sbo41sp2 bip admin en

Download Sbo41sp2 Bip Admin En

If you can't read please download the document

Upload: pratikshah83

Post on 19-Oct-2015

167 views

Category:

Documents


1 download

DESCRIPTION

Sbo41sp2 Bip Admin En

TRANSCRIPT

  • Business Intelligence Platform Administrator Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2

    2013-11-21

  • 2013 SAP AG or an SAP affiliate company. All rights reserved. No part of this publication may bereproduced or transmitted in any form or for any purpose without the express permission of SAP AG.

    Copyright

    The information contained herein may be changed without prior notice. Some software productsmarketed by SAP AG and its distributors contain proprietary software components of other softwarevendors. National product specifications may vary. These materials are provided by SAP AG and itsaffiliated companies ("SAP Group") for informational purposes only, without representation or warrantyof any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials.The only warranties for SAP Group products and services are those that are set forth in the expresswarranty statements accompanying such products and services, if any. Nothing herein should beconstrued as constituting an additional warranty. SAP and other SAP products and services mentionedherein as well as their respective logos are trademarks or registered trademarks of SAP AG inGermany and other countries. Please seehttp://www.sap.com/corporate-en/legal/copyright/index.epx#trademark for additional trademarkinformation and notices.

    2013-11-21

  • Contents

    Document History.................................................................................................................21Chapter 1

    Getting Started......................................................................................................................23Chapter 2

    About this guide.....................................................................................................................232.1

    Who should use this guide?...................................................................................................232.1.1

    About the Business Intelligence platform ...............................................................................232.1.2

    Variables................................................................................................................................242.1.3

    Terminology...........................................................................................................................242.1.4

    Before you start.....................................................................................................................262.2

    Key concepts.........................................................................................................................262.2.1

    Key administrative tools.........................................................................................................292.2.2

    Key tasks...............................................................................................................................312.2.3

    Architecture...........................................................................................................................35Chapter 3

    Architecture overview............................................................................................................353.1

    Component diagram...............................................................................................................363.1.1

    Architecture tiers...................................................................................................................373.1.2

    Databases..............................................................................................................................383.1.3

    Servers, hosts, and clusters...................................................................................................393.1.4

    Web application servers.........................................................................................................393.1.5

    Software Development Kits...................................................................................................413.1.6

    Data sources.........................................................................................................................433.1.7

    Authentication and single sign-on...........................................................................................433.1.8

    SAP integration......................................................................................................................453.1.9

    Integrated version control.......................................................................................................463.1.10

    Upgrade path.........................................................................................................................473.1.11

    Servers, services, nodes, and hosts......................................................................................473.2

    Server changes since XI 3.1...................................................................................................493.2.1

    Services.................................................................................................................................513.2.2

    Service categories.................................................................................................................583.2.3

    Server types..........................................................................................................................613.2.4

    Servers..................................................................................................................................673.2.5

    2013-11-213

  • Client applications..................................................................................................................693.3

    Installed with SAP BusinessObjects Business Intelligence platform Client Tools....................703.3.1

    Installed with SAP BusinessObjects Business Intelligence platform........................................743.3.2

    Available separately...............................................................................................................753.3.3

    Web application clients..........................................................................................................773.3.4

    Process Workflows................................................................................................................803.4

    Startup and authentication.....................................................................................................803.4.1

    Program objects.....................................................................................................................823.4.2

    Crystal Reports......................................................................................................................843.4.3

    Web Intelligence....................................................................................................................883.4.4

    Analysis.................................................................................................................................903.4.5

    System Configuration Wizard...............................................................................................93Chapter 4

    Introduction to the System Configuration Wizard...................................................................934.1

    Specifying the products you use............................................................................................934.2

    Choosing a deployment template...........................................................................................954.3

    Specifying data folder locations..............................................................................................964.4

    Reviewing your changes.........................................................................................................984.5

    Log files and response files....................................................................................................984.6

    Using a response file..............................................................................................................994.6.1

    Managing Licenses.............................................................................................................103Chapter 5

    Managing license keys.........................................................................................................1035.1

    To view license information..................................................................................................1035.1.1

    To add a license key.............................................................................................................1035.1.2

    To view current account activity...........................................................................................1045.1.3

    Managing Users and Groups..............................................................................................105Chapter 6

    Account management overview............................................................................................1056.1

    User management................................................................................................................1056.1.1

    Group management.............................................................................................................1066.1.2

    Available authentication types .............................................................................................1076.1.3

    Managing Enterprise and general accounts..........................................................................1096.2

    To create a user account......................................................................................................1096.2.1

    To modify a user account.....................................................................................................1106.2.2

    To delete a user account......................................................................................................1106.2.3

    To create a new group.........................................................................................................1116.2.4

    To modify a group's properties.............................................................................................1116.2.5

    To view group members.......................................................................................................1126.2.6

    To add subgroups................................................................................................................1126.2.7

    2013-11-214

    Contents

  • To specify group membership..............................................................................................1136.2.8

    To delete a group.................................................................................................................1136.2.9

    To add users or user groups in bulk.....................................................................................1146.2.10

    To enable the Guest account...............................................................................................1146.2.11

    Adding users to groups........................................................................................................1156.2.12

    Changing password settings................................................................................................1166.2.13

