BOBJ X!4 Admin Guide[1]

874
Business Intelligence Platform Administrator Guide SAP BusinessObjects Business Intelligence platform 4.0 Support Package 2 2011-10-11

Transcript of BOBJ X!4 Admin Guide[1]

Business Intelligence Platform Administrator Guide SAP BusinessObjects Business Intelligence platform 4.0 Support Package 2

2011-10-11

Copyright

2011 SAP AG. All rights reserved.SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries.Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects Software Ltd. Business Objects is an SAP company.Sybase and Adaptive Server, iAnywhere, Sybase 365, SQL Anywhere, and other Sybase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Sybase, Inc. Sybase is an SAP company. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary.These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. 2011-10-11

Contents

Chapter 1

Getting Started......................................................................................................................17 About this help.......................................................................................................................17 Who should use this help?.....................................................................................................17 About SAP BusinessObjects Business Intelligence platform .................................................17 Variables................................................................................................................................18 Before you start.....................................................................................................................18 Key concepts.........................................................................................................................18 Key administrative tools.........................................................................................................21 Key tasks...............................................................................................................................22 Architecture...........................................................................................................................25 Architecture overview............................................................................................................25 System overview....................................................................................................................26 Databases..............................................................................................................................27 Servers..................................................................................................................................28 Web application servers.........................................................................................................29 Software Development Kits...................................................................................................30 Data sources.........................................................................................................................33 Authentication and single sign-on...........................................................................................34 SAP integration......................................................................................................................36 Lifecycle management (LCM).................................................................................................37 Integrated version control.......................................................................................................38 Permanent data......................................................................................................................38 Upgrade path.........................................................................................................................38 Conceptual tiers.....................................................................................................................39 Services and servers..............................................................................................................40 Services.................................................................................................................................42 Service categories.................................................................................................................49 Server types..........................................................................................................................52 Servers..................................................................................................................................55 Client applications..................................................................................................................58 Installed with SAP BusinessObjects Business Intelligence Platform Client Tools....................59

1.1 1.1.1 1.1.2 1.1.3 1.2 1.2.1 1.2.2 1.2.3Chapter 2

2.1 2.1.1 2.1.2 2.1.3 2.1.4 2.1.5 2.1.6 2.1.7 2.1.8 2.1.9 2.1.10 2.1.11 2.1.12 2.2 2.3 2.3.1 2.3.2 2.3.3 2.3.4 2.4 2.4.1

3

2011-10-11

Contents

2.4.2 2.4.3 2.4.4 2.5 2.5.1 2.5.2 2.5.3 2.5.4Chapter 3

Installed with SAP BusinessObjects Business Intelligence Platform.......................................63 Available separately...............................................................................................................64 Web application clients..........................................................................................................65 Information Workflows...........................................................................................................69 Authentication........................................................................................................................69 Scheduling.............................................................................................................................71 Viewing..................................................................................................................................76 On Demand...........................................................................................................................78 Managing Licenses...............................................................................................................81 Managing License keys..........................................................................................................81 To view license information....................................................................................................81 To add a license key...............................................................................................................81 To view current account activity.............................................................................................82 Measuring licenses................................................................................................................82 To run a license audit.............................................................................................................83 Managing Users and Groups................................................................................................85 Account management overview..............................................................................................85 User management..................................................................................................................85 Group management...............................................................................................................87 Available authentication types ...............................................................................................88 Managing Enterprise and general accounts............................................................................90 To create a user account........................................................................................................90 To modify a user account.......................................................................................................91 To delete a user account........................................................................................................92 To create a new group...........................................................................................................92 To modify a group's properties...............................................................................................93 To view group members.........................................................................................................93 To add subgroups..................................................................................................................93 To specify group membership................................................................................................94 To delete a group...................................................................................................................94 To enable the Guest account.................................................................................................95 Adding users to groups..........................................................................................................95 Changing password settings..................................................................................................97 Granting access to users and groups.....................................................................................98 Controlling access to user inboxes.........................................................................................99 Configuring BI launch pad options..........................................................................................99 Managing aliases.................................................................................................................103 To create a user and add a third-party alias..........................................................................103

3.1 3.1.1 3.1.2 3.1.3 3.2 3.2.1Chapter 4

4.1 4.1.1 4.1.2 4.1.3 4.2 4.2.1 4.2.2 4.2.3 4.2.4 4.2.5 4.2.6 4.2.7 4.2.8 4.2.9 4.2.10 4.2.11 4.2.12 4.2.13 4.2.14 4.2.15 4.3 4.3.1

4

2011-10-11

Contents

4.3.2 4.3.3 4.3.4 4.3.5Chapter 5

To create a new alias for an existing user.............................................................................104 To assign an alias from another user....................................................................................104 To delete an alias.................................................................................................................105 To disable an alias................................................................................................................105 Setting Rights......................................................................................................................107 How rights work in BI platform.............................................................................................107 Access levels.......................................................................................................................107 Advanced rights settings......................................................................................................108 Inheritance...........................................................................................................................109 Type-specific rights..............................................................................................................114 Determining effective rights.................................................................................................115 Managing security settings for objects in the CMC..............................................................116 To view rights for a principal on an object.............................................................................116 To assign principals to an access control list for an object....................................................117 To modify security for a principal on an object......................................................................117 To set rights on a top-level folder in BI platform....................................................................118 Checking security settings for a principal.............................................................................118 Working with access levels..................................................................................................121 Choosing between View and View On Demand access levels.............................................123 To copy an existing access level..........................................................................................124 To create a new access level...............................................................................................124 To rename an access level...................................................................................................125 To delete an access level.....................................................................................................125 To modify rights in an access level.......................................................................................125 Tracing the relationship between access levels and objects.................................................126 Managing access levels across sites....................................................................................127 Breaking inheritance.............................................................................................................128 To disable inheritance...........................................................................................................129 Using rights to delegate administration.................................................................................129 Choosing between Modify the rights users have to objects options.....................................131 Owner rights........................................................................................................................132 Summary of recommendations for rights administration.......................................................132 Securing BI Platform...........................................................................................................135 Security overview ................................................................................................................135 Disaster recovery planning...................................................................................................135 General recommendations for securing your deployment.....................................................136 Configuring security for bundled third-party servers.............................................................137 Active trust relationship........................................................................................................137

