872
SAP BusinessObjects Enterprise Administrator's Guide SAP BusinessObjects Enterprise XI 4.0 2010-09-13

Xi4 Bip Admin En

Embed Size (px)

Citation preview

  • SAP BusinessObjects Enterprise Administrator's Guide SAP BusinessObjects Enterprise XI 4.0

    2010-09-13

  • 2010 SAP AG. All rights reserved.SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAPBusiness ByDesign, and other SAP products and services mentioned herein as well as their respective

    Copyright

    logos are trademarks or registered trademarks of SAP AG in Germany and other countries. BusinessObjects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, WebIntelligence, Xcelsius, and other Business Objects products and services mentioned herein as wellas their respective logos are trademarks or registered trademarks of Business Objects S.A. in theUnited States and in other countries. Business Objects is an SAP company.All other product andservice names mentioned are the trademarks of their respective companies. Data contained in thisdocument serves informational purposes only. National product specifications may vary.These materialsare subject to change without notice. These materials are provided by SAP AG and its affiliatedcompanies ("SAP Group") for informational purposes only, without representation or warranty of anykind, and SAP Group shall not be liable for errors or omissions with respect to the materials. Theonly warranties for SAP Group products and services are those that are set forth in the expresswarranty statements accompanying such products and services, if any. Nothing herein should beconstrued as constituting an additional warranty.

    2010-09-13

  • Contents

    Getting Started......................................................................................................................17Chapter 1

    Before you start.....................................................................................................................171.1

    Key concepts.........................................................................................................................171.1.1

    Key administrative tools.........................................................................................................191.1.2

    Key tasks...............................................................................................................................211.1.3

    About this help.......................................................................................................................231.2

    Who should use this help?.....................................................................................................231.2.1

    About SAP BusinessObjects Enterprise.................................................................................241.2.2

    Variables................................................................................................................................241.2.3

    Architecture...........................................................................................................................25Chapter 2

    Architecture overview............................................................................................................252.1

    System overview....................................................................................................................262.1.1

    Databases..............................................................................................................................272.1.2

    Servers..................................................................................................................................282.1.3

    Web application servers.........................................................................................................292.1.4

    Software Development Kits...................................................................................................302.1.5

    Data sources.........................................................................................................................332.1.6

    Language support..................................................................................................................342.1.7

    Authentication and single sign-on...........................................................................................352.1.8

    SAP integration......................................................................................................................372.1.9

    Lifecycle management (LCM).................................................................................................382.1.10

    Integrated version control.......................................................................................................382.1.11

    Permanent data......................................................................................................................392.1.12

    Upgrade path.........................................................................................................................392.1.13

    Conceptual tiers.....................................................................................................................392.2

    Services and servers..............................................................................................................412.3

    Services.................................................................................................................................422.3.1

    Service categories.................................................................................................................492.3.2

    Server types..........................................................................................................................522.3.3

    Server types..........................................................................................................................552.3.4

    Client applications..................................................................................................................582.4

    2010-09-133

  • Installed with SAP BusinessObjects Enterprise Client Tools...................................................592.4.1

    Installed with SAP BusinessObjects Enterprise......................................................................632.4.2

    Available separately...............................................................................................................642.4.3

    Web application clients..........................................................................................................652.4.4

    Information Workflows ..........................................................................................................682.5

    Authentication........................................................................................................................682.5.1

    Scheduling.............................................................................................................................702.5.2

    Viewing..................................................................................................................................752.5.3

    On Demand...........................................................................................................................772.5.4

    Managing Licenses...............................................................................................................81Chapter 3

    Managing License keys..........................................................................................................813.1

    To view license information....................................................................................................813.1.1

    To add a license key...............................................................................................................813.1.2

    To view current account activity.............................................................................................823.1.3

    Measuring licenses................................................................................................................823.2

    To run a license audit.............................................................................................................833.2.1

    Managing Users and Groups................................................................................................85Chapter 4

    Account management overview..............................................................................................854.1

    User management..................................................................................................................854.1.1

    Group management...............................................................................................................874.1.2

    Available authentication types ...............................................................................................884.1.3

    Managing Enterprise and general accounts............................................................................904.2

    To create a user account........................................................................................................904.2.1

    To modify a user account.......................................................................................................914.2.2

    To delete a user account........................................................................................................924.2.3

    To create a new group...........................................................................................................924.2.4

    To modify a group's properties...............................................................................................934.2.5

    To view group members.........................................................................................................934.2.6

    To add subgroups..................................................................................................................934.2.7

    To specify group membership................................................................................................944.2.8

    To delete a group...................................................................................................................944.2.9

    To enable the Guest account.................................................................................................954.2.10

    Adding users to groups..........................................................................................................954.2.11

    Changing password settings..................................................................................................974.2.12

    Granting access to users and groups.....................................................................................984.2.13

    Controlling access to user inboxes.........................................................................................994.2.14

    Configuring BI launch pad options..........................................................................................994.2.15

    Managing aliases.................................................................................................................1034.3

    2010-09-134

    Contents

  • To create a user and add a third-party alias..........................................................................1034.3.1

    To create a new alias for an existing user.............................................................................1044.3.2

    To assign an alias from another user....................................................................................1044.3.3

    To delete an alias.................................................................................................................1054.3.4

    To disable an alias................................................................................................................1054.3.5

    Setting Rights......................................................................................................................107Chapter 5

    How rights work in SAP BusinessObjects Enterprise...........................................................1075.1

    Access levels.......................................................................................................................1075.1.1

    Advanced rights settings......................................................................................................1085.1.2

    Inheritance...........................................................................................................................1095.1.3

    Type-specific rights..............................................................................................................1145.1.4

    Determining effective rights.................................................................................................1155.1.5