    Granting access to users and groups...................................................................................1186.2.14

    Controlling access to user inboxes.......................................................................................1186.2.15

    Configuring BI launch pad options........................................................................................1196.2.16

    Managing aliases.................................................................................................................1226.3

    To create a user and add a third-party alias..........................................................................1226.3.1

    To create a new alias for an existing user.............................................................................1236.3.2

    To assign an alias from another user....................................................................................1236.3.3

    To delete an alias.................................................................................................................1246.3.4

    To disable an alias................................................................................................................1256.3.5

    Setting Rights......................................................................................................................127Chapter 7

    How rights work in BI platform.............................................................................................1277.1

    Access levels.......................................................................................................................1277.1.1

    Advanced rights settings......................................................................................................1287.1.2

    Inheritance...........................................................................................................................1297.1.3

    Type-specific rights..............................................................................................................1347.1.4

    Determining effective rights.................................................................................................1357.1.5

    Managing security settings for objects in the CMC..............................................................1367.2

    To view rights for a principal on an object.............................................................................1367.2.1

    To assign principals to an access control list for an object....................................................1377.2.2

    To modify security for a principal on an object......................................................................1377.2.3

    To set rights on a top-level folder in the BI platform..............................................................1387.2.4

    Checking security settings for a principal.............................................................................1387.2.5

    Working with access levels..................................................................................................1417.3

    Choosing between View and View On Demand access levels.............................................1437.3.1

    To copy an existing access level..........................................................................................1447.3.2

    To create a new access level...............................................................................................1447.3.3

    To rename an access level...................................................................................................1457.3.4

    To delete an access level.....................................................................................................1457.3.5

    To modify rights in an access level.......................................................................................1457.3.6

    Tracing the relationship between access levels and objects.................................................1467.3.7

    Managing access levels across sites....................................................................................1477.3.8

    Breaking inheritance.............................................................................................................1487.4

    To disable inheritance...........................................................................................................1497.4.1

    Using rights to delegate administration.................................................................................1497.5

    2013-11-215

    Contents

  • Choosing between Modify the rights users have to objects options.....................................1517.5.1

    Owner rights........................................................................................................................1527.5.2

    Summary of recommendations for rights administration.......................................................1537.6

    Securing the BI Platform.....................................................................................................155Chapter 8

    Security overview ................................................................................................................1558.1

    Disaster recovery planning...................................................................................................1558.2

    General recommendations for securing your deployment.....................................................1568.3

    Configuring security for bundled third-party servers.............................................................1578.4

    Active trust relationship........................................................................................................1578.5

    Logon tokens.......................................................................................................................1578.5.1

    Ticket mechanism for distributed security.............................................................................1588.5.2

    Sessions and session tracking.............................................................................................1598.6

    CMS session tracking..........................................................................................................1598.6.1

    Environment protection........................................................................................................1608.7

    Web browser to web server.................................................................................................1608.7.1

    Web server to BI platform....................................................................................................1608.7.2

    Auditing security configuration modifications .......................................................................1608.8

    Auditing web activity............................................................................................................1618.9

    Protection against malicious logon attempts.........................................................................1618.9.1

    Password restrictions...........................................................................................................1618.9.2

    Logon restrictions................................................................................................................1628.9.3

    User restrictions..................................................................................................................1628.9.4

    Guest account restrictions...................................................................................................1628.9.5

    Processing extensions.........................................................................................................1638.10

    Overview of BI platform data security...................................................................................1638.11

    Data processing security modes..........................................................................................1648.11.1

    Cryptography in the BI platform............................................................................................1668.12

    Working with cluster keys....................................................................................................1668.12.1

    Cryptographic Officers.........................................................................................................1688.12.2

    Managing cryptographic keys in the CMC............................................................................1708.12.3

    Configuring servers for SSL.................................................................................................1748.13

    Creating key and certificate files..........................................................................................1748.13.1

    Setting up SSL when the certificate is managed by a certificate authority............................1778.13.2

    Configuring the SSL protocol...............................................................................................1788.13.3

    Understanding communication between BI platform components.........................................1838.14

    Overview of BI platform servers and communication ports...................................................1838.14.1

    Communication between BI platform components ...............................................................1858.14.2

    Configuring the BI platform for firewalls................................................................................1928.15

    To configure the system for firewalls....................................................................................1928.15.1

    Debugging a firewalled deployment......................................................................................1958.15.2

    2013-11-216

    Contents

  • Examples of typical firewall scenarios...................................................................................1978.16

    Example - Application tier deployed on a separate network..................................................1978.16.1

    Example - Thick client and database tier separated from BI platform servers by a firewall.....1998.16.2

    Firewall settings for integrated environments.......................................................................2028.17

    Specific firewall guidelines for SAP integration.....................................................................2028.17.1

    Firewall configuration for JD Edwards EnterpriseOne integration..........................................2048.17.2

    Specific firewall guidelines for Oracle EBS...........................................................................2058.17.3

    Firewall configuration for PeopleSoft Enterprise integration .................................................2068.17.4

    Firewall configuration for Siebel integration..........................................................................2088.17.5

    The BI platform and reverse proxy servers ..........................................................................2098.18

    Supported reverse proxy servers ........................................................................................2108.18.1