5.1 5.1.1 5.1.2 5.1.3 5.1.4 5.1.5 5.2 5.2.1 5.2.2 5.2.3 5.2.4 5.2.5 5.3 5.3.1 5.3.2 5.3.3 5.3.4 5.3.5 5.3.6 5.3.7 5.3.8 5.4 5.4.1 5.5 5.5.1 5.5.2 5.6Chapter 6

6.1 6.2 6.3 6.4 6.5

5

2011-10-11

Contents

6.5.1 6.5.2 6.6 6.6.1 6.7 6.7.1 6.7.2 6.8 6.9 6.9.1 6.9.2 6.9.3 6.9.4 6.9.5 6.10 6.11 6.11.1 6.12 6.12.1 6.12.2 6.12.3 6.13 6.13.1 6.13.2 6.14 6.14.1 6.14.2 6.15 6.15.1 6.15.2 6.16 6.16.1 6.16.2 6.17 6.17.1 6.17.2 6.17.3 6.17.4 6.17.5 6.18 6.18.1

Logon tokens.......................................................................................................................137 Ticket mechanism for distributed security.............................................................................138 Sessions and session tracking.............................................................................................138 CMS session tracking..........................................................................................................139 Environment protection........................................................................................................139 Web browser to web server.................................................................................................140 Web server to BI platform....................................................................................................140 Auditing security configuration modifications .......................................................................140 Auditing web activity............................................................................................................141 Protection against malicious logon attempts.........................................................................141 Password restrictions...........................................................................................................141 Logon restrictions................................................................................................................142 User restrictions..................................................................................................................142 Guest account restrictions...................................................................................................142 Processing extensions.........................................................................................................143 Overview of BI platform data security...................................................................................143 Data processing security modes..........................................................................................144 Cryptography in BI platform..................................................................................................146 Working with cluster keys....................................................................................................146 Cryptographic Officers.........................................................................................................148 Managing cryptographic keys in the CMC............................................................................150 Configuring servers for SSL.................................................................................................154 Creating key and certificate files..........................................................................................154 Configuring the SSL protocol...............................................................................................157 Understanding communication between BI platform components.........................................161 Overview of BI platform servers and communication ports...................................................161 Communication between BI platform components ...............................................................164 Configuring BI platform for firewalls......................................................................................171 To configure the system for firewalls....................................................................................171 Debugging a firewalled deployment......................................................................................174 Examples of typical firewall scenarios...................................................................................176 Example - Application tier deployed on a separate network..................................................176 Example - Thick client and database tier separated from BI platform servers by a firewall.....178 Firewall settings for integrated environments.......................................................................180 Specific firewall guidelines for SAP integration.....................................................................181 Firewall configuration for JD Edwards EnterpriseOne integration..........................................183 Specific firewall guidelines for Oracle EBS...........................................................................185 Firewall configuration for PeopleSoft Enterprise integration .................................................186 Firewall configuration for Siebel integration..........................................................................188 BI platform and reverse proxy servers .................................................................................189 Supported reverse proxy servers ........................................................................................189

6

2011-10-11

Contents

6.18.2 6.19 6.19.1 6.19.2 6.19.3 6.19.4 6.19.5 6.20 6.20.1 6.20.2 6.20.3Chapter 7

Understanding how web applications are deployed .............................................................190 Configuring reverse proxy servers for BI platform web applications......................................190 Detailed instructions for configuring reverse proxy servers..................................................190 To configure the reverse proxy server..................................................................................191 To configure Apache 2.2 reverse proxy server for BI platform .............................................191 To configure WebSEAL 6.0 reverse proxy server for BI platform .........................................192 To configure Microsoft ISA 2006 for BI platform .................................................................193 Special configuration for BI platform in reverse proxy deployments......................................194 Enabling reverse proxy for web services..............................................................................194 Enabling the root path for session cookies for ISA 2006......................................................197 Enabling reverse proxy for SAP BusinessObjects Live Office...............................................199 Authentication.....................................................................................................................201 Authentication options in BI platform....................................................................................201 Primary authentication..........................................................................................................201 Security plug-ins..................................................................................................................203 Single sign-on to BI platform................................................................................................203 Enterprise authentication......................................................................................................206 Enterprise authentication overview.......................................................................................206 Enterprise authentication settings.........................................................................................206 To change Enterprise settings..............................................................................................207 Enabling Trusted Authentication...........................................................................................209 Configuring Trusted Authentication for the web application..................................................210 LDAP authentication............................................................................................................219 Using LDAP authentication..................................................................................................220 Configuring LDAP authentication..........................................................................................221 Mapping LDAP groups.........................................................................................................232 Windows AD authentication.................................................................................................236 Overview..............................................................................................................................236 Preparing for AD authentication (Kerberos)..........................................................................240 AD authentication single sign-on..........................................................................................250 Mapping AD groups and configuring AD authentication........................................................260 Troubleshooting Windows AD authentication.......................................................................264 SAP authentication...............................................................................................................266 Configuring SAP authentication ...........................................................................................266 Creating a user account for BI platform................................................................................267 Connecting to SAP entitlement systems..............................................................................268 Setting SAP Authentication options.....................................................................................270 Importing SAP roles.............................................................................................................275 Configuring Secure Network Connection (SNC)..................................................................279 Setting up single sign-on to the SAP system........................................................................292