    Managing security settings for objects in the CMC..............................................................1165.2

    To view rights for a principal on an object.............................................................................1175.2.1

    To assign principals to an access control list for an object....................................................1175.2.2

    To modify security for a principal on an object......................................................................1185.2.3

    To set rights on a top-level folder in SAP BusinessObjects Enterprise.................................1185.2.4

    Checking security settings for a principal.............................................................................1195.2.5

    Working with access levels..................................................................................................1215.3

    Choosing between View and View On Demand access levels.............................................1235.3.1

    To copy an existing access level..........................................................................................1245.3.2

    To create a new access level...............................................................................................1255.3.3

    To rename an access level...................................................................................................1255.3.4

    To delete an access level.....................................................................................................1255.3.5

    To modify rights in an access level.......................................................................................1265.3.6

    Tracing the relationship between access levels and objects.................................................1275.3.7

    Managing access levels across sites....................................................................................1275.3.8

    Breaking inheritance.............................................................................................................1285.4

    To disable inheritance...........................................................................................................1295.4.1

    Using rights to delegate administration.................................................................................1305.5

    Choosing between Modify the rights users have to objects options.....................................1315.5.1

    Owner rights........................................................................................................................1335.5.2

    Summary of recommendations for rights administration.......................................................1335.6

    Securing SAP BusinessObjects Enterprise.........................................................................135Chapter 6

    Security overview ................................................................................................................1356.1

    Disaster recovery planning...................................................................................................1356.2

    General recommendations for securing your deployment.....................................................1366.3

    Configuring security for bundled third-party servers.............................................................1376.4

    2010-09-135

    Contents

  • Active trust relationship........................................................................................................1376.5

    Logon tokens.......................................................................................................................1376.5.1

    Ticket mechanism for distributed security.............................................................................1386.5.2

    Sessions and session tracking.............................................................................................1386.6

    CMS session tracking..........................................................................................................1396.6.1

    Environment protection........................................................................................................1396.7

    Web browser to web server.................................................................................................1406.7.1

    Web server to SAP BusinessObjects Enterprise..................................................................1406.7.2

    Auditing web activity............................................................................................................1406.8

    Protection against malicious logon attempts.........................................................................1416.8.1

    Password restrictions...........................................................................................................1416.8.2

    Logon restrictions................................................................................................................1416.8.3

    User restrictions..................................................................................................................1426.8.4

    Guest account restrictions...................................................................................................1426.8.5

    Processing extensions.........................................................................................................1426.9

    Overview of SAP BusinessObjects Enterprise data security.................................................1436.10

    Data processing security modes..........................................................................................1436.10.1

    Cryptography in SAP BusinessObjects Enterprise...............................................................1456.11

    Working with cluster keys....................................................................................................1466.11.1

    Cryptographic Officers.........................................................................................................1496.11.2

    Managing cryptographic keys in the CMC............................................................................1506.11.3

    Configuring servers for SSL.................................................................................................1546.12

    Creating key and certificate files..........................................................................................1556.12.1

    Configuring the SSL protocol...............................................................................................1576.12.2

    Understanding communication between SAP BusinessObjects Enterprise components.......1606.13

    Overview of SAP BusinessObjects Enterprise servers and communication ports.................1606.13.1

    Communication between SAP BusinessObjects Enterprise components ............................1626.13.2

    Configuring BusinessObjects Enterprise for firewalls...........................................................1696.14

    To configure the system for firewalls....................................................................................1706.14.1

    Debugging a firewalled deployment......................................................................................1736.14.2

    Examples of typical firewall scenarios...................................................................................1746.15

    Example - Application tier deployed on a separate network..................................................1746.15.1

    Example - Thick client and database tier separated from BusinessObjects Enterprise servers bya firewall...............................................................................................................................177

    6.15.2

    Firewall settings for integrated ERP environments................................................................1796.16

    Specific firewall guidelines for SAP integration.....................................................................1806.16.1

    Firewall configuration for JD Edwards EnterpriseOne integration..........................................1816.16.2

    Specific firewall guidelines for Oracle EBS...........................................................................1836.16.3

    Firewall configuration for PeopleSoft Enterprise integration .................................................1846.16.4

    Firewall configuration for Siebel integration..........................................................................1866.16.5

    SAP BusinessObjects Enterprise and reverse proxy servers ...............................................1886.17

    2010-09-136

    Contents

  • Supported reverse proxy servers ........................................................................................1886.17.1

    Understanding how web applications are deployed .............................................................1886.17.2

    Configuring reverse proxy servers for SAP BusinessObjects Enterprise web applications.....1896.18

    Detailed instructions for configuring reverse proxy servers..................................................1896.18.1

    To configure the reverse proxy server..................................................................................1906.18.2

    To configure Apache 2.2 reverse proxy server for SAP BusinessObjects Enterprise ...........1906.18.3

    To configure WebSEAL 6.0 reverse proxy server for BusinessObjects Enterprise ..............1906.18.4

    To configure Microsoft ISA 2006 for SAP BusinessObjects Enterprise ...............................1916.18.5

    Special configuration for SAP BusinessObjects Enterprise in reverse proxy deployments.....1936.19

    Enabling reverse proxy for Developer Suite Web Services...................................................1936.19.1

    Enabling the root path for session cookies for ISA 2006......................................................1946.19.2

    Enabling reverse proxy for SAP BusinessObjects Live Office...............................................1966.19.3

    Authentication.....................................................................................................................197Chapter 7

    Enterprise authentication......................................................................................................1977.1

    Enterprise authentication overview.......................................................................................1977.1.1

    Enterprise authentication settings.........................................................................................1977.1.2

    To change Enterprise settings..............................................................................................1997.1.3

    Enabling Trusted Authentication...........................................................................................2007.1.4