    Understanding how web applications are deployed .............................................................2108.18.2

    Configuring reverse proxy servers for BI platform web applications......................................2108.19

    Detailed instructions for configuring reverse proxy servers..................................................2118.19.1

    To configure the reverse proxy server..................................................................................2118.19.2

    To configure Apache 2.2 reverse proxy server for the BI platform .......................................2128.19.3

    To configure WebSEAL 6.0 reverse proxy server for the BI platform ...................................2128.19.4

    To configure Microsoft ISA 2006 for the BI platform ...........................................................2138.19.5

    Special configuration for the BI platform in reverse proxy deployments................................2158.20

    Enabling reverse proxy for web services..............................................................................2158.20.1

    Enabling the root path for session cookies for ISA 2006......................................................2178.20.2

    Enabling reverse proxy for SAP BusinessObjects Live Office...............................................2198.20.3

    Authentication.....................................................................................................................221Chapter 9

    Authentication options in the BI platform..............................................................................2219.1

    Primary authentication..........................................................................................................2229.1.1

    Security plug-ins..................................................................................................................2239.1.2

    Single sign-on to the BI platform..........................................................................................2239.1.3

    Enterprise authentication......................................................................................................2259.2

    Enterprise authentication overview.......................................................................................2269.2.1

    Enterprise authentication settings.........................................................................................2269.2.2

    To change Enterprise settings..............................................................................................2279.2.3

    Enabling Trusted Authentication...........................................................................................2289.2.4

    Configuring Trusted Authentication for the web application..................................................2309.2.5

    LDAP authentication............................................................................................................2399.3

    Using LDAP authentication..................................................................................................2399.3.1

    Configuring LDAP authentication..........................................................................................2419.3.2

    Mapping LDAP groups.........................................................................................................2519.3.3

    Windows AD authentication.................................................................................................2609.4

    Using Windows AD authentication.......................................................................................2609.4.1

    Preparing the Domain Controller..........................................................................................2619.4.2

    2013-11-217

    Contents

  • Configuring AD Authentication in the CMC..........................................................................2639.4.3

    Configuring the BI platform service to run the SIA................................................................2699.4.4

    Configuring the web application server for AD Authentication..............................................2719.4.5

    Single Sign-On Setup...........................................................................................................2799.4.6

    Troubleshooting Windows AD authentication.......................................................................2929.4.7

    SAP authentication...............................................................................................................2939.5

    Configuring SAP authentication ...........................................................................................2939.5.1

    Creating a user account for the BI platform..........................................................................2949.5.2

    Connecting to SAP entitlement systems..............................................................................2959.5.3

    Setting SAP Authentication options.....................................................................................2979.5.4

    Importing SAP roles.............................................................................................................3029.5.5

    Configuring Secure Network Communication (SNC)............................................................3069.5.6

    Setting up single sign-on to the SAP system........................................................................3189.5.7

    Configuring SSO for SAP Crystal Reports and SAP NetWeaver..........................................3229.5.8

    PeopleSoft authentication....................................................................................................3239.6

    Overview..............................................................................................................................3239.6.1

    Enabling PeopleSoft Enterprise authentication......................................................................3249.6.2

    Mapping PeopleSoft roles to the BI Platform........................................................................3249.6.3

    Scheduling user updates......................................................................................................3279.6.4

    Using the PeopleSoft Security Bridge..................................................................................3299.6.5

    JD Edwards authentication...................................................................................................3409.7

    Overview..............................................................................................................................3409.7.1

    Enabling JD Edwards EnterpriseOne authentication..............................................................3409.7.2

    Mapping JD Edwards EnterpriseOne roles to the BI Platform...............................................3419.7.3

    Scheduling user updates......................................................................................................3449.7.4

    Siebel authentication............................................................................................................3459.8

    Enabling Siebel authentication..............................................................................................3469.8.1

    Mapping roles to the BI platform..........................................................................................3469.8.2

    Scheduling user updates......................................................................................................3499.8.3

    Oracle EBS authentication...................................................................................................3519.9

    Enabling Oracle EBS authentication......................................................................................3519.9.1

    Mapping Oracle E-Business Suite roles to the BI platform....................................................3529.9.2

    Unmapping roles .................................................................................................................3569.9.3

    Customizing rights for mapped Oracle EBS groups and users .............................................3579.9.4

    Configuring Single Sign-on (SSO) for SAP Crystal Reports and Oracle EBS........................3589.9.5

    Server Administration..........................................................................................................361Chapter 10

    Working with the Servers management area in the CMC.....................................................36110.1

    Managing servers by using scripts on Windows ..................................................................36510.2

    Managing servers on Unix ...................................................................................................36510.3

    Viewing and changing a server's status................................................................................36510.4

    2013-11-218

    Contents

  • Viewing the state of servers.................................................................................................36510.4.1

    Starting, stopping, and restarting servers.............................................................................36710.4.2

    Stopping a Central Management Server..............................................................................36910.4.3

    Enabling and disabling servers..............................................................................................37010.4.4

    Adding, cloning, or deleting servers......................................................................................37110.5

    Adding, cloning, and deleting servers...................................................................................37110.5.1

    Clustering Central Management Servers..............................................................................37410.6

    Clustering Central Management Servers..............................................................................37510.6.1

