COPY OR ELECTRONIC FORM) ENCLOSED AND ON THE
COMPACT DISC(S) ARE SUBJECT TO THE LICENSE
AGREEMENT.
The documentation stored on the compact disc(s) may be printed by
licensee for licensee’s internal use only. Except for the foregoing, no
part of this documentation (whether in hard copy or electronic form)
may be reproduced or transmitted in any form by any means, electronic
or mechanical, including photocopying, recording, or any information
storage and retrieval system, without the prior written permission of
TimesTen Inc.
Oracle, JD Edwards, PeopleSoft, Retek, TimesTen, the TimesTen icon,
MicroLogging and Direct Data Access are trademarks or registered
trademarks of Oracle Corporation and/or its affiliates. Other names may
be trademarks of their respective owners.
The Programs (which include both the software and documentation)
contain proprietary information; they are provided under a license
agreement containing restrictions on use and disclosure and are also
protected by copyright, patent, and other intellectual and industrial
property laws. Reverse engineering, disassembly, or decompilation of
the Programs, except to the extent required to obtain interoperability
with other independently created software or as specified by law, is
prohibited.
The information contained in this document is subject to change without
notice. If you find any problems in the documentation, please report
them to us in writing. This document is not warranted to be error-free.
Except as may be expressly permitted in your license agreement for
these Programs, no part of these Programs may be reproduced or
transmitted in any form or by any means, electronic or mechanical, for
any purpose.
February 2007
Printed in the United States of America
vi Oracle TimesTen In-Memory Database Installation Guide
Index
Contents vii
viii Oracle TimesTen In-Memory Database Installation Guide
About this Guide
This document contains all necessary information for installing the
Oracle TimesTen® In-Memory Database (TimesTen) Data Manager,
Client and Server components.
The TimesTen CD contains a
notes. These notes list product information and late changes to the
printed documentation. The release notes are also available in PDF
format. The PDF file is named
TimesTen documentation
TimesTen documentation is available on the product distribution media
and on the Oracle Technology Network:
Oracle TimesTen In-Memory
Database C Developer’s and
Reference Guide
and the
Oracle TimesTen In-Memory
Database Java Developer’s
and Reference Guide
Oracle TimesTen In-Memory
Database API Reference
Guide
Contains information needed to install and configure
TimesTen on all supported platforms.
Describes all the available features in the Oracle
TimesTen In-Memory Database.
Provides information on configuring TimesTen and
using the ttIsql utility to manage a data store. This
guide also provides a basic tutorial for TimesTen.
Provide information on how to use the full set of
available features in TimesTen to develop and
implement applications that use TimesTen.
Describes all TimesTen utilities, procedures, APIs and
provides a reference to other features of TimesTen.
Contains a complete reference to the TimesTen error
messages and information on using SNMP Traps with
TimesTen.
Describes how to use the TTClasses C++ API to use
the features available in TimesTen to develop and
implement applications.
Provides information to help you understand how
TimesTen Replication works and step-by-step
instructions and examples that show how to perform
the most commonly needed tasks.
This guide is for application developers who use and
administer TimesTen and for system administrators
who configure and manage TimesTen Replication.
Describes how to use Cache Connect to cache Oracle
data in TimesTen data stores. This guide is for
developers who use and administer TimesTen for
caching Oracle data.
Provides information and solutions for handling
problems that may arise while developing applications
that work with TimesT en, or while configuring or
managing TimesTen.
Background reading
For a Java reference, see:
• Horstmann, Cay and Gary Cornell. Core Java(TM) 2, Volume I--Fundamentals (7th Edition) (Core Java 2). Prentice Hall PTR; 7
edition (August 17, 2004).
A list of books about ODBC and SQL is in the Microsoft ODBC manual
included in your developer’s kit. Your developer’s kit includes the
appropriate ODBC manual for your platform:
• Microsoft ODBC 3.0 Programmer’s Reference and SDK Guide
provides all relevant information on ODBC for Windows developers.
