1008
Business Intelligence Platform Administrator Guide ■ SAP BusinessObjects Business Intelligence platform 4.0 Support Package 5 2012-12-12

SAP BusinessObjects Business Intelligence Platform 4.0 Support Package 5

Embed Size (px)

DESCRIPTION

SAP BusinessObjects Business Intelligence Platform 4.0 Support Package 5

Citation preview

  • Business Intelligence Platform Administrator Guide SAP BusinessObjects Business Intelligence platform 4.0 Support Package 5

    2012-12-12

  • 2012 SAP AG. All rights reserved.SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAPBusinessObjects Explorer, StreamWork, SAP HANA and other SAP products and services mentioned

    Copyright

    herein as well as their respective logos are trademarks or registered trademarks of SAP AG inGermany and other countries.Business Objects and the Business Objects logo, BusinessObjects,Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects productsand services mentioned herein as well as their respective logos are trademarks or registeredtrademarks of Business Objects Software Ltd. Business Objects is an SAP company.Sybase andAdaptive Server, iAnywhere, Sybase 365, SQL Anywhere, and other Sybase products and servicesmentioned herein as well as their respective logos are trademarks or registered trademarks of Sybase,Inc. Sybase is an SAP company. Crossgate, m@gic EDDY, B2B 360, B2B 360 Services areregistered trademarks of Crossgate AG in Germany and other countries. Crossgate is an SAPcompany. All other product and service names mentioned are the trademarks of their respectivecompanies. Data contained in this document serves informational purposes only. National productspecifications may vary.These materials are subject to change without notice. These materials areprovided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only,without representation or warranty of any kind, and SAP Group shall not be liable for errors oromissions with respect to the materials. The only warranties for SAP Group products and servicesare those that are set forth in the express warranty statements accompanying such products andservices, if any. Nothing herein should be construed as constituting an additional warranty.

    2012-12-12

  • Contents

    Document History.................................................................................................................21Chapter 1

    Getting Started......................................................................................................................23Chapter 2

    About this help.......................................................................................................................232.1

    Who should use this help?.....................................................................................................232.1.1

    About SAP BusinessObjects Business Intelligence platform .................................................232.1.2

    Variables................................................................................................................................242.1.3

    Before you start.....................................................................................................................242.2

    Key concepts.........................................................................................................................242.2.1

    Key administrative tools.........................................................................................................272.2.2

    Key tasks...............................................................................................................................292.2.3

    Architecture...........................................................................................................................33Chapter 3

    Architecture overview............................................................................................................333.1

    Architecture diagram..............................................................................................................343.1.1

    Architecture tiers...................................................................................................................353.1.2

    Databases..............................................................................................................................363.1.3

    Servers..................................................................................................................................373.1.4

    Web application servers.........................................................................................................383.1.5

    Software Development Kits...................................................................................................393.1.6

    Data sources.........................................................................................................................413.1.7

    Authentication and single sign-on...........................................................................................423.1.8

    SAP integration......................................................................................................................443.1.9

    Promotion Management ........................................................................................................453.1.10

    Integrated version control.......................................................................................................453.1.11

    Upgrade path.........................................................................................................................463.1.12

    Services and servers..............................................................................................................463.2

    Server changes since XI 3.1...................................................................................................483.2.1

    Services.................................................................................................................................493.2.2

    Service categories.................................................................................................................573.2.3

    Server types..........................................................................................................................603.2.4

    Servers..................................................................................................................................623.2.5

    2012-12-123

  • Client applications..................................................................................................................643.3

    Installed with SAP BusinessObjects Business Intelligence Platform Client Tools....................653.3.1

    Installed with SAP BusinessObjects Business Intelligence Platform.......................................703.3.2

    Available separately...............................................................................................................713.3.3

    Web application clients..........................................................................................................723.3.4

    Process Workflows................................................................................................................763.4

    Startup and authentication.....................................................................................................763.4.1

    Program objects.....................................................................................................................783.4.2

    Crystal Reports......................................................................................................................793.4.3

    Web Intelligence....................................................................................................................833.4.4

    Analysis.................................................................................................................................853.4.5

    Managing Licenses...............................................................................................................87Chapter 4

    Managing License keys..........................................................................................................874.1

    To view license information....................................................................................................874.1.1

    To add a license key...............................................................................................................874.1.2

    To view current account activity.............................................................................................884.1.3

    Measuring licenses................................................................................................................884.2

    To run a license audit.............................................................................................................894.2.1

    Managing Users and Groups................................................................................................91Chapter 5

    Account management overview..............................................................................................915.1

    User management..................................................................................................................915.1.1

    Group management...............................................................................................................925.1.2

    Available authentication types ...............................................................................................935.1.3

    Managing Enterprise and general accounts............................................................................955.2

    To create a user account........................................................................................................955.2.1

    To modify a user account.......................................................................................................965.2.2

    To delete a user account........................................................................................................965.2.3

    To create a new group...........................................................................................................975.2.4

    To modify a group's properties...............................................................................................975.2.5

    To view group members.........................................................................................................985.2.6

    To add subgroups..................................................................................................................985.2.7

    To specify group membership................................................................................................995.2.8

    To delete a group...................................................................................................................995.2.9

    To add users or user groups in bulk.....................................................................................1005.2.10

    To enable the Guest account...............................................................................................1005.2.11

    Adding users to groups........................................................................................................1015.2.12

    Changing password settings................................................................................................1025.2.13