    Managing server groups.......................................................................................................37910.7

    Creating a server group.......................................................................................................38010.7.1

    Working with server subgroups............................................................................................38110.7.2

    Modifying the group membership of a server.......................................................................38210.7.3

    Administrative access to servers and server groups for users..............................................38210.7.4

    Configuring Adaptive Processing Servers for production systems........................................38410.8

    Assessing your system's performance.................................................................................38410.9

    Monitoring BI platform servers.............................................................................................38510.9.1

    Analyzing server metrics......................................................................................................38510.9.2

    Viewing system metrics.......................................................................................................38510.9.3

    Logging server activity.........................................................................................................38610.9.4

    Configuring server settings..................................................................................................38710.10

    To change a server's properties...........................................................................................38710.10.1

    To apply service settings to multiple servers........................................................................38810.10.2

    Working with configuration templates...................................................................................38810.10.3

    Configuring server network settings.....................................................................................39110.11

    Network environment options..............................................................................................39110.11.1

    Server host identification options.........................................................................................39210.11.2

    Configuring a multi-homed machine......................................................................................39310.11.3

    Configuring port numbers.....................................................................................................39610.11.4

    Managing Nodes..................................................................................................................39910.12

    Using nodes.........................................................................................................................39910.12.1

    Adding a new node..............................................................................................................40110.12.2

    Recreating a node................................................................................................................40510.12.3

    Deleting a node....................................................................................................................40810.12.4

    Renaming a node.................................................................................................................41010.12.5

    Moving a node.....................................................................................................................41210.12.6

    Script parameters................................................................................................................41510.12.7

    Adding Windows server dependencies.................................................................................42010.12.8

    Changing the user credentials for a node.............................................................................42110.12.9

    Renaming a machine in a BI platform deployment.................................................................42110.13

    Changing cluster names.......................................................................................................42210.13.1

    Changing IP addresses........................................................................................................42210.13.2

    2013-11-219

    Contents

  • Renaming machines.............................................................................................................42410.13.3

    Using 32-bit and 64-bit third-party libraries with BI platform..................................................42810.14

    Managing server and node placeholders..............................................................................42810.15

    To view server placeholders.................................................................................................42810.15.1

    To view and edit the placeholders for a node........................................................................42910.15.2

    Managing Central Management Server (CMS) Databases.................................................431Chapter 11

    Managing CMS system database connections.....................................................................43111.1

    To select SQL Anywhere as a CMS database......................................................................43111.1.1

    To select SAP HANA as a CMS database...........................................................................43211.1.2

    Selecting a new or existing CMS database..........................................................................43311.2

    To select a new or existing CMS database on Windows......................................................43411.2.1

    To select a new or existing CMS database on UNIX............................................................43411.2.2

    Recreating the CMS system database.................................................................................43511.3

    To recreate the CMS system database on Windows............................................................43511.3.1

    To recreate the CMS system database on UNIX..................................................................43611.3.2

    Copying data from one CMS system database to another...................................................43711.4

    Preparing to copy a CMS system database.........................................................................43711.4.1

    To copy a CMS system database on Windows....................................................................43811.4.2

    To copy data from a CMS system database on UNIX..........................................................43911.4.3

    Managing Web Application Container Servers (WACS).....................................................441Chapter 12

    WACS.................................................................................................................................44112.1

    Web Application Container Server (WACS).........................................................................44112.1.1

    Adding or removing additional WACS to your deployment...................................................44412.1.2

    Adding or removing services to WACS................................................................................44812.1.3

    Configuring HTTPS/SSL......................................................................................................44912.1.4

    Supported authentication methods.......................................................................................45312.1.5

    Configuring AD Kerberos for WACS ...................................................................................45312.1.6

    Configuring AD Kerberos single sign-on ..............................................................................45912.1.7

    Configuring RESTful web services........................................................................................46112.1.8

    WACS and your IT environment...........................................................................................47012.1.9

    Configuring web application properties.................................................................................47312.1.10

    Troubleshooting...................................................................................................................47312.1.11

    WACS properties.................................................................................................................47712.1.12

    Backing Up and Restoring Your System.............................................................................479Chapter 13

    Overview of backup and restore...........................................................................................47913.1

    Terminology.........................................................................................................................47913.2

    Use cases for backup and restore........................................................................................48113.3

    2013-11-2110

    Contents

  • Backups...............................................................................................................................48313.4

    Backing up the entire system...............................................................................................48413.4.1

    Backing up server settings...................................................................................................48713.4.2

    Backing up BI content..........................................................................................................48913.4.3

    Restoring your system.........................................................................................................49013.5

    Restoring your entire system...............................................................................................49013.5.1

    Restoring server settings.....................................................................................................49513.5.2

    Restoring BI content............................................................................................................49713.5.3

    BackupCluster and RestoreCluster scripts...........................................................................49813.6

    Copying Your BI Platform Deployment...............................................................................501Chapter 14

    Overview of system copying................................................................................................50114.1

    Terminology.........................................................................................................................50114.2

    Use cases for system copying.............................................................................................50114.3

    Planning to copy your system...............................................................................................50214.4

    Considerations and limitations..............................................................................................50314.5

    System copy procedure.......................................................................................................50514.6

    To export from a source system...........................................................................................50514.6.1