    Configuring Trusted Authentication for the web application..................................................2027.1.5

    LDAP authentication............................................................................................................2117.2

    Using LDAP authentication..................................................................................................2117.2.1

    Configuring LDAP authentication..........................................................................................2137.2.2

    Mapping LDAP groups.........................................................................................................2237.2.3

    Windows AD authentication.................................................................................................2287.3

    Using Windows AD authentication.......................................................................................2287.3.1

    Using Windows AD users and groups..................................................................................2297.3.2

    Using Kerberos authentication for Windows AD...................................................................2357.3.3

    Single sign-on with Windows AD..........................................................................................2477.3.4

    SAP authentication...............................................................................................................2607.4

    Configuring SAP authentication ...........................................................................................2617.4.1

    Creating a user account for SAP BusinessObjects Enterprise..............................................2617.4.2

    Connecting to SAP entitlement systems..............................................................................2637.4.3

    Setting SAP Authentication options.....................................................................................2657.4.4

    Importing SAP roles.............................................................................................................2707.4.5

    Configuring Secure Network Connection (SNC)..................................................................2737.4.6

    Configuring SSO for SAP Crystal Reports and SAP Netweaver...........................................2857.4.7

    Setting up single sign-on to the SAP system........................................................................2877.4.8

    PeopleSoft authentication....................................................................................................2917.5

    Overview..............................................................................................................................2917.5.1

    Enabling PeopleSoft Enterprise authentication......................................................................2917.5.2

    2010-09-137

    Contents

  • Mapping PeopleSoft roles to SAP BusinessObjects Enterprise............................................2927.5.3

    Scheduling user updates......................................................................................................2957.5.4

    Using the PeopleSoft Security Bridge..................................................................................2977.5.5

    JD Edwards authentication...................................................................................................3087.6

    Overview..............................................................................................................................3087.6.1

    Enabling JD Edwards EnterpriseOne authentication..............................................................3087.6.2

    Mapping JD Edwards EnterpriseOne roles to BusinessObjects Enterprise...........................3097.6.3

    Scheduling user updates......................................................................................................3127.6.4

    Siebel authentication............................................................................................................3147.7

    Enabling Siebel authentication..............................................................................................3147.7.1

    Mapping roles to SAP BusinessObjects Enterprise..............................................................3157.7.2

    Scheduling user updates......................................................................................................3187.7.3

    Oracle EBS authentication...................................................................................................3207.8

    Enabling Oracle EBS authentication......................................................................................3207.8.1

    Mapping Oracle E-Business Suite roles to SAP BusinessObjects Enterprise.......................3217.8.2

    Unmapping roles .................................................................................................................3267.8.3

    Customizing rights for mapped Oracle EBS groups and users .............................................3277.8.4

    Configuring Single Sign-on (SSO) for SAP Crystal Reports and PeopleSoft Enterprise........3287.8.5

    Automated user updates......................................................................................................3297.9

    Scheduling user updates......................................................................................................3297.9.1

    Authentication options in SAP BusinessObjects Enterprise .................................................3317.10

    Primary authentication..........................................................................................................3327.10.1

    Security plug-ins..................................................................................................................3337.10.2

    Single sign-on to SAP BusinessObjects Enterprise..............................................................3347.10.3

    Server Administration..........................................................................................................337Chapter 8

    Server Administration...........................................................................................................3378.1

    Working with the Servers management area in the CMC.....................................................3378.1.1

    Managing servers by using scripts on Windows ..................................................................3418.1.2

    Managing servers on UNIX .................................................................................................3418.1.3

    Managing License keys........................................................................................................3418.1.4

    Measuring licenses..............................................................................................................3438.1.5

    Viewing and changing a server's status................................................................................3448.1.6

    Adding, cloning, or deleting servers......................................................................................3498.1.7

    Clustering Central Management Servers..............................................................................3528.1.8

    Managing server groups.......................................................................................................3568.1.9

    Assessing your system's performance.................................................................................3608.1.10

    Configuring server settings..................................................................................................3638.1.11

    Configuring server network settings.....................................................................................3668.1.12

    Managing Nodes..................................................................................................................3748.1.13

    Renaming a computer in an SAP BusinessObjects Enterprise deployment...........................3948.1.14

    2010-09-138

    Contents

  • Using 32-bit and 64-bit third-party libraries with SAP BusinessObjects Enterprise................3958.1.15

    Managing server and node placeholders..............................................................................3958.1.16

    Managing Central Management Server (CMS) databases.................................................397Chapter 9

    Managing CMS system database connections.....................................................................3979.1

    Selecting a new or existing CMS database..........................................................................3979.2

    To select a new or existing CMS database on Windows......................................................3989.2.1

    To select a new or existing CMS database on UNIX............................................................3989.2.2

    Recreating the CMS system database.................................................................................3999.3

    To recreate the CMS system database on Windows............................................................3999.3.1

    To recreate the CMS system database on UNIX..................................................................4009.3.2

    Copying data from one CMS system database to another...................................................4019.4

    Preparing to copy a CMS system database.........................................................................4019.4.1

    To copy a CMS system database on Windows....................................................................4029.4.2

    To copy data from a CMS system database on UNIX..........................................................4029.4.3

    Managing Web Application Container Servers (WACS).....................................................405Chapter 10

    WACS.................................................................................................................................40510.1

    Web Application Container Server (WACS).........................................................................40510.1.1

    Adding or removing additional WACS to your deployment...................................................40810.1.2

    Adding or removing services to WACS................................................................................41210.1.3

    Configuring HTTPS/SSL......................................................................................................41310.1.4

    Supported authentication methods.......................................................................................41710.1.5

    Configuring AD Kerberos for WACS ...................................................................................41810.1.6