7.1 7.1.1 7.1.2 7.1.3 7.2 7.2.1 7.2.2 7.2.3 7.2.4 7.2.5 7.3 7.3.1 7.3.2 7.3.3 7.4 7.4.1 7.4.2 7.4.3 7.4.4 7.4.5 7.5 7.5.1 7.5.2 7.5.3 7.5.4 7.5.5 7.5.6 7.5.7

7

2011-10-11

Contents

7.5.8 7.6 7.6.1 7.6.2 7.6.3 7.6.4 7.6.5 7.7 7.7.1 7.7.2 7.7.3 7.7.4 7.8 7.8.1 7.8.2 7.8.3 7.9 7.9.1 7.9.2 7.9.3 7.9.4 7.9.5Chapter 8

Configuring SSO for SAP Crystal Reports and SAP NetWeaver..........................................296 PeopleSoft authentication....................................................................................................297 Overview..............................................................................................................................297 Enabling PeopleSoft Enterprise authentication......................................................................297 Mapping PeopleSoft roles to the BI Platform........................................................................298 Scheduling user updates......................................................................................................301 Using the PeopleSoft Security Bridge..................................................................................303 JD Edwards authentication...................................................................................................314 Overview..............................................................................................................................314 Enabling JD Edwards EnterpriseOne authentication..............................................................314 Mapping JD Edwards EnterpriseOne roles to BI Platform.....................................................315 Scheduling user updates......................................................................................................318 Siebel authentication............................................................................................................320 Enabling Siebel authentication..............................................................................................320 Mapping roles to BI platform................................................................................................321 Scheduling user updates......................................................................................................324 Oracle EBS authentication...................................................................................................325 Enabling Oracle EBS authentication......................................................................................326 Mapping Oracle E-Business Suite roles to BI platform..........................................................326 Unmapping roles .................................................................................................................331 Customizing rights for mapped Oracle EBS groups and users .............................................331 Configuring Single Sign-on (SSO) for SAP Crystal Reports and Oracle EBS........................333 Server Administration..........................................................................................................335 Server Administration...........................................................................................................335 Working with the Servers management area in the CMC.....................................................335 Managing servers by using scripts on Windows ..................................................................339 Managing servers on UNIX .................................................................................................339 Managing License keys........................................................................................................339 Measuring licenses..............................................................................................................341 Viewing and changing a server's status................................................................................342 Adding, cloning, or deleting servers......................................................................................347 Clustering Central Management Servers..............................................................................350 Managing server groups.......................................................................................................354 Assessing your system's performance.................................................................................358 Configuring server settings..................................................................................................363 Configuring server network settings.....................................................................................367 Managing Nodes..................................................................................................................375 Renaming a computer in an SAP BusinessObjects Business Intelligence platform deployment.395 Using 32-bit and 64-bit third-party libraries with SAP BusinessObjects Business Intelligence platform...............................................................................................................................396

8.1 8.1.1 8.1.2 8.1.3 8.1.4 8.1.5 8.1.6 8.1.7 8.1.8 8.1.9 8.1.10 8.1.11 8.1.12 8.1.13 8.1.14 8.1.15

8

2011-10-11

Contents

8.1.16Chapter 9

Managing server and node placeholders..............................................................................396 Managing Central Management Server (CMS) databases.................................................399 Managing CMS system database connections.....................................................................399 Selecting a new or existing CMS database..........................................................................399 To select a new or existing CMS database on Windows......................................................400 To select a new or existing CMS database on UNIX............................................................400 Recreating the CMS system database.................................................................................401 To recreate the CMS system database on Windows............................................................401 To recreate the CMS system database on UNIX..................................................................402 Copying data from one CMS system database to another...................................................403 Preparing to copy a CMS system database.........................................................................403 To copy a CMS system database on Windows....................................................................404 To copy data from a CMS system database on UNIX..........................................................404 Managing Web Application Container Servers (WACS).....................................................407 WACS.................................................................................................................................407 Web Application Container Server (WACS).........................................................................407 Adding or removing additional WACS to your deployment...................................................410 Adding or removing services to WACS................................................................................414 Configuring HTTPS/SSL......................................................................................................415 Supported authentication methods.......................................................................................419 Configuring AD Kerberos for WACS ...................................................................................420 Configuring AD Kerberos single sign-on ..............................................................................426 WACS and your IT environment...........................................................................................428 Configuring web application properties.................................................................................431 Troubleshooting...................................................................................................................431 WACS properties.................................................................................................................435 Backing Up and Restoring..................................................................................................437 Backing up and restoring your system..................................................................................437 Conducting a system backup...............................................................................................438 Backing up server settings...................................................................................................439 Backing up Business Intelligence content.............................................................................441 Restoring your system.........................................................................................................442 Restoring lost or corrupt SAP BusinessObjects Business Intelligence platform files where a backup is available...............................................................................................................446 Recreating a SAP BusinessObjects Business Intelligence platform system when files are lost.446 BackupCluster and RestoreCluster parameters...................................................................447

9.1 9.2 9.2.1 9.2.2 9.3 9.3.1 9.3.2 9.4 9.4.1 9.4.2 9.4.3Chapter 10

10.1 10.1.1 10.1.2 10.1.3 10.1.4 10.1.5 10.1.6 10.1.7 10.1.8 10.1.9 10.1.10 10.1.11Chapter 11