    To import to a target system................................................................................................50914.6.2

    Version Management..........................................................................................................513Chapter 15

    To manage different versions of BI resources .....................................................................51315.1

    Starting and stopping Subversion manually on Unix..............................................................51415.2

    Required files for Subversion on Solaris 10 and RedHat Linux 5..........................................51415.3

    To use the Version Management System settings option.....................................................51515.4

    Default Version Management System settings.....................................................................51615.4.1

    To set the ClearCase Version Management System in Windows.........................................51615.4.2

    To set the ClearCase Version Management System in Unix................................................51715.4.3

    To compare different versions of the same job.....................................................................51715.5

    To upgrade Subversion content............................................................................................51815.6

    Promotion Management......................................................................................................519Chapter 16

    Welcome to promotion management....................................................................................51916.1

    Overview..............................................................................................................................51916.1.1

    Features...............................................................................................................................51916.1.2

    Application access rights......................................................................................................52016.1.3

    Support for WinAD in promotion management.....................................................................52116.1.4

    Getting started with the promotion management tool...........................................................52116.2

    Accessing the promotion management tool..........................................................................52116.2.1

    User interface components..................................................................................................52216.2.2

    2013-11-2111

    Contents

  • Using the Settings option.....................................................................................................52316.2.3

    Using the promotion management tool.................................................................................53016.3

    Creating and deleting folders................................................................................................53116.3.1

    To create a job.....................................................................................................................53216.3.2

    To create a new job by copying an existing job ....................................................................53416.3.3

    To search for a job...............................................................................................................53516.3.4

    To edit a job.........................................................................................................................53516.3.5

    To add an infoobject to a job................................................................................................53616.3.6

    To manage the dependencies of a job..................................................................................53716.3.7

    To search for dependents ...................................................................................................53816.3.8

    To promote a job when repositories are connected..............................................................53816.3.9

    Promoting a job using an LCMBIAR File...............................................................................54016.3.10

    To schedule a job promotion................................................................................................54316.3.11

    To view the history of a job..................................................................................................54416.3.12

    To roll back a job..................................................................................................................54516.3.13

    To manage different versions of an infoobject......................................................................54716.4

    Version Management application access rights....................................................................54816.4.1

    Backing up and restoring Subversion files............................................................................54916.4.2

    Using the Command Line option..........................................................................................54916.5

    To run the command-line tool on Windows...........................................................................55016.5.1

    To run the command-line tool on Unix..................................................................................55116.5.2

    Command-line tool parameters............................................................................................55116.5.3

    Sample properties file..........................................................................................................55916.5.4

    Using the Enhanced Change and Transport System.............................................................56016.6

    Prerequisites........................................................................................................................56016.6.1

    To configure the BI platform and CTS+ Integration...............................................................56116.6.2

    To promote a job using CTS.................................................................................................56716.6.3

    Visual Difference.................................................................................................................571Chapter 17

    Visual Difference in the promotion management tool............................................................57117.1

    To compare objects or files using Visual Difference.............................................................57217.1.1

    To compare objects or files using the Version Management System....................................57317.1.2

    To schedule the comparison.................................................................................................57417.1.3

    Managing Applications.......................................................................................................577Chapter 18

    Managing applications through the CMC..............................................................................57718.1

    Overview..............................................................................................................................57718.1.1

    Common settings for applications........................................................................................57818.1.2

    Application-specific settings.................................................................................................57918.1.3

    Managing applications through BOE.war properties.............................................................61718.2

    2013-11-2112

    Contents

  • The BOE war file..................................................................................................................61718.2.1

    Customizing BI launch pad and OpenDocument logon entry points......................................62718.3

    BI launch pad and OpenDocument file locations...................................................................62718.3.1

    To define a custom logon page............................................................................................62818.3.2

    To add trusted authentication at logon..................................................................................62918.3.3

    Customizing the Web Intelligence interface..........................................................................63018.4

    Features tab.........................................................................................................................63118.4.1

    User Interface Elements tab.................................................................................................63118.4.2

    To customize the Web Intelligence interface appearance.....................................................64118.4.3

    Enabling Web Intelligence User Interface Extension Points for specific user groups.............64218.4.4

    Managing Connections and Universes...............................................................................645Chapter 19

    Managing connections.........................................................................................................64519.1

    To delete a universe connection...........................................................................................64519.1.1

    Managing universes.............................................................................................................64619.2

    To delete universes..............................................................................................................64619.2.1

    Monitoring...........................................................................................................................647Chapter 20

    About Monitoring.................................................................................................................64720.1

    Monitoring terms..................................................................................................................64720.2

    Architecture.........................................................................................................................64920.2.1

    Configuring database support for Monitoring ......................................................................65020.3

    Configuration for using the Derby database.........................................................................65120.3.1

    Configuration for using the auditing database.......................................................................65120.3.2

    Configuration properties.......................................................................................................65720.4

    JMX end point URL..............................................................................................................66120.4.1

    HTTPS authentication for monitoring probes........................................................................66220.4.2

    Password encryption for probes...........................................................................................66220.4.3

    Integrating with other applications........................................................................................66320.5

    Integrating the monitoring application with IBM Tivoli............................................................66320.5.1

    Integrating the monitoring application with SAP Solution Manager ......................................66620.5.2