    Configuring AD Kerberos single sign-on ..............................................................................42410.1.7

    WACS and your IT environment...........................................................................................42610.1.8

    Troubleshooting...................................................................................................................42810.1.9

    WACS properties.................................................................................................................43210.1.10

    Backing Up and Restoring..................................................................................................435Chapter 11

    Backing up and restoring your system..................................................................................43511.1

    Backing up your entire system.............................................................................................43611.1.1

    Backing up server settings...................................................................................................43611.1.2

    Backing up Business Intelligence content.............................................................................43911.1.3

    Restoring your system.........................................................................................................43911.1.4

    Restoring lost or corrupt SAP BusinessObjects Enterprise files where a backup is available.44411.1.5

    Recreating a SAP BusinessObjects Enterprise system when files are lost...........................44411.1.6

    BackupCluster and RestoreCluster parameters...................................................................44411.1.7

    2010-09-139

    Contents

  • Life Cycle Management......................................................................................................449Chapter 12

    Lifecycle management console............................................................................................44912.1

    Version Management System settings for Lifecycle management console...........................44912.2

    BIAR Engine Command-Line Tool.........................................................................................45012.3

    Using a properties file .........................................................................................................45212.3.1

    To use the BIAR Engine Command-Line Tool.......................................................................45612.3.2

    Managing Applications.......................................................................................................459Chapter 13

    Managing applications through the CMC..............................................................................45913.1

    Overview..............................................................................................................................45913.1.1

    Common settings for applications........................................................................................46013.1.2

    Application-specific settings.................................................................................................46113.1.3

    Managing applications through BOE.war properties.............................................................47713.2

    The BOE.war file..................................................................................................................47713.2.1

    Configuring BEx Web Integration .........................................................................................48513.3

    Starting a Server for BEx Web Applications ........................................................................48713.3.1

    Starting a Standalone Server for BEx Web Applications ......................................................48713.3.2

    Configuring Server Settings.................................................................................................48813.3.3

    Checking Connection to BW System ..................................................................................48813.3.4

    Configuring a Connection Between BEx Web Application Designer and BusinessObjectsEnterprise............................................................................................................................489

    13.3.5

    Customizing BI launch pad and OpenDocument logon entry points......................................49013.4

    BI launch pad and OpenDocument file locations...................................................................49013.4.1

    To define a custom logon page............................................................................................49113.4.2

    To add trusted authentication at logon..................................................................................49213.4.3

    Managing Connections and Universes...............................................................................495Chapter 14

    Managing connections.........................................................................................................49514.1

    To delete a universe connection...........................................................................................49514.1.1

    Managing universes.............................................................................................................49614.2

    To delete universes..............................................................................................................49614.2.1

    Monitoring...........................................................................................................................497Chapter 15

    About Monitoring.................................................................................................................49715.1

    Monitoring terms..................................................................................................................49715.2

    Architecture.........................................................................................................................49815.2.1

    Cluster support for monitoring server...................................................................................50115.3

    Metrics................................................................................................................................50215.4

    Configuration properties.......................................................................................................51015.5

    2010-09-1310

    Contents

  • JMX end point URL..............................................................................................................51315.5.1

    Integrating with other applications........................................................................................51415.6

    Integrating the monitoring application with IBM Tivoli............................................................51515.6.1

    Integrating the monitoring application with SAP Solution Manager ......................................51815.6.2

    Creating Universe for Derby Database.................................................................................51815.7

    Troubleshooting...................................................................................................................51915.8

    Dashboard...........................................................................................................................51915.8.1

    Alerts...................................................................................................................................52015.8.2

    Watchlist..............................................................................................................................52015.8.3

    Probes.................................................................................................................................52115.8.4

    Metrics................................................................................................................................52115.8.5

    Graph...................................................................................................................................52215.8.6

    Auditing...............................................................................................................................523Chapter 16

    Overview..............................................................................................................................52316.1

    CMC Auditing page.............................................................................................................52916.2

    Auditing Status....................................................................................................................52916.2.1

    Configuring Auditing events.................................................................................................53116.2.2

    Auditing Data Store configuration settings...........................................................................53316.2.3

    Audit events.........................................................................................................................53416.3

    Audit events and details.......................................................................................................54116.3.1

    Platform Search...................................................................................................................557Chapter 17

    Overview..............................................................................................................................55717.1

    Architecture.........................................................................................................................55717.2

    Clustered Support................................................................................................................55917.3

    SDK and Open Search.........................................................................................................55917.4

    Platform Search SDK...........................................................................................................56017.4.1

    Open Search........................................................................................................................56017.4.2

    Configuring Application Properties.......................................................................................56217.5

    Searchable Content Types...................................................................................................56617.6

    Suggested Queries..............................................................................................................56817.7

    Facets..................................................................................................................................56917.8

    Multilingual Support.............................................................................................................56917.9

    Suggestions.........................................................................................................................57017.10

    Federating Search Results from SAP BusinessObjects Explorer..........................................57017.11

    Search-time Integration with SAP NetWeaver Enterprise Search.........................................57017.12

    Creating a Connector in SAP NetWeaver Enterprise Search ...............................................57117.12.1

    Importing a User's Role in SAP BusinessObjects Enterprise Authentication.........................57217.12.2

    Searching from NetWeaver Enterprise Search.....................................................................57217.12.3

    2010-09-1311

    Contents

  • Auditing................................................................................................................................57317.13

    Indexing Failure Listing.........................................................................................................57417.14

    Troubleshooting...................................................................................................................57417.15

    Federation...........................................................................................................................577Chapter 18

    Federation............................................................................................................................57718.1

    Federation terms..................................................................................................................57818.2

    BI application .......................................................................................................................57818.2.1