11.1 11.1.1 11.1.2 11.1.3 11.1.4 11.1.5 11.1.6 11.1.7

9

2011-10-11

Contents

Chapter 12

Life Cycle Management......................................................................................................451 Lifecycle management..........................................................................................................451 Version Management System settings for Lifecycle management console...........................451 Version Management System settings for Lifecycle management console...........................451 Version Management System Supported Options ..............................................................452 Creating and Configuring SubVersion Repository Manually .................................................453 BIAR Engine Command-Line Tool.........................................................................................454 Using a properties file .........................................................................................................456 To use the BIAR Engine Command-Line Tool.......................................................................460 Managing Applications.......................................................................................................463 Managing applications through the CMC..............................................................................463 Overview..............................................................................................................................463 Common settings for applications........................................................................................464 Application-specific settings.................................................................................................465 Managing applications through BOE.war properties.............................................................480 The BOE war file..................................................................................................................480 Customizing BI launch pad and OpenDocument logon entry points......................................488 BI launch pad and OpenDocument file locations...................................................................489 To define a custom logon page............................................................................................490 To add trusted authentication at logon..................................................................................491 Configuring BEx Web Integration .........................................................................................491 Starting a Server for BEx Web Applications ........................................................................493 Starting a Standalone Server for BEx Web Applications ......................................................493 Configuring Server Settings.................................................................................................493 Checking Connection to BW System ..................................................................................494 Configuring a connection between BEx web application designer and BI platform................495 Managing Connections and Universes...............................................................................497 Managing connections.........................................................................................................497 To delete a universe connection...........................................................................................497 Managing universes.............................................................................................................498 To delete universes..............................................................................................................498 Monitoring...........................................................................................................................499 About Monitoring.................................................................................................................499 Monitoring terms..................................................................................................................499 Architecture.........................................................................................................................500 Cluster support for monitoring server...................................................................................503

12.1 12.2 12.2.1 12.2.2 12.2.3 12.3 12.3.1 12.3.2Chapter 13

13.1 13.1.1 13.1.2 13.1.3 13.2 13.2.1 13.3 13.3.1 13.3.2 13.3.3 13.4 13.4.1 13.4.2 13.4.3 13.4.4 13.4.5Chapter 14

14.1 14.1.1 14.2 14.2.1Chapter 15

15.1 15.2 15.2.1 15.3

10

2011-10-11

Contents

15.4 15.5 15.5.1 15.6 15.6.1 15.6.2 15.7 15.8 15.8.1 15.8.2 15.8.3 15.8.4 15.8.5 15.8.6Chapter 16

Metrics................................................................................................................................504 Configuration properties.......................................................................................................512 JMX end point URL..............................................................................................................515 Integrating with other applications........................................................................................516 Integrating the monitoring application with IBM Tivoli............................................................517 Integrating the monitoring application with SAP Solution Manager ......................................520 Creating Universe for Derby Database.................................................................................520 Troubleshooting...................................................................................................................521 Dashboard...........................................................................................................................521 Alerts...................................................................................................................................522 Watchlist..............................................................................................................................522 Probes.................................................................................................................................523 Metrics................................................................................................................................523 Graph...................................................................................................................................524 Auditing...............................................................................................................................525 Overview..............................................................................................................................525 CMC Auditing page.............................................................................................................531 Auditing Status....................................................................................................................531 Configuring Auditing events.................................................................................................533 Auditing Data Store configuration settings...........................................................................535 Audit events.........................................................................................................................536 Audit events and details.......................................................................................................543 Platform Search...................................................................................................................559 Overview..............................................................................................................................559 Architecture.........................................................................................................................559 Cluster support for Platform Search.....................................................................................561 SDK and Open Search.........................................................................................................561 Platform Search SDK...........................................................................................................562 Open Search........................................................................................................................562 Configuring Application Properties.......................................................................................564 Searchable Content Types...................................................................................................568 Suggested Queries..............................................................................................................570 Facets..................................................................................................................................571 Multilingual Support.............................................................................................................571 Suggestions.........................................................................................................................572 Federating Search Results from SAP BusinessObjects Explorer..........................................572 Search-time Integration with SAP NetWeaver Enterprise Search.........................................572 Creating a Connector in SAP NetWeaver Enterprise Search ...............................................573

16.1 16.2 16.2.1 16.2.2 16.2.3 16.3 16.3.1Chapter 17

17.1 17.2 17.3 17.4 17.4.1 17.4.2 17.5 17.6 17.7 17.8 17.9 17.10 17.11 17.12 17.12.1

11

2011-10-11

Contents

17.12.2 17.12.3 17.13 17.14 17.15Chapter 18

Importing a User's Role in SAP BusinessObjects Enterprise Authentication.........................574 Searching from NetWeaver Enterprise Search.....................................................................574 Auditing................................................................................................................................575 Indexing Failure Listing.........................................................................................................576 Troubleshooting...................................................................................................................576 Federation...........................................................................................................................579 Federation............................................................................................................................579 Federation terms..................................................................................................................580 BI application .......................................................................................................................580 Destination site ...................................................................................................................581 Local....................................................................................................................................581 Locally run completed instances ..........................................................................................581 Multiple origin sites .............................................................................................................581 One-way replication .............................................................................................................581 Origin site ...........................................................................................................................582 Remote................................................................................................................................582 Remote connection..............................................................................................................582 Remote scheduling..............................................................................................................582 Replication...........................................................................................................................582 Replication job.....................................................................................................................582 Replication list......................................................................................................................583 Replication object.................................................................................................................583 Replication package.............................................................................................................583 Replication refresh...............................................................................................................583 Two-way replication..............................................................................................................583 Managing security rights......................................................................................................584 Rights required on the origin site..........................................................................................584 Rights required on the destination site.................................................................................585 Federation-specific rights.....................................................................................................586 Replicating security on an object..........................................................................................588 Replicating security using access levels...............................................................................588 Replication types and mode options.....................................................................................589 One-way replication .............................................................................................................589 Two-way replication .............................................................................................................589 Refresh from origin or refresh from destination....................................................................590 Replicating third-party users and groups...............................................................................591 Replicating universes and universe connections...................................................................592 Managing replication lists.....................................................................................................593 Creating replication lists.......................................................................................................594 Modifying Replication Lists...................................................................................................596

