998
Business Intelligence Platform Administrator Guide ■ SAP BusinessObjects Business Intelligence platform 4.0 Feature Pack 3 2012-03-22

Business Intelligence Platform Administrator Guide

Embed Size (px)

Citation preview

Business Intelligence Platform Administrator Guide SAP BusinessObjects Business Intelligence platform 4.0 Feature Pack 3

2012-03-22

Copyright

2011 SAP AG. All rights reserved.SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries.Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects Software Ltd. Business Objects is an SAP company.Sybase and Adaptive Server, iAnywhere, Sybase 365, SQL Anywhere, and other Sybase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Sybase, Inc. Sybase is an SAP company. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary.These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. 2012-03-22

Contents

Chapter 1

Document History.................................................................................................................19

Chapter 2

Getting Started......................................................................................................................21 About this help.......................................................................................................................21 Who should use this help?.....................................................................................................21 About SAP BusinessObjects Business Intelligence platform .................................................21 Variables................................................................................................................................22 Before you start.....................................................................................................................22 Key concepts.........................................................................................................................22 Key administrative tools.........................................................................................................25 Key tasks...............................................................................................................................27 Architecture...........................................................................................................................31 Architecture overview............................................................................................................31 Architecture diagram..............................................................................................................32 Architecture tiers...................................................................................................................33 Databases..............................................................................................................................34 Servers..................................................................................................................................35 Web application servers.........................................................................................................36 Software Development Kits...................................................................................................37 Data sources.........................................................................................................................39 Authentication and single sign-on...........................................................................................40 SAP integration......................................................................................................................42 Lifecycle management (LCM).................................................................................................43 Integrated version control.......................................................................................................43 Upgrade path.........................................................................................................................44 Services and servers..............................................................................................................44 Server changes since XI 3.1...................................................................................................46 Services.................................................................................................................................47 Service categories.................................................................................................................55 Server types..........................................................................................................................57 Servers..................................................................................................................................60

2.1 2.1.1 2.1.2 2.1.3 2.2 2.2.1 2.2.2 2.2.3Chapter 3

3.1 3.1.1 3.1.2 3.1.3 3.1.4 3.1.5 3.1.6 3.1.7 3.1.8 3.1.9 3.1.10 3.1.11 3.1.12 3.2 3.2.1 3.2.2 3.2.3 3.2.4 3.2.5

3

2012-03-22

Contents

3.3 3.3.1 3.3.2 3.3.3 3.3.4 3.4 3.4.1 3.4.2 3.4.3 3.4.4 3.4.5Chapter 4

Client applications..................................................................................................................62 Installed with SAP BusinessObjects Business Intelligence Platform Client Tools....................63 Installed with SAP BusinessObjects Business Intelligence Platform.......................................68 Available separately...............................................................................................................69 Web application clients..........................................................................................................70 Process Workflows................................................................................................................74 Startup and authentication.....................................................................................................74 Program objects.....................................................................................................................76 Crystal Reports......................................................................................................................77 Web Intelligence....................................................................................................................81 Analysis.................................................................................................................................83 Managing Licenses...............................................................................................................85 Managing License keys..........................................................................................................85 To view license information....................................................................................................85 To add a license key...............................................................................................................85 To view current account activity.............................................................................................86 Measuring licenses................................................................................................................86 To run a license audit.............................................................................................................87 Managing Users and Groups................................................................................................89 Account management overview..............................................................................................89 User management..................................................................................................................89 Group management...............................................................................................................90 Available authentication types ...............................................................................................91 Managing Enterprise and general accounts............................................................................93 To create a user account........................................................................................................93 To modify a user account.......................................................................................................94 To delete a user account........................................................................................................94 To create a new group...........................................................................................................95 To modify a group's properties...............................................................................................95 To view group members.........................................................................................................96 To add subgroups..................................................................................................................96 To specify group membership................................................................................................97 To delete a group...................................................................................................................97 To add users or user groups in bulk.......................................................................................98 To enable the Guest account.................................................................................................98 Adding users to groups..........................................................................................................99 Changing password settings................................................................................................100 Granting access to users and groups...................................................................................102

4.1 4.1.1 4.1.2 4.1.3 4.2 4.2.1Chapter 5

5.1 5.1.1 5.1.2 5.1.3 5.2 5.2.1 5.2.2 5.2.3 5.2.4 5.2.5 5.2.6 5.2.7 5.2.8 5.2.9 5.2.10 5.2.11 5.2.12 5.2.13 5.2.14

4

2012-03-22

Contents

5.2.15 5.2.16 5.2.17 5.2.18 5.2.19 5.2.20 5.3 5.3.1 5.3.2 5.3.3 5.3.4 5.3.5Chapter 6

Controlling access to user inboxes.......................................................................................102 Configuring BI launch pad options........................................................................................103 Managing attributes for system users .................................................................................106 Prioritizing user attributes across multiple authentication options.........................................107 To add a new user attribute..................................................................................................108 To edit extended user attributes...........................................................................................109 Managing aliases.................................................................................................................109 To create a user and add a third-party alias..........................................................................110 To create a new alias for an existing user.............................................................................110 To assign an alias from another user....................................................................................111 To delete an alias.................................................................................................................112 To disable an alias................................................................................................................112 Setting Rights......................................................................................................................115 How rights work in BI platform.............................................................................................115 Access levels.......................................................................................................................115 Advanced rights settings......................................................................................................116 Inheritance...........................................................................................................................117 Type-specific rights..............................................................................................................122 Determining effective rights.................................................................................................123 Managing security settings for objects in the CMC..............................................................124 To view rights for a principal on an object.............................................................................124 To assign principals to an access control list for an object....................................................125 To modify security for a principal on an object......................................................................125 To set rights on a top-level folder in BI platform....................................................................126 Checking security settings for a principal.............................................................................126 Working with access levels..................................................................................................129 Choosing between View and View On Demand access levels.............................................131 To copy an existing access level..........................................................................................132 To create a new access level...............................................................................................132 To rename an access level...................................................................................................133 To delete an access level.....................................................................................................133 To modify rights in an access level.......................................................................................133 Tracing the relationship between access levels and objects.................................................134 Managing access levels across sites....................................................................................135 Breaking inheritance.............................................................................................................136 To disable inheritance...........................................................................................................137 Using rights to delegate administration.................................................................................137 Choosing between Modify the rights users have to objects options.....................................139 Owner rights........................................................................................................................140 Summary of recommendations for rights administration.......................................................140