• Microsoft ODBC 2.0 Programmer’s Reference and SDK Guide,
included online in PDF format, provides information on ODBC for
UNIX developers.
For a conceptual overview and programming how-to of ODBC, see:
• Kyle Geiger. Inside ODBC. Redmond, WA: Microsoft Press. 1995.
For a review of SQL, see:
• Melton, Jim and Simon, Alan R. Understanding the New SQL: A Complete Guide. San Francisco, CA: Morgan Kaufmann Publishers.
1993.
• Groff, James R. / Weinberg, Paul N. SQL: The Complete Reference, Second Edition. McGraw-Hill Osborne Media. 2002.
For information about Unicode, see:
• The Unicode Consortium, The Unicode Standard, Version 5.0,
Addison-Wesley Professional, 2006.
• The Unicode Consortium Home Page at http://www.unicode.org
Conventions used in this guide
TimesTen supports multiple platforms. Unless otherwise indicated, the
information in this guide applies to all supported platforms. The term
Windows refers to Windows 2000, Windows XP and Windows Server
2003. The term UNIX refers to Solaris, Linux, HP-UX, Tru64 and AIX.
TimesTen documentation uses these typographical conventions:
If you see...It means...
code font
Code examples, filenames, and pathnames.
For example, the
italic code
font
A variable in a code example that you must replace.
For example:
Driver=install_dir/lib/libtten.sl
Replace install_dirwith the path of your TimesT en
installation directory.
.odbc.ini. or ttconnect.ini file.
About this Guide 3
TimesTen documentation uses these conventions in command line
examples and descriptions:
If you see...It means...
fixed width
italics
[ ]
Variable; must be replaced with an appropriate value.
Square brackets indicate that an item in a command line
is optional.
{ }
Curly braces indicated that you must choose one of the
items separated by a vertical bar ( | ) in a command line.
|
A vertical bar (or pipe) separates arguments that you may
use more than one argument on a single command line.
...
An ellipsis (. . .) after an argument indicates that you may
use more than one argument on a single command line.
%
#
The percent sign indicates the UNIX shell prompt.
The number (or pound) sign indicates the UNIX root
prompt.
TimesTen documentation uses these variables to identify path, file and
user names:
If you see...It means...
install_dir
The path that represents the directory where the current
release of TimesTen is installed.
TTinstance
The instance name for your specific installation of
TimesTen. Each installation of TimesTen must be
identified at install time with a unique alphanumeric
instance name. This name appears in the install path. The
instance name “giraffe” is used in examples in this guide.
bits or bbT wo digits, either 32 or 64, that represent either the 32-bit
or 64-bit operating system.
release or rrT wo digits that represent the first two digits of the current
TimesTen release number, with or without a dot. For
example, 70 or 7.0 represents TimesTen Release 7.0.
jdk_version
Two digits that represent the version number of the
major JDK release. Specifically, 14 represent JDK 1.4;
5 represents JDK 5.
A sample name for the TimesTen instance administrator.
You can use any legal user name as the TimesTen
administrator. On Windows, the TimesTen instance
administrator must be a member of the Administrators
group. Each TimesTen instance can have a unique
instance administrator name.
DSN
The data source name.
Technical Support
For information about obtaining technical support for TimesTen
products, go to the following Web address:
With TimesTen you can optionally install a layer of internal security,
which throughout the TimesTen documentation set and in the
installation scripts is referred to as “Access Control.”
The Access Control feature of TimesTen provides an environment of
basic control for applications that use the internally defined privileges.
In TimesTen, user privileges are granted on a instance wide-basis. A
user’s privileges apply to all data stores in a given TimesTen instance or
installation.
Limitations of Access Control and non-root installs
General
You can enable Access Control when you install TimesTen. You can
also choose to enable it after installation by using the ttmodinstall
utility. See “Enabling Access Control after installation on UNIX” on
page 14. Access Control cannot be disabled after installation of
TimesTen. You must uninstall and re-install TimesTen if you want to
disable Access Control.
