SAP BusinessObjects Information platform services Administrator's Guide

Administrator's Guide
SAP BusinessObjects Information platform services 4.0
2010-12-02
Copyright
© 2010 SAP AG. All rights reserved.SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects S.A. in the United States and in other countries. Business Objects is an SAP company.All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary.These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty.
2010-12-02

Contents

Getting Started......................................................................................................................13Chapter 1
1.1
1.1.1
1.1.2
1.1.3
1.2
1.2.1
1.2.2
1.2.3
2.1
2.1.1
2.1.2
2.1.3
2.1.4
2.1.5
2.1.6
2.1.7
2.1.8
2.1.9
2.1.10
2.1.11
2.2
2.3
2.3.1
2.3.2
2.3.3
2.3.4
2.4
2.4.1
2.4.2
Before you start.....................................................................................................................13
Key concepts.........................................................................................................................13
Key administrative tools.........................................................................................................15
Key tasks...............................................................................................................................16
About this help.......................................................................................................................18
Who should use this help?.....................................................................................................19
About Information platform services.......................................................................................19
Variables................................................................................................................................19
Architecture...........................................................................................................................21Chapter 2
Architecture overview............................................................................................................21
System overview....................................................................................................................21
Databases..............................................................................................................................22
Servers..................................................................................................................................23
Web application servers.........................................................................................................24
Language support..................................................................................................................25
Authentication and single sign-on...........................................................................................26
SAP integration......................................................................................................................28
Lifecycle management (LCM).................................................................................................29
Integrated version control.......................................................................................................29
Permanent data......................................................................................................................30
Upgrade path.........................................................................................................................30
Conceptual tiers.....................................................................................................................30
Services and servers..............................................................................................................31
Services.................................................................................................................................33
Service categories.................................................................................................................35
Server types..........................................................................................................................36
Server categories...................................................................................................................37
Client applications..................................................................................................................39
Central Configuration Manager (CCM)...................................................................................39
Upgrade management tool.....................................................................................................40
2010-12-023
Contents
2.4.3
2.5
2.5.1
2.5.2
3.1
3.1.1
3.1.2
3.1.3
3.2
3.2.1
4.1
4.1.1
4.1.2
4.1.3
4.2
4.2.1
4.2.2
4.2.3
4.2.4
4.2.5
4.2.6
4.2.7
4.2.8
4.2.9
4.2.10
4.2.11
4.2.12
4.2.13
4.2.14
4.2.15
4.3
4.3.1
4.3.2
4.3.3
4.3.4
4.3.5
Web application clients..........................................................................................................40
Information Workflows...........................................................................................................41
Authentication........................................................................................................................41
Scheduling.............................................................................................................................43
Managing Licenses...............................................................................................................45Chapter 3
Managing License keys..........................................................................................................45
To view license information....................................................................................................45
To add a license key...............................................................................................................45
To view current account activity.............................................................................................46
Measuring licenses................................................................................................................46
To run a license audit.............................................................................................................47
Managing Users and Groups................................................................................................49Chapter 4
Account management overview..............................................................................................49
User management..................................................................................................................49
Group management...............................................................................................................51
Available authentication types ...............................................................................................52
Managing Enterprise and general accounts............................................................................54
To create a user account........................................................................................................54
To modify a user account.......................................................................................................55
To delete a user account........................................................................................................56
To create a new group...........................................................................................................56
To modify a group's properties...............................................................................................57
To view group members.........................................................................................................57
To add subgroups..................................................................................................................57
To specify group membership................................................................................................58
To delete a group...................................................................................................................58
To enable the Guest account.................................................................................................59
Adding users to groups..........................................................................................................59
Changing password settings..................................................................................................61
Granting access to users and groups.....................................................................................62
Controlling access to user inboxes.........................................................................................63
Configuring BI launch pad options..........................................................................................63
Managing aliases...................................................................................................................67
To create a user and add a third-party alias............................................................................67
To create a new alias for an existing user...............................................................................68
To assign an alias from another user......................................................................................68
To delete an alias...................................................................................................................69
To disable an alias..................................................................................................................69
2010-12-024
Contents
Setting Rights........................................................................................................................71Chapter 5
5.1
5.1.1
5.1.2
5.1.3
5.1.4
5.1.5
5.2
5.2.1
5.2.2
5.2.3
5.2.4
5.2.5
5.3
5.3.1
5.3.2
5.3.3
5.3.4
5.3.5
5.3.6
5.3.7
5.3.8
5.4
5.4.1
5.5
5.5.1
5.5.2
5.6
How rights work in Information platform services...................................................................71
Access levels.........................................................................................................................71
Advanced rights settings........................................................................................................72
Inheritance.............................................................................................................................73
Type-specific rights................................................................................................................78
Determining effective rights...................................................................................................79
Managing security settings for objects in the CMC................................................................80
To view rights for a principal on an object...............................................................................81