    Granting access to users and groups...................................................................................1045.2.14

    2012-12-124

    Contents

  • Controlling access to user inboxes.......................................................................................1045.2.15

    Configuring BI launch pad options........................................................................................1045.2.16

    Managing attributes for system users .................................................................................1085.2.17

    Prioritizing user attributes across multiple authentication options.........................................1095.2.18

    To add a new user attribute..................................................................................................1095.2.19

    To edit extended user attributes...........................................................................................1115.2.20

    Managing aliases.................................................................................................................1115.3

    To create a user and add a third-party alias..........................................................................1125.3.1

    To create a new alias for an existing user.............................................................................1125.3.2

    To assign an alias from another user....................................................................................1135.3.3

    To delete an alias.................................................................................................................1135.3.4

    To disable an alias................................................................................................................1145.3.5

    Setting Rights......................................................................................................................117Chapter 6

    How rights work in BI platform.............................................................................................1176.1

    Access levels.......................................................................................................................1176.1.1

    Advanced rights settings......................................................................................................1186.1.2

    Inheritance...........................................................................................................................1196.1.3

    Type-specific rights..............................................................................................................1246.1.4

    Determining effective rights.................................................................................................1256.1.5

    Managing security settings for objects in the CMC..............................................................1266.2

    To view rights for a principal on an object.............................................................................1266.2.1

    To assign principals to an access control list for an object....................................................1276.2.2

    To modify security for a principal on an object......................................................................1276.2.3

    To set rights on a top-level folder in BI platform....................................................................1286.2.4

    Checking security settings for a principal.............................................................................1286.2.5

    Working with access levels..................................................................................................1316.3

    Choosing between View and View On Demand access levels.............................................1336.3.1

    To copy an existing access level..........................................................................................1346.3.2

    To create a new access level...............................................................................................1346.3.3

    To rename an access level...................................................................................................1356.3.4

    To delete an access level.....................................................................................................1356.3.5

    To modify rights in an access level.......................................................................................1356.3.6

    Tracing the relationship between access levels and objects.................................................1366.3.7

    Managing access levels across sites....................................................................................1376.3.8

    Breaking inheritance.............................................................................................................1386.4

    To disable inheritance...........................................................................................................1396.4.1

    Using rights to delegate administration.................................................................................1396.5

    Choosing between Modify the rights users have to objects options.....................................1416.5.1

    Owner rights........................................................................................................................1426.5.2

    Summary of recommendations for rights administration.......................................................1436.6

    2012-12-125

    Contents

  • Securing the BI platform.....................................................................................................145Chapter 7

    Security overview ................................................................................................................1457.1

    Disaster recovery planning...................................................................................................1457.2

    General recommendations for securing your deployment.....................................................1467.3

    Configuring security for bundled third-party servers.............................................................1477.4

    Active trust relationship........................................................................................................1477.5

    Logon tokens.......................................................................................................................1487.5.1

    Ticket mechanism for distributed security.............................................................................1487.5.2

    Sessions and session tracking.............................................................................................1497.6

    CMS session tracking..........................................................................................................1497.6.1

    Environment protection........................................................................................................1507.7

    Web browser to web server.................................................................................................1507.7.1

    Web server to BI platform....................................................................................................1507.7.2

    Auditing security configuration modifications .......................................................................1517.8

    Auditing web activity............................................................................................................1517.9

    Protection against malicious logon attempts.........................................................................1517.9.1

    Password restrictions...........................................................................................................1517.9.2

    Logon restrictions................................................................................................................1527.9.3

    User restrictions..................................................................................................................1527.9.4

    Guest account restrictions...................................................................................................1537.9.5

    Processing extensions.........................................................................................................1537.10

    Overview of BI platform data security...................................................................................1537.11

    Data processing security modes..........................................................................................1547.11.1

    Cryptography in BI platform..................................................................................................1567.12

    Working with cluster keys....................................................................................................1577.12.1

    Cryptographic Officers.........................................................................................................1597.12.2

    Managing cryptographic keys in the CMC............................................................................1607.12.3

    Configuring servers for SSL.................................................................................................1647.13

    Creating key and certificate files..........................................................................................1657.13.1

    Configuring the SSL protocol...............................................................................................1677.13.2

    Understanding communication between BI platform components.........................................1727.14

    Overview of BI platform servers and communication ports...................................................1727.14.1

    Communication between BI platform components ...............................................................1747.14.2

    Configuring BI platform for firewalls......................................................................................1817.15

    To configure the system for firewalls....................................................................................1817.15.1

    Debugging a firewalled deployment......................................................................................1847.15.2

    Examples of typical firewall scenarios...................................................................................1867.16

    Example - Application tier deployed on a separate network..................................................1867.16.1

    Example - Thick client and database tier separated from BI platform servers by a firewall.....1887.16.2

    Firewall settings for integrated environments.......................................................................1917.17

    2012-12-126

    Contents

  • Specific firewall guidelines for SAP integration.....................................................................1917.17.1

    Firewall configuration for JD Edwards EnterpriseOne integration..........................................1937.17.2

    Specific firewall guidelines for Oracle EBS...........................................................................1957.17.3

    Firewall configuration for PeopleSoft Enterprise integration .................................................1967.17.4

    Firewall configuration for Siebel integration..........................................................................1987.17.5

    BI platform and reverse proxy servers .................................................................................1997.18

    Supported reverse proxy servers ........................................................................................1997.18.1