6.1 6.1.1 6.1.2 6.1.3 6.1.4 6.1.5 6.2 6.2.1 6.2.2 6.2.3 6.2.4 6.2.5 6.3 6.3.1 6.3.2 6.3.3 6.3.4 6.3.5 6.3.6 6.3.7 6.3.8 6.4 6.4.1 6.5 6.5.1 6.5.2 6.6

5

2012-03-22

Contents

Chapter 7

Securing the BI platform.....................................................................................................143 Security overview ................................................................................................................143 Disaster recovery planning...................................................................................................143 General recommendations for securing your deployment.....................................................144 Configuring security for bundled third-party servers.............................................................145 Active trust relationship........................................................................................................145 Logon tokens.......................................................................................................................145 Ticket mechanism for distributed security.............................................................................146 Sessions and session tracking.............................................................................................147 CMS session tracking..........................................................................................................147 Environment protection........................................................................................................148 Web browser to web server.................................................................................................148 Web server to BI platform....................................................................................................148 Auditing security configuration modifications .......................................................................148 Auditing web activity............................................................................................................149 Protection against malicious logon attempts.........................................................................149 Password restrictions...........................................................................................................149 Logon restrictions................................................................................................................150 User restrictions..................................................................................................................150 Guest account restrictions...................................................................................................150 Processing extensions.........................................................................................................151 Overview of BI platform data security...................................................................................151 Data processing security modes..........................................................................................152 Cryptography in BI platform..................................................................................................154 Working with cluster keys....................................................................................................154 Cryptographic Officers.........................................................................................................156 Managing cryptographic keys in the CMC............................................................................158 Configuring servers for SSL.................................................................................................162 Creating key and certificate files..........................................................................................162 Configuring the SSL protocol...............................................................................................165 Understanding communication between BI platform components.........................................169 Overview of BI platform servers and communication ports...................................................169 Communication between BI platform components ...............................................................172 Configuring BI platform for firewalls......................................................................................178 To configure the system for firewalls....................................................................................178 Debugging a firewalled deployment......................................................................................181 Examples of typical firewall scenarios...................................................................................183 Example - Application tier deployed on a separate network..................................................183 Example - Thick client and database tier separated from BI platform servers by a firewall.....185 Firewall settings for integrated environments.......................................................................188

7.1 7.2 7.3 7.4 7.5 7.5.1 7.5.2 7.6 7.6.1 7.7 7.7.1 7.7.2 7.8 7.9 7.9.1 7.9.2 7.9.3 7.9.4 7.9.5 7.10 7.11 7.11.1 7.12 7.12.1 7.12.2 7.12.3 7.13 7.13.1 7.13.2 7.14 7.14.1 7.14.2 7.15 7.15.1 7.15.2 7.16 7.16.1 7.16.2 7.17

6

2012-03-22

Contents

7.17.1 7.17.2 7.17.3 7.17.4 7.17.5 7.18 7.18.1 7.18.2 7.19 7.19.1 7.19.2 7.19.3 7.19.4 7.19.5 7.20 7.20.1 7.20.2 7.20.3Chapter 8

Specific firewall guidelines for SAP integration.....................................................................188 Firewall configuration for JD Edwards EnterpriseOne integration..........................................190 Specific firewall guidelines for Oracle EBS...........................................................................192 Firewall configuration for PeopleSoft Enterprise integration .................................................193 Firewall configuration for Siebel integration..........................................................................195 BI platform and reverse proxy servers .................................................................................196 Supported reverse proxy servers ........................................................................................196 Understanding how web applications are deployed .............................................................197 Configuring reverse proxy servers for BI platform web applications......................................197 Detailed instructions for configuring reverse proxy servers..................................................197 To configure the reverse proxy server..................................................................................198 To configure Apache 2.2 reverse proxy server for BI platform .............................................198 To configure WebSEAL 6.0 reverse proxy server for BI platform .........................................199 To configure Microsoft ISA 2006 for BI platform .................................................................200 Special configuration for BI platform in reverse proxy deployments......................................201 Enabling reverse proxy for web services..............................................................................202 Enabling the root path for session cookies for ISA 2006......................................................204 Enabling reverse proxy for SAP BusinessObjects Live Office...............................................206 Authentication.....................................................................................................................209 Authentication options in BI platform....................................................................................209 Primary authentication..........................................................................................................209 Security plug-ins..................................................................................................................211 Single sign-on to BI platform................................................................................................211 Enterprise authentication......................................................................................................214 Enterprise authentication overview.......................................................................................214 Enterprise authentication settings.........................................................................................214 To change Enterprise settings..............................................................................................215 Enabling Trusted Authentication...........................................................................................217 Configuring Trusted Authentication for a web application.....................................................218 LDAP authentication............................................................................................................228 Using LDAP authentication..................................................................................................228 Configuring LDAP authentication..........................................................................................229 Mapping LDAP groups.........................................................................................................239 Windows AD authentication.................................................................................................248 Overview..............................................................................................................................248 Preparing for AD authentication (Kerberos)..........................................................................252 AD authentication single sign-on..........................................................................................262 Mapping AD groups and configuring AD authentication........................................................272 Troubleshooting Windows AD authentication.......................................................................276 SAP authentication...............................................................................................................278