    Cluster support for monitoring server...................................................................................66620.6

    Troubleshooting...................................................................................................................66720.7

    Dashboard...........................................................................................................................66720.7.1

    Alerts...................................................................................................................................66720.7.2

    Watchlist..............................................................................................................................66820.7.3

    Probes.................................................................................................................................66820.7.4

    Metrics................................................................................................................................66920.7.5

    Graph...................................................................................................................................66920.7.6

    2013-11-2113

    Contents

  • Auditing...............................................................................................................................671Chapter 21

    Overview..............................................................................................................................67121.1

    CMC Auditing page.............................................................................................................67721.2

    Auditing Status....................................................................................................................67721.2.1

    Configuring Auditing events.................................................................................................67921.2.2

    Auditing Data Store configuration settings...........................................................................68121.2.3

    Audit events.........................................................................................................................68321.3

    Audit events and details.......................................................................................................69421.3.1

    Platform Search...................................................................................................................713Chapter 22

    Understanding Platform Search............................................................................................71322.1

    Platform Search SDK...........................................................................................................71322.1.1

    Clustered Environment.........................................................................................................71422.1.2

    Setting Up Platform Search..................................................................................................71422.2

    Deploying OpenSearch........................................................................................................71422.2.1

    Configuring reverse proxy....................................................................................................71622.2.2

    Configuring Application Properties in the CMC....................................................................71622.2.3

    Working with Platform Search..............................................................................................72122.3

    Indexing Content in the CMS Repository.............................................................................72122.3.1

    Indexing Failure Listing.........................................................................................................72222.3.2

    Searching Results................................................................................................................72322.3.3

    Integrating Platform Search with SAP NetWeaver Enterprise Search...................................73022.4

    Creating a Connector in SAP NetWeaver Enterprise Search ...............................................73022.4.1

    Importing a User's Role into the BI platform.........................................................................73122.4.2

    Searching from NetWeaver Enterprise Search.....................................................................73222.5

    Auditing................................................................................................................................73222.6

    Troubleshooting...................................................................................................................73322.7

    Self Healing..........................................................................................................................73322.7.1

    Problem Scenarios...............................................................................................................73422.7.2

    Federation...........................................................................................................................737Chapter 23

    Federation............................................................................................................................73723.1

    Federation terms..................................................................................................................73823.2

    Managing security rights......................................................................................................74023.3

    Rights required on the origin site..........................................................................................74023.3.1

    Rights required on the destination site.................................................................................74123.3.2

    Federation-specific rights.....................................................................................................74223.3.3

    Replicating security on an object..........................................................................................74423.3.4

    Replicating security using access levels...............................................................................74423.3.5

    2013-11-2114

    Contents

  • Replication types and mode options.....................................................................................74523.4

    One-way replication .............................................................................................................74523.4.1

    Two-way replication .............................................................................................................74523.4.2

    Refresh from origin or refresh from destination....................................................................74623.4.3

    Replicating third-party users and groups...............................................................................74723.5

    Replicating universes and universe connections...................................................................74823.6

    Managing replication lists.....................................................................................................74923.7

    Creating replication lists.......................................................................................................75023.7.1

    Modifying Replication Lists...................................................................................................75223.7.2

    Managing remote connections.............................................................................................75323.8

    Creating remote connections...............................................................................................75323.8.1

    Modifying remote connections.............................................................................................75623.8.2

    Managing replication jobs.....................................................................................................75623.9

    Creating replication jobs.......................................................................................................75623.9.1

    Scheduling replication jobs...................................................................................................75923.9.2

    Modifying replication jobs.....................................................................................................76023.9.3

    Viewing a log after a replication job......................................................................................76023.9.4

    Managing object cleanup......................................................................................................76123.10

    How to use object cleanup...................................................................................................76123.10.1

    Object cleanup limits............................................................................................................76223.10.2

    Object cleanup frequency.....................................................................................................76223.10.3

    Managing conflict detection and resolution...........................................................................76323.11

    One-way replication conflict resolution.................................................................................76423.11.1

    Two-way replication conflict resolution.................................................................................76523.11.2

    Using Web Services in Federation.......................................................................................76823.12

    Session variables ................................................................................................................76823.12.1

    File caching .........................................................................................................................76923.12.2

    Custom deployment ............................................................................................................76923.12.3

    Remote scheduling and locally run instances........................................................................77023.13

    Remote scheduling..............................................................................................................77023.13.1

    Locally run instances............................................................................................................77223.13.2

    Instance share......................................................................................................................77223.13.3

    Importing and promoting replicated content..........................................................................77323.14

    Importing replicated content.................................................................................................77323.14.1

    Importing replicated content and continuing replication ........................................................77423.14.2

    Promoting content from a test environment..........................................................................77523.14.3

    Re-pointing a destination site...............................................................................................77523.14.4

    Best practices......................................................................................................................77623.15

    Current release limitations....................................................................................................77923.15.1

    Troubleshooting error messages..........................................................................................78023.15.2

    2013-11-2115

    Contents

  • Supplementary Configurations for ERP Environments........................................................783Chapter 24

    Configurations for SAP NetWeaver integration....................................................................78324.1

    Integrating with SAP NetWeaver Business Warehouse (BW)...............................................78324.1.1