    Understanding how web applications are deployed .............................................................2007.18.2

    Configuring reverse proxy servers for BI platform web applications......................................2007.19

    Detailed instructions for configuring reverse proxy servers..................................................2007.19.1

    To configure the reverse proxy server..................................................................................2017.19.2

    To configure Apache 2.2 reverse proxy server for BI platform .............................................2017.19.3

    To configure WebSEAL 6.0 reverse proxy server for BI platform .........................................2027.19.4

    To configure Microsoft ISA 2006 for BI platform .................................................................2037.19.5

    Special configuration for BI platform in reverse proxy deployments......................................2047.20

    Enabling reverse proxy for web services..............................................................................2057.20.1

    Enabling the root path for session cookies for ISA 2006......................................................2077.20.2

    Enabling reverse proxy for SAP BusinessObjects Live Office...............................................2097.20.3

    Authentication.....................................................................................................................211Chapter 8

    Authentication options in BI platform....................................................................................2118.1

    Primary authentication..........................................................................................................2128.1.1

    Security plug-ins..................................................................................................................2138.1.2

    Single sign-on to BI platform................................................................................................2138.1.3

    Enterprise authentication......................................................................................................2168.2

    Enterprise authentication overview.......................................................................................2168.2.1

    Enterprise authentication settings.........................................................................................2168.2.2

    To change Enterprise settings..............................................................................................2178.2.3

    Enabling Trusted Authentication...........................................................................................2198.2.4

    Configuring Trusted Authentication for a web application.....................................................2208.2.5

    LDAP authentication............................................................................................................2298.3

    Using LDAP authentication..................................................................................................2308.3.1

    Configuring LDAP authentication..........................................................................................2318.3.2

    Mapping LDAP groups.........................................................................................................2418.3.3

    Windows AD authentication.................................................................................................2508.4

    Using Windows AD authentication.......................................................................................2508.4.1

    Preparing the Domain Controller..........................................................................................2518.4.2

    Configuring AD Authentication in the CMC..........................................................................2538.4.3

    Configuring the BI platform service to run the SIA................................................................2598.4.4

    Configuring the web application server for AD Authentication..............................................2618.4.5

    Single Sign-On Setup...........................................................................................................2698.4.6

    2012-12-127

    Contents

  • Troubleshooting Windows AD authentication.......................................................................2818.4.7

    SAP authentication...............................................................................................................2828.5

    Configuring SAP authentication ...........................................................................................2828.5.1

    Creating a user account for BI platform................................................................................2838.5.2

    Connecting to SAP entitlement systems..............................................................................2848.5.3

    Setting SAP Authentication options.....................................................................................2868.5.4

    Importing SAP roles.............................................................................................................2918.5.5

    Configuring Secure Network Communication (SNC)............................................................2958.5.6

    Setting up single sign-on to the SAP system........................................................................3088.5.7

    Configuring SSO for SAP Crystal Reports and SAP NetWeaver..........................................3128.5.8

    PeopleSoft authentication....................................................................................................3138.6

    Overview..............................................................................................................................3138.6.1

    Enabling PeopleSoft Enterprise authentication......................................................................3138.6.2

    Mapping PeopleSoft roles to the BI Platform........................................................................3148.6.3

    Scheduling user updates......................................................................................................3178.6.4

    Using the PeopleSoft Security Bridge..................................................................................3198.6.5

    JD Edwards authentication...................................................................................................3298.7

    Overview..............................................................................................................................3298.7.1

    Enabling JD Edwards EnterpriseOne authentication..............................................................3298.7.2

    Mapping JD Edwards EnterpriseOne roles to BI Platform.....................................................3308.7.3

    Scheduling user updates......................................................................................................3338.7.4

    Siebel authentication............................................................................................................3348.8

    Enabling Siebel authentication..............................................................................................3358.8.1

    Mapping roles to BI platform................................................................................................3358.8.2

    Scheduling user updates......................................................................................................3388.8.3

    Oracle EBS authentication...................................................................................................3408.9

    Enabling Oracle EBS authentication......................................................................................3408.9.1

    Mapping Oracle E-Business Suite roles to BI platform..........................................................3418.9.2

    Unmapping roles .................................................................................................................3458.9.3

    Customizing rights for mapped Oracle EBS groups and users .............................................3458.9.4

    Configuring Single Sign-on (SSO) for SAP Crystal Reports and Oracle EBS........................3478.9.5

    Server Administration..........................................................................................................349Chapter 9

    Working with the Servers management area in the CMC.....................................................3499.1

    Managing servers by using scripts on Windows ..................................................................3529.2

    Managing servers on Unix ...................................................................................................3529.3

    Managing License keys........................................................................................................3539.4

    To view license information..................................................................................................3539.4.1

    To add a license key.............................................................................................................3539.4.2

    To view current account activity...........................................................................................3549.4.3

    Measuring licenses..............................................................................................................3549.5

    2012-12-128

    Contents

  • To run a license audit...........................................................................................................3559.5.1

    Viewing and changing a server's status................................................................................3569.6

    Viewing the state of servers.................................................................................................3569.6.1

    Starting, stopping, and restarting servers.............................................................................3579.6.2

    Stopping a Central Management Server..............................................................................3599.6.3

    Enabling and disabling servers..............................................................................................3609.6.4

    Adding, cloning, or deleting servers......................................................................................3619.7

    Adding, cloning, and deleting servers...................................................................................3619.7.1