To assign principals to an access control list for an object......................................................81
To modify security for a principal on an object........................................................................82
To set rights on a top-level folder in Information platform services.........................................82
Checking security settings for a principal...............................................................................83
Working with access levels....................................................................................................85
Choosing between View and View On Demand access levels...............................................87
To copy an existing access level............................................................................................88
To create a new access level.................................................................................................89
To rename an access level.....................................................................................................89
To delete an access level.......................................................................................................89
To modify rights in an access level.........................................................................................90
Tracing the relationship between access levels and objects...................................................91
Managing access levels across sites......................................................................................91
Breaking inheritance...............................................................................................................92
To disable inheritance.............................................................................................................93
Using rights to delegate administration...................................................................................94
Choosing between Modify the rights users have to objects options.......................................95
Owner rights..........................................................................................................................97
Summary of recommendations for rights administration.........................................................97
6.1
6.2
6.3
6.4
6.5
6.5.1
6.5.2
6.6
6.6.1
Securing Information platform services................................................................................99Chapter 6
Security overview ..................................................................................................................99
Disaster recovery planning.....................................................................................................99
General recommendations for securing your deployment.....................................................100
Configuring security for bundled third-party servers.............................................................101
Active trust relationship........................................................................................................101
Logon tokens.......................................................................................................................101
Ticket mechanism for distributed security.............................................................................102
Sessions and session tracking.............................................................................................102
CMS session tracking..........................................................................................................103
2010-12-025
Contents
6.7
6.7.1
6.7.2
6.8
6.9
6.9.1
6.9.2
6.9.3
6.9.4
6.9.5
6.10
6.11
6.11.1
6.12
6.12.1
6.12.2
6.12.3
6.13
6.13.1
6.13.2
6.14
6.14.1
6.14.2
6.15
6.15.1
6.15.2
6.16
6.16.1
6.16.2
6.17
6.17.1
6.17.2
6.17.3
6.17.4
6.17.5
6.18
6.18.1
6.18.2
6.19
6.19.1
Environment protection........................................................................................................103
Web browser to web server.................................................................................................104
Web server to Information platform services........................................................................104
Auditing security configuration modifications........................................................................104
Auditing web activity............................................................................................................105
Protection against malicious logon attempts.........................................................................105
Password restrictions...........................................................................................................105
Logon restrictions................................................................................................................106
User restrictions..................................................................................................................106
Guest account restrictions...................................................................................................106
Processing extensions.........................................................................................................107
Overview of Information platform services data security.......................................................107
Data processing security modes..........................................................................................108
Cryptography in Information platform services......................................................................110
Working with cluster keys....................................................................................................110
Cryptographic Officers.........................................................................................................113
Managing cryptographic keys in the CMC............................................................................114
Configuring servers for SSL.................................................................................................118
Creating key and certificate files..........................................................................................119
Configuring the SSL protocol...............................................................................................121
Understanding communication between Information platform services components.............125
Overview of Information platform services servers and communication ports.......................125
Communication between Information platform services components ...................................128
Configuring SAP BusinessObjects Enterprise for firewalls...................................................135
To configure the system for firewalls....................................................................................135
Debugging a firewalled deployment......................................................................................138
Examples of typical firewall scenarios...................................................................................140
Example - Application tier deployed on a separate network..................................................140
Example - Thick client and database tier separated from Information platform services servers
by a firewall..........................................................................................................................142
Firewall settings for integrated ERP environments................................................................145
Specific firewall guidelines for SAP integration.....................................................................145
Firewall configuration for JD Edwards EnterpriseOne integration..........................................147
Specific firewall guidelines for Oracle EBS...........................................................................149
Firewall configuration for PeopleSoft Enterprise integration .................................................150
Firewall configuration for Siebel integration..........................................................................152
Information platform services and reverse proxy servers .....................................................153
Supported reverse proxy servers ........................................................................................154
Understanding how web applications are deployed .............................................................154
Configuring reverse proxy servers for Information platform services web applications..........154
Detailed instructions for configuring reverse proxy servers..................................................155
2010-12-026
Contents
6.19.2
6.19.3
6.19.4
6.19.5
6.20
6.20.1
6.20.2
6.20.3
7.1
7.1.1
7.1.2
7.1.3
7.1.4
7.1.5
7.2
7.2.1
7.2.2
7.2.3
7.3
7.3.1
7.3.2
7.3.3
7.3.4
7.3.5
7.4
7.4.1
7.4.2
7.4.3
7.4.4
7.4.5
7.4.6
7.5
7.5.1
7.5.2
7.5.3
7.5.4
7.5.5
7.6
7.6.1
To configure the reverse proxy server..................................................................................155
To configure Apache 2.2 reverse proxy server for Information platform services .................156
To configure WebSEAL 6.0 reverse proxy server for Information platform services .............156
To configure Microsoft ISA 2006 for Information platform services .....................................157
Special configuration for Information platform services in reverse proxy deployments..........159
Enabling reverse proxy for Information platform services Web Services...............................159
Enabling the root path for session cookies for ISA 2006......................................................160
Enabling reverse proxy for SAP BusinessObjects Live Office...............................................161
Authentication.....................................................................................................................163Chapter 7
Enterprise authentication......................................................................................................163
Enterprise authentication overview.......................................................................................163
Enterprise authentication settings.........................................................................................163
To change Enterprise settings..............................................................................................165
Enabling Trusted Authentication...........................................................................................166
Configuring Trusted Authentication for the web application..................................................168
LDAP authentication............................................................................................................177
Using LDAP authentication..................................................................................................177
Configuring LDAP authentication..........................................................................................178
Mapping LDAP groups.........................................................................................................189