8.1 8.1.1 8.1.2 8.1.3 8.2 8.2.1 8.2.2 8.2.3 8.2.4 8.2.5 8.3 8.3.1 8.3.2 8.3.3 8.4 8.4.1 8.4.2 8.4.3 8.4.4 8.4.5 8.5

7

2012-03-22

Contents

8.5.1 8.5.2 8.5.3 8.5.4 8.5.5 8.5.6 8.5.7 8.5.8 8.6 8.6.1 8.6.2 8.6.3 8.6.4 8.6.5 8.7 8.7.1 8.7.2 8.7.3 8.7.4 8.8 8.8.1 8.8.2 8.8.3 8.9 8.9.1 8.9.2 8.9.3 8.9.4 8.9.5Chapter 9

Configuring SAP authentication ...........................................................................................278 Creating a user account for BI platform................................................................................279 Connecting to SAP entitlement systems..............................................................................280 Setting SAP Authentication options.....................................................................................282 Importing SAP roles.............................................................................................................286 Configuring Secure Network Communication (SNC)............................................................290 Setting up single sign-on to the SAP system........................................................................303 Configuring SSO for SAP Crystal Reports and SAP NetWeaver..........................................307 PeopleSoft authentication....................................................................................................308 Overview..............................................................................................................................308 Enabling PeopleSoft Enterprise authentication......................................................................308 Mapping PeopleSoft roles to the BI Platform........................................................................309 Scheduling user updates......................................................................................................312 Using the PeopleSoft Security Bridge..................................................................................314 JD Edwards authentication...................................................................................................324 Overview..............................................................................................................................324 Enabling JD Edwards EnterpriseOne authentication..............................................................324 Mapping JD Edwards EnterpriseOne roles to BI Platform.....................................................325 Scheduling user updates......................................................................................................328 Siebel authentication............................................................................................................329 Enabling Siebel authentication..............................................................................................330 Mapping roles to BI platform................................................................................................330 Scheduling user updates......................................................................................................333 Oracle EBS authentication...................................................................................................335 Enabling Oracle EBS authentication......................................................................................335 Mapping Oracle E-Business Suite roles to BI platform..........................................................336 Unmapping roles .................................................................................................................340 Customizing rights for mapped Oracle EBS groups and users .............................................340 Configuring Single Sign-on (SSO) for SAP Crystal Reports and Oracle EBS........................342 Server Administration..........................................................................................................343 Server administration...........................................................................................................343 Working with the Servers management area in the CMC.....................................................343 Managing servers by using scripts on Windows ..................................................................347 Managing servers on Unix ...................................................................................................347 Managing License keys........................................................................................................347 Measuring licenses..............................................................................................................349 Viewing and changing a server's status................................................................................350 Adding, cloning, or deleting servers......................................................................................355 Clustering Central Management Servers..............................................................................358 Managing server groups.......................................................................................................362

9.1 9.1.1 9.1.2 9.1.3 9.1.4 9.1.5 9.1.6 9.1.7 9.1.8 9.1.9

8

2012-03-22

Contents

9.1.10 9.1.11 9.1.12 9.1.13 9.1.14 9.1.15 9.1.16Chapter 10

Assessing your system's performance.................................................................................367 Configuring server settings..................................................................................................369 Configuring server network settings.....................................................................................373 Managing Nodes..................................................................................................................380 Renaming a machine in a BI platform deployment.................................................................402 Using 32-bit and 64-bit third-party libraries with BI platform..................................................408 Managing server and node placeholders..............................................................................409 Managing Central Management Server (CMS) databases.................................................411 Managing CMS system database connections.....................................................................411 To select SAP HANA as a CMS database...........................................................................411 Selecting a new or existing CMS database..........................................................................412 To select a new or existing CMS database on Windows......................................................413 To select a new or existing CMS database on Unix..............................................................413 Recreating the CMS system database.................................................................................414 To recreate the CMS system database on Windows............................................................414 To recreate the CMS system database on Unix...................................................................415 Copying data from one CMS system database to another...................................................416 Preparing to copy a CMS system database.........................................................................416 To copy a CMS system database on Windows....................................................................417 To copy data from a CMS system database on Unix............................................................417 Managing Web Application Container Servers (WACS).....................................................419 WACS.................................................................................................................................419 Web Application Container Server (WACS).........................................................................419 Adding or removing additional WACS to your deployment...................................................422 Adding or removing services to WACS................................................................................426 Configuring HTTPS/SSL......................................................................................................427 Supported authentication methods.......................................................................................431 Configuring AD Kerberos for WACS ...................................................................................432 Configuring AD Kerberos single sign-on ..............................................................................438 Configuring RESTful web services........................................................................................440 WACS and your IT environment...........................................................................................444 Configuring web application properties.................................................................................446 Troubleshooting...................................................................................................................447 WACS properties.................................................................................................................451 Backing Up and Restoring..................................................................................................453 Backing up and restoring your system..................................................................................453 Backups...............................................................................................................................454

10.1 10.1.1 10.2 10.2.1 10.2.2 10.3 10.3.1 10.3.2 10.4 10.4.1 10.4.2 10.4.3Chapter 11