    Clustering Central Management Servers..............................................................................3659.8

    Clustering Central Management Servers..............................................................................3659.8.1

    Managing server groups.......................................................................................................3699.9

    Creating a server group.......................................................................................................3709.9.1

    Working with server subgroups............................................................................................3719.9.2

    Modifying the group membership of a server.......................................................................3729.9.3

    User access to servers and server groups...........................................................................3729.9.4

    Assessing your system's performance.................................................................................3749.10

    Monitoring SAP BusinessObjects Business Intelligence platform servers............................3749.10.1

    Analyzing server metrics......................................................................................................3749.10.2

    Viewing system metrics.......................................................................................................3759.10.3

    Logging server activity.........................................................................................................3759.10.4

    Configuring server settings..................................................................................................3769.11

    To change a server's properties...........................................................................................3779.11.1

    To apply service settings to multiple servers........................................................................3779.11.2

    Working with configuration templates...................................................................................3789.11.3

    Configuring server network settings.....................................................................................3809.12

    Network environment options..............................................................................................3809.12.1

    Server host identification options.........................................................................................3819.12.2

    Configuring a multi-homed machine......................................................................................3839.12.3

    Configuring port numbers.....................................................................................................3869.12.4

    Managing Nodes..................................................................................................................3899.13

    Using nodes.........................................................................................................................3899.13.1

    Adding a new node..............................................................................................................3919.13.2

    Recreating a node................................................................................................................3959.13.3

    Deleting a node....................................................................................................................3989.13.4

    Renaming a node.................................................................................................................4009.13.5

    Moving a node.....................................................................................................................4029.13.6

    Script parameters................................................................................................................4059.13.7

    Adding Windows server dependencies.................................................................................4119.13.8

    Changing the user credentials for a node.............................................................................4119.13.9

    Renaming a machine in a BI platform deployment.................................................................4129.14

    Renaming a machine in a BI platform deployment.................................................................4129.14.1

    2012-12-129

    Contents

  • Using 32-bit and 64-bit third-party libraries with BI platform..................................................4189.15

    Managing server and node placeholders..............................................................................4199.16

    To view server placeholders.................................................................................................4199.16.1

    To view and edit the placeholders for a node........................................................................4199.16.2

    Managing Central Management Server (CMS) databases.................................................421Chapter 10

    Managing CMS system database connections.....................................................................42110.1

    To select SQL Anywhere as a CMS database......................................................................42110.1.1

    To select SAP HANA as a CMS database...........................................................................42210.1.2

    Selecting a new or existing CMS database..........................................................................42310.2

    To select a new or existing CMS database on Windows......................................................42410.2.1

    To select a new or existing CMS database on Unix..............................................................42410.2.2

    Recreating the CMS system database.................................................................................42510.3

    To recreate the CMS system database on Windows............................................................42510.3.1

    To recreate the CMS system database on Unix...................................................................42610.3.2

    Copying data from one CMS system database to another...................................................42710.4

    Preparing to copy a CMS system database.........................................................................42710.4.1

    To copy a CMS system database on Windows....................................................................42810.4.2

    To copy data from a CMS system database on Unix............................................................42810.4.3

    Managing Web Application Container Servers (WACS).....................................................431Chapter 11

    WACS.................................................................................................................................43111.1

    Web Application Container Server (WACS).........................................................................43111.1.1

    Adding or removing additional WACS to your deployment...................................................43411.1.2

    Adding or removing services to WACS................................................................................43811.1.3

    Configuring HTTPS/SSL......................................................................................................43911.1.4

    Supported authentication methods.......................................................................................44311.1.5

    Configuring AD Kerberos for WACS ...................................................................................44411.1.6

    Configuring AD Kerberos single sign-on ..............................................................................45011.1.7

    Configuring RESTful web services........................................................................................45211.1.8

    WACS and your IT environment...........................................................................................45611.1.9

    Configuring web application properties.................................................................................45911.1.10

    Troubleshooting...................................................................................................................46011.1.11

    WACS properties.................................................................................................................46411.1.12

    Backing Up and Restoring..................................................................................................465Chapter 12

    Backing up and restoring your system..................................................................................46512.1

    Backups...............................................................................................................................46612.1.1

    Restoring your system.........................................................................................................47212.1.2

    BackupCluster and RestoreCluster scripts...........................................................................48012.1.3

    2012-12-1210

    Contents

  • Copying your deployment...................................................................................................483Chapter 13

    Overview of system copying................................................................................................48313.1

    Terminology.........................................................................................................................48313.2

    Use cases............................................................................................................................48313.3

    Planning to copy your system...............................................................................................48513.4

    Considerations and limitations..............................................................................................48613.5

    System copy procedure.......................................................................................................48713.6

    To perform a system copy export from a source system......................................................48713.6.1

    To perform a system copy import to a target system...........................................................49013.6.2

    Version Management..........................................................................................................493Chapter 14

    Managing Different Versions of BI resources ......................................................................49314.1

    Using the Version Management System Settings Option.....................................................49414.2

    Setting the ClearCase Version Management System in Windows.......................................49514.2.1

    Setting the ClearCase Version Management System in Unix...............................................49514.2.2

    Comparing different versions of the same job......................................................................49614.3

    Upgrading Subversion content.............................................................................................49614.4

    Promotion Management......................................................................................................499Chapter 15

    Welcome to promotion management....................................................................................49915.1