    Configuring for JD Edwards integration................................................................................83124.2

    Configuring Single Sign-on (SSO) for SAP Crystal Reports.................................................83224.2.1

    Configuring Secure Sockets Layer for JD Edwards Integrations...........................................83224.2.2

    Configuring for PeopleSoft Enterprise integration.................................................................83424.3

    Configuring Single Sign-on (SSO) for SAP Crystal Reports and PeopleSoft Enterprise........83424.3.1

    Configuring Secure Sockets Layer communication..............................................................83524.3.2

    Performance Tuning for PeopleSoft systems........................................................................83724.3.3

    Configuring for Siebel integration.........................................................................................83824.4

    Configuring Siebel to integrate with SAP BI platform............................................................83824.4.1

    Creating the Crystal Reports menu item..............................................................................83924.4.2

    Contextual awareness..........................................................................................................84124.4.3

    Configuring Single Sign-on (SSO) for SAP Crystal Reports and Siebel................................84324.4.4

    Configuring for Secure Sockets Layer Communication........................................................84424.4.5

    Managing and Configuring Logs.........................................................................................847Chapter 25

    Logging traces for components............................................................................................84725.1

    Trace log levels....................................................................................................................84725.2

    Configuring tracing for servers.............................................................................................84825.3

    To set the log level in the CMC............................................................................................84925.3.1

    To set the log level for multiple servers in the CMC.............................................................84925.3.2

    To configure server tracing using the BO_trace.ini file..........................................................85025.3.3

    Configuring tracing for web applications...............................................................................85225.4

    To set the web application trace log level in the CMC..........................................................85325.4.1

    To configure tracing settings using the BO_trace.ini file.......................................................85325.4.2

    Configuring tracing for upgrade management tool................................................................85725.5

    To configure tracing for upgrade management tool...............................................................85825.5.1

    Configuring tracing for BI platform client applications...........................................................85825.6

    Integration to SAP Solution Manager..................................................................................861Chapter 26

    Integration overview.............................................................................................................86126.1

    SAP Solution Manager integration checklist.........................................................................86126.2

    Managing system landscape directory registration...............................................................86226.3

    Registration of the BI platform in the System Landscape.....................................................86226.3.1

    When is SLD registration triggered?....................................................................................86426.3.2

    Logging SLD connectivity ...................................................................................................86426.3.3

    Managing Solution Management Diagnostics agents...........................................................86526.4

    2013-11-2116

    Contents

  • Solution Manager Diagnostics (SMD) overview...................................................................86526.4.1

    Working with SMD agents...................................................................................................86526.4.2

    SMAdmin user account........................................................................................................86626.4.3

    Managing performance instrumentation................................................................................86626.5

    Performance instrumentation for the BI platform..................................................................86626.5.1

    Setting up performance instrumentation for the BI platform..................................................86726.5.2

    Performance instrumentation for the web tier.......................................................................86826.5.3

    Instrumentation log files ......................................................................................................86826.5.4

    Tracing with SAP Passport...................................................................................................86926.6

    Command Line Administration............................................................................................871Chapter 27

    Unix scripts..........................................................................................................................87127.1

    Script utilities.......................................................................................................................87127.1.1

    Script templates...................................................................................................................87627.1.2

    Scripts used by the BI platform............................................................................................87727.1.3

    Windows scripts..................................................................................................................87827.2

    ccm.exe...............................................................................................................................87827.2.1

    Server Command Lines........................................................................................................88127.3

    Command lines overview.....................................................................................................88127.3.1

    Standard options for all servers............................................................................................88227.3.2

    Central Management Server................................................................................................88327.3.3

    Crystal Reports Processing Server and Crystal Reports Cache Server................................88527.3.4

    Dashboards Processing Server and Dashboards Cache Server...........................................88627.3.5

    Job Servers.........................................................................................................................88727.3.6

    Adaptive Processing Server.................................................................................................88827.3.7

    Report Application Server....................................................................................................88827.3.8

    Web Intelligence Processing Server.....................................................................................89027.3.9

    Input and Output File Repository Servers.............................................................................89227.3.10

    Event Server........................................................................................................................89427.3.11

    Repository Diagnostic Tool.................................................................................................895Chapter 28

    Overview of the Repository Diagnostic Tool.........................................................................89528.1

    Using the Repository Diagnostic Tool..................................................................................89528.2

    To use the Repository Diagnostic Tool.................................................................................89628.2.1

    Repository Diagnostic Tool Parameters...............................................................................89728.2.2

    Inconsistencies between the CMS and the FRS...................................................................90428.3

    Inconsistencies in the CMS metadata..................................................................................90528.4

    Rights Appendix..................................................................................................................909Chapter 29

    About the rights appendix.....................................................................................................90929.1

    2013-11-2117

    Contents

  • General rights......................................................................................................................90929.2

    Rights for specific object types............................................................................................91229.3

    Folder rights.........................................................................................................................91229.3.1

    Categories...........................................................................................................................91229.3.2

    Desktop Intelligence documents..........................................................................................91329.3.3

    Notes...................................................................................................................................91529.3.4

    Crystal reports.....................................................................................................................91629.3.5

    Web Intelligence documents................................................................................................91629.3.6

    Users and groups.................................................................................................................91729.3.7

    Access levels.......................................................................................................................92029.3.8