    Destination site ...................................................................................................................57918.2.2

    Local....................................................................................................................................57918.2.3

    Locally run completed instances ..........................................................................................57918.2.4

    Multiple origin sites .............................................................................................................57918.2.5

    One-way replication .............................................................................................................57918.2.6

    Origin site ...........................................................................................................................58018.2.7

    Remote................................................................................................................................58018.2.8

    Remote connection..............................................................................................................58018.2.9

    Remote scheduling..............................................................................................................58018.2.10

    Replication...........................................................................................................................58018.2.11

    Replication job.....................................................................................................................58018.2.12

    Replication list......................................................................................................................58118.2.13

    Replication object.................................................................................................................58118.2.14

    Replication package.............................................................................................................58118.2.15

    Replication refresh...............................................................................................................58118.2.16

    Two-way replication..............................................................................................................58118.2.17

    Managing security rights......................................................................................................58218.3

    Rights required on the origin site..........................................................................................58218.3.1

    Rights required on the destination site.................................................................................58318.3.2

    Federation-specific rights.....................................................................................................58418.3.3

    Replicating security on an object..........................................................................................58618.3.4

    Replicating security using access levels...............................................................................58618.3.5

    Replication types and mode options.....................................................................................58718.4

    One-way replication .............................................................................................................58718.4.1

    Two-way replication .............................................................................................................58718.4.2

    Refresh from origin or refresh from destination....................................................................58818.4.3

    Replicating third-party users and groups...............................................................................58918.5

    Replicating universes and universe connections...................................................................59018.6

    Managing replication lists.....................................................................................................59118.7

    Creating replication lists.......................................................................................................59218.7.1

    Modifying Replication Lists...................................................................................................59418.7.2

    Managing remote connections.............................................................................................59518.8

    Creating remote connections...............................................................................................59518.8.1

    2010-09-1312

    Contents

  • Modifying remote connections.............................................................................................59718.8.2

    Managing replication jobs.....................................................................................................59818.9

    Creating replication jobs.......................................................................................................59818.9.1

    Scheduling replication jobs...................................................................................................60118.9.2

    Modifying replication jobs.....................................................................................................60218.9.3

    Viewing a log after a replication job......................................................................................60218.9.4

    Managing object cleanup......................................................................................................60318.10

    How to use object cleanup...................................................................................................60318.10.1

    Object cleanup limits............................................................................................................60418.10.2

    Object cleanup frequency.....................................................................................................60418.10.3

    Managing conflict detection and resolution...........................................................................60518.11

    One-way replication conflict resolution.................................................................................60618.11.1

    Two-way replication conflict resolution.................................................................................60718.11.2

    Using Web Services in Federation.......................................................................................61018.12

    Session variables ................................................................................................................61018.12.1

    File caching .........................................................................................................................61118.12.2

    Custom deployment ............................................................................................................61118.12.3

    Remote scheduling and locally run instances........................................................................61218.13

    Remote scheduling..............................................................................................................61218.13.1

    Locally run instances............................................................................................................61418.13.2

    Instance share......................................................................................................................61418.13.3

    Importing and promoting replicated content..........................................................................61518.14

    Importing replicated content.................................................................................................61518.14.1

    Importing replicated content and continuing replication ........................................................61618.14.2

    Promoting content from a test environment..........................................................................61618.14.3

    Re-pointing a destination site...............................................................................................61718.14.4

    Best practices......................................................................................................................61718.15

    Current release limitations....................................................................................................62018.15.1

    Troubleshooting error messages..........................................................................................62118.15.2

    Supplementary Configurations for ERP Environments........................................................625Chapter 19

    Configurations for SAP NetWeaver integration....................................................................62519.1

    Integrating with SAP Netweaver Business Warehouse (BW)...............................................62519.1.1

    Configuring for JD Edwards integration................................................................................67319.2

    Configuring Single Sign-on (SSO) for SAP Crystal Reports.................................................67319.2.1

    Configuring Secure Socket Layer for JD Edwards Integrations............................................67419.2.2

    Configuring for PeopleSoft Enterprise integration.................................................................67519.3

    Configuring Single Sign-on (SSO) for SAP Crystal Reports and PeopleSoft Enterprise........67519.3.1

    Configuring Secure Socket Layer communication................................................................67619.3.2

    Performance Tunning for PeopleSoft systems......................................................................67819.3.3

    Configuring for Siebel integration.........................................................................................68019.4

    2010-09-1313

    Contents

  • Configuring Siebel to integrate with SAP BusinessObjects Enterprise XI..............................68019.4.1

    Creating the Crystal Reports menu item..............................................................................68119.4.2

    Contextual awareness..........................................................................................................68219.4.3

    Configuring Single Sign-on (SSO) for SAP Crystal Reports and Siebel................................68519.4.4

    Configuring for Secure Socket Layer Communication..........................................................68519.4.5

    Managing and Configuring Logs.........................................................................................687Chapter 20

    Logging traces from components.........................................................................................68720.1

    Trace log levels....................................................................................................................68720.2

    Configuring tracing for servers.............................................................................................68820.3

    To set the server trace log level in the CMC........................................................................68920.3.1

    To set the trace log level for multiple servers managed in the CMC.....................................68920.3.2

    To configure server tracing through the BO_trace.ini file......................................................69020.3.3

    Configuring tracing for web applications...............................................................................69320.4

    To set the web application trace log level in the CMC..........................................................69320.4.1

    To manually modify tracing settings through the BO_trace.ini file.........................................69420.4.2

    Configuring tracing for Upgrade management tool...............................................................69920.5

    To configure tracing for Upgrade management tool..............................................................69920.5.1

    Integration to SAP Solution Manager..................................................................................701Chapter 21

    Managing system landscape directory registration...............................................................70121.1