    Promotion Management Overview.......................................................................................49915.1.1

    Promotion Management Features........................................................................................49915.1.2

    Application Access Rights....................................................................................................50015.1.3

    Getting Started with the promotion management tool..........................................................50115.2

    Accessing the promotion management application...............................................................50115.2.1

    User Interface components..................................................................................................50115.2.2

    Using the Settings Option....................................................................................................50315.2.3

    Using the promotion management tool.................................................................................51015.3

    Creating and Deleting a Folder.............................................................................................51115.3.1

    Creating a Job.....................................................................................................................51215.3.2

    Creating a New Job by Copying an Existing Job .................................................................51415.3.3

    Searching for a Job..............................................................................................................51515.3.4

    Editing a Job........................................................................................................................51515.3.5

    Adding an Infoobject in promotion management...................................................................51615.3.6

    Managing Dependencies in promotion management ...........................................................51715.3.7

    Searching for Dependents ..................................................................................................51815.3.8

    Promoting a Job When the Repositories are Connected......................................................51815.3.9

    Promoting a Job by Using a BIAR File..................................................................................52015.3.10

    Scheduling a job promotion..................................................................................................52315.3.11

    2012-12-1211

    Contents

  • Viewing the History of a Job................................................................................................52415.3.12

    Rolling Back a Job...............................................................................................................52515.3.13

    Managing Different Versions of an Infoobject.......................................................................52715.4

    Version Management application access rights....................................................................52915.4.1

    Backing Up and Restoring Subversion Files.........................................................................52915.4.2

    Using the Command Line Option.........................................................................................53015.5

    Running the Command Line Option in Windows...................................................................53115.5.1

    Running the Command Line Option in UNIX.........................................................................53115.5.2

    Command Line Option Parameters......................................................................................53215.5.3

    Sample Properties File.........................................................................................................53815.5.4

    Using the Enhanced Change and Transport System.............................................................53915.6

    Pre-requisites.......................................................................................................................54015.6.1

    Configuring the Business Intelligence Platform and CTS+ Integration...................................54015.6.2

    Promoting a Job Using CTS.................................................................................................54515.6.3

    Visual Difference.................................................................................................................549Chapter 16

    Visual Difference in the promotion management tool............................................................54916.1

    Comparing objects or files by using visual difference...........................................................55016.1.1

    Comparing objects or files in version management system..................................................55116.1.2

    Scheduling the comparison..................................................................................................55216.1.3

    Managing Applications.......................................................................................................555Chapter 17

    Managing applications through the CMC..............................................................................55517.1

    Overview..............................................................................................................................55517.1.1

    Common settings for applications........................................................................................55617.1.2

    Application-specific settings.................................................................................................55717.1.3

    Managing applications through BOE.war properties.............................................................58517.2

    The BOE war file..................................................................................................................58517.2.1

    Customizing BI launch pad and OpenDocument logon entry points......................................59417.3

    BI launch pad and OpenDocument file locations...................................................................59417.3.1

    To define a custom logon page............................................................................................59517.3.2

    To add trusted authentication at logon..................................................................................59617.3.3

    Managing Connections and Universes...............................................................................599Chapter 18

    Managing connections.........................................................................................................59918.1

    To delete a universe connection...........................................................................................59918.1.1

    Managing universes.............................................................................................................60018.2

    To delete universes..............................................................................................................60018.2.1

    2012-12-1212

    Contents

  • Monitoring...........................................................................................................................601Chapter 19

    About Monitoring.................................................................................................................60119.1

    Monitoring terms..................................................................................................................60119.2

    Architecture.........................................................................................................................60319.2.1

    Cluster support for monitoring server...................................................................................60619.3

    Metrics................................................................................................................................60719.4

    CMS Query metrics.............................................................................................................61919.4.1

    Configuration properties.......................................................................................................61919.5

    JMX end point URL..............................................................................................................62419.5.1

    Integrating with other applications........................................................................................62519.6

    Integrating the monitoring application with IBM Tivoli............................................................62519.6.1

    Integrating the monitoring application with SAP Solution Manager ......................................62819.6.2

    Creating Universe for Derby Database.................................................................................62919.7

    Audit DB Support for Monitoring .........................................................................................63019.8

    Pre-Requisites......................................................................................................................63019.8.1

    Configuring SBO files..........................................................................................................63019.8.2

    Adding alias names in the SBO file ......................................................................................63219.8.3

    Monitoring Database Migration............................................................................................63219.9

    Pre-requisites.......................................................................................................................63319.9.1

    Preparing the Target Database ............................................................................................63319.9.2

    Creating CSV dumps...........................................................................................................63319.9.3

    Restoring contents on the target database...........................................................................63419.9.4

    Validating the Migration .......................................................................................................63519.9.5

    Troubleshooting...................................................................................................................63519.10

    Dashboard...........................................................................................................................63519.10.1

    Alerts...................................................................................................................................63619.10.2

    Watchlist..............................................................................................................................63619.10.3

    Probes.................................................................................................................................63719.10.4

    Metrics................................................................................................................................63719.10.5

    Graph...................................................................................................................................63819.10.6

    Auditing...............................................................................................................................639Chapter 20

    Overview..............................................................................................................................63920.1

    CMC Auditing page.............................................................................................................64520.2

    Auditing Status Summary.....................................................................................................64520.2.1

    Configuring Auditing events.................................................................................................64720.2.2