18.1 18.2 18.2.1 18.2.2 18.2.3 18.2.4 18.2.5 18.2.6 18.2.7 18.2.8 18.2.9 18.2.10 18.2.11 18.2.12 18.2.13 18.2.14 18.2.15 18.2.16 18.2.17 18.3 18.3.1 18.3.2 18.3.3 18.3.4 18.3.5 18.4 18.4.1 18.4.2 18.4.3 18.5 18.6 18.7 18.7.1 18.7.2

12

2011-10-11

Contents

18.8 18.8.1 18.8.2 18.9 18.9.1 18.9.2 18.9.3 18.9.4 18.10 18.10.1 18.10.2 18.10.3 18.11 18.11.1 18.11.2 18.12 18.12.1 18.12.2 18.12.3 18.13 18.13.1 18.13.2 18.13.3 18.14 18.14.1 18.14.2 18.14.3 18.14.4 18.15 18.15.1 18.15.2Chapter 19

Managing remote connections.............................................................................................597 Creating remote connections...............................................................................................597 Modifying remote connections.............................................................................................599 Managing replication jobs.....................................................................................................600 Creating replication jobs.......................................................................................................600 Scheduling replication jobs...................................................................................................603 Modifying replication jobs.....................................................................................................604 Viewing a log after a replication job......................................................................................604 Managing object cleanup......................................................................................................605 How to use object cleanup...................................................................................................605 Object cleanup limits............................................................................................................606 Object cleanup frequency.....................................................................................................606 Managing conflict detection and resolution...........................................................................607 One-way replication conflict resolution.................................................................................608 Two-way replication conflict resolution.................................................................................609 Using Web Services in Federation.......................................................................................612 Session variables ................................................................................................................612 File caching .........................................................................................................................613 Custom deployment ............................................................................................................613 Remote scheduling and locally run instances........................................................................614 Remote scheduling..............................................................................................................614 Locally run instances............................................................................................................615 Instance share......................................................................................................................616 Importing and promoting replicated content..........................................................................617 Importing replicated content.................................................................................................617 Importing replicated content and continuing replication ........................................................617 Promoting content from a test environment..........................................................................618 Re-pointing a destination site...............................................................................................619 Best practices......................................................................................................................619 Current release limitations....................................................................................................622 Troubleshooting error messages..........................................................................................623 Supplementary Configurations for ERP Environments........................................................627 Configurations for SAP NetWeaver integration....................................................................627 Integrating with SAP NetWeaver Business Warehouse (BW)...............................................627 Configuring for JD Edwards integration................................................................................675 Configuring Single Sign-on (SSO) for SAP Crystal Reports.................................................676 Configuring Secure Socket Layer for JD Edwards Integrations............................................676 Configuring for PeopleSoft Enterprise integration.................................................................678 Configuring Single Sign-on (SSO) for SAP Crystal Reports and PeopleSoft Enterprise........678 Configuring Secure Socket Layer communication................................................................679

19.1 19.1.1 19.2 19.2.1 19.2.2 19.3 19.3.1 19.3.2

13

2011-10-11

Contents

19.3.3 19.4 19.4.1 19.4.2 19.4.3 19.4.4 19.4.5Chapter 20

Performance Tuning for PeopleSoft systems........................................................................681 Configuring for Siebel integration.........................................................................................682 Configuring Siebel to integrate with SAP BusinessObjects Business Intelligence platform....682 Creating the Crystal Reports menu item..............................................................................683 Contextual awareness..........................................................................................................685 Configuring Single Sign-on (SSO) for SAP Crystal Reports and Siebel................................687 Configuring for Secure Sockets Layer Communication........................................................688 Managing and Configuring Logs.........................................................................................689 Logging traces from components.........................................................................................689 Trace log levels....................................................................................................................689 Configuring tracing for servers.............................................................................................690 To set the server trace log level in the CMC........................................................................691 To set the trace log level for multiple servers managed in the CMC.....................................691 To configure server tracing through the BO_trace.ini file......................................................692 Configuring tracing for web applications...............................................................................695 To set the web application trace log level in the CMC..........................................................695 To manually modify tracing settings through the BO_trace.ini file.........................................696 Configuring tracing for upgrade management tool................................................................701 To configure tracing for upgrade management tool...............................................................701 Integration to SAP Solution Manager..................................................................................703 Integration overview.............................................................................................................703 SAP Solution Manager integration checklist.........................................................................703 Managing system landscape directory registration...............................................................705 Registration of BI platform in the System Landscape...........................................................705 When is SLD registration triggered?....................................................................................706 Logging SLD connectivity ...................................................................................................707 Managing Solution Management Diagnostics agents...........................................................707 Solution Manager Diagnostics (SMD) overview...................................................................707 Working with SMD agents...................................................................................................708 SMAdmin user account........................................................................................................708 Managing performance instrumentation................................................................................709 Performance instrumentation for BI platform........................................................................709 Setting up performance instrumentation for BI platform........................................................709 Performance instrumentation for the web tier.......................................................................711 Instrumentation log files ......................................................................................................711 Tracing with SAP Passport...................................................................................................711

20.1 20.2 20.3 20.3.1 20.3.2 20.3.3 20.4 20.4.1 20.4.2 20.5 20.5.1Chapter 21

21.1 21.2 21.3 21.3.1 21.3.2 21.3.3 21.4 21.4.1 21.4.2 21.4.3 21.5 21.5.1 21.5.2 21.5.3 21.5.4 21.6