Windows AD authentication.................................................................................................194
Overview..............................................................................................................................194
Preparing for AD authentication (Kerberos)..........................................................................197
AD authentication single sign-on..........................................................................................207
Mapping AD groups and configuring AD authentication........................................................218
Troubleshooting Windows AD authentication.......................................................................223
SAP authentication...............................................................................................................225
Configuring SAP authentication ...........................................................................................225
Creating a user account for Information platform services....................................................226
Connecting to SAP entitlement systems..............................................................................227
Setting SAP Authentication options.....................................................................................229
Importing SAP roles.............................................................................................................234
Setting up single sign-on to the SAP system........................................................................236
PeopleSoft authentication....................................................................................................241
Overview..............................................................................................................................241
Enabling PeopleSoft Enterprise authentication......................................................................241
Mapping PeopleSoft roles to Information platform services..................................................242
Scheduling user updates......................................................................................................245
Using the PeopleSoft Security Bridge..................................................................................247
JD Edwards authentication...................................................................................................258
Overview..............................................................................................................................258
2010-12-027
Contents
7.6.2
7.6.3
7.6.4
7.7
7.7.1
7.7.2
7.7.3
7.8
7.8.1
7.8.2
7.8.3
7.8.4
7.9
7.9.1
7.10
7.10.1
7.10.2
7.10.3
Enabling JD Edwards EnterpriseOne authentication..............................................................258
Mapping JD Edwards EnterpriseOne roles to Information platform services.........................259
Scheduling user updates......................................................................................................262
Siebel authentication............................................................................................................264
Enabling Siebel authentication..............................................................................................264
Mapping roles to Information platform services....................................................................265
Scheduling user updates......................................................................................................268
Oracle EBS authentication...................................................................................................270
Enabling Oracle EBS authentication......................................................................................270
Mapping Oracle E-Business Suite roles to Information platform services.............................271
Unmapping roles .................................................................................................................276
Customizing rights for mapped Oracle EBS groups and users .............................................277
Automated user updates......................................................................................................278
Scheduling user updates......................................................................................................278
Authentication options in Information platform services .......................................................280
Primary authentication..........................................................................................................281
Security plug-ins..................................................................................................................282
Single sign-on to Information platform services....................................................................283
Server Administration..........................................................................................................287Chapter 8
8.1
8.1.1
8.1.2
8.1.3
8.1.4
8.1.5
8.1.6
8.1.7
8.1.8
8.1.9
8.1.10
8.1.11
8.1.12
8.1.13
8.1.14
8.1.15
9.1
9.1.1
Server Administration...........................................................................................................287
Working with the Servers management area in the CMC.....................................................287
Managing servers by using scripts on Windows ..................................................................291
Managing servers on UNIX .................................................................................................291
Managing License keys........................................................................................................291
Measuring licenses..............................................................................................................293
Viewing and changing a server's status................................................................................294
Adding, cloning, or deleting servers......................................................................................299
Clustering Central Management Servers..............................................................................302
Managing server groups.......................................................................................................306
Assessing your system's performance.................................................................................310
Configuring server settings..................................................................................................313
Configuring server network settings.....................................................................................316
Managing Nodes..................................................................................................................324
Renaming a computer in an Information platform services deployment.................................344
Managing server and node placeholders..............................................................................345
Managing Web Application Container Servers (WACS).....................................................347Chapter 9
WACS.................................................................................................................................347
Web Application Container Server (WACS).........................................................................347
2010-12-028
Contents
9.1.2
9.1.3
9.1.4
9.1.5
9.1.6
9.1.7
9.1.8
9.1.9
9.1.10
10.1
10.1.1
10.1.2
10.1.3
10.1.4
10.1.5
10.1.6
10.1.7
Adding or removing additional WACS to your deployment...................................................350
Adding or removing services to WACS................................................................................354
Configuring HTTPS/SSL......................................................................................................355
Supported authentication methods.......................................................................................359
Configuring AD Kerberos for WACS ...................................................................................359
Configuring AD Kerberos single sign-on ..............................................................................366
WACS and your IT environment...........................................................................................368
Troubleshooting...................................................................................................................371
WACS properties.................................................................................................................375
Backing up and Restoring...................................................................................................377Chapter 10
Backing up and restoring your system..................................................................................377
Backing up your entire system.............................................................................................378
Backing up server settings...................................................................................................378
Backing up Business Intelligence content.............................................................................381
Restoring your system.........................................................................................................381
Restoring lost or corrupt Information platform services files where a backup is available......385
Recreating a Information platform services system when files are lost.................................386
BackupCluster and RestoreCluster parameters...................................................................386
11.1
11.2
11.2.1
11.3
11.3.1
11.3.2
12.1
12.2
12.2.1
12.3
12.4
12.5
12.5.1
12.6
12.6.1
12.6.2
12.7
Lifecycle Management........................................................................................................391Chapter 11
Lifecycle management console............................................................................................391
Version Management System settings for Lifecycle management console...........................391
Version Management System settings for Lifecycle management console...........................391
BIAR Engine Command-Line Tool.........................................................................................392
Using a properties file .........................................................................................................395
To use the BIAR Engine Command-Line Tool.......................................................................399
Monitoring...........................................................................................................................401Chapter 12
About Monitoring.................................................................................................................401
Monitoring terms..................................................................................................................401