    Universe (.unv) rights...........................................................................................................92029.3.9

    Universe (.unx) rights...........................................................................................................92229.3.10

    Universe object-access levels..............................................................................................92329.3.11

    Connection rights.................................................................................................................92429.3.12

    Applications.........................................................................................................................92629.3.13

    Server Properties Appendix.................................................................................................943Chapter 30

    About the server properties appendix...................................................................................94330.1

    Common Server Properties..................................................................................................94330.1.1

    Core Services properties.....................................................................................................94630.1.2

    Connectivity Services Properties.........................................................................................96030.1.3

    Crystal Reports Services Properties....................................................................................96530.1.4

    Analysis Services Properties................................................................................................97430.1.5

    Data Federation Services Properties....................................................................................97630.1.6

    Web Intelligence Services properties...................................................................................97630.1.7

    Dashboards Services Properties..........................................................................................98430.1.8

    Server Metrics Appendix.....................................................................................................987Chapter 31

    About the Server Metrics Appendix.....................................................................................98731.1

    Common Server Metrics .....................................................................................................98831.1.1

    Central Management Server Metrics...................................................................................99031.1.2

    Connection Server Metrics..................................................................................................99431.1.3

    Event Server Metrics...........................................................................................................99431.1.4

    File Repository Server Metrics.............................................................................................99531.1.5

    Adaptive Processing Server Metrics....................................................................................99631.1.6

    Web Application Container Server Metrics........................................................................100131.1.7

    Adaptive Job Server Metrics..............................................................................................100231.1.8

    Crystal Reports Server Metrics..........................................................................................100431.1.9

    Web Intelligence Server Metrics........................................................................................100731.1.10

    Dashboards Server Metrics...............................................................................................100931.1.11

    2013-11-2118

    Contents

  • Server and Node Placeholder Appendix............................................................................1013Chapter 32

    Server and node placeholders............................................................................................101332.1

    Auditing Data Store Schema Appendix.............................................................................1023Chapter 33

    Overview............................................................................................................................102333.1

    Schema diagram................................................................................................................102333.2

    Auditing Data Store Tables................................................................................................102333.3

    Monitoring Database Schema Appendix...........................................................................1033Chapter 34

    Trending database schema.................................................................................................103334.1

    System Copy Worksheet Appendix...................................................................................1037Chapter 35

    System copy worksheet.....................................................................................................103735.1

    Index 1039

    2013-11-2119

    Contents

  • 2013-11-2120

    Contents

  • Document History

    The following table provides an overview of the most important document changes.

    DescriptionDateVersion

    First release of this document.May 2013SAP BusinessObjectsBI platform 4.1

    The Promotion Management chapter is updated. The Managing Licenses chapter is updated. Other corrections and minor updates.

    August2013

    SAP BusinessObjectsBI platform 4.1 Sup-port Package 1

    The Version Management chapter is updated. The To launch Version Management on Solaris 10 section has

    been added. The Starting and stopping Subversion manually on Unix section

    has been added. The Default Version Management system settings section has

    been added. The To use the Version Management System settings option

    section has been updated.

    The Promotion Management chapter is updated. The Using LCM Override Settings option section has been up-

    dated. The Using the Command Line option section has been updated. The Command-line tool parameters section has been updated.

    The Repository Diagnostic Tool chapter is updated. The Customizing the Web Intelligence interface section is updated. Other corrections and minor updates.

    November2013

    SAP BusinessObjectsBI platform 4.1 Sup-port Package 2

    2013-11-2121

    Document History

  • 2013-11-2122

    Document History

  • Getting Started

    2.1 About this guide

    This guide provides you with information and procedures for deploying and configuring SAPBusinessObjects Business Intelligence platform (the BI platform). Procedures are provided for commontasks. Conceptual information and technical details are provided for all advanced topics.

    For information about installing this product, see the SAP BusinessObjects Business Intelligence PlatformInstallation Guide.

    2.1.1 Who should use this guide?

    This guide covers deployment and configuration of the BI platform. We recommend consulting thisguide if you are performing any of the following tasks:

    planning your first deployment

    configuring your first deployment

    making significant changes to the architecture of an existing deployment

    improving your system's performance.

    This guide is intended for system administrators who are responsible for configuring, managing, andmaintaining a BI platform installation. Familiarity with your operating system and your networkenvironment is beneficial, as is a general understanding of web application server management andscripting technologies. However, to assist all levels of administrative experience, this guide aims toprovide sufficient background and conceptual information to clarify all administrative tasks and features.

    2.1.2 About the Business Intelligence platform

    The BI platform is a flexible and scalable solution for delivering information to end users, in multipleforms including dashboards and interactive reports, via any web applicationintranet, extranet, Internet,or corporate portal. An integrated suite for reporting, analysis, and information delivery, the BI platform

    2013-11-2123

    Getting Started

  • provides a solution for increasing end-user productivity and reducing administrative efforts. Whether itis used to distribute weekly sales reports, to provide customers with personalized service offerings, orto integrate critical information in corporate portals, the BI platform delivers tangible benefits that extendacross and beyond the organization.

    2.1.3 Variables

    The following variables are used throughout this guide.

    DescriptionVariable

    The directory where the BI platform is installed.

    On Windows, the default