14

2011-10-11

Contents

Chapter 22

Command Line Administration............................................................................................713 UNIX scripts.........................................................................................................................713 Script utilities.......................................................................................................................713 Script templates...................................................................................................................719 Scripts used by SAP BusinessObjects Business Intelligence platform.................................719 Windows scripts..................................................................................................................721 ccm.exe...............................................................................................................................721 Server Command Lines........................................................................................................724 Command lines overview.....................................................................................................724 Standard options for all servers............................................................................................725 Central Management Server................................................................................................726 Crystal Reports Processing Server and Crystal Reports Cache Server................................729 Dashboard Design Processing Server and Dashboard Design Cache Server.......................729 Job Servers.........................................................................................................................731 Adaptive Processing Server.................................................................................................732 Report Application Server....................................................................................................732 Web Intelligence Processing Server.....................................................................................734 Input and Output File Repository Servers.............................................................................736 Event Server........................................................................................................................738 Dashboard and Dashboard Analytics Servers .....................................................................739 Rights Appendix..................................................................................................................741 About the rights appendix.....................................................................................................741 General rights......................................................................................................................741 Rights for specific object types............................................................................................744 Folder rights.........................................................................................................................744 Categories...........................................................................................................................744 Notes...................................................................................................................................745 Crystal reports.....................................................................................................................745 Web Intelligence documents................................................................................................746 Users and groups.................................................................................................................747 Access levels.......................................................................................................................748 BI Workspaces.....................................................................................................................749 Universe (.unv) rights...........................................................................................................750 Universe (.unx) rights...........................................................................................................751 Universe object-access levels..............................................................................................753 Connection rights.................................................................................................................754 Applications.........................................................................................................................755

22.1 22.1.1 22.1.2 22.1.3 22.2 22.2.1 22.3 22.3.1 22.3.2 22.3.3 22.3.4 22.3.5 22.3.6 22.3.7 22.3.8 22.3.9 22.3.10 22.3.11 22.3.12Chapter 23

23.1 23.2 23.3 23.3.1 23.3.2 23.3.3 23.3.4 23.3.5 23.3.6 23.3.7 23.3.8 23.3.9 23.3.10 23.3.11 23.3.12 23.3.13

15

2011-10-11

Contents

Chapter 24

Server Properties Appendix.................................................................................................767 About the server properties appendix...................................................................................767 Common Server Properties..................................................................................................767 Core Services Properties.....................................................................................................770 Connectivity Services Properties.........................................................................................780 Crystal Reports Services Properties....................................................................................784 Analysis Services Properties................................................................................................792 Data Federation Services Properties....................................................................................794 Web Intelligence Services Properties...................................................................................794 Dashboard Design Services Properties................................................................................804 Server Metrics Appendix.....................................................................................................809 About the Server Metrics Appendix.....................................................................................809 Common Server Metrics .....................................................................................................809 Central Management Server Metrics...................................................................................812 Connection Server Metrics..................................................................................................816 Event Server Metrics...........................................................................................................817 File Repository Server Metrics.............................................................................................818 Adaptive Processing Server Metrics....................................................................................818 Web Application Container Server Metrics..........................................................................823 Adaptive Job Server Metrics................................................................................................824 Crystal Report Server Metrics.............................................................................................826 Web Intelligence Server Metrics..........................................................................................829 Dashboard Design Server Metrics.......................................................................................831 Server and Node Placeholder Appendix..............................................................................835 Server and node placeholders..............................................................................................835 Auditing Data Store Schema Appendix...............................................................................845 Overview..............................................................................................................................845 Schema diagram..................................................................................................................845 Auditing Data Store Tables..................................................................................................846 More Information.................................................................................................................857 859

24.1 24.1.1 24.1.2 24.1.3 24.1.4 24.1.5 24.1.6 24.1.7 24.1.8Chapter 25

25.1 25.1.1 25.1.2 25.1.3 25.1.4 25.1.5 25.1.6 25.1.7 25.1.8 25.1.9 25.1.10 25.1.11Chapter 26

26.1Chapter 27

27.1 27.2 27.3Appendix A Index

16

2011-10-11

Getting Started

Getting Started

1.1 About this helpThis help provides you with information and procedures for deploying and configuring your BI platform. Procedures are provided for common tasks. Conceptual information and technical details are provided for all advanced topics. For information about installing this product, see the SAP BusinessObjects Business Intelligence Platform Installation Guide.

1.1.1 Who should use this help?This help covers deployment and configuration tasks. We recommend consulting this guide if you are: planning your first deployment configuring your first deployment making significant changes to the architecture of an existing deployment improving your system's performance.

This help is intended for system administrators who are responsible for configuring, managing, and maintaining a BI platform installation. Familiarity with your operating system and your network environment is beneficial, as is a general understanding of web application server management and scripting technologies. However, to assist all levels of administrative experience, this help aims to provide sufficient background and conceptual information to clarify all administrative tasks and features.

1.1.2 About SAP BusinessObjects Business Intelligence platformThe BI platform is a flexible, scalable, and reliable solution for delivering powerful, interactive reports to end users via any web applicationintranet, extranet, Internet or corporate portal. Whether it is used for distributing weekly sales reports, providing customers with personalized service offerings, or integrating critical information into corporate portals, BI platform delivers tangible benefits that extend

17

2011-10-11

Getting Started

across and beyond the organization. As an integrated suite for reporting, analysis, and information delivery, the platform provides a solution for increasing end-user productivity and reducing administrative efforts.

1.1.3 VariablesThe following variables are used throughout this guide.Variable Description

The directory where the BI platform is installed. On a Windows machine, the default directory is C:\Program Files (x86)\SAP BusinessObjects\.

The name of your UNIX operating system. Acceptable values are: aix_rs6000_64 linux_x64 solaris_sparcv9 hpux_ia64 The directory where scripts for administering BI platform are located. On a Windows machine, the directory is \win64_x64\scripts. On Unix machines, the directory is //scripts.

1.2 Before you start

1.2.1 Key concepts

18

2011-10-11

Getting Started

1.2.1.1 Services and serversThe following diagram shows a hypothetical installation of BI platform. Note: The nodes, servers, and services shown are for illustrative purposes only. The number of hosts, nodes, servers and servicesas well as the type of servers, and serviceswill vary in real-world installations.