Architecture.........................................................................................................................402
Cluster support for monitoring server...................................................................................405
Metrics................................................................................................................................406
Configuration properties.......................................................................................................410
JMX end point URL..............................................................................................................413
Integrating with other applications........................................................................................414
Integrating the monitoring application with IBM Tivoli............................................................415
Integrating the monitoring application with SAP Solution Manager ......................................418
Creating Universe for Derby Database.................................................................................418
2010-12-029
Contents
12.8
12.8.1
12.8.2
12.8.3
12.8.4
12.8.5
12.8.6
13.1
13.2
13.2.1
13.2.2
13.2.3
13.3
13.3.1
14.1
14.2
14.3
14.3.1
14.3.2
14.3.3
14.4
14.4.1
14.4.2
14.5
14.5.1
Troubleshooting...................................................................................................................419
Dashboard...........................................................................................................................419
Alerts...................................................................................................................................420
Watchlist..............................................................................................................................420
Probes.................................................................................................................................421
Metrics................................................................................................................................421
Graph...................................................................................................................................422
Auditing...............................................................................................................................423Chapter 13
Overview..............................................................................................................................423
CMC Auditing page.............................................................................................................429
Auditing Status....................................................................................................................429
Configuring Auditing events.................................................................................................431
Auditing Data Store configuration settings...........................................................................433
Audit events.........................................................................................................................434
Audit events and details.......................................................................................................441
Supportability......................................................................................................................457Chapter 14
Logging traces from components.........................................................................................457
Trace log levels....................................................................................................................457
Configuring tracing for servers.............................................................................................458
To set the server trace log level in the CMC........................................................................459
To set the trace log level for multiple servers managed in the CMC.....................................459
To configure server tracing through the BO_trace.ini file......................................................460
Configuring tracing for web applications...............................................................................463
To set the web application trace log level in the CMC..........................................................463
To manually modify tracing settings through the BO_trace.ini file.........................................464
Configuring tracing for Upgrade management tool...............................................................469
To configure tracing for Upgrade management tool..............................................................469
15.1
15.1.1
15.2
15.2.1
15.3
15.4
15.5
15.6
Command line administration.............................................................................................471Chapter 15
Command lines overview.....................................................................................................471
To view or modify a server's command line..........................................................................471
Standard options for all servers............................................................................................471
UNIX signal handling............................................................................................................472
Central Management Server................................................................................................472
Job Servers.........................................................................................................................475
Adaptive Processing Server.................................................................................................476
Input and Output File Repository Servers.............................................................................476
2010-12-0210
Contents
Rights appendix...................................................................................................................479Chapter 16
16.1
16.1.1
16.1.2
16.1.3
16.1.4
16.1.5
16.1.6
16.2
16.3
17.1
17.1.1
17.1.2
18.1
18.1.1
18.1.2
18.1.3
18.1.4
18.1.5
18.1.6
Rights for specific object types............................................................................................479
Folder rights.........................................................................................................................479
Categories...........................................................................................................................479
Notes...................................................................................................................................480
Users and groups.................................................................................................................480
Access levels.......................................................................................................................481
Applications.........................................................................................................................482
About the rights appendix.....................................................................................................483
General rights......................................................................................................................484
Server properties appendix.................................................................................................487Chapter 17
About the server properties appendix...................................................................................487
Common Server Properties..................................................................................................487
Core Services Properties.....................................................................................................490
Server metrics.....................................................................................................................501Chapter 18
About the Server Metrics Appendix.....................................................................................501
Common Server Metrics .....................................................................................................501
Central Management Server Metrics...................................................................................504
File Repository Server Metrics.............................................................................................508
Adaptive Processing Server Metrics....................................................................................509
Web Application Container Server Metrics..........................................................................514
Adaptive Job Server Metrics................................................................................................515
Nodes and placeholders.....................................................................................................519Chapter 19
19.1
20.1
20.2
20.3
Index 541
Server and node placeholders..............................................................................................519
Auditing Database Schema Appendix.................................................................................529Chapter 20
Overview..............................................................................................................................529
Schema diagram..................................................................................................................529
Auditing Data Store Tables..................................................................................................530
2010-12-0211
Contents
2010-12-0212

Getting Started

Getting Started
1.1 Before you start
1.1.1 Key concepts
1.1.1.1 Services and servers
The following diagram shows a hypothetical installation of Information platform services.
Note:
The nodes, servers, and services shown are for illustrative purposes only. The number of hosts, nodes, servers and services—as well as the type of servers, and services—will vary in real-world installations.
2010-12-0213
Getting Started
Two hosts form the cluster named
The host named
HostAlpha
ProductionBISystem
, with two hosts:
has Information platform services installed and is configured to have
two nodes:
NodeMercury
and publish reports, an Input File Repository Server ( input reports, and an Output File Repository Server (
: contains an Adaptive Job Server (
NodeMercury.AJS
NodeMercury.IFRS
NodeMercury.OFRS
report output.
NodeVenus
: contains an Adaptive Processing Server (
NodeVenus.APS
publishing, monitoring, and translation features, an Adaptive Processing Server ( with a service to provide client auditing, and a Central Management Server ( with a service to provide the CMS services.
The host named
HostBeta
has Information platform services installed and is configured to have
three nodes:
NodeMars
: contains a Central Management Server (
NodeMars.CMS
the CMS services.
NodeJupiter
: contains a Interactive Analysis Processing Server ( with a service to provide Interactive Analysis reporting, and an Event Server (
NodeJupiter.EventServer
) to provide report monitoring of files.