11.1 11.1.1 11.1.2 11.1.3 11.1.4 11.1.5 11.1.6 11.1.7 11.1.8 11.1.9 11.1.10 11.1.11 11.1.12Chapter 12

12.1 12.1.1

9

2012-03-22

Contents

12.1.2 12.1.3Chapter 13

Restoring your system.........................................................................................................460 BackupCluster and RestoreCluster scripts...........................................................................468 Copying your deployment...................................................................................................473 Overview of system copying................................................................................................473 Terminology.........................................................................................................................473 Use cases............................................................................................................................473 Planning to copy your system...............................................................................................475 Considerations and limitations..............................................................................................476 System copy procedure.......................................................................................................478 To perform a system copy export from a source system......................................................478 To perform a system copy import to a target system...........................................................481 Version Management..........................................................................................................483 Managing Different Versions of BI resources ......................................................................483 Using the Version Management System Settings Option.....................................................484 Setting the ClearCase Version Management System in Windows.......................................485 Setting the ClearCase Version Management System in Unix...............................................485 kComparing different versions of an LCM job......................................................................486 Upgrading Subversion content.............................................................................................486 Promotion Management......................................................................................................489 Welcome to promotion management....................................................................................489 Promotion Management Overview.......................................................................................489 Promotion Management Features........................................................................................489 Application Access Rights....................................................................................................490 Getting Started with the promotion management tool..........................................................491 Accessing the promotion management application...............................................................491 User Interface components..................................................................................................491 Using the Settings Option....................................................................................................493 Using the promotion management tool.................................................................................499 Creating and Deleting a Folder.............................................................................................500 Creating a Job.....................................................................................................................501 Creating a New Job by Copying an Existing Job .................................................................504 Searching for a Job..............................................................................................................504 Editing a Job........................................................................................................................505 Adding an Infoobject in promotion management...................................................................505 Managing Dependencies in promotion management ...........................................................506 Searching for Dependents ..................................................................................................507 Promoting a Job When the Repositories are Connected......................................................508

13.1 13.2 13.3 13.4 13.5 13.6 13.6.1 13.6.2Chapter 14

14.1 14.2 14.2.1 14.2.2 14.3 14.4Chapter 15

15.1 15.1.1 15.1.2 15.1.3 15.2 15.2.1 15.2.2 15.2.3 15.3 15.3.1 15.3.2 15.3.3 15.3.4 15.3.5 15.3.6 15.3.7 15.3.8 15.3.9

10

2012-03-22

Contents

15.3.10 15.3.11 15.3.12 15.3.13 15.4 15.4.1 15.4.2 15.5 15.5.1 15.5.2 15.5.3 15.5.4 15.6 15.6.1 15.6.2 15.6.3Chapter 16

Promoting a Job by Using a BIAR File..................................................................................510 Scheduling a Job Promotion.................................................................................................513 Viewing the History of a Job................................................................................................514 Rolling Back a Job...............................................................................................................515 Managing Different Versions of an Infoobject.......................................................................517 Version Management application access rights....................................................................518 Backing Up and Restoring Subversion Files.........................................................................519 Using the Command Line Option.........................................................................................520 Running the Command Line Option in Windows...................................................................520 Running the Command Line Option in UNIX.........................................................................521 Command Line Option Parameters......................................................................................522 Sample Properties File.........................................................................................................528 Using the Enhanced Change and Transport System.............................................................529 Pre-requisites.......................................................................................................................530 Configuring the Business Intelligence Platform and CTS+ Integration...................................530 Promoting a Job Using CTS.................................................................................................533 Visual Difference.................................................................................................................537 Visual Difference in the promotion management tool............................................................537 Comparing objects or files by using visual difference...........................................................538 Comparing objects or files in version management system..................................................539 Scheduling the comparison..................................................................................................540 Managing Applications.......................................................................................................543 Managing applications through the CMC..............................................................................543 Overview..............................................................................................................................543 Common settings for applications........................................................................................544 Application-specific settings.................................................................................................545 Managing applications through BOE.war properties.............................................................573 The BOE war file..................................................................................................................573 Customizing BI launch pad and OpenDocument logon entry points......................................582 BI launch pad and OpenDocument file locations...................................................................582 To define a custom logon page............................................................................................583 To add trusted authentication at logon..................................................................................584 Managing Connections and Universes...............................................................................587 Managing connections.........................................................................................................587 To delete a universe connection...........................................................................................587 Managing universes.............................................................................................................588 To delete universes..............................................................................................................588