Two hosts form the cluster named ProductionBISystem, with two hosts: The host named HostAlpha has BI platform installed and is configured to have two nodes:

NodeMercury: contains an Adaptive Job Server (NodeMercury.AJS) with services to schedule and publish reports, an Input File Repository Server (NodeMercury.IFRS) with a service to store input reports, and an Output File Repository Server (NodeMercury.OFRS) with a service to store report output.

19

2011-10-11

Getting Started

NodeVenus: contains an Adaptive Processing Server (NodeVenus.APS) with services to provide publishing, monitoring, and translation features, an Adaptive Processing Server (NodeVenus.APS2) with a service to provide client auditing, and a Central Management Server (NodeVenus.CMS) with a service to provide the CMS services.

The host named HostBeta has BI platform installed and is configured to have three nodes:

NodeMars: contains a Central Management Server (NodeMars.CMS) with a service to provide the CMS services. NodeJupiter: contains an Web Intelligence Processing Server (NodeJupiter.Web Intelligence) with a service to provide Web Intelligence reporting, and an Event Server (NodeJupiter.EventServer) to provide report monitoring of files. NodeSaturn: contains an Adaptive Processing Server (NodeSaturn.APS) with a service to provide client auditing.

The BI platform uses the terms server and service to refer to the two types of software running on a BI platform machine. A service is a server subsystem that performs a specific function. The service runs within the memory space of its server under the process id of the parent container (server). For example, the SAP BusinessObjects Web Intelligence Scheduling and Publishing Service is a subsystem that runs within the Adaptive Job Server. The term server is used to describe an operating system level process (on some systems, this is referred to as a daemon) hosting one or more services. For example, the Central Management Server (CMS) and Adaptive Processing Server are servers. A server runs under a specific operating system account and has its own PID. A node is a collection of BI platform servers running on the same host. One or more nodes can be on a single host. BI platform can be installed on a single machine, spread across different machines on an intranet, or separated over a wide area network (WAN).

1.2.1.2 Server IntelligenceServer Intelligence is a component of the Central Management Console (CMC) to manage a collection or server processes, collectively known as a node. Changes to server processes applied in the CMC are propagated to affected servers by the Server Intelligence Agent (SIA). The SIA is also used for the automatic restart or shutdown of a server if it encounters an unexpected condition, and is used by the Central Management Server (CMC) to manage nodes. The Server Intelligence Agent (SIA) server archives server information in the CMS system database so you can easily restore default server settings, or create redundant instances of server processes with the same settings.

20

2011-10-11

Getting Started

Note: A single machine can contain multiple nodes, and the nodes can be in the same BI platform cluster or in different clusters.

1.2.2 Key administrative tools

1.2.2.1 Central Management Console (CMC)

The Central Management Console (CMC) is a web-based tool to perform administrative tasks, including user, content, and server management. It also allows you to publish, organize, and configure security settings. Because the CMC is a web-based application, you can perform all of these administrative tasks through a web browser on any machine that can connect to the server. All users can log on to the CMC to change their user preference settings. Only members of the Administrators group can change management settings, unless explicitly granted the rights to do so. Roles can also be assigned to the CMC to grant some users privileges to perform minor administrative tasks

1.2.2.2 Central Configuration Manager (CCM)The Central Configuration Manager (CCM) is a server troubleshooting and node management tool provided in two forms. In a Microsoft Windows environment, the CCM allows you to manage local and remote servers through its graphical user interface (GUI) or from a command line. In a Unix environment, the CCM shell script (ccm.sh) allows you to manage servers from the command-line. The CCM allows you to create and configure Server Intelligence Agent (SIA) nodes and start or stop your web application server. On Windows, it also allows you to configure network parameters, such as Secure Socket Layer (SSL) encryption. These parameters apply to all servers within a node. Note: Most server management tasks are now handled through the CMC, not through the CCM. The CCM is now used for troubleshooting and node configuration.

21

2011-10-11

Getting Started

1.2.2.3 Repository Diagnostic ToolThe Repository Diagnostic Tool (RDT) can scan, diagnose, and repair inconsistencies that may occur between the Central Management Server (CMS) system database and the File Repository Servers (FRS) filestore. You can set a limit for the number of errors the RDT will find and repair before stopping. RDT should be used after you restore your BI platform system.

1.2.2.4 Upgrade management toolUpgrade management tool (formerly Import Wizard) is installed as a part of BI platform, and guides administrators through the process of importing users, groups, and folders from previous versions of the BI platform. It also allows you to import and upgrade objects, events, server groups, repository objects, and calendars. For information on upgrading from a previous version of BI platform, see the SAP BusinessObjects Business Intelligence Upgrade Guide.

1.2.3 Key tasksDepending on your situation, you may want to focus on specific sections of this help, and there may be other resources available for you. For each of the following situations, there is a list of suggested tasks and reading topics. Related Topics Planning or performing your first deployment Configuring your deployment Improving your system's performance Central Management Console (CMC)

1.2.3.1 Planning or performing your first deployment

22

2011-10-11

Getting Started

If you are planning or performing your first deployment of BI platform, it is recommended that you perform the following tasks and read the corresponding sections: To get familiar with the BI platform components, read Architectural overview. To assess your needs and design a deployment architecture that works best for you, read the SAP BusinessObjects Business Intelligence Platform Deployment Planning Guide. Understanding communication between BI platform components. Security overview. If you plan to use third-party authentication, read Authentication. For more information about installing BI platform, see the SAP BusinessObjects Business Intelligence Platform Installation Guide. After you install, read Server management overview.

Related Topics Architecture overview Understanding communication between BI platform components Security overview Authentication options in BI platform Server Administration

1.2.3.2 Configuring your deploymentIf you have just completed your installation of the BI platform and need to perform initial configuration tasks, such as firewall configuration and user management, it is recommended that you read the following sections. Related Topics Server Administration Communication between BI platform components Security overview About Monitoring

1.2.3.3 Improving your system's performance

23

2011-10-11

Getting Started

If you want to assess your deployment's efficiency and fine-tune it in order to maximize resources, it is recommended that you read the following sections: If you want to monitor your existing system, read Monitoring. For daily maintenance tasks and procedures for working with servers in the CMC, see Server Maintenance.