The instance administrator owns all files in the installation directory
tree. Only the instance administrator can administer the TimesTen
instance. See “TimesTen instance administrator” on page 9. All
TimesTen daemon processes are owned by the instance administrator.
1
Prior to installing TimesTen as non-root, certain tasks must be
performed by the user
for non-root installations on UNIX systems” on page 37. You cannot
root. Those tasks are outlined in “Prerequisites
7
Cache Connect
For Cache Connect, the TimesTen internal user must match the Oracle
user. External Client/Server users must match the Oracle user. If you are
using the Cache Connect Administrator interface, the user must be an
internal TimesTen user.
Replication
If Access Control is enabled, replication daemon administration and
replication schema changes are restricted to users having the ADMIN
privilege. See “Privileges” on page 13.
Changes are applied to a replicated subscriber data store regardless of
the settings or presence of Access Control on the subscriber.
Instance user configuration commands are not replicated.
Client/Server
If a TimesTen client connects to a Timesten server, and the server side
data store has Access Control enabled, the server’s Authenticate
attribute must be enabled.
T o use Access Control with Client/Server applications, when the user is
identified externally, the Client and the Server processes must be on the
same machine. When Access Control is enabled, remote Client/Server
access is only supported with TimesTen internal users.
TimesTen ignores the values of UID, PWD and PWDCrypt if specified
in the Server DSN. These are client-side only attributes. The user name
and password must be explicitly declared on the Client side.
When Access Control is enable, if PWD or PWDCrypt is specified in
Client/Server applications, TimesTen assumes that the user is internally
identified, otherwise TimesTen assumes that the user is externally
identified and authenticated by the operating system.
Instance access
Instance startup/shutdown
Permission to start and stop the main TimesTen daemon is restricted to
the TimesTen instance administrator.
A DSN for a minimal instance-wide data store is defined by TimesTen
at install time to guarantee that TimesTen always has something with
which to connect.
The following is the definition of the instance DSN for a root
installation:
This data store gets special treatment from the daemon, and has special
access restrictions placed on it. Any user can connect to the instance
data store to change their own password. However, users other than the
instance administrator have only SELECT privileges on the instance
data store.
TimesTen users
TimesTen instance administrator
The owner of a TimesTen installation is the “TimesTen instance
administrator.”
Only a member of the TimesTen administrators group can install
TimesTen because only the instance administrator user can administer
TimesTen. The user installing the instance automatically becomes the
administrator for that instance. Only that user may start or stop the
instance, and only that user may administer the other users in that
instance. If the GroupRestrict attribute is set, the instance
administrator user must have corresponding group membership.
Access Control 9
Note: All examples in the TimesTen documentation set use the name
timesten to represent the instance administrator.
For details on establishing the TimesTen instance administrators group,
see “Create the TimesTen instance administrators group” on page 37.
On Windows systems, the user
TimesTen instance administrator when Access Control is selected at
install time.
On UNIX systems, a TimesTen instance administrator user is the OS
user who installs that instance of Timesten.
System automatically becomes the
TimesTen instance users
TimesTen instance users are user names that have been identified to the
instance. They are defined at the instance level and apply to all data
stores in an instance. Initially, only one user name is known to the
instance: the instance administrator.
Only the instance administrator has permission to create or delete users.
Individual users have permission to change their own passwords.
Instance users may be internal user names or external user names.
Internal user
A user name that has been defined within the TimesTen instance is
referred to as an “internal user.” It has no significance outside of the
particular instance of TimesTen in which it was defined. Internal users
are authenticated by the TimesTen instance. See "CREATE USER"in
the Oracle TimesTen In-Memory Database SQL Reference Guide.
TimesTen user names (as specified in the UID DSN attribute) are
automatically converted to upper case (case insensitive).