    Registration of SAP BusinessObjects Enterprise in the System Landscape.........................70121.1.1

    When is SLD registration triggered?....................................................................................70221.1.2

    Logging SLD connectivity ...................................................................................................70321.1.3

    Managing Solution Management Diagnostics agents...........................................................70321.2

    Solution Manager Diagnostics (SMD) overview...................................................................70321.2.1

    Working with SMD agents...................................................................................................70421.2.2

    SMAdmin user account........................................................................................................70421.2.3

    Managing performance instrumentation................................................................................70521.3

    Performance instrumentation for SAP BusinessObjects Enterprise......................................70521.3.1

    Setting up performance instrumentation for SAP BusinessObjects Enterprise servers.........70521.3.2

    Performance instrumentation for the web tier.......................................................................70721.3.3

    Instrumentation log files ......................................................................................................70721.3.4

    Integration overview.............................................................................................................70721.4

    SAP Solution Manager integration checklist.........................................................................70821.5

    Tracing with SAP Passport...................................................................................................70921.6

    Command Line Administration............................................................................................711Chapter 22

    UNIX scripts.........................................................................................................................71122.1

    Script utilities.......................................................................................................................71122.1.1

    2010-09-1314

    Contents

  • Script templates...................................................................................................................71722.1.2

    Scripts used by SAP BusinessObjects Enterprise................................................................71722.1.3

    Windows scripts..................................................................................................................71922.2

    ccm.exe...............................................................................................................................71922.2.1

    Server Command Lines........................................................................................................72222.3

    Command lines overview.....................................................................................................72222.3.1

    Standard options for all servers............................................................................................72322.3.2

    Central Management Server................................................................................................72422.3.3

    Crystal Reports Processing Server and Crystal Reports Cache Server................................72622.3.4

    Dashboard Design Processing Server and Dashboard Design Cache Server.......................72722.3.5

    Job Servers.........................................................................................................................72822.3.6

    Adaptive Processing Server.................................................................................................72922.3.7

    Report Application Server....................................................................................................73022.3.8

    Web Intelligence Processing Server.....................................................................................73122.3.9

    Input and Output File Repository Servers.............................................................................73322.3.10

    Event Server........................................................................................................................73522.3.11

    Dashboard and Dashboard Analytics Servers .....................................................................73622.3.12

    Rights Appendix..................................................................................................................737Chapter 23

    Rights for specific object types............................................................................................73723.1

    Folder rights.........................................................................................................................73723.1.1

    Categories...........................................................................................................................73723.1.2

    Notes...................................................................................................................................73823.1.3

    Crystal reports.....................................................................................................................73823.1.4

    Interactive Analysis documents............................................................................................73923.1.5

    Users and groups.................................................................................................................74023.1.6

    Access levels.......................................................................................................................74123.1.7

    BI Workspaces.....................................................................................................................74223.1.8

    Universe (.unv) rights...........................................................................................................74323.1.9

    Universe (.unx) rights...........................................................................................................74423.1.10

    Universe object-access levels..............................................................................................74623.1.11

    Connection rights.................................................................................................................74723.1.12

    Applications.........................................................................................................................74823.1.13

    About the rights appendix.....................................................................................................76023.2

    General rights......................................................................................................................76023.3

    Server Properties Appendix.................................................................................................765Chapter 24

    About the server properties appendix...................................................................................76524.1

    Common Server Properties..................................................................................................76524.1.1

    Core Services Properties.....................................................................................................76824.1.2

    2010-09-1315

    Contents

  • Connectivity Services Properties.........................................................................................77824.1.3

    Crystal Reports Services Properties....................................................................................78224.1.4

    Advanced Analysis Services Properties...............................................................................79024.1.5

    Data Federation Services Properties....................................................................................79224.1.6

    Interactive Analysis Services Properties...............................................................................79224.1.7

    Dashboard Design Services Properties................................................................................80224.1.8

    Server Metrics Appendix.....................................................................................................807Chapter 25

    About the Server Metrics Appendix.....................................................................................80725.1

    Common Server Metrics .....................................................................................................80725.1.1

    Central Management Server Metrics...................................................................................81025.1.2

    Connection Server Metrics..................................................................................................81425.1.3

    Event Server Metrics...........................................................................................................81525.1.4

    File Repository Server Metrics.............................................................................................81625.1.5

    Adaptive Processing Server Metrics....................................................................................81625.1.6

    Web Application Container Server Metrics..........................................................................82125.1.7

    Adaptive Job Server Metrics................................................................................................82225.1.8

    Crystal Report Server Metrics.............................................................................................82425.1.9

    Interactive Analysis Server Metrics......................................................................................82725.1.10

    Dashboard Design Server Metrics.......................................................................................82925.1.11

    Server and Node Placeholder Appendix..............................................................................833Chapter 26

    Server and node placeholders..............................................................................................83326.1

    Auditing Data Store Schema Appendix...............................................................................843Chapter 27

    Overview..............................................................................................................................84327.1

    Schema diagram..................................................................................................................84327.2

    Auditing Data Store Tables..................................................................................................84427.3

    More Information.................................................................................................................855Appendix A

    Index 857

    2010-09-1316

    Contents

  • Getting Started

    1.1 Before you start

    1.1.1 Key concepts

    1.1.1.1 Services and servers

    The following diagram shows a hypothetical installation of SAP BusinessObjects Enterprise.

    Note:The nodes, servers, and services shown are for illustrative purposes only. The number of hosts, nodes,servers and servicesas well as the type of servers, and serviceswill vary in real-world installations.