    Auditing Data Store configuration settings...........................................................................64920.2.3

    Audit events.........................................................................................................................65020.3

    Audit events and details.......................................................................................................65920.3.1

    2012-12-1213

    Contents

  • Platform Search...................................................................................................................679Chapter 21

    Understanding Platform Search............................................................................................67921.1

    Platform Search SDK...........................................................................................................67921.1.1

    Clustered Environment.........................................................................................................68021.1.2

    Setting Up Platform Search..................................................................................................68021.2

    Deploying OpenSearch........................................................................................................68021.2.1

    Configuring reverse proxy....................................................................................................68221.2.2

    Configuring Application Properties in CMC..........................................................................68221.2.3

    Working with Platform Search..............................................................................................68921.3

    Indexing Content in the CMS Repository.............................................................................68921.3.1

    Indexing Failure Listing.........................................................................................................69021.3.2

    Searching Results................................................................................................................69021.3.3

    Integrating Platform Search with SAP NetWeaver Enterprise Search...................................69721.4

    Creating a Connector in SAP NetWeaver Enterprise Search ...............................................69721.4.1

    Importing a User's Role in SAP BusinessObjects Business Intelligence Authentication........69821.4.2

    Searching from NetWeaver Enterprise Search.....................................................................69921.5

    Auditing................................................................................................................................69921.6

    Troubleshooting...................................................................................................................70021.7

    Self Healing..........................................................................................................................70121.7.1

    Problem Scenarios...............................................................................................................70121.7.2

    Federation...........................................................................................................................703Chapter 22

    Federation............................................................................................................................70322.1

    Federation terms..................................................................................................................70422.2

    Managing security rights......................................................................................................70622.3

    Rights required on the origin site..........................................................................................70622.3.1

    Rights required on the destination site.................................................................................70722.3.2

    Federation-specific rights.....................................................................................................70822.3.3

    Replicating security on an object..........................................................................................71022.3.4

    Replicating security using access levels...............................................................................71022.3.5

    Replication types and mode options.....................................................................................71122.4

    One-way replication .............................................................................................................71122.4.1

    Two-way replication .............................................................................................................71122.4.2

    Refresh from origin or refresh from destination....................................................................71222.4.3

    Replicating third-party users and groups...............................................................................71322.5

    Replicating universes and universe connections...................................................................71422.6

    Managing replication lists.....................................................................................................71522.7

    Creating replication lists.......................................................................................................71622.7.1

    Modifying Replication Lists...................................................................................................71822.7.2

    2012-12-1214

    Contents

  • Managing remote connections.............................................................................................71922.8

    Creating remote connections...............................................................................................71922.8.1

    Modifying remote connections.............................................................................................72122.8.2

    Managing replication jobs.....................................................................................................72222.9

    Creating replication jobs.......................................................................................................72222.9.1

    Scheduling replication jobs...................................................................................................72522.9.2

    Modifying replication jobs.....................................................................................................72622.9.3

    Viewing a log after a replication job......................................................................................72622.9.4

    Managing object cleanup......................................................................................................72722.10

    How to use object cleanup...................................................................................................72722.10.1

    Object cleanup limits............................................................................................................72822.10.2

    Object cleanup frequency.....................................................................................................72822.10.3

    Managing conflict detection and resolution...........................................................................72922.11

    One-way replication conflict resolution.................................................................................73022.11.1

    Two-way replication conflict resolution.................................................................................73122.11.2

    Using Web Services in Federation.......................................................................................73422.12

    Session variables ................................................................................................................73422.12.1

    File caching .........................................................................................................................73522.12.2

    Custom deployment ............................................................................................................73522.12.3

    Remote scheduling and locally run instances........................................................................73622.13

    Remote scheduling..............................................................................................................73622.13.1

    Locally run instances............................................................................................................73822.13.2

    Instance share......................................................................................................................73822.13.3

    Importing and promoting replicated content..........................................................................73922.14

    Importing replicated content.................................................................................................73922.14.1

    Importing replicated content and continuing replication ........................................................74022.14.2

    Promoting content from a test environment..........................................................................74122.14.3

    Re-pointing a destination site...............................................................................................74122.14.4

    Best practices......................................................................................................................74222.15

    Current release limitations....................................................................................................74522.15.1

    Troubleshooting error messages..........................................................................................74622.15.2

    Supplementary Configurations for ERP Environments........................................................749Chapter 23

    Configurations for SAP NetWeaver integration....................................................................74923.1

    Integrating with SAP NetWeaver Business Warehouse (BW)...............................................74923.1.1

    Configuring for JD Edwards integration................................................................................79723.2

    Configuring Single Sign-on (SSO) for SAP Crystal Reports.................................................79823.2.1

    Configuring Secure Socket Layer for JD Edwards Integrations............................................79823.2.2

    Configuring for PeopleSoft Enterprise integration.................................................................80023.3

    Configuring Single Sign-on (SSO) for SAP Crystal Reports and PeopleSoft Enterprise........80023.3.1

    Configuring Secure Socket Layer communication................................................................80123.3.2

    2012-12-1215

    Contents

  • Performance Tuning for PeopleSoft systems........................................................................80323.3.3

    Configuring for Siebel integration.........................................................................................80423.4

    Configuring Siebel to integrate with SAP BusinessObjects Business Intelligence platform....80423.4.1

    Creating the Crystal Reports menu item..............................................................................80523.4.2

    Contextual awareness..........................................................................................................80723.4.3