) with services to schedule
) with a service to store
) with a service to store
) with services to provide
NodeVenus.APS2
NodeVenus.CMS
) with a service to provide
NodeJupiter.InteractiveAnalysis
2010-12-0214
)
)
)
Getting Started
NodeSaturn
client auditing.
: contains an Adaptive Processing Server (
NodeSaturn.APS
) with a service to provide
Information platform services uses the terms running on an Information platform services machine.
A
service
space of its server under the process id of the parent container (server). For example, the SAP BusinessObjects Interactive Analysis Scheduling and Publishing Service is a subsystem that runs within the Adaptive Job Server.
The term to as a and Adaptive Processing Server are servers. A server runs under a specific operating system account and has its own PID.
A
node
nodes can be on a single host.
Information platform services can be installed on a single machine, spread across different machines on an intranet, or separated over a wide area network (WAN).
is a server subsystem that performs a specific function. The service runs within the memory
server
is used to describe an operating system level process (on some systems, this is referred
daemon
is a collection of Information platform services servers running on the same host. One or more
) hosting one or more services. For example, the Central Management Server (CMS)
1.1.2 Key administrative tools
server
and
service
to refer to the two types of software
1.1.2.1 Central Management Console (CMC)
The Central Management Console (CMC) is a web-based tool to perform administrative tasks, including user, content, and server management. It also allows you to publish, organize, and configure security settings. Because the CMC is a web-based application, you can perform all of these administrative tasks through a web browser on any machine that can connect to the server.
All users can log on to the CMC to change their user preference settings. Only members of the
Administrators
Roles can also be assigned to the CMC to grant some users privileges to perform minor administrative tasks
group can change management settings, unless explicitly granted the rights to do so.
2010-12-0215
Getting Started
1.1.2.2 Central Configuration Manager (CCM)
The Central Configuration Manager (CCM) is a server troubleshooting and node configuration tool provided in two forms. In a Microsoft Windows environment, the CCM allows you to manage local and remote servers through its graphical user interface (GUI) or command line.
The CCM allows you to create and configure Server Intelligence Agent (SIA) nodes and start or stop your web application server. On Windows, it also allows you to configure network parameters, such as Secure Socket Layer (SSL) encryption. These parameters apply to all servers within a node.
Note:
Most server management tasks are now handled through the CMC, not through the CCM. The CCM is now used for troubleshooting and node configuration.
1.1.2.3 Upgrade management tool
Upgrade management tool (formerly Import Wizard) is installed as a part of Information platform services, and guides administrators through the process of importing users, groups, and folders from previous versions of Information platform services. It also allows you to import and upgrade objects, events, server groups, repository objects, and calendars.
For information on upgrading from a previous version of Information platform services, see the
platform services Upgrade Guide
1.1.3 Key tasks
Depending on your situation, you may want to focus on specific sections of this help, and there may be other resources available for you. For each of the following situations, there is a list of suggested tasks and reading topics.
Related Topics
Planning or performing your first deployment
Configuring your deployment
Improving your system's performance
Central Management Console (CMC)
Information
.
2010-12-0216
Getting Started
1.1.3.1 Planning or performing your first deployment
If you are planning or performing your first deployment of Information platform services, it is recommended that you perform the following tasks and read the corresponding sections:
To get familiar with the Information platform services components, read “Architecture overview”.
“Communication between Information platform services components”.
“Security overview”.
If you plan to use third-party authentication, read “Authentication”.
For more information about installing this product, see the
Guide
.
After you install, read “Server Administration”.
Related Topics
Architecture overview
Security overview
Server Administration
Information platform services Installation
1.1.3.2 Configuring your deployment
If you have just completed your installation of Information platform services and need to perform initial configuration tasks, such as firewall configuration and user management, it is recommended that you read the following sections.
Related Topics
Server Administration
Security overview
About Monitoring
1.1.3.3 Improving your system's performance
2010-12-0217
Getting Started
If you want to assess your deployment's efficiency and fine-tune it in order to maximize resources, it is recommended that you read the following sections:
If you want to monitor your existing system, read “Monitoring”.
For daily maintenance tasks and procedures for working with servers in the CMC, see “Server
Maintenance”.
Related Topics
About Monitoring
Server Administration
1.1.3.4 Working with objects in the CMC
If you are working with objects in the CMC, read the following sections:
For information about setting up users and groups in the CMC, see “Account Management Overview”.
To set security on objects, see “How rights work in Information platform services”.
For general information about working with objects, see the
Related Topics
Account management overview
How rights work in Information platform services
1.2 About this help
This help provides you with information and procedures for deploying and configuring your Information platform services system. Procedures are provided for common tasks. Conceptual information and technical details are provided for all advanced topics.
For daily maintenance tasks and procedures for working with the CMC, see the
services Administrator's Guide
For information about installing this product, see the
Information platform services CMC Help
.
Information platform
.
Information platform services Installation Guide
.
2010-12-0218
Getting Started
1.2.1 Who should use this help?
This help covers deployment and configuration tasks. We recommend consulting this guide if you are:
planning your first deployment
configuring your first deployment
making significant changes to the architecture of an existing deployment
improving your system's performance.
This help is intended for system administrators who are responsible for configuring, managing, and maintaining an Information platform services installation. Familiarity with your operating system and your network environment is beneficial, as is a general understanding of web application server management and scripting technologies. However, to assist all levels of administrative experience, this help aims to provide sufficient background and conceptual information to clarify all administrative tasks and features.