16.1 16.1.1 16.1.2 16.1.3Chapter 17

17.1 17.1.1 17.1.2 17.1.3 17.2 17.2.1 17.3 17.3.1 17.3.2 17.3.3Chapter 18

18.1 18.1.1 18.2 18.2.1

11

2012-03-22

Contents

Chapter 19

Monitoring...........................................................................................................................589 About Monitoring.................................................................................................................589 Monitoring terms..................................................................................................................589 Architecture.........................................................................................................................591 Cluster support for monitoring server...................................................................................594 Metrics................................................................................................................................595 CMS Query metrics.............................................................................................................607 Configuration properties.......................................................................................................607 JMX end point URL..............................................................................................................611 Integrating with other applications........................................................................................613 Integrating the monitoring application with IBM Tivoli............................................................613 Integrating the monitoring application with SAP Solution Manager ......................................616 Creating Universe for Derby Database.................................................................................616 Audit DB Support for Monitoring .........................................................................................617 Pre-Requisites......................................................................................................................618 Configuring SBO files..........................................................................................................618 Adding alias names in the SBO file ......................................................................................619 Monitoring Database Migration............................................................................................620 Pre-requisites.......................................................................................................................620 Preparing the Target Database ............................................................................................620 Creating CSV dumps...........................................................................................................621 Restoring contents on the target database...........................................................................621 Validating the Migration .......................................................................................................622 Troubleshooting...................................................................................................................622 Dashboard...........................................................................................................................623 Alerts...................................................................................................................................623 Watchlist..............................................................................................................................623 Probes.................................................................................................................................624 Metrics................................................................................................................................625 Graph...................................................................................................................................625 Auditing...............................................................................................................................627 Overview..............................................................................................................................627 CMC Auditing page.............................................................................................................633 Auditing Status Summary.....................................................................................................633 Configuring Auditing events.................................................................................................635 Auditing Data Store configuration settings...........................................................................637 Audit events.........................................................................................................................638 Audit events and details.......................................................................................................647

19.1 19.2 19.2.1 19.3 19.4 19.4.1 19.5 19.5.1 19.6 19.6.1 19.6.2 19.7 19.8 19.8.1 19.8.2 19.8.3 19.9 19.9.1 19.9.2 19.9.3 19.9.4 19.9.5 19.10 19.10.1 19.10.2 19.10.3 19.10.4 19.10.5 19.10.6Chapter 20

20.1 20.2 20.2.1 20.2.2 20.2.3 20.3 20.3.1

12

2012-03-22

Contents

Chapter 21

Platform Search...................................................................................................................665 Understanding Platform Search............................................................................................665 Platform Search SDK...........................................................................................................665 Clustered Environment.........................................................................................................666 Setting Up Platform Search..................................................................................................666 Deploying OpenSearch........................................................................................................666 Configuring reverse proxy....................................................................................................668 Configuring Application Properties in CMC..........................................................................668 Working with Platform Search..............................................................................................673 Indexing Content in the CMS Repository.............................................................................673 Searching Results................................................................................................................675 Integrating Platform Search with SAP NetWeaver Enterprise Search...................................682 Creating a Connector in SAP NetWeaver Enterprise Search ...............................................682 Importing a User's Role in SAP BusinessObjects Business Intelligence Authentication........683 Searching from NetWeaver Enterprise Search.....................................................................683 Auditing................................................................................................................................684 Troubleshooting...................................................................................................................685 Self Healing..........................................................................................................................685 Problem Scenarios...............................................................................................................685 Federation...........................................................................................................................689 Federation............................................................................................................................689 Federation terms..................................................................................................................690 BI application .......................................................................................................................690 Destination site ...................................................................................................................691 Local....................................................................................................................................691 Locally run completed instances ..........................................................................................691 Multiple origin sites .............................................................................................................691 One-way replication .............................................................................................................691 Origin site ...........................................................................................................................692 Remote................................................................................................................................692 Remote connection..............................................................................................................692 Remote scheduling..............................................................................................................692 Replication...........................................................................................................................692 Replication job.....................................................................................................................692 Replication list......................................................................................................................693 Replication object.................................................................................................................693 Replication package.............................................................................................................693 Replication refresh...............................................................................................................693

21.1 21.1.1 21.1.2 21.2 21.2.1 21.2.2 21.2.3 21.3 21.3.1 21.3.2 21.4 21.4.1 21.4.2 21.5 21.6 21.7 21.7.1 21.7.2Chapter 22

22.1 22.2 22.2.1 22.2.2 22.2.3 22.2.4 22.2.5 22.2.6 22.2.7 22.2.8 22.2.9 22.2.10 22.2.11 22.2.12 22.2.13 22.2.14 22.2.15 22.2.16

13

2012-03-22

Contents

22.2.17 22.3 22.3.1 22.3.2 22.3.3 22.3.4 22.3.5 22.4 22.4.1 22.4.2 22.4.3 22.5 22.6 22.7 22.7.1 22.7.2 22.8 22.8.1 22.8.2 22.9 22.9.1 22.9.2 22.9.3 22.9.4 22.10 22.10.1 22.10.2 22.10.3 22.11 22.11.1 22.11.2 22.12 22.12.1 22.12.2 22.12.3 22.13 22.13.1 22.13.2 22.13.3 22.14 22.14.1

Two-way replication..............................................................................................................693 Managing security rights......................................................................................................694 Rights required on the origin site..........................................................................................694 Rights required on the destination site.................................................................................695 Federation-specific rights.....................................................................................................696 Replicating security on an object..........................................................................................698 Replicating security using access levels...............................................................................698 Replication types and mode options.....................................................................................699 One-way replication .............................................................................................................699 Two-way replication .............................................................................................................699 Refresh from origin or refresh from destination....................................................................700 Replicating third-party users and groups...............................................................................701 Replicating universes and universe connections...................................................................702 Managing replication lists.....................................................................................................703 Creating replication lists.......................................................................................................704 Modifying Replication Lists...................................................................................................706 Managing remote connections.............................................................................................707 Creating remote connections...............................................................................................707 Modifying remote connections.............................................................................................709 Managing replication jobs.....................................................................................................710 Creating replication jobs.......................................................................................................710 Scheduling replication jobs...................................................................................................713 Modifying replication jobs.....................................................................................................714 Viewing a log after a replication job......................................................................................714 Managing object cleanup......................................................................................................715 How to use object cleanup...................................................................................................715 Object cleanup limits............................................................................................................716 Object cleanup frequency.....................................................................................................716 Managing conflict detection and resolution...........................................................................717 One-way replication conflict resolution.................................................................................718 Two-way replication conflict resolution.................................................................................719 Using Web Services in Federation.......................................................................................722 Session variables ................................................................................................................722 File caching .........................................................................................................................723 Custom deployment ............................................................................................................723 Remote scheduling and locally run instances........................................................................724 Remote scheduling..............................................................................................................724 Locally run instances............................................................................................................725 Instance share......................................................................................................................726 Importing and promoting replicated content..........................................................................727 Importing replicated content.................................................................................................727