    2010-09-1317

    Getting Started

  • Two hosts form the cluster named ProductionBISystem, with two hosts: The host named HostAlpha has SAP BusinessObjects Enterprise installed and is configured to have

    two nodes:

    NodeMercury: contains an Adaptive Job Server (NodeMercury.AJS) with services to scheduleand publish reports, an Input File Repository Server (NodeMercury.IFRS) with a service to storeinput reports, and an Output File Repository Server (NodeMercury.OFRS) with a service to storereport output.

    NodeVenus: contains an Adaptive Processing Server (NodeVenus.APS) with services to providepublishing, monitoring, and translation features, an Adaptive Processing Server (NodeVenus.APS2)with a service to provide client auditing, and a Central Management Server (NodeVenus.CMS)with a service to provide the CMS services.

    The host named HostBeta has SAP BusinessObjects Enterprise installed and is configured to havethree nodes:

    NodeMars: contains a Central Management Server (NodeMars.CMS) with a service to providethe CMS services.

    NodeJupiter: contains a Interactive Analysis Processing Server (NodeJupiter.InteractiveAnalysis)with a service to provide Interactive Analysis reporting, and an Event Server(NodeJupiter.EventServer) to provide report monitoring of files.

    2010-09-1318

    Getting Started

  • NodeSaturn: contains an Adaptive Processing Server (NodeSaturn.APS) with a service to provideclient auditing.

    SAP BusinessObjects Enterprise uses the terms server and service to refer to the two types of softwarerunning on an SAP BusinessObjects Enterprise machine.

    A service is a server subsystem that performs a specific function. The service runs within the memoryspace of its server under the process id of the parent container (server). For example, the SAPBusinessObjects Interactive Analysis Scheduling and Publishing Service is a subsystem that runs withinthe Adaptive Job Server.

    The term server is used to describe an operating system level process (on some systems, this is referredto as a daemon) hosting one or more services. For example, the Central Management Server (CMS)and Adaptive Processing Server are servers. A server runs under a specific operating system accountand has its own PID.

    A node is a collection of SAP BusinessObjects Enterprise servers running on the same host. One ormore nodes can be on a single host.

    SAP BusinessObjects Enterprise can be installed on a single machine, spread across different machineson an intranet, or separated over a wide area network (WAN).

    1.1.1.2 Server Intelligence

    Server Intelligence is a component of the Central Management Console (CMC) to manage a collectionor server processes, collectively known as a node. Changes to server processes applied in the CMCare propagated to affected servers by the Server Intelligence Agent (SIA). The SIA is also used for theautomatic restart or shutdown of a server if it encounters an unexpected condition, and is used by theCentral Management Server (CMC) to manage nodes.

    The Server Intelligence Agent (SIA) server archives server information in the CMS system databaseso you can easily restore default server settings, or create redundant instances of server processeswith the same settings.

    1.1.2 Key administrative tools

    1.1.2.1 Central Management Console (CMC)

    2010-09-1319

    Getting Started

  • The Central Management Console (CMC) is a web-based tool to perform administrative tasks, includinguser, content, and server management. It also allows you to publish, organize, and configure securitysettings. Because the CMC is a web-based application, you can perform all of these administrativetasks through a web browser on any machine that can connect to the server.

    All users can log on to the CMC to change their user preference settings. Only members of theAdministrators group can change management settings, unless explicitly granted the rights to do so.Roles can also be assigned to the CMC to grant some users privileges to perform minor administrativetasks

    1.1.2.2 Central Configuration Manager (CCM)

    The Central Configuration Manager (CCM) is a server troubleshooting and node configuration toolprovided in two forms. In a Microsoft Windows environment, the CCM allows you to manage local andremote servers through its graphical user interface (GUI) or from a command line. In a Unix environment,the CCM shell script (ccm.sh) allows you to manage servers from the command-line.

    The CCM allows you to create and configure Server Intelligence Agent (SIA) nodes and start or stopyour web application server. On Windows, it also allows you to configure network parameters, such asSecure Socket Layer (SSL) encryption. These parameters apply to all servers within a node.

    Note:Most server management tasks are now handled through the CMC, not through the CCM. The CCMis now used for troubleshooting and node configuration.

    1.1.2.3 Repository Diagnostic Tool

    The Repository Diagnostic Tool (RDT) can scan, diagnose, and repair inconsistencies that may occurbetween the Central Management Server (CMS) system database and the File Repository Servers(FRS) filestore. You can set a limit for the number of errors the RDT will find and repair before stopping.

    RDT should be used after you restore your SAP BusinessObjects Enterprise system.

    1.1.2.4 Upgrade management tool

    Upgrade management tool (formerly Import Wizard) is installed as a part of SAP BusinessObjectsEnterprise, and guides administrators through the process of importing users, groups, and folders from

    2010-09-1320

    Getting Started

  • previous versions of SAP BusinessObjects Enterprise. It also allows you to import and upgrade objects,events, server groups, repository objects, and calendars.

    For information on upgrading from a previous version of SAP BusinessObjects Enterprise, see the SAPBusinessObjects Enterprise Upgrade Guide.

    1.1.3 Key tasks

    Depending on your situation, you may want to focus on specific sections of this help, and there maybe other resources available for you. For each of the following situations, there is a list of suggestedtasks and reading topics.

    Related Topics Planning or performing your first deployment Configuring your deployment Improving your system's performance Central Management Console (CMC)

    1.1.3.1 Planning or performing your first deployment

    If you are planning or performing your first deployment of SAP BusinessObjects Enterprise, it isrecommended that you perform the following tasks and read the corresponding sections:

    To get familiar with the SAP BusinessObjects Enterprise components, read Architectural overview.

    To assess your needs and design a deployment architecture that works best for you, read the SAPBusinessObjects Enterprise Deployment Planning Guide.

    Understanding communication between SAP BusinessObjects Enterprise components.

    Security overview.