External user
A user name that is identified by the operating system or some other
external mechanism is referred to as an “external user.” In this release
only the operating system user name is recognized as an external user.
External users are assumed to have been authenticated by some external
mechanism. See "CREATE USER"in the Oracle TimesTen In-Memory
Database SQL Reference Guide. A password is not required by
TimesTen since the user was authenticated by the operating system at
login time.
UNIX external user names are case sensitive. Windows external user
names are not. When connecting from UNIX platforms, TimesTen
automatically converts the external user name to upper case, rendering it
case insensitive.
The PWDCrypt attribute allows you to encrypt a password rather to use
cleartext passwords, and it also provides a way to deal with the special
characters and case sensitivity used in passwords that might create
difficulties if specified in clear text within the PWD DSN attribute.
Before installation
Several steps must be taken to prepare a machine for TimesTen
installation. These steps are needed once per machine and require root
permission. See “Installation prerequisites” on page 25. Additional steps
must be performed before installation if either Access Control is to be
enabled or you plan to install as non-root.
TimesTen administrators group
An operating system group needs to be defined for those users who will
be allowed to install and administer TimesTen instances. This can be an
existing group, but we suggest that a group named “timesten” be created
specifically for this purpose. “Create the TimesTen instance
administrators group” on page 37. The member of the TimesTen
administrators group who installs the TimesTen instance becomes the
TimesTen instance administrator for that instance.
Instance registry directory
TimesTen maintains a “registry” of all TimesTen instances installed on a
given machine. The instance registry itself is not required for operation,
but it is essential for correct installation and uninstallation of TimesT en.
It is not accessible by TimesTen users including the instance
administrator user.
On Unix platforms, for root user installs, the instance registry is located
in the directory
TimesTen/
is a once per machine, pre-installation step. See “Create the TimesTen
registry” on page 38. The disk space required for the files in this
directory is less than 2k bytes.
On Windows the instance registry is contained in the operating system
registry. No action is required by users including the instance
administrator user.
/etc/TimesTen/. Initial creation of the /etc/
directory may require root access. Creation of this directory
Access Control 11
Installation directories, files and the daemon port
Installation of TimesTen must be performed by the chosen instance
administrator user. The instance administrator owns all files in the
installation directory tree. Only the instance administrator can operate
the instance.
Installation directories
The installer suggests default destination directories, based on the user
performing the installation.
Instance home directory
The instance may be installed in any directory to which the instance
administrator has sufficient permission.
On Unix, the installer suggests
releases. For non-root users, the installer suggests the home directory of
the user, usually defined by the environment variable $HOME.
On Windows, the installer suggests the directory pattern as used in
previous releases of TimesTen,
The TimesTen documentation refers to the installation directory as
install_dir.
/opt/TimesTen/tt70 as in previous
C:\TimesTen\tt70.
Daemon home directory
The “home” or current working directory of the running the main
TimesTen daemon is known as the daemon home directory. This
directory must be owned by the instance administrator, with
permissions on UNIX systems. The daemon verifies both the
permissions and ownership of this directory when it starts up.
On UNIX, the installer suggests the use of
installed as non-root or
On Windows, the
purpose, just as in previous releases.
/var/TimesTen/tt70 if running as root.
install_dir\srv\info directory is used for this
install_dir/info if
rwxr-xr-x
Password file
If access control is selected at installation time, user and password data
is stored in the file
Initially, this file contains a single entry for the instance administrator.
The presence of this file indicates to the daemon that Access Control has
been selected. If this file is missing, an error occurs after Access Control
is enabled.
This file is readable and writable only by the instance administrator.
Passwords are stored in encrypted form and are not known to the
instance administrator as one way hashes, so they cannot be recovered.
Daemon port
Though the instance registry enforces portTCP/IP uniqueness for
TimesTen instances, the possibility of the TimesTen main daemon port
conflicting with ports used by non-TimesTen applications always exists.
See “Changing the daemon port nu mber on UNIX” on page 39 for ways
to change the demon port number after installation.