14

2012-03-22

Contents

22.14.2 22.14.3 22.14.4 22.15 22.15.1 22.15.2Chapter 23

Importing replicated content and continuing replication ........................................................727 Promoting content from a test environment..........................................................................728 Re-pointing a destination site...............................................................................................729 Best practices......................................................................................................................729 Current release limitations....................................................................................................732 Troubleshooting error messages..........................................................................................733 Supplementary Configurations for ERP Environments........................................................737 Configurations for SAP NetWeaver integration....................................................................737 Integrating with SAP NetWeaver Business Warehouse (BW)...............................................737 Configuring for JD Edwards integration................................................................................785 Configuring Single Sign-on (SSO) for SAP Crystal Reports.................................................786 Configuring Secure Socket Layer for JD Edwards Integrations............................................786 Configuring for PeopleSoft Enterprise integration.................................................................788 Configuring Single Sign-on (SSO) for SAP Crystal Reports and PeopleSoft Enterprise........788 Configuring Secure Socket Layer communication................................................................789 Performance Tuning for PeopleSoft systems........................................................................791 Configuring for Siebel integration.........................................................................................792 Configuring Siebel to integrate with SAP BusinessObjects Business Intelligence platform....792 Creating the Crystal Reports menu item..............................................................................793 Contextual awareness..........................................................................................................795 Configuring Single Sign-on (SSO) for SAP Crystal Reports and Siebel................................797 Configuring for Secure Sockets Layer Communication........................................................798 Managing and Configuring Logs.........................................................................................799 Logging traces from components.........................................................................................799 Trace log levels....................................................................................................................799 Configuring tracing for servers.............................................................................................800 To set the server trace log level in the CMC........................................................................801 To set the trace log level for multiple servers managed in the CMC.....................................801 To configure server tracing through the BO_trace.ini file......................................................802 Configuring tracing for web applications...............................................................................805 To set the web application trace log level in the CMC..........................................................805 To manually modify tracing settings through the BO_trace.ini file.........................................806 Configuring tracing for upgrade management tool................................................................811 To configure tracing for upgrade management tool...............................................................811 Integration to SAP Solution Manager..................................................................................813 Integration overview.............................................................................................................813 SAP Solution Manager integration checklist.........................................................................813

23.1 23.1.1 23.2 23.2.1 23.2.2 23.3 23.3.1 23.3.2 23.3.3 23.4 23.4.1 23.4.2 23.4.3 23.4.4 23.4.5Chapter 24

24.1 24.2 24.3 24.3.1 24.3.2 24.3.3 24.4 24.4.1 24.4.2 24.5 24.5.1Chapter 25

25.1 25.2

15

2012-03-22

Contents

25.3 25.3.1 25.3.2 25.3.3 25.4 25.4.1 25.4.2 25.4.3 25.5 25.5.1 25.5.2 25.5.3 25.5.4 25.6Chapter 26

Managing system landscape directory registration...............................................................815 Registration of BI platform in the System Landscape...........................................................815 When is SLD registration triggered?....................................................................................816 Logging SLD connectivity ...................................................................................................817 Managing Solution Management Diagnostics agents...........................................................817 Solution Manager Diagnostics (SMD) overview...................................................................817 Working with SMD agents...................................................................................................818 SMAdmin user account........................................................................................................818 Managing performance instrumentation................................................................................819 Performance instrumentation for BI platform........................................................................819 Setting up performance instrumentation for BI platform........................................................819 Performance instrumentation for the web tier.......................................................................821 Instrumentation log files ......................................................................................................821 Tracing with SAP Passport...................................................................................................821 Command Line Administration............................................................................................823 Unix scripts..........................................................................................................................823 Script utilities.......................................................................................................................823 Script templates...................................................................................................................829 Scripts used by SAP BusinessObjects Business Intelligence platform.................................829 Windows scripts..................................................................................................................831 ccm.exe...............................................................................................................................831 Server Command Lines........................................................................................................834 Command lines overview.....................................................................................................834 Standard options for all servers............................................................................................835 Central Management Server................................................................................................836 Crystal Reports Processing Server and Crystal Reports Cache Server................................837 Dashboards Processing Server and Dashboards Cache Server...........................................838 Job servers..........................................................................................................................839 Adaptive Processing Server.................................................................................................840 Report Application Server....................................................................................................841 Web Intelligence Processing Server.....................................................................................842 Input and Output File Repository Servers.............................................................................844 Event Server........................................................................................................................844 Dashboard and Dashboard Analytics Servers .....................................................................845 Rights Appendix..................................................................................................................847 About the rights appendix.....................................................................................................847 General rights......................................................................................................................847 Rights for specific object types............................................................................................850

26.1 26.1.1 26.1.2 26.1.3 26.2 26.2.1 26.3 26.3.1 26.3.2 26.3.3 26.3.4 26.3.5 26.3.6 26.3.7 26.3.8 26.3.9 26.3.10 26.3.11 26.3.12Chapter 27

27.1 27.2 27.3

16

2012-03-22

Contents

27.3.1 27.3.2 27.3.3 27.3.4 27.3.5 27.3.6 27.3.7 27.3.8 27.3.9 27.3.10 27.3.11 27.3.12Chapter 28