Related Topics About Monitoring Server Administration

1.2.3.4 Working with objects in the CMCIf you are working with objects in the CMC, read the following sections: For information about setting up users and groups in the CMC, see Account Management Overview. To set security on objects, see How rights work in BI platform. For general information about working with objects, see SAP BusinessObjects Business Intelligence Platform User's Guide.

Related Topics Account management overview How rights work in BI platform

24

2011-10-11

Architecture

Architecture

2.1 Architecture overviewThis section outlines the overall platform architecture, system, and service components that make up the SAP BusinessObjects Business Intelligence platform. The information helps administrators understand the system essentials and help to form a plan for the system deployment, management, and maintenance. Note: For a list of supported platforms, languages, databases, web application servers, web servers, and other systems supported by this release, see the Product Availability Matrix (Supported Platforms/PAR), available on the SAP BusinessObjects section of the SAP Support Portal at: https://ser vice.sap.com/bosap-support. SAP BusinessObjects Business Intelligence platform is designed for high performance across a broad spectrum of user and deployment scenarios. For example, specialized platform services handle either on-demand data access and report generation, or report scheduling based on times and events. You can offload processor intensive scheduling and processing by creating dedicated servers to host specific services. The architecture is designed to meet the needs of virtually any BI deployment, and is flexible enough to grow from several users with a single tool, to tens of thousands of users with multiple tools and interfaces. Developers can integrate SAP BusinessObjects Business Intelligence platform BI into your organization's other technology systems by using web services, Java, or .NET application programming interfaces (APIs). End users can access, create, edit, and interact with reports using specialized tools and applications that include: Clients installed by SAP BusinessObjects Business Intelligence Platform Client Tools installation program: Web Intelligence Business View Manager Report Conversion Tool Universe design tool Web Service query tool (formerly Query as a Web Service) Information design tool (formerly Information Designer) Translation Management Tool (formerly Translation Manager) Widgets for SAP BusinessObjects Business Intelligence Platform (formerly BI Widgets) Clients available separately:

25

2011-10-11

Architecture

SAP Crystal Reports SAP BusinessObjects Dashboard Design (formerly Xcelsius) SAP BusinessObjects Analysis (formerly Voyager) BI Workspaces (formerly Dashboard Builder)

IT departments can use data and system management tools that include: Report Viewers Central Management Console (CMC) Central Configuration Manager (CCM) Repository Diagnostic Tool (RDT) Data Federation Administration Tool Upgrade management tool (formerly Import Wizard) Universe design tool (formerly Universe Designer) SAP BusinessObjects Mobile To provide flexibility, reliability, and scalability, SAP BusinessObjects Business Intelligence platform components can be installed on one or across many machines. You can even install two different versions of SAP BusinessObjects Business Intelligence platform simultaneously on the same computer, although this configuration is only recommended as part of the upgrade process or testing purposes. Server processes can be vertically scaled (where one computer runs several, or all, server-side processes) to reduce cost, or horizontally scaled (where server processes are distributed between two or more networked machines) to improve performance. It is also possible to run multiple, redundant, versions of the same server process on more than one machine, so that processing can continue if the primary process encounters a problem. Note: While it is possible to use a mixture of Windows and Unix or Linux platforms, it is recommended that you do not mix operating systems for Central Management Server (CMS) processes.

2.1.1 System overviewSAP BusinessObjects Business Intelligence platform provides enterprise level analysis and reporting tools. Data can be analyzed from any of a large number of supported database systems (including text or multi-dimensional OLAP systems) and BI reports can be published in many different formats to many different publishing systems. The following diagram illustrates how SAP BusinessObjects Business Intelligence platform fits in with your organization's infrastructure.

26

2011-10-11

Architecture

SAP BusinessObjects Business Intelligence platform reports from a read-only connection to your organization's databases, and uses its own databases for storing its configuration, auditing, and other operational information. The BI reports created by the system can be sent to a variety of destinations, including file systems, and email, or accessed through web sites or portals. SAP BusinessObjects Business Intelligence platform is a self-contained system that can exist on a single machine (for example, as a small development or pre-production test environment) or can be scaled up into a cluster of many machines that run different components (for example, as a large-scale production environment).

2.1.2 DatabasesSAP BusinessObjects Business Intelligence platform uses several different databases. Reporting database This refers to your organization's information. It is the source information analyzed and reported on by SAP BusinessObjects Business Intelligence platform. Most commonly, the information is stored within a relational database, but it can also be contained within text files, Microsoft Office documents, or OLAP systems. CMS system database The CMS system database is used to store SAP BusinessObjects Business Intelligence platform information, such as user, server, folder, document, configuration, and authentication details. It is

27

2011-10-11

Architecture

maintained by the Central Management Server (CMS), and is sometimes referred to as the system repository. Auditing Data Store The Auditing Data Store (ADS) is used to store information on trackable events that occur in SAP BusinessObjects Business Intelligence platform. This information can be used to monitor the usage of system components, user activity, or other aspects of day-to-day operation. Lifecycle Management database The Lifecycle Management database tracks configuration and version information related to an SAP BusinessObjects Business Intelligence platform installation, as well as updates. Monitoring database Monitoring uses the Java Derby database to store system configuration and component information for SAP supportability. If you do not have a database server in place for use with the CMS system and Auditing Data Store databases, the SAP BusinessObjects Business Intelligence platform installation program can install and configure one for you. It is recommended that you evaluate your requirements against information from your database server vendor to determine which supported database would best suit your organization's requirements.

2.1.3 ServersSAP BusinessObjects Business Intelligence platform consists of collections of servers running on one or more hosts. Small installat