    Configuring Single Sign-on (SSO) for SAP Crystal Reports and Siebel................................80923.4.4

    Configuring for Secure Sockets Layer Communication........................................................81023.4.5

    Managing and Configuring Logs.........................................................................................811Chapter 24

    Logging traces from components.........................................................................................81124.1

    Trace log levels....................................................................................................................81124.2

    Configuring tracing for servers.............................................................................................81224.3

    To set the server trace log level in the CMC........................................................................81324.3.1

    To set the trace log level for multiple servers managed in the CMC.....................................81324.3.2

    To configure server tracing through the BO_trace.ini file......................................................81424.3.3

    Configuring tracing for web applications...............................................................................81724.4

    To set the web application trace log level in the CMC..........................................................81724.4.1

    To manually modify tracing settings through the BO_trace.ini file.........................................81824.4.2

    Configuring tracing for BI platform client applications...........................................................82324.5

    Configuring tracing for upgrade management tool................................................................82324.6

    To configure tracing for upgrade management tool...............................................................82324.6.1

    Integration to SAP Solution Manager..................................................................................825Chapter 25

    Integration overview.............................................................................................................82525.1

    SAP Solution Manager integration checklist.........................................................................82525.2

    Managing system landscape directory registration...............................................................82725.3

    Registration of BI platform in the System Landscape...........................................................82725.3.1

    When is SLD registration triggered?....................................................................................82825.3.2

    Logging SLD connectivity ...................................................................................................82925.3.3

    Managing Solution Management Diagnostics agents...........................................................82925.4

    Solution Manager Diagnostics (SMD) overview...................................................................82925.4.1

    Working with SMD agents...................................................................................................83025.4.2

    SMAdmin user account........................................................................................................83025.4.3

    Managing performance instrumentation................................................................................83125.5

    Performance instrumentation for BI platform........................................................................83125.5.1

    Setting up performance instrumentation for BI platform........................................................83125.5.2

    Performance instrumentation for the web tier.......................................................................83325.5.3

    Instrumentation log files ......................................................................................................83325.5.4

    Tracing with SAP Passport...................................................................................................83325.6

    2012-12-1216

    Contents

  • Command Line Administration............................................................................................835Chapter 26

    Unix scripts..........................................................................................................................83526.1

    Script utilities.......................................................................................................................83526.1.1

    Script templates...................................................................................................................84126.1.2

    Scripts used by SAP BusinessObjects Business Intelligence platform.................................84126.1.3

    Windows scripts..................................................................................................................84226.2

    ccm.exe...............................................................................................................................84326.2.1

    Server Command Lines........................................................................................................84626.3

    Command lines overview.....................................................................................................84626.3.1

    Standard options for all servers............................................................................................84626.3.2

    Central Management Server................................................................................................84826.3.3

    Crystal Reports Processing Server and Crystal Reports Cache Server................................84926.3.4

    Dashboards Processing Server and Dashboards Cache Server...........................................85026.3.5

    Job servers..........................................................................................................................85126.3.6

    Adaptive Processing Server.................................................................................................85226.3.7

    Report Application Server....................................................................................................85326.3.8

    Web Intelligence Processing Server.....................................................................................85426.3.9

    Input and Output File Repository Servers.............................................................................85626.3.10

    Event Server........................................................................................................................85626.3.11

    Dashboard and Dashboard Analytics Servers .....................................................................85726.3.12

    Rights Appendix..................................................................................................................859Chapter 27

    About the rights appendix.....................................................................................................85927.1

    General rights......................................................................................................................85927.2

    Rights for specific object types............................................................................................86227.3

    Folder rights.........................................................................................................................86227.3.1

    Categories...........................................................................................................................86227.3.2

    Notes...................................................................................................................................86327.3.3

    Crystal reports.....................................................................................................................86327.3.4

    Web Intelligence documents................................................................................................86427.3.5

    Users and groups.................................................................................................................86527.3.6

    Access levels.......................................................................................................................86627.3.7

    Universe (.unv) rights...........................................................................................................86727.3.8

    Universe (.unx) rights...........................................................................................................86827.3.9

    Universe object-access levels..............................................................................................87027.3.10

    Connection rights.................................................................................................................87127.3.11

    Applications.........................................................................................................................87327.3.12

    2012-12-1217

    Contents

  • Server Properties Appendix.................................................................................................885Chapter 28

    About the server properties appendix...................................................................................88528.1

    Common server properties..................................................................................................88528.1.1

    Core Services properties.....................................................................................................88828.1.2

    Connectivity Services properties..........................................................................................90228.1.3

    Crystal Reports Services properties....................................................................................90728.1.4

    Analysis Services properties................................................................................................91628.1.5

    Data Federation Services properties....................................................................................91828.1.6

    Web Intelligence Services properties...................................................................................91928.1.7

    Dashboards Services properties..........................................................................................93028.1.8

    Server Metrics Appendix.....................................................................................................935Chapter 29

    About the Server Metrics Appendix.....................................................................................93529.1

    Common Server Metrics .....................................................................................................93529.1.1

    Central Management Server Metrics...................................................................................93829.1.2

    Connection Server metrics...................................................................................................94229.1.3

    Event Server Metrics...........................................................................................................94329.1.4

    File Repository Server Metrics.............................................................................................94429.1.5

    Adaptive Processing Server metrics.....................................................................................94429.1.6

    Web Application Container Server Metrics..........................................................................95029.1.7