1.2.2 About Information platform services
Information platform services is a flexible, scalable, and reliable solution for delivering powerful, interactive reports to end users via any web application—intranet, extranet, Internet or corporate portal. Whether it is used for distributing weekly sales reports, providing customers with personalized service offerings, or integrating critical information into corporate portals, Information platform services delivers tangible benefits that extend across and beyond the organization. As an integrated suite for reporting, analysis, and information delivery, Information platform services provides a solution for increasing end-user productivity and reducing administrative efforts.
1.2.3 Variables
The following variables are used throughout this guide.
2010-12-0219
Getting Started
DescriptionVariable
<INSTALLDIR>
<PLAT FORM64DIR>
<SCRIPTDIR>
The directory where Information platform services is installed.
On a Windows machine, the default directory is C:\Program Files (x86)\SAP BusinessObjects\.
The name of your UNIX operating system. Acceptable values are:
aix_rs6000_64
linux_x64
solaris_sparcv9
hpux_ia64
The directory where scripts for administering Information platform services are located.
On a Windows machine, the directory is <INSTALLDIR>\win64_x64\scripts.
On Unix machines, the directory is <INSTALLDIR>/<PLAT FORM64DIR>/scripts.
2010-12-0220

Architecture

Architecture
2.1 Architecture overview
This section outlines the overall platform architecture, system, and service components that make up the Information platform services Business Intelligence (BI) platform. The information helps administrators understand the system essentials and help to form a plan for the system deployment, management, and maintenance.
Information platform services is designed for high performance across a broad spectrum of user and deployment scenarios. For example, specialized platform services handle either on-demand data access and report generation, or report scheduling based on times and events. You can offload processor intensive scheduling and processing by creating dedicated servers to host specific services. The architecture is designed to meet the needs of virtually any BI deployment, and is flexible enough to grow from several users with a single tool, to tens of thousands of users with multiple tools and interfaces.
To provide flexibility, reliability, and scalability, Information platform services components can be installed on one or across many machines. You can even install two different versions of Information platform services simultaneously on the same computer, although this configuration is only recommended as part of the upgrade process or testing purposes.
Server processes can be “vertically scaled” (where one computer runs several, or all, server-side processes) to reduce cost, or “horizontally scaled” (where server processes are distributed between two or more networked machines) to improve performance. It is also possible to run multiple, redundant, versions of the same server process on more than one machine, so that processing can continue if the primary process encounters a problem.
2.1.1 System overview
Information platform services is a Business Intelligence (BI) platform that provides enterprise level analysis and reporting tools. Data can be analyzed from any of a large number of supported database systems (including text or multi-dimensional OLAP systems) and BI reports can be published in many different formats to many different publishing systems.
The following diagram illustrates how Information platform services fits in with your organization's infrastructure.
2010-12-0221
Architecture
Information platform services reports from a read-only connection to your organization's databases, and uses its own databases for storing its configuration, auditing, and other operational information. The BI reports created by the system can be sent to a variety of destinations, including file systems, and email, or accessed through web sites or portals.
Information platform services is a self-contained system that can exist on a single machine (for example, as a small development or pre-production test environment) or can be scaled up into a cluster of many machines that run different components (for example, as a large-scale production environment).
2.1.2 Databases
Information platform services uses several different databases.
Reporting database
This refers to your organization's information. It is the source information analyzed and reported on by Information platform services. Most commonly, the information is stored within a relational database, but it can also be contained within text files, Microsoft Office documents, or OLAP systems.
CMS system database
The CMS system database is used to store Information platform services information, such as user, server, folder, document, configuration, authorization, and authentication details. It is maintained by the Central Management Server (CMS), and is sometimes referred to as the
system repository
.
Auditing Data Store
2010-12-0222
Architecture
The Auditing Data Store (ADS) is used to store information on trackable events that occur in Information platform services. This information can be used to monitor the usage of system components, user activity, or other aspects of day-to-day operation.
Lifecycle Management database
The Lifecycle Management database tracks configuration and version information related to an Information platform services installation, as well as updates.
Monitoring database
Monitoring uses the Java Derby database to store system configuration and component information for SAP supportability.
If you do not have a database server in place for use with the CMS system and Auditing Data Store databases, the Information platform services installation program can install and configure one for you. It is recommended that you evaluate your requirements against information from your database server vendor to determine which supported database would best suit your organization's requirements.
2.1.3 Servers
Information platform services consists of collections of servers running on one or more hosts. Small installations (such as test or development systems) can use a single host for a web application server, database server, and all Information platform services servers.
Medium and large installations can have servers running on multiple hosts. For example, a web application server host can be used in combination with an Information platform services server host. This frees up resources on the Information platform services server host, allowing it to process more information than if it also hosted the web application server.
Large installations can have several Information platform services server hosts working together in a cluster. For example, if an organization has a large number of SAP Crystal Reports users, Crystal Reports processing servers can be created on multiple Information platform services server hosts to ensure that there are plenty of resources available to process requests from clients.
The advantages of having multiple servers include:
Improved performance
Multiple Information platform services server hosts can process a queue of reporting information faster than a single Information platform services server host.
Load balancing
If a server is experiencing a higher load than the other servers in a cluster, the CMS automatically sends new work to a server with better resources.
Improved availability
If a server encounters an unexpected condition, the CMS automatically re-routes work to different servers until the condition is corrected.
2010-12-0223
Architecture
2.1.4 Web application servers
A web application server acts as the translation layer between a web browser or rich application, and Information platform services. Web application servers running on Windows, Unix, and Linux are supported.
The following web application servers are supported:
JBoss
Oracle Application Server
SAP NetWeaver AS Java
Tomcat
WebLogic
WebSphere
For a detailed list of supported web application servers, consult the at: http://service.sap.com/bosap-support.
Supported Platforms Guide
available
If you do not have a web application server in place for use with Information platform services, the installation program can install and configure a Tomcat 6 web application server for you. It is recommended that you evaluate your requirements against information from your web application server vendor to determine which supported web application server would best suit your organization's requirements.
Note:
When configuring a production environment, it is recommended that the web application server is hosted on a separate system. Running Information platform services and a web application server on the same host in a production environment may decrease performance.
2.1.4.1 Web Application Container Service (WACS)
A web application server is required to host Information platform services web applications.
If you are an advanced Java web application server administrator with advanced administration needs, use a supported Java web application server to host Information platform services web applications. If you will be using a supported Windows operating system to host Information platform services, and prefer a simple web application server installation process, or you do not have the resources to administer a Java web application server, you can install the Web Application Container Service (WACS) when installing Information platform services.
WACS is an Information platform services server that allows Information platform services web applications, such as the Central Management Console (CMC) and Web Services, to run without the need for a previously installed Java web application server.
2010-12-0224
Architecture
Using WACS to provides a number of advantages:
WACS requires a minimum effort to install, maintain, and configure. It is installed and configured by
the Information platform services installation program, and no additional steps are required to start using it.
WACS removes the need for Java application server administration and maintenance skills.
WACS provides an administrative interface that is consistent with other Information platform services
servers.
Like other Information platform services servers, WACS can be installed on a dedicated host.
Note:
There are some limitations to using WACS instead of a dedicated Java web applications server:
WACS is only available on supported Windows operating systems.
Custom web applications cannot be deployed to WACS, as it only supports the web applications
installed with Information platform services.
WACS cannot be used with an Apache load balancer.
It is possible to use a dedicated web application server in addition to WACS. This allows your dedicated web application server to host custom web applications, while the CMC and other Information platform services web applications are hosted by WACS.
2.1.5 Language support
Information platform services products are translated into many different languages and supports data in an even broader selection of languages.
Product interfaces are available in the following languages:
Czech
Simplified Chinese
Traditional Chinese
Danish
Dutch
English
Finnish
French
German
Italian
Japanese
Korean
Norwegian Bokmal
Polish
Portuguese
Russian
2010-12-0225
Architecture
Spanish
Swedish
Thai
In addition to supporting data in any of the languages available in the interface, the following character sets are also supported:
Greek
Malaysian
Hebrew
Arabic
Romanian
Vietnamese
Hungarian
Turkish
Hindi
2.1.6 Authentication and single sign-on
System security is managed by the Central Management Server (CMS), security plug-ins, and third-party authentication tools, such as SiteMinder or Kerberos. These components authenticate users and authorize user access for Information platform services, its folders, and other objects.
The following user authentication single sign-on security plug-ins are available:
Enterprise (default), including Trusted Authentication support for third-party authentication.
LDAP
Windows Active Directory (AD)
When using an Enterprise Resource Planning (ERP) system, single sign-on is used to authenticate user access to the ERP system so that reports can be against ERP data. The following user authentication single sign-on for ERP systems are supported:
SAP ERP and Business Warehouse (BW)
Oracle E-Business Suite (EBS)
Siebel Enterprise
JD Edwards Enterprise One
PeopleSoft Enterprise
2.1.6.1 Security plug-ins
2010-12-0226
Architecture
Security plug-ins automate account creation and management by allowing you to map user accounts and groups from third-party systems into Information platform services. You can map third-party user accounts or groups to existing Enterprise user accounts or groups, or you can create new Enterprise user accounts or groups that correspond to each mapped entry in the external system.
The security plug-ins dynamically maintain third-party user and group listings. So, once you map a Lightweight Directory Access Protocol (LDAP) or Windows Active Directory (AD) group to Information platform services, all users who belong to that group can log into Information platform services. Subsequent changes to the third-party group memberships are automatically propagated.
Information platform services supports the following security plug-ins:
Enterprise security plug-in
The Central Management Server (CMS) handles security information, such as user accounts, group memberships, and object rights that define user and group privileges. This is known as Enterprise authentication.
Enterprise authentication is always enabled; it cannot be disabled. Use the system default Enterprise Authentication if you prefer to create distinct accounts and groups for use with Information platform services, or if you have not already set up a hierarchy of users and groups on an LDAP or Windows AD server.
Trusted Authentication is a component of Enterprise authentication that integrates with third-party single sign-on solutions, including Java Authentication and Authorization Service (JAAS). Applications that have established trust with the Central Management Server can use Trusted Authentication to allow users to log on without providing their passwords.
LDAP security plug-in
Windows AD
Note:
Although a user can configure Windows AD authentication for Information platform services and custom applications through the CMC, the CMC does not support Windows AD authentication with NTLM. The only methods of authentication that the CMC support are Windows AD with Kerberos, LDAP, Enterprise, and Trusted Authentication.