Folder rights.........................................................................................................................850 Categories...........................................................................................................................850 Notes...................................................................................................................................851 Crystal reports.....................................................................................................................851 Web Intelligence documents................................................................................................852 Users and groups.................................................................................................................853 Access levels.......................................................................................................................854 Universe (.unv) rights...........................................................................................................855 Universe (.unx) rights...........................................................................................................856 Universe object-access levels..............................................................................................858 Connection rights.................................................................................................................859 Applications.........................................................................................................................861 Server Properties Appendix.................................................................................................873 About the server properties appendix...................................................................................873 Common server properties..................................................................................................873 Core Services properties.....................................................................................................876 Connectivity Services properties..........................................................................................890 Crystal Reports Services properties....................................................................................895 Analysis Services properties................................................................................................904 Data Federation Services properties....................................................................................906 Web Intelligence Services properties...................................................................................907 Dashboards Services properties..........................................................................................918 Server Metrics Appendix.....................................................................................................923 About the Server Metrics Appendix.....................................................................................923 Common Server Metrics .....................................................................................................923 Central Management Server Metrics...................................................................................926 Connection Server metrics...................................................................................................930 Event Server Metrics...........................................................................................................931 File Repository Server Metrics.............................................................................................932 Adaptive Processing Server metrics.....................................................................................932 Web Application Container Server Metrics..........................................................................938 Adaptive Job Server metrics................................................................................................938 Crystal Report Server metrics..............................................................................................941 Web Intelligence Server metrics...........................................................................................944 Dashboards Server metrics..................................................................................................946 Server and Node Placeholder Appendix..............................................................................949 Server and node placeholders..............................................................................................949

28.1 28.1.1 28.1.2 28.1.3 28.1.4 28.1.5 28.1.6 28.1.7 28.1.8Chapter 29

29.1 29.1.1 29.1.2 29.1.3 29.1.4 29.1.5 29.1.6 29.1.7 29.1.8 29.1.9 29.1.10 29.1.11Chapter 30

30.1

17

2012-03-22

Contents

Chapter 31

Auditing Data Store Schema Appendix...............................................................................963 Overview..............................................................................................................................963 Schema diagram..................................................................................................................963 Auditing Data Store tables...................................................................................................964 System Copy Worksheet.....................................................................................................975 System copy worksheet.......................................................................................................975 More Information.................................................................................................................977 981

31.1 31.2 31.3Chapter 32

32.1Appendix A Index

18

2012-03-22

Document History

Document History

The following table provides an overview of the most important document changes.Version Date Description

SAP BusinessObjects Business Intelligence platform 4.0

Nov. 2011

First release of this document.

19

2012-03-22

Document History

Version

Date

Description

Additions to this release: Importing users and groups in bulk using the CCM, see To add users or user groups in bulk. Extending attributes for both imported and Enterprise user accounts, see Managing attributes for system users . Using the LDAP plugin to configure single sign-on to a SAP HANA database through JDBC, see "". SQL Anywhere is now available as an ODBC data source. For node management with SQL Anywhere on Unix machines, see To prepare a Unix machine for SQL Anywhere. Best practices designed to prevent issues that can arise as a result of changes to machine names, IP addresses, cluster names, and server names, see "Renaming a machine in a BI platform deployment". March 2012 To select SAP HANA as a CMS database after the initial installation of BI platform, see To select SAP HANA as a CMS database. Configuring the RESTful Web Service ihosted on a WACS server, see Configuring RESTful web services. Performing a "Hot backup", creating a backup copy without having to stop the servers, see Hot backups. Creating a copy of a BI platform deployment for testing, standby, or other purposes, see Overview of system copying. Enabling and configuring integration details for the SAP StreamWork application, see Managing SAP StreamWork integration. Creating and assigning tasks to delegated administrators, see Delegated administration and CMC tab access. A self-healing mechanism for Platform Search is now available, see Self Healing. The following content has been removed: All references to role-based licensing, BI Analyst and BI Viewer user accounts.

SAP BusinessObjects Business Intelligence platform 4.0 Feature Pack 3

20

2012-03-22

Getting Started

Getting Started

2.1 About this helpThis help provides you with information and procedures for deploying and configuring your BI platform. Procedures are provided for common tasks. Conceptual information and technical details are provided for all advanced topics. For information about installing this product, see the SAP BusinessObjects Business Intelligence Platform Installation Guide.

2.1.1 Who should use this help?This help covers deployment and configuration tasks. We recommend consulting this guide if you are: planning your first deployment configuring your first deployment making significant changes to the architecture of an existing deployment improving your system's performance.

This help is intended for system administrators who are responsible for configuring, managing, and maintaining a BI platform installation. Familiarity with your operating system and your network environment is beneficial, as is a general understanding of web application server management and scripting technologies. However, to assist all levels of administrative experience, this help aims to provide sufficient background and conceptual information to clarify all administrative tasks and features.

2.1.2 About SAP BusinessObjects Business Intelligence platformThe BI platform is a flexible, scalable, and reliable solution for delivering powerful, interactive reports to end users via any web applicationintranet, extranet, Internet or corporate portal. Whether it is used for distributing weekly sales reports, providing customers with personalized service offerings, or integrating critical information into corporate portals, BI platform delivers tangible benefits that extend

21

2012-03-22

Getting Started

across and beyond the organization. As an integrated suite for reporting, analysis, and information delivery, the platform provides a solution for increasing end-user productivity and reducing administrative efforts.