Authenticating users and privileges
When Access Control is enabled, certain TimesTen utility APIs, XLA
operations, utilities, procedures and SQL operations require user
authentication. For details on each operation, see the specific chapters of
the Oracle T imes Ten In-Memory Database API Reference Guide and the
All TimesTen utilities prompt for a password if needed. See Chapter 2,
“Utilities” in the Oracle TimesTen In-Memory Database API Reference
Guide.
Client/Server utilities always prompt for a password if no PWD attribute
is specified, since they must always use Authenticate.
Scripts built on utilities requiring passwords may want to use the
PWDCrypt attribute, rather than embedding a cleartext password in the
script.
Privileges
For a description of the TimesTen Access Control privileges, see
“Access Control Privileges” in the Oracle TimesTen In-Memory
Database SQL Reference Guide,
GroupRestrict
The instance administrator must be included in the GroupRestrict
groups being used.
Access Control 13
Maintaining users and privileges
TimesTen allows the instance administrator to create, drop and alter
users when Access Control is enabled. It also allows the instance
administrator to grant and revoke privileges for users. For details see
Chapter 5, “SQL Statements in the Oracle TimesTen In-Memory
Database SQL Reference Guide.
Administration of users is done at the instance level by establishing a
connection to any data store and using the SQL commands to create and
modify users. These commands are not transactional and cannot be
rolled back.
Listing of defined users and privileges
The ttUserPrivileges built-in procedure lists the privileges granted to
users defined in the instance.
The ttSchema utility allows user definitions and privilege information
to be output in the form of SQL statements that can be used to recreate
the user environment within a different instance.
Enabling Access Control after installation on UNIX
On UNIX, the ttmodinstall utility allows the instance administrator to
enable Access Control if it was not enabled at install time. If you have
not stopped the TimesT en daemon before using ttmodinstall, the utility
stops the daemon before changing the port number. After the port
change, the daemon is automatically restarted. If you have not stopped
the entire TimesTen instance, then ttmodinstall will stop the instance,
make the necessary changes, then restart the instance.
This is useful, if you install TimesTen and later determine that you want
to enable Access Control.
The utility is run from the command line and takes the
Control
% ttmodinstall -enableAccessControl
Note: Disabling Access Control can only be done by uninstalling and
re-installing the same or a differently release of TimesTen.
The ttmodinstall utility can also modify the path supplied to the
ORACLE_HOME environment variable that provides Cache Connect
to Oracle with the knowledge of where Oracle is installed.
All other changes to the TimesTen instance can only be made by
uninstalling and re-installing the same or a differently release of
TimesTen. (See “Changing the daemon port number on UNIX” on page
39 and “ORACLE_HOME environment variable” on page 77.)
This chapter contains configuration information that you will need to
review before installing TimesTen on your system, in the sections:
• Platforms and configurations
• Installation instances
• Choosing the appropriate TimesTen components
• Installation prerequisites
• Operating system security considerations
• Prerequisites for non-root installations on UNIX systems
• Changing the daemon port number on UNIX
You will find a description of the procedures to install TimesTen on
your platform:
• Installing TimesTen on Windows systems
• Installing TimesTen on Solaris systems
• Installing TimesTen on HP-UX systems
• Installing TimesTen on HP-UX Memory Windows
• Installing TimesTen on AIX systems
• Installing TimesTen on Linux systems
• Installing TimesTen on Tru64 UNIX systems
This chapter also contains information to help you configure TimesTen
after installation, work with the demo applications, migrate data stores
to this release and view the TimesTen documentation:
• Using the Cache Administrator
• Informational messages on Windows systems
• Informational messages on UNIX systems
• ODBC installation
• Environment modifications
• Web server configuration
• Migrating data stores to TimesTen 7.0
17
• Building and running the demo applications
• Viewing the online documentation
Finally, this chapter contains information that helps you troubleshoot
any problems that may arise during the installation process: