46
EIF Services Installation Guide Performance Management

P3630AUS InforPM EIFServices InstallGuide Services Installation... · 2017. 12. 4. · SunSystems Global Security included with SunSystems. Note: Although EIF Services operates on

  • Upload
    others

  • View
    2

  • Download
    1

Embed Size (px)

Citation preview

  • EIF Services

    Installation Guide

    Performance Management

  • EIF Services Installation Guide

    Issued: October 2007

    EIF Services version: 10.0

    Document Number: P3630A US

    File name: InforPM_EIFServices_InstallGuide.doc

    Disclaimer: Infor PM Query & Analysis is used in conjunction with third party companion products, such as operating systems and database systems. Query & Analysis is only supported for companion products that are in turn currently supported by their respective parent company. Please refer to the Query & Analysis Support Policy for full details. Copyright © 2007 Infor. All rights reserved. The word and design marks set forth herein are trademarks and/or registered trademarks of Infor and/or related affiliates and subsidiaries. All rights reserved. All other trademarks listed herein are the property of their respective owners. www.infor.com. Important Notices The material contained in this publication (including any supplementary information) constitutes and contains confidential and proprietary information of Infor. By gaining access to the attached, you acknowledge and agree that the material (including any modification, translation or adaptation of the material) and all copyright, trade secrets and all other right, title and interest therein, are the sole property of Infor and that you shall not gain right, title or interest in the material (including any modification, translation or adaptation of the material) by virtue of your review thereof other than the non-exclusive right to use the material solely in connection with and the furtherance of your license and use of software made available to your company from Infor pursuant to a separate agreement (“Purpose”). In addition, by accessing the enclosed material, you acknowledge and agree that you are required to maintain such material in strict confidence and that your use of such material is limited to the Purpose described above. Although Infor has taken due care to ensure that the material included in this publication is accurate and complete, Infor cannot warrant that the information contained in this publication is complete, does not contain typographical or other errors, or will meet your specific requirements. As such, Infor does not assume and hereby disclaims all liability, consequential or otherwise, for any loss or damage to any person or entity which is caused by or relates to errors or omissions in this publication (including any supplementary information), whether such errors or omissions result from negligence, accident or any other cause. Trademarks IBM and DB2 are trademarks of International Business Machines Corporation in the United States, other countries, or both. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Access, Microsoft, SQL Server and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. MySQL is a registered trademark of MySQL AB in the United States, the European Union and other countries. Citrix is a trademark of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries. Other product and company names mentioned herein may be the trademarks of their respective owners.

    Infor Global Solutions 13560 Morris Road Suite 4100 Alpharetta, GA 30004 Tel: 678-319-8000 Fax: 678-319-8682 Web: www.infor.com

    www.infor.com

  • EIF Services Installation Guide

    Welcome ............................................................................................................................................................. 1

    Assumptions .................................................................................................................................................................... 1 General Requirements ................................................................................................................................................... 2

    Before You Begin ............................................................................................................................................... 2 Server Requirements...................................................................................................................................................... 2 Configuration .................................................................................................................................................................... 3

    Installation Steps .............................................................................................................................................. 5 Step 1: Preparation.......................................................................................................................................................... 5 Step 2: Install Internet Information Services............................................................................................................ 5 Step 3: Create Query & Analysis Centralized Database......................................................................................... 6 Step 4: Install EIF Services ......................................................................................................................................... 14 Step 5: Install DataLinks ............................................................................................................................................. 15 Step 6: Connection Wizard ......................................................................................................................................... 16 Step 7: Create Users and Profiles ............................................................................................................................. 21 Step 8: Serialize EIF Services ..................................................................................................................................... 29 Step 9: Allocating Users .............................................................................................................................................. 30 Step 10: Restart Internet Information Services .................................................................................................... 31 Step 11: Testing EIF Services .................................................................................................................................... 32 Step 12: Configure SunSystems Global Security ................................................................................................. 35

    Troubleshooting.............................................................................................................................................. 38 Windows Authentication in SQL Server ................................................................................................................... 38 Remote Microsoft SQL Server and Windows Authentication............................................................................. 39 Co-existence of .NET 1.1 and 2.0 on IIS and Application Pooling ..................................................................... 40 Internet Information Services.................................................................................................................................... 41 Oracle - ORA-12640: Authentication adapter initialization failed..................................................................... 42

    Table of Contents

  • EIF Services Installation Guide

    1

    Welcome to the Enterprise Integration Foundation (EIF) Services Installation Guide.

    Assumptions

    This guide has been written with the following assumptions:

    You have a working knowledge of Microsoft® Windows® operating system.

    You are familiar with ODBC Administrator.

    You have a working knowledge of the selected database server and computer systems, including installing software and working with networks.

    Welcome

  • EIF Services Installation Guide

    2

    General Requirements

    Before you begin the EIF Services installation, check you have the following information:

    Your database server software and name.

    Your database name.

    The password for the System Administrator.

    Server Requirements

    The server computer requires the following configuration to use EIF Services:

    Microsoft® Windows Server® 2000 or Windows Server® 2003 operating system with the latest service packs.

    Microsoft® SQL Server™ 2000

    MDAC 2.8

    Microsoft® .Net Framework 1.1 and .Net Framework 2.0.

    Internet Information Services.

    SunSystems Global Security included with SunSystems.

    Note: Although EIF Services operates on Windows XP, the operating system limits the number of incoming users to 10. Windows XP is not recommended.

    Citrix Environment

    EIF Services supports a Citrix® environment, but is not recommended. Application User Profiles must be disabled to operate EIF Services; this is at odds with a typical Citrix installation. Sessions are handled by Internet Information Services. EIF Services should be installed on a separate web server and not the Citrix server. To operate Citrix and EIF Services on the same server a single user profile must be used.

    Note: EIF Services is used in conjunction with third party companion products, such as operating systems and database systems. EIF Services is only supported for companion products that are in turn currently supported by their respective parent company. Please refer to the EIF Services Support Policy for full details.

    Before You Begin

  • EIF Services Installation Guide

    3

    Configuration

    The following diagram depicts a typical EIF Services configuration.

    The EIF Services software and DataLinks for the products over which EIF Services will report are installed on the EIF Services server. The term DataLink refers to the collection of files forming the business logic layer, allowing Query & Analysis applications to present a Product Database in layout or format that can be easily recognised by the end user. Once installed, Query & Analysis will be connected to a Query & Analysis Database and perhaps one or more Product Databases.

    The Query & Analysis Database is a single centralised database containing Query & Analysis user, security and serialisation (licensing) details. The database can be an Oracle®, Microsoft® SQL Server™, Microsoft® Access™, IBM® DB2® or MySQL® database. It is recommended that the Query & Analysis Database be of the same type (where possible) as any Product Databases. For example, if the product over which EIF Services is to report runs on SQL Server 2000, it is recommended that the Query & Analysis database also be a SQL Server 2000 database.

  • EIF Services Installation Guide

    4

    Product Databases are the actual application databases over which EIF Services will report. In most cases EIF Services will be reporting over only one Product Database, but there may be several if more DataLinks are in use with EIF Services.

    Data is extracted from the Product database by the Report Server connected via a web service and the running the DataLink SQL query embedded in a report. Reports created by Report Designers can be deployed to a Web Server allowing Internet users to view results in a Web browser.

    The installation process is a follows:

    1. Create a Query & Analysis database on the Product server.

    2. Install EIF Services on a server or high specification PC.

    SunSystems Global Security

    If EIF Services connects to SunSystems 522 or Vision Reporting Services where SunSystems Global Security has been implemented, EIF Services must also be installed on the Global Security server and Web server.

    Global Security server - install EIF Services without the Web Services.

    Web server - install all EIF Services components. 3. Connect to the Query & Analysis database.

    4. Create Query & Analysis users and profiles. Query & Analysis users can be created based on the names of Product users defined in the Product database.

    5. Serialize EIF Services.

    6. Allocate Query & Analysis users to the Product and Query & Analysis application.

    7. Restart IIS.

    8. Test DataLink SQL Tool.

    9. If necessary, implement SunSystems Global Security for SunSystems.

  • EIF Services Installation Guide

    5

    Step 1: Preparation

    1. Read the EIF Services Installation Guide.

    2. Read any Product installation addendum documents included with the EIF Services installation, located in the folder \LsAlchemy\\Doc

    Product addendum documents cover installation issues or additional steps required for specific Products. Not all Products, accessed via a DataLink, have addendum documents.

    Once EIF Services has been installed addendum documents are placed in a Doc sub-folder in the EIF Services program folder. By default:

    C:\Program Files\Infor\EIF Services\COMEngine\Doc\

    3. Contact your software vendor to request a license file to serialize EIF Services and Product.

    4. Backup the computer. It is recommend that before commencing any software installation that server backup procedures are performed.

    Step 2: Install Internet Information Services

    A typical Windows installation does not install Internet Information Services required by EIF Services. A Windows installation CD is required.

    To install IIS on the HTTP server:

    1. Insert the Windows installation CD into the CD drive.

    2. Start Windows Control Panel.

    3. Open Add or Remove Programs.

    4. Start Add / Remove Windows Components.

    5. Select Internet Information Services from the Components list.

    6. Complete the installation steps and reboot the server.

    Installation Steps

  • EIF Services Installation Guide

    6

    Step 3: Create Query & Analysis Centralized Database

    Note: Only one Query & Analysis centralized database is permitted per site.

    The Query & Analysis centralized database can be a Microsoft® SQL Server™, Oracle®, IBM® DB2® or MySQL® database or the Microsoft® Access™ database provided. It is recommended that Query & Analysis centralized database is the same type as the Product database. Ideally the database should be created on a server other than a Product database server.

    The database contains user information, serialization details, dictionary and global settings. It consists of approximately 50 tables and is about 10 MB in size.

    All EIF Services users point to a single Query & Analysis centralized database.

    To create SQL Server database, click here.

    To create an Oracle database, click here.

    To use the Access database provided, click here.

  • EIF Services Installation Guide

    7

    Microsoft SQL Database

    If the Product uses a SQL database then create a SQL database for Query & Analysis. Access to the database can be made by SQL Server logon or Windows Authentication. Windows Authentication is more secure since SQL user details are visible in the Query & Analysis Client Setup application. For full details please refer to your Microsoft SQL Server documentation.

    The procedure detailed below recommends creating a Domain Group. The Doman is comprised of Windows users that will use Query & Analysis. Thus as a Query & Analysis user they are a member of the Domain that is granted access to the SQL database. This makes future administration tasks such as adding a Query & Analysis user and ensuring access is granted a straight forward process.

    1. Create a Windows Domain Group, for example ‘QUERY & ANALYSISGROUP’

    2. Add Windows users to the Group. The Windows users will ultimately be created as Query & Analysis users.

    3. Start SQL Server Management Studio as an Administrator.

    4. In the Database server tree, right-click Security and select New > Logon.

    The Login – New Properties dialog box is displayed

    5. Click the Login name Search button.

  • EIF Services Installation Guide

    8

    6. In the Select User or Group, type the Domain name followed by backslash and the group name. Alternatively, click the assist button to browse accessible domains for the group. For example, ‘SALESDOMAIN \ QUERY & ANALYSISGROUP’.

    7. Click Check Names and OK.

    8. In the Database tree, right-click Databases > New Databases

    9. In the Database name box, type in ‘Query & Analysis’ or similar name.

    10. Click OK. The Query & Analysis database is created.

    11. Open the Properties of the Login ‘QUERY & ANALYSISGROUP’

    12. Change Default database from Master to Query & Analysis.

    13. Select the User Mapping page.

  • EIF Services Installation Guide

    9

    14. Select the Query & Analysis database.

    15. Select the Database Roles permitted to the Windows Domain Group. Query & Analysis requires the following permissions:

    public

    db_ddladmin - permits the creation of tables and views

    db_datareader - read access to DataLink

    db_datawriter - write back access for Data Sends

  • EIF Services Installation Guide

    10

    16. Click OK to close the Login Properties dialog box.

    If you intend to use Query & Analysis NetEnterprise Server, Query & Analysis eAlert (Browser) or Query & Analysis Executive (Browser) that require IIS or web services, also grant Query & Analysis database access with the same roles to the default accounts:

    ASPNET for Windows 2000 / XP

    IIS_WPG for Windows 2003

  • EIF Services Installation Guide

    11

    Oracle Database

    If the Product uses an Oracle database then create a new Oracle schema to store the Query & Analysis tables on the server.

    A Net Service Name defines how to access an Oracle database across a network. On each of the client PCs, Net Service Names should be created for the Query & Analysis Centralized database and the Product’s Oracle database

    Create an Oracle Schema To create an Oracle schema / user on the server:

    1. On the server, start Oracle Enterprise Manager Console.

    2. Select Launch Standalone if Oracle Management Server is not available.

    3. Select the Oracle Instance that hosts the Product database.

    4. If the instance name is not in the database list, select Add Database to Trees from the Object menu item and enter the server and database details.

    The Net Service Name appears in the Database tree.

  • EIF Services Installation Guide

    12

    5. Select the database and logon with “sys” credentials.

    6. Expand the Product database in the tree and select Schema.

    7. Click Create schema objects.

    8. Select User from the Create list.

    9. In the Create User dialog box, complete the following settings:

    General tab: type ‘Query & Analysis’ into the Name box and specify a password.

    Role tab: select Connect role.

    System tab: select Create Synonym, Create Table and Create View privileges.

    Quota tab: type 50 Mb in the Users setting. 10. Click the Create button.

    Create an Net Service Name

    To create a Net Service Name for Query & Analysis and the Product on the client:

    11. On the client, start Oracle Net Manager.

    12. On the Edit menu, click Create. Net Service Wizard starts.

    13. Type in the Query & Analysis Net Service Name for the server. This appears in the Service Naming tree.

    14. Select TCP/IP (Internet Protocol).

    15. Type in the Host Name, this is the Query & Analysis server name.

    16. Type in the Port Number, by default 1521.

    17. Type in the Instance / Service Name; the global database name.

  • EIF Services Installation Guide

    13

    18. Test access to the database. It is assumed the test is successful.

    19. Close Net Service Wizard.

    20. Save Network Configuration.

    21. Repeat the process, this time create a Net Service Name for the Product.

    22. Exit Oracle Net Manager.

    Microsoft Access Database

    During installation a Microsoft Access database is placed in the following folder:

    C:\Program Files\Infor\EIF Services\COMEngine

    If you intend to store Query & Analysis centralized settings in an Access database use the LsDatabase.mdb file provided. The file should be moved from the folder to a shared network drive. EIF Services should then point to this database in a central location.

  • EIF Services Installation Guide

    14

    Step 4: Install EIF Services

    1. Run the EIF Services, setup.exe.

    2. Click Next.

    3. Select the installation type.

    On the Web server, perform a ‘Typical’ installation comprised of three components:

    Core Engine Components

    ADO.net 2.0 Data Provider

    Web Services

    On the Global Security server, perform a ‘Custom’ installation comprised of two components, omitting Web Services:

    Core Engine Components

    ADO.net 2.0 Data Provider 4. Click Next.

    EIF Services is installed by default by to:

    C:\Program Files\Infor\EIF Services

    5. Click the Finish button

    In the EIF Services program group, short-cuts are created to:

    Setup

    Maintenance

    Update DataLinks

    DataLink SQL Tool

    DataLink SQL reference document.

  • EIF Services Installation Guide

    15

    Step 5: Install DataLinks

    In order for Query & Analysis Report Services to extract data from the Product database, the Product’s DataLinks need to be installed.

    The definition files, or DataLink, contain the rules that Query & Analysis uses to describe the selected database.

    The Update DataLink feature installs the selected database’s definition files, as well as supporting documentation, product help and demo files if appropriate. DataLink documents are placed in the folder:

    C:\Program Files\EIFServices\COMEngine\Doc\

    The DataLinks, stored in their individual folders, are contained in the LsAlchemy folder. A new version of a DataLink can be installed without installing a new version of EIF Services, providing there have been no changes in the EIF Services engine that have been implemented in the DataLink. In this case it would also be necessary to update EIF Services to the minimum version specified by the DataLink.

    It is recommended that latest copies of DataLinks are kept in a central location, such as a shared network drive.

    Application User Profiles must be disabled. The option can be found on the About tab in Query & Analysis Maintenance.

    To install DataLinks:

    1. Start Maintenance in the EIF Services program folder.

    2. Click the About tab.

    3. Confirm the Application User Profiles option is disabled. DataLinks will be installed to the Master folder:

    C:\Program Files\Infor\EIFServices\COMEngine\Settings\LsAgEg10.mdb

    Note: EIF Services does not support Application User Profiles.

    4. Quit Maintenance.

    5. Run the Update DataLinks utility.

    All DataLinks must be updated to the Master folder.

    6. Click the Data Directory assist button and locate the LsAlchemy folder. Select the parent folder, LsAlchemy. Do not select the actual DataLink subfolder (e.g., SS4 or SS5). New releases of the DataLinks can reside on the same server or mapped folder on another server.

    Click the Update button and Yes to confirm. The DataLinks are copied to the Master folder.

    7. Quit Update DataLinks.

  • EIF Services Installation Guide

    16

    Step 6: Connection Wizard

    The Connection Wizard establishes links between:

    The EIF Services and the Query & Analysis centralized database

    The EIF Services and the Product database The Connection Wizard lists the Products installed from the LsAlchemy settings folder.

    All new clients should use DSN-less connections to enable EIF Services to access the EIF Services and Product databases. A DSN-less connection is recommended over implementing a System DSN connection. Unlike ODBC Data Source Names, DSN-less connection details are stored within the password protected EIF Services product, thus ensuring database access settings are not exposed to other applications and users.

    The procedure for creating a DSN-less connection is described below.

    EIF Services Software Query & Analysis Database

    The following procedure points the EIF Services software to the Query & Analysis centralized database.

    1. Start Maintenance.

    2. Click the Client Setup button.

    3. Select the Connections Details tab.

    4. Select ‘Query & Analysis’ in the Connection Wizard’s Product list.

    5. Click Next.

    6. Select the Database type.

    Microsoft SQL

    Oracle

    Microsoft Access 7. Complete the fields for the selected database type.

  • EIF Services Installation Guide

    17

    Microsoft SQL

    Data Source Name: create a DSN-less or DSN connection. A DSN-less connection is recommended. In the Data Source Name box type the SQL server name that holds the Query & Analysis database and precede the name with an asterisk ( * ). If you prefer to create a DSN connection, click the assist button to start Microsoft ODBC Data Source Administrator utility.

    Database: the name of the Query & Analysis Centralized database on the server.

    Time out: the length of time allowed for query to run before it is closed down. The default is zero seconds.

    Oracle

    Data Source Name: create a DSN-less or DSN connection. A DSN-less connection is recommended. In the Data Source Name box type the Oracle net service name that refers to the EIF Services database and precede the name with an asterisk ( * ). If you prefer to create a DSN connection, click the assist button to start Microsoft ODBC Data Source Administrator utility.

    Time out: the length of time allowed for query to run before it is closed down. The default is zero seconds.

    Microsoft Access

    File Name: click the assist button and locate the shared network folder in which the LsDatabase.mdb file resides.

    System Database: if required, click the assist button and locate the Access system file (*.mdw).

    Time out: the length of time allowed for query to run before it is closed down. The default is zero seconds.

  • EIF Services Installation Guide

    18

    8. Click the Next button.

    9. Type in the Query & Analysis database User ID and Password.

    The user requires read and write access permissions to Query & Analysis Centralized database.

    Authentication: access to the SQL Server database can be granted by SQL Server user details or Windows network login ID:

    SQL Server – type in database User ID and Password.

    Windows User Name – authenticated Windows login details are used when connecting to the Query & Analysis SQL database. The Username and Password boxes are disabled. Configure SQL Server to accept Windows Authentication.

    10. Click the Next button.

    11. Click the Test Connection button, EIF Services checks whether it can access the data source. If successful the ‘Connection Test Successful’ message is displayed and the indicator turns green. If the test fails, the indicator turns red with a white cross. It is assumed the test was successful.

    Connection Not Tested

    Test Successful Test Failed

    12. Click the Finish button.

    EIF Services Software Product Database

    The following procedure points the EIF Services software to the Product database. As with the Query & Analysis centralized database, create either a DSN-less or DSN connection to the Product database. A DSN-less connection is recommended. Only database types supported by the Product are listed.

    13. Select the Product in the Product list.

    14. Select the Database type.

    15. Complete the fields for the selected database type.

  • EIF Services Installation Guide

    19

    Microsoft SQL

    Data Source Name: create a DSN-less or DSN connection. A DSN-less connection is recommended. In the Data Source Name box type the SQL Server name that holds the Product database and precede the name with an asterisk ( * ). If you prefer to create a DSN connection, click the assist button to start Microsoft ODBC Data Source Administrator utility.

    Database: the name of the Product database on the server.

    Time out: the length of time allowed for query to run before it is closed down. The default is zero seconds.

    OEM to ANSI: for databases that use the older OEM format instead of ANSI and store languages that have diacritic characters (German, French etc) this option ensures corrupt characters are not returned. Enable for SunSystems 426. Disable for SunSystems 4.3 and SunSystems 5.

    Oracle

    Data Source Name: create a DSN-less or DSN connection. A DSN-less connection is recommended. In the Data Source Name type the Oracle net service name that refers to the Product database and precede the name with an asterisk ( * ). If you prefer to create a DSN connection, click the assist button to start Microsoft ODBC Data Source Administrator utility.

    Time out: the length of time allowed for query to run before it is closed down. The default is zero seconds.

    OEM to ANSI: for databases that use the older OEM format instead of ANSI and store languages that have diacritic characters (German, French etc) this option ensures corrupt characters are not returned. Enable for SunSystems 426. Disable for SunSystems 4.3 and SunSystems 5.

  • EIF Services Installation Guide

    20

    16. Click the Next button.

    17. Type in the Product database User ID and Password.

    The user requires read access to Product tables. Some Products (DataLinks) during an invasive install create tables and views in the Product database or support Data Send functionality. In these cases the user requires read and write access privileges.

    Authentication: access to the SQL Server database can be granted by SQL Server user details or Windows network login ID:

    SQL Server – type in database User ID and Password.

    Windows User Name – authenticated Windows login details are used when connecting to the Product SQL database. The Username and Password boxes are disabled. Configure SQL Server to accept Windows Authentication.

    18. Click the Next button

    Server Install Application

    If the Install button is displayed execute the Server Install Application.

    The Install button is displayed if the selected Product is provided with a Server Install Application. A Server Install Application is designed specifically for the Product and its DataLink. It may assist in applying appropriate security settings, table configuration or connection details. Please review the Installation Addendum documentation for your DataLink for information about the Server Install Application.

    19. Click the Test Connection button, EIF Services checks whether it can access the data source. If successful the ‘Connection Test Successful’ message is displayed and the indicator turns green. If the test fails, the indicator turns red with a white cross.

    It is assumed the test was successful.

    20. Repeat the connection process for the remaining Products.

    21. Click the Finish button.

    22. Click Finish again to close the Connection Wizard.

    SunSystems Global Security

    If EIF Services detects Global Security used by SunSystems Products, EIF Services automatically integrates with this security system. To continue with EIF Services installation, Global Security detection will be temporary disabled and then reactivated after the Query & Analysis users have been created and tested.

    In Client Setup, on the Other tab clear the Global Security option.

  • EIF Services Installation Guide

    21

    23. Click the Save button on the Client Setup dialog box. Query & Analysis installation is complete. It is not necessary to reboot the computer.

    Step 7: Create Users and Profiles

    Creating EIF Services Users - User Wizard

    This section details how to create Query & Analysis users by running the User Wizard.

    The User Wizard can create Query & Analysis users based on either:

    Product users stored in the Product database

    Windows users within a Windows domain.

    For Product users, the wizard creates Query & Analysis users, Query & Analysis profiles and maps these Profiles to their relevant Product User ID. For Windows users, by implementing Integrated Security, on starting Query & Analysis applications Query & Analysis users are automatically logged on since user authentication has already been conducted by the Windows logon details effectively providing single sign-on functionality. The Wizard also allows you to set the default password for all Query & Analysis users.

    To create Query & Analysis Users with the User Wizard:

    1. In Setup, on the Users menu, click User Wizard.

    2. Select either the Product or Window Users option.

    Product has four options:

    User Names. If enabled, the User Names will be created from the Product user names.

    Map directly to users. If enabled, maps a Query & Analysis user to a Product User ID.

    User Profiles. If enabled, User Names will be assigned to Profiles.

    Remote Users. If enabled, creates Remote Users for Executive (Browser) and eAlert (Browser) from the imported Product users. You may prefer to create and allocate remote users manually as a Remote User does not have to have a one on one relationship to a Query & Analysis User. Remote Users can be created or changed at a later point time. [Not applicable to EIF Services]

    Windows Users option:

    Select a Windows Domain from the Domain list. Query & Analysis searches this Domain in order to create Query & Analysis users. [Not applicable to EIF Services]

    3. Click the Next button.

  • EIF Services Installation Guide

    22

    4. By default the Guest profile is assigned to all Query & Analysis users. Click the assist button to nominate an alternative Query & Analysis profile. The Query & Analysis profile determines which features are activated in Query & Analysis applications and the Product. A Query & Analysis user, as member of a Query & Analysis profile, inherits the features activated within the profile.

    5. Select User Security if required. This option provides additional Product specific security by mapping a Query & Analysis user profile to a Product user retrieved from the data source. A Query & Analysis user, as member of a Query & Analysis profile, will have the same permissions as the mapped Product user when accessing the Product database.

    6. Click the Next button.

    7. The following default password options can be set for all Query & Analysis users being created:

    Passwords are mandatory for all users. Updated passwords cannot be blank.

    A default password can be defined which will be assigned to all users.

    Whether passwords will expire and the time frame.

    Password length, complexity and force password change on next logon.

  • EIF Services Installation Guide

    23

    8. Click the Next button.

    [Not applicable to EIF Services]

    Remote Security provides an additional level of security for Query & Analysis browser products, Query & Analysis Executive (Browser) and Query & Analysis eAlert (Browser), which operate over the internet. Remote Logon access is requested prior to Query & Analysis Logon details; so both logon details must be correct in order to start the Query & Analysis browser product. Remote Security is also used to determine which Query & Analysis users have administrator rights to configure which server folders can be accessed by Query & Analysis browser product users.

    9. Type in Remote Security password and add a Group with administrator access. The Administrator will be able to set which server folders can be accessed by Remote Users.

  • EIF Services Installation Guide

    24

    10. Click the Next button.

    A list of Users and associated User Profiles & Remote Security is displayed. Users that already exist in Query & Analysis can not be selected and are listed with a light grey background.

    11. This list may be modified by:

    Clearing the tick ( ) left of a User so it is not created.

    Changing a User Profile assigned to a User from the drop-down list.

    Changing a Remote Security logon by from the drop-down list.

    12. Click the Finish button to create the Query & Analysis users. The users are listed on the User Security tab.

    Note: The users ‘demo’, ‘guest’ and ‘system’ are default Query & Analysis users with a Guest profile.

  • EIF Services Installation Guide

    25

    Creating Query & Analysis Users – Manual Method

    Note: Skip this step if you are performing additional client installations or upgrading Query & Analysis.

    Rather than using User Wizard to create multiple Query & Analysis users from importing them from the Product, a single Query & Analysis user can be created manually.

    The first step is to create a Query & Analysis profile. The profile controls the inclusion of features in Query & Analysis applications; each separated by tabs. If a feature is disabled, as member of the profile, the Query & Analysis user is denied access to that feature. The second step is to create a Query & Analysis user and assigned them to a profile.

    1. Start Query & Analysis Setup.

    2. Enter the ‘System’ user ID and password. The password is blank during initial configuration. Click OK.

    3. On the Profiles menu, click Add. The User Profiles dialog box is displayed.

    4. In the Code box, enter a profile name.

    5. In the Description box enter a profile description.

    6. Click the Help button for further details on each of the product and client application settings.

    7. Save the user profile.

    8. On the Users menu, click Add. The Add Users dialog box is displayed.

    9. In the User Name box, enter the Query & Analysis user’s name.

    10. In the Description box, enter a description for the Query & Analysis user.

    The Query & Analysis password can be configured manually on the Details tab or authorized by Windows logon by completing the Integrated Security tab.

    11. Click the Help button for further details on setting Query & Analysis user passwords.

    12. Click the User Profile assist button.

    13. Select the profile and click OK.

  • EIF Services Installation Guide

    26

    14. Map a Query & Analysis User Profile to a Product user.

    15. Click the Save button.

    The Query & Analysis user profile is assigned to the Query & Analysis user.

    16. Continue to add profiles and users as required.

  • EIF Services Installation Guide

    27

    Implementing Integrated Security – Manual Method

    By allocating the Windows User Name to a Query & Analysis user or profile, valid Windows logon details are used instead of Query & Analysis logon details to permit the user access to Query & Analysis. Successfully logging on to Windows effectively gives the user permission to use Query & Analysis.

    Note: The Windows user is mapped to Query & Analysis user or profile. This affects all Products, for example if a site had Query & Analysis for SunSystems and Query & Analysis for Micros Fidelio installed then the same Windows user and Query & Analysis user are mapped (remembering the Query & Analysis user can be different to a SunSystems user). The Query & Analysis user is then mapped to user within the different products. For example - Windows user mydomain/myname is mapped to Query & Analysis user ‘guest’ then mapped to PKP in SunSystems 5 and PeterP in Micros Fidelio.

    To configure Integrated Security:

    1. In Setup, click the User Security tab.

    2. Select the user in the grid.

    3. On the Users menu, click Edit.

    4. Select Integrated Security tab.

  • EIF Services Installation Guide

    28

    There are two modes:

    Search mode which searches for names or groups specified in the Find box for the selected Domain. The results populate the User Names list.

    Browse mode which automatically populates the User Names list with all names or groups held in the selected Domain.

    5. Highlight the Domain Name & User Name to be assigned to the selected Query & Analysis User then click

    the button.

    6. Click the Save button.

  • EIF Services Installation Guide

    29

    Step 8: Serialize EIF Services

    The licensing process for EIF Services is known as Serialization.

    In order to run EIF Services, the EIF Services suite, Author Products and any Product DataLink extensions must be serialized by uploading a license file. If EIF Services or an Author Product is not serialized, EIF Services operates in demonstration mode for up to 30 days with imposed restrictions on EIF Services functionality.

    The serialization of EIF Services requires a valid copy of the Product. The serialization details of your EIF Services installation are linked to your Product license.

    All client machines must point to the same Query & Analysis centralized database and must also have the same Licensee No. for all products.

    To serialize EIF Services:

    1. Run Setup.

    2. On the Serialization menu, click Load from File.

    3. In the Open dialog box, navigate to the location of the supplied EIF Services Serialization file. The file will have been supplied simultaneously with your software and will have a .lic extension.

    Note: The EIF Services Licensee No. is, by default, incorporated as part of the licence file name (*.lic).

    4. Select the *.lic file that has been sent to you and click the Open button.

    Product name displayed in pink in the Serialization grid indicates that there were licensing details for this product included in the file; however, the DataLink for the product is not on the server.

    5. Click the Execute button.

    6. Click the assist button to browse for the Product ‘key’ file. This file is determined by the Product DataLink.

    7. Click Open then click OK.

    If details contained in the Product file match the serial number in the EIF Services serialization file, then a message will appear advising Transfer Successful.

  • EIF Services Installation Guide

    30

    Step 9: Allocating Users

    Once the EIF Services users have been created, they can be allocated to the EIF Services application within Products. The number of users that can be allocated to each of the applications is determined by the license.

    1. Run Setup.

    2. On the Users menu, click User Allocation.

    3. In User Allocation window, select EIF Services under the Product heading.

    4. Select an unallocated user.

    5. Click the right arrow button. The user is transferred to the Allocated Users list.

    Continue to allocate users to Products as required.

    6. Click OK and quit EIF Services Setup.

  • EIF Services Installation Guide

    31

    Step 10: Restart Internet Information Services

    After installing EIF Services for first time, or when changes are made to connection details or upgrading DataLinks, it is necessary to restart Internet Information Services. This stops and restarts the Agora web service.

    Note: Restarting IIS temporarily stops web services. Consider the impact to other systems that rely on IIS before proceeding.

    To restart IIS:

    1. On the Web server, right click 'My Computer'.

    2. Select Manage from the short-cut menu. Computer Management opens.

    3. Expand Services and Applications in the tree.

    4. Right-click Internet Information Services.

    5. Select Restart IIS...

    In Windows 2003 and Windows XP, the Restart IIS option appears in the All Tasks sub-menu.

    6. Click OK on the Stop/Start/Reboot dialog box.

    IIS is restarted.

  • EIF Services Installation Guide

    32

    Step 11: Testing EIF Services

    The final step is to test that data can be returned by the Agora web service. The simplest test is to extract a list of Query & Analysis users from the Query & Analysis database using the DataLink SQL Tool included with EIF Services.

    1. Start DataLink SQL Tool in the EIF Services program group.

    You are prompted for a connection URL. The URL should point to the web server running the Agora web service.

    2. Type in the server name followed by the Agora WS syntax into the EIF Services URL box, i.e., http:///Agora.WS/Serducts.asmx

    If you are running the web service and DataLink SQL Tool on the same local machine, type in the URL: http://localhost/Agora.WS/Serducts.asmx or ‘Localclient’.

    DataLink SQL Tool starts.

    http://localhost/Agora.WS/Serducts.asmx

  • EIF Services Installation Guide

    33

    3. In the DataLink pane, expand the Query & Analysis DataLink node. A list of tables is displayed.

    4. From the Security folder, drag the User Details data item from the DataLink pane into the centre DataLink SQL code pane.

  • EIF Services Installation Guide

    34

    5. The following DataLink SQL statement is automatically generated.

    SELECT TOP 100 *

    FROM [Vision.US]

    WHERE [/US/Ucd] = ''

    6. On the Tools menu, click Run SQL Statement. A list of Query & Analysis users is returned from the Query & Analysis centralized database, thus confirming the Agora web service is operating. The test is complete.

    Sample Applications

    Included with EIF Services installation is a collection of sample applications designed to show how to develop an application using the API for query building, lookups and reading schema. These samples need to connect via a URL to a web server with the SunSystems 5 DataLink installed.

    The sample applications are located in the folder:

    C:\Program Files\Infor\EIF Services\Sample\VB

  • EIF Services Installation Guide

    35

    Step 12: Configure SunSystems Global Security

    Note: This step is only applicable to installations running Global Security used by SunSystems Products.

    EIF Services supports SunSystems Global Security used in SunSystems solutions. This enables a SunSystems user to automatically logon to EIF Services applications without having to provide separate Query & Analysis logon details. EIF Services, without the Web service component, must be installed on the Global Security server.

    EIF Services supports Global Security 1.1 or later. When EIF Services is installed on a system that includes Global Security, EIF Services defaults to the SunSystems user security method. In Client Setup, on the Other tab, the Global Security option is ticked. If SunSystems Security is not detected, the option is disabled.

    Typically SunSystems users are initially created by the SunSystems User Manager. Query & Analysis users are created in Query & Analysis Setup. Query & Analysis users are inturn allocated to Query & Analysis applications in order to be granted access. In SunSystems User Manager, SunSystems users are mapped to Query & Analysis users. Hence, a valid SunSystems user authorizes the Query & Analysis user to automatically logon to the Query & Analysis application.

    Previously in this Installation Guide Global Security detection was disabled in Client Setup. However, to logon to any Query & Analysis application, including Query & Analysis Setup, when prompted use Global Security administrator logon details. By default, the logon is ‘suadmin’.

    To map a SunSystems user to a Query & Analysis user:

    1. On the server, start User Manager from Global Security Server.

    2. Click the Groups tab. Confirm the Query & Analysis Users group is listed.

    3. Click the Users tab.

  • EIF Services Installation Guide

    36

    4. On the Edit menu, click Add User… .Alternatively, edit an existing SU user’s details.

    5. Type in the SU User Name.

    6. Click the Group Membership Change,,, button.

    7. Select the Query & Analysis Users option and click OK.

    8. In the left pane, click Query & Analysis. The Map to User list appears.

    9. Select the Query & Analysis user from the list. In this example, SU user ‘Tim (Query & Analysis)’ is mapped to the Query & Analysis user ‘Tim’ returned from the Query & Analysis Centralized database.

  • EIF Services Installation Guide

    37

    10. Click OK.

    11. Complete Standard Authentication and Windows Authentication settings.

    12. Repeat the above steps for new SU users and mappings to Query & Analysis users.

    13. Click OK.

    14. Retest EIF Services using Global Security logon details to logon to the DataLink SQL Tool.

  • EIF Services Installation Guide

    38

    Windows Authentication in SQL Server

    When EIF Services is connected to a SQL Server, either user access details provided in Client Setup or Windows network login ID can be used to access the Query & Analysis centralized database. In the latter case, the following configuration settings should be made in SQL Server. For full details please refer to your SQL Server documentation.

    1. Start SQL Server Enterprise Manager.

    2. Expand a Server Group, then the Server.

    3. Expand Security.

    4. Right-click Logins, and then click New Login. The SQL Server Login Properties dialog box is displayed.

    5. In the Name box, type the SQL server name followed by a backslash and the Web Service user. The default settings are as follows:

    For Windows 2000 / XP : \ASPNET

    For Windows 2003 Server : NT Authority\Network Service 6. Select Windows Authentication and select the SQL Server in the Domain list.

    7. Click Grant Access.

    8. Select the default Database to which the Windows login is connected to after being authenticated.

    9. If required, choose the default language to be used for the login in SQL Server.

    10. Click the Database Access tab.

    11. In the database list, select the Query & Analysis centralized database.

    12. Select the Database Roles permitted to the Windows login. EIF Services requires the following permissions;

    public

    db_ddladmin

    db_datareader

    db_datawriter 13. Click OK to close the SQL Server Login Properties dialog box.

    Troubleshooting

  • EIF Services Installation Guide

    39

    Remote Microsoft SQL Server and Windows Authentication

    Additional configuration steps are required when a remote Microsoft SQL Server installed on Windows 2003 (or XP) uses Windows Authentication. If EIF Services fails to connect the following error message is displayed:

    Complete the procedure below:

    1. Locate the machine.config file in

    C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\CONFIG\

    2. Replace the line:

    with

    3. Save and close the file.

    4. Add the PC name of the EIF Services server to the list of users authorized by SQL Server.

    For example, if the EIF Services server is called ‘EIFServer’, the domain is CORP, then add the name “CORP\EIFServer$”

    No additional configuration steps are required for Windows 2003 or Windows XP with remote Microsoft SQL server using SQL server authentication or with remote Oracle Server

  • EIF Services Installation Guide

    40

    Co-existence of .NET 1.1 and 2.0 on IIS and Application Pooling

    EIF Services Web Service may occasionally produce a memory error due to the co-existence of .NET 1.1 and 2.0 on IIS and application pooling. This can be solved by changing the Web Service Application Protection setting to High (Isolated) on the Virtual tab.

    To modify EIF Services Web Service Properties:

    1. Start Windows Computer Management utility.

    Computer Management is an Administrative Tool in Control Panel.

    2. In Computer Management (local), select Services and Applications.

    3. Expand Internet Information Services, Web Sites and Default Web Site.

    4. Right-click Agora.WS and select Properties.

  • EIF Services Installation Guide

    41

    5. Select High (Isolated) in the Application Protection list.

    Internet Information Services

    Installing IIS

    A typical Windows installation may not install Internet Information Services required by Query & Analysis browser products that operate over the web. A Windows installation CD is required.

    To install IIS on the HTTP server:

    1. Insert the Windows installation CD into the CD drive.

    2. Start Windows Control Panel.

    3. Open Add or Remove Programs.

    4. Start Add / Remove Windows Components.

    5. Select Internet Information Services from the Components list.

    6. Complete the installation steps and reboot the server.

    Restarting IIS

    If you experience problems accessing the Web server, restart Internet Information Services (IIS).

    Note: Restarting IIS temporarily stops web services. Consider the impact to other systems that rely on IIS before proceeding.

  • EIF Services Installation Guide

    42

    To restart IIS:

    7. On the Web server, right click 'My Computer'.

    8. Select Manage from the short-cut menu. Computer Management opens.

    9. Expand Services and Applications in the tree.

    10. Right-click Internet Information Services.

    11. Select Restart IIS...

    In Windows 2003 and Windows XP, the Restart IIS option appears in the All Tasks sub-menu.

    12. Click OK on the Stop/Start/Reboot dialog box.

    IIS is restarted.

    In eAlert (Browser), test the connection to the server.

    Oracle - ORA-12640: Authentication adapter initialization failed

    Oracle 10g users might encounter the following error message:

    Webserver (IIS 5) connection fails with : ORA-12640 Authentication adapter initialization failed

    The Oracle Authentication adapter initialization fails to connect to the Oracle Database, thus the service can not start. This has been identified as issue caused by Oracle installation security configuration. By default the web

  • EIF Services Installation Guide

    43

    services, such as Agora.WS, are installed with an identity of NETWORK SERVICE. Depending on the access method these services may fail to access the database.

    This can be resolved by completing the following steps:

    1. Add the domain account to the ORA_DBA group on the Oracle database server.

    2. Change the Web service IIS Application pool Identity from NETWORK SERVICE to the account created in the previous step.

    3. Add the same account to the IIS_WPG on the IIS server.

    WelcomeBefore You BeginCitrix Environment

    Installation StepsMicrosoft SQL DatabaseOracle DatabaseMicrosoft Access DatabaseEIF Services Software ( Query & Analysis DatabaseEIF Services Software ( Product DatabaseCreating EIF Services Users - User WizardCreating Query & Analysis Users – Manual MethodImplementing Integrated Security – Manual MethodSample Applications

    TroubleshootingInstalling IISRestarting IIS