2.1.3 VariablesThe following variables are used throughout this guide:Variable Description

The directory where BI platform is installed. On Windows, the default directory is C:\Program Files (x86)\SAP BusinessObjects\. The name of your Unix operating system. Acceptable values are: aix_rs6000_64 linux_x64 solaris_sparcv9 hpux_ia64 The directory where scripts for administering BI platform are located On Windows: \SAP BusinessObjects Enterprise XI 4.0\win64_x64\scripts On Unix: /sap_bobj/enterprise_xi40//scripts

2.2 Before you start

2.2.1 Key concepts

22

2012-03-22

Getting Started

2.2.1.1 Services and serversBI platform uses service and server to refer to the two types of software running on a BI platform computer. A service is a server subsystem that performs a specific function. The service runs in the memory space of its server, under the process ID of the parent container (server). For example, the Web Intelligence Scheduling Service is a subsystem that runs on the Adaptive Job Server. A server is a process at the operating system level (on some systems, called a daemon) that hosts one or more services. For example, the Central Management Server (CMS) and Adaptive Processing Server are servers. A server runs on a specific operating system account and has its own PID. A node is a collection of BI platform servers running on the same host and managed by the same Server Intelligence Agent (SIA). One or more nodes can be on a single host. BI platform can be installed on one computer, spread across different computers on an intranet, or separated over a wide area network (WAN). Services, servers, nodes, and hosts The following diagram shows a hypothetical installation of BI platform. The number of services, servers, nodes, and hostsand the type of services and serversvaries in actual installations.

23

2012-03-22

Getting Started

Two hosts form the cluster named ProductionBISystem, which has two hosts: The host named HostAlpha has BI platform installed and is configured with two nodes: NodeMercury contains an Adaptive Job Server (NodeMercury.AJS) with services to schedule and publish reports, an Input File Repository Server (NodeMercury.IFRS) with a service to store input reports, and an Output File Repository Server (NodeMercury.OFRS) with a service to store report output. NodeVenus contains an Adaptive Processing Server (NodeVenus.APS) with services to provide publishing, monitoring, and translation features, an Adaptive Processing Server (Node Venus.APS2) with a service to provide client auditing, and a Central Management Server (NodeVenus.CMS) with a service to provide the CMS services.

The host named HostBeta has BI platform installed and is configured with three nodes: NodeMars contains a Central Management Server (NodeMars.CMS) with a service to provide CMS services. Having the CMS on two computers enables load balancing and mitigation and failover capabilities. NodeJupiter contains an Web Intelligence Processing Server (NodeJupiter.WebIntelli gence) with a service to provide Web Intelligence reporting and an Event Server (Node Jupiter.EventServer) to provide report monitoring of files.

24

2012-03-22

Getting Started

NodeSaturn contains an Adaptive Processing Server (NodeSaturn.APS) with a service to provide client auditing.

Related Topics Server administration

2.2.1.2 Server IntelligenceServer Intelligence is a core component of Business Intelligence platform. Changes to server processes applied in the Central Management Console (CMC) are propagated to corresponding server objects by the CMS. The Server Intelligence Agent (SIA) is used to automatically restart or shut down a server when it encounters an unexpected condition and is used by the Administrator to manage a node. The CMS archives information about servers in the CMS system database so you can easily restore default server settings or create redundant instances of server processes with the same settings. Because the SIA periodically queries the CMS to request information about servers it manages, the SIA knows which state servers should be in and when to take action. Note: A single computer can contain multiple nodes, and the nodes can be in the same BI platform cluster or in different clusters.

2.2.2 Key administrative tools

2.2.2.1 Central Management Console (CMC)

The Central Management Console (CMC) is a web-based tool that you use to perform administrative tasks (including user, content, and server management) and to configure security settings. Because the CMC is a web-based application, you can perform all of the administrative tasks in a web browser on any computer that can connect to the web application server. All users can log on to the CMC to change their own preference settings. Only members of the Administrators group can change management settings, unless a user is explicitly granted rights to do

25

2012-03-22

Getting Started

so. Roles can be assigned in the CMC to grant user privileges to perform minor administrative tasks, such as managing users in your group and managing reports in folders that belong to your team.

2.2.2.2 Central Configuration ManagerThe Central Configuration Manager (CCM) is a server troubleshooting and node management tool that is provided in two forms. On Windows, you use the CCM to manage local and remote servers, in the CCM user interface (UI) or from a command line. On Unix, you use the CCM shell script (ccm.sh) to manage servers from a command line. The CCM allows you to create and configure nodes and to start or stop your web application server, if it is the default bundled Tomcat web application server. On Windows, you can use the CCM to configure network parameters, such as Secure Socket Layer (SSL) encryption. The parameters apply to all servers in a node. Note: Most server management tasks are handled in the CMC, not the CCM. The CCM is used for troubleshooting and node configuration.

2.2.2.3 Repository Diagnostic ToolThe Repository Diagnostic Tool (RDT) can scan, diagnose, and repair inconsistencies that may occur between the Central Management Server (CMS) system database and the File Repository Servers (FRS) filestore. You can set a limit for the number of errors the RDT will find and repair before stopping. RDT should be used after you restore your BI platform system.

2.2.2.4 Upgrade management toolUpgrade management tool (formerly Import Wizard) is installed as a part of SAP BusinessObjects Business Intelligence platform, and guides administrators through the process of importing users, groups, and folders from previous versions of SAP BusinessObjects Business Intelligence platform. It also allows you to import and upgrade objects, events, server groups, repository objects, and calendars. For information on upgrading from a previous version of SAP BusinessObjects Business Intelligence platform, see the SAP BusinessObjects Business Intelligence Platform Upgrade Guide.

26

2012-03-22

Getting Started

2.2.3 Key tasksDepending on your situation, you may want to focus on specific sections of this help, and there may be other resources available for you. For each of the following situations, there is a list of sug