    Adaptive Job Server metrics................................................................................................95029.1.8

    Crystal Report Server metrics..............................................................................................95329.1.9

    Web Intelligence Server metrics...........................................................................................95629.1.10

    Dashboards Server metrics..................................................................................................95829.1.11

    Server and Node Placeholder Appendix..............................................................................961Chapter 30

    Server and node placeholders..............................................................................................96130.1

    Auditing Data Store Schema Appendix...............................................................................975Chapter 31

    Overview..............................................................................................................................97531.1

    Schema diagram..................................................................................................................97531.2

    Auditing Data Store tables...................................................................................................97631.3

    System Copy Worksheet.....................................................................................................987Chapter 32

    System copy worksheet.......................................................................................................98732.1

    2012-12-1218

    Contents

  • More Information.................................................................................................................989Appendix A

    Index 991

    2012-12-1219

    Contents

  • 2012-12-1220

    Contents

  • Document History

    The following table provides an overview of the most important document changes.

    DescriptionDateVersion

    First release of this document.Nov. 2011SAP BusinessObjectsBusiness Intelligenceplatform 4.0

    Additions to this release: Importing users and groups in bulk using the CCM Extending attributes for both imported and Enterprise user accounts Using the LDAP plugin to configure single sign-on to a SAP HANA

    database through JDBC SQL Anywhere as an ODBC data source. For node management

    with SQL Anywhere on Unix machines, see To prepare a Unixmachine for SQL Anywhere.

    Best practices designed to prevent issues that can arise as a resultof changes to machine names, IP addresses, cluster names, andserver names

    Selecting SAP HANA as a CMS database after the initial installationof BI platform

    Configuring the RESTful Web Service hosted on a WACS server Performing a "hot backup" (creating a backup copy without having

    to stop servers) Creating a copy of a BI platform deployment for testing, standby, or

    other purposes Enabling and configuring integration details for the SAP StreamWork

    application Creating and assigning tasks to delegated administrators Self-healing mechanism for Platform Search

    In addition, all references to role-based licensing, BI Analyst and BIViewer user accounts were removed.

    March 2012

    SAP BusinessObjectsBusiness Intelligenceplatform 4.0 FeaturePack 3

    2012-12-1221

    Document History

  • DescriptionDateVersion

    Additions and changes in this release: Instructions that specify how to start SAP BusinessObjects applica-

    tions from the Windows Start menu are updated. Updated section Adding a new node to a cluster.

    November2012

    SAP BusinessObjectsBusiness Intelligenceplatform 4.0 SupportPackage 5

    Related Topics To add users or user groups in bulk Managing attributes for system users Using the LDAP plugin to configure SSO to the SAP HANA database To prepare a Unix machine for SQL Anywhere To select SQL Anywhere as a CMS database Configuring RESTful web services Hot backups Overview of system copying Managing SAP StreamWork integration Delegated administration and CMC tab access Self Healing

    2012-12-1222

    Document History

  • Getting Started

    2.1 About this help

    This help provides you with information and procedures for deploying and configuring your BI platform.Procedures are provided for common tasks. Conceptual information and technical details are providedfor all advanced topics.

    For information about installing this product, see the SAP BusinessObjects Business Intelligence PlatformInstallation Guide.

    2.1.1 Who should use this help?

    This help covers deployment and configuration tasks. We recommend consulting this guide if you are:

    planning your first deployment

    configuring your first deployment

    making significant changes to the architecture of an existing deployment

    improving your system's performance.

    This help is intended for system administrators who are responsible for configuring, managing, andmaintaining a BI platform installation. Familiarity with your operating system and your networkenvironment is beneficial, as is a general understanding of web application server management andscripting technologies. However, to assist all levels of administrative experience, this help aims toprovide sufficient background and conceptual information to clarify all administrative tasks and features.

    2.1.2 About SAP BusinessObjects Business Intelligence platform

    The BI platform is a flexible, scalable, and reliable solution for delivering powerful, interactive reportsto end users via any web applicationintranet, extranet, Internet or corporate portal. Whether it is usedfor distributing weekly sales reports, providing customers with personalized service offerings, orintegrating critical information into corporate portals, BI platform delivers tangible benefits that extend

    2012-12-1223

    Getting Started

  • across and beyond the organization. As an integrated suite for reporting, analysis, and informationdelivery, the platform provides a solution for increasing end-user productivity and reducing administrativeefforts.

    2.1.3 Variables

    The following variables are used throughout this guide:

    DescriptionVariable

    The directory where BI platform is installed. On Windows, the default directory isC:\Program Files (x86)\SAP BusinessObjects\.

    The name of your Unix operating system. Acceptable values are: aix_rs6000_64 linux_x64 solaris_sparcv9 hpux_ia64

    The directory where scripts for administering BI platform are located On Windows: \SAP BusinessObjects Enterprise XI

    4.0\win64_x64\scripts

    On Unix: /sap_bobj/enterprise_xi40//scripts

    2.2 Before you start

    2.2.1 Key concepts

    2012-12-1224

    Getting Started

  • 2.2.1.1 Services and servers

    BI platform uses service and server to refer to the two types of software running on a BI platformcomputer.

    A service is a server subsystem that performs a specific function. The service runs in the memory spaceof its server, under the process ID of the parent container (server). For example, the Web IntelligenceScheduling Service is a subsystem that runs on the Adaptive Job Server.

    A server is a process at