2.1.6.2 Enterprise Resource Planning (ERP) integration
An Enterprise Resource Planning (ERP) application supports the essential functions of an organization's processes by collecting real-time information related to day-to-day operations. SAP BusinessObjects Enterprise supports single sign-on and reporting from the following ERP systems:
SAP ERP and Business Warehouse (BW)
Note:
SAP GUI must be installed before using OLAP Data Access (ODA), SAP BusinessObjects Advanced Analysis (formerly Voyager), or BW connections.
2010-12-0227
Architecture
Siebel Enterprise
Oracle E-Business Suite
JD Edwards EnterpriseOne
PeopleSoft Enterprise
Note:
SAP ERP and BW support is installed by default. Use the Custom / Expand installation option to
deselect SAP integration support if you do not want support for SAP ERP or BW.
Support for Siebel Enterprise, Oracle E-Business Suite, JD Edwards EnterpriseOne, or PeopleSoft
is not installed by default. Use the "Custom / Expand" installation option to select and install integration for non-SAP ERP systems.
For detailed information on the specific versions supported by SAP BusinessObjects Enterprise, consult the
Supported Platforms Guide
, available at service.sap.com/bosap-support.
To configure ERP integration, see the
2.1.7 SAP integration
Information platform services integrates with your existing SAP infrastructure with the following SAP tools:
SAP System Landscape Directory (SLD)
The system landscape directory of SAP NetWeaver is the central source of system landscape information relevant for the management of your software life-cycle. By providing a directory comprising information about all installable software available from SAP and automatically updated data about systems already installed in a landscape, you get the foundation for tool support to plan software life-cycle tasks in your system landscape.
The Information platform services installation program registers the vendor and product names and versions with the SLD, as well as server and front-end component names, versions, and location.
SAP Solution Manager
The SAP Solution Manager is a platform that provides the integrated content, tools, and methodologies to implement, support, operate and monitor an organization's SAP and non-SAP solutions.
SAP BusinessObjects Enterprise Administrator Guide
.
Non-SAP software with an SAP-certified integration is entered into a central repository and transferred automatically to your SAP System Landscape Directories (SLD). SAP customers can then easily identify which version of third-party product integration has been certified by SAP within their SAP system environment. This service provides additional awareness for third-party products besides our online catalogs for third-party products.
SAP Solution Manager is available to SAP customers at no extra charge, and includes direct access to SAP support and SAP product upgrade path information. For more information on SLD, see
2010-12-0228
Architecture
“Registration of Information platform services in the System Landscape” in the
services Administrator Guide
CTS Transport (CTS+)
The Change and Transport System (CTS) helps you to organize development projects in ABAP Workbench and in Customizing, and then transport the changes between the SAP systems in your system landscape. As well as ABAP objects, you can also transport Java objects (J2EE, JEE) and SAP-specific non-ABAP technologies (such as Web Dynpro Java or SAP NetWeaver Portal) in your landscape.
Monitoring with CA Wily Introscope
CA Wily Introscope is a web application management product that delivers the ability to monitor and diagnose performance problems that may occur within Java-based SAP modules in production, including visibility into custom Java applications and connections to back-end systems. It allows you to isolate performance bottlenecks in NetWeaver modules including individual Servlets, JSPs, EJBs, JCO’s, Classes, Methods and more. It offers real-time, low-overhead monitoring, end-to-end transaction visibility, historical data for analysis or capacity planning, customizable dashboards, automated threshold alarms, and an open architecture to extend monitoring beyond NetWeaver environments.
.
2.1.8 Lifecycle management (LCM)
Information platform
Lifecycle management (LCM) refers to a set of processes involved in managing an installation's product information. It establishes procedures for governing the installation of Information platform services to development, test, production, or maintenance environments.
Information platform services Lifecycle Manager is a web-based tool that enables you to move BI objects from one system to another system, without affecting the dependencies of those objects. It also enables you to manage different versions, manage dependencies, or roll back a promoted object to its previous state.
The LCM tool is a plug-in for Information platform services. You can promote a BI object from one system to another system only if the same version of the application is installed on both the source and destination systems.
For more information, see the
Guide
.
Information platform services Lifecycle management console User's
2.1.9 Integrated version control
2010-12-0229
Architecture
The files that make up SAP BusinessObjects Enterprise on a server system are now kept under version control. The installation program will install and configure the Subversion version control system, or you can enter details to use an existing Subversion or ClearCase version control system.
A version control system makes it possible to keep and restore different revisions of configuration and other files, which means it is always possible to revert the system to a known state from any time in the past.
2.1.10 Permanent data
The term "permanent data" refers to any piece of information considered important enough to be migrated during a system upgrade. For example, the Central Management Server (CMS) stores configuration information in the CMS database rather than the Windows registry or a configuration file.
All Information platform services products store permanent data in the CMS system database. This allows data and configuration information to be easily migrated to a new version when you upgrade.
2.1.11 Upgrade path
It's possible to upgrade from a previous release of Information platform services, but you must first install Information platform services 4.0, then migrate the settings and data from your existing system with the Upgrade management tool.
For information on how to upgrade from a previous version, see the
Upgrade Guide
.
2.2 Conceptual tiers
Information platform services can be thought of as a series of conceptual tiers:
Information platform services
2010-12-0230
Loading...
+ 520 hidden pages