    If you plan to use third-party authentication, read Authentication.

    For more information about installing BusinessObjects Enterprise, see the SAP BusinessObjectsEnterprise Installation Guide.

    After you install, read Server management overview.

    Related Topics Architecture overview Understanding communication between SAP BusinessObjects Enterprise components

    2010-09-1321

    Getting Started

  • Security overview Authentication options in SAP BusinessObjects Enterprise Server Administration

    1.1.3.2 Configuring your deployment

    If you have just completed your installation of SAP BusinessObjects Enterprise and need to performinitial configuration tasks, such as firewall configuration and user management, it is recommended thatyou read the following sections.

    Related Topics Server Administration Communication between SAP BusinessObjects Enterprise components Security overview About Monitoring

    1.1.3.3 Improving your system's performance

    If you want to assess your deployment's efficiency and fine-tune it in order to maximize resources, it isrecommended that you read the following sections:

    If you want to monitor your existing system, read Monitoring.

    For daily maintenance tasks and procedures for working with servers in the CMC, see ServerMaintenance.

    Related Topics About Monitoring Server Administration

    1.1.3.4 Working with objects in the CMC

    If you are working with objects in the CMC, read the following sections:

    2010-09-1322

    Getting Started

  • For information about setting up users and groups in the CMC, see Account Management Overview.

    To set security on objects, see How rights work in SAP BusinessObjects Enterprise.

    For general information about working with objects, see SAP BusinessObjects Enterprise User'sGuide.

    Related Topics Account management overview How rights work in SAP BusinessObjects Enterprise

    1.2 About this help

    This help provides you with information and procedures for deploying and configuring yourBusinessObjects Enterprise system. Procedures are provided for common tasks. Conceptual informationand technical details are provided for all advanced topics.

    For daily maintenance tasks and procedures for working with the CMC, see the BusinessObjectsEnterprise Administrator's Guide.

    For information about installing BusinessObjects Enterprise, see the BusinessObjects EnterpriseInstallation Guide.

    1.2.1 Who should use this help?

    This help covers deployment and configuration tasks. We recommend consulting this guide if you are:

    planning your first deployment

    configuring your first deployment

    making significant changes to the architecture of an existing deployment

    improving your system's performance.

    This help is intended for system administrators who are responsible for configuring, managing, andmaintaining a BusinessObjects Enterprise installation. Familiarity with your operating system and yournetwork environment is beneficial, as is a general understanding of web application server managementand scripting technologies. However, to assist all levels of administrative experience, this help aims toprovide sufficient background and conceptual information to clarify all administrative tasks and features.

    2010-09-1323

    Getting Started

  • 1.2.2 About SAP BusinessObjects Enterprise

    SAP BusinessObjects Enterprise is a flexible, scalable, and reliable solution for delivering powerful,interactive reports to end users via any web applicationintranet, extranet, Internet or corporate portal.Whether it is used for distributing weekly sales reports, providing customers with personalized serviceofferings, or integrating critical information into corporate portals, SAP BusinessObjects Enterprisedelivers tangible benefits that extend across and beyond the organization. As an integrated suite forreporting, analysis, and information delivery, SAP BusinessObjects Enterprise provides a solution forincreasing end-user productivity and reducing administrative efforts.

    1.2.3 Variables

    The following variables are used throughout this guide.

    DescriptionVariable

    The directory where SAP BusinessObjects Enterprise is installed.

    On a Windows machine, the default directory is C:\Program Files (x86)\SAPBusinessObjects\.

    The name of your UNIX operating system. Acceptable values are: aix_rs6000_64 linux_x64 solaris_sparcv9 hpux_ia64

    The directory where scripts for administering SAP BusinessObjects Enterpriseare located.

    On a Windows machine, the directory is \win64_x64\scripts.

    On Unix machines, the directory is //scripts.

    2010-09-1324

    Getting Started

  • Architecture

    2.1 Architecture overview

    This section outlines the overall platform architecture, system, and service components that make upthe SAP BusinessObjects Enterprise Business Intelligence (BI) platform. The information will helpadministrators understand the system essentials and help to form a plan for the system deployment,management, and maintenance.

    SAP BusinessObjects Enterprise is designed for high performance across a broad spectrum of userand deployment scenarios. For example, specialized platform services handle either on-demand dataaccess and report generation, or report scheduling based on times and events. You can offload processorintensive scheduling and processing by creating dedicated servers to host specific services. Thearchitecture is designed to meet the needs of virtually any BI deployment, and is flexible enough togrow from several users with a single tool, to tens of thousands of users with multiple tools and interfaces.

    Developers can integrate SAP BusinessObjects Enterprise BI into your organization's other technologysystems by using web services, Java, or .NET application programming interfaces (APIs).

    End users can access, create, edit, and interact with reports using specialized tools and applicationsthat include: Clients installed by SAP BusinessObjects Enterprise Client Tools installation program:

    Interactive Analysis (formerly Web Intelligence) Business View Manager Report Conversion Tool Universe design tool Web Service query tool (formerly Query as a Web Service) Information design tool (formerly Information Designer) Translation Management Tool (formerly Translation Manager) Widgets for SAP BusinessObjects Enterprise (formerly BI Widgets)

    Clients available separately: SAP Crystal Reports SAP BusinessObjects Dashboard Design (formerly Xcelsius) SAP BusinessObjects Enterprise Advanced Analysis (formerly Voyager) BI Workspaces (formerly Dashboard Builder)

    IT departments can use data and system management tools that include: Report Viewers

    2010-09-1325

    Architecture

  • Central Management Console (CMC) Central Configuration Manager (CCM) Repository Diagnostic Tool (RDT) Data Federation Administration Tool Upgrade management tool (formerly Import Wizard) Universe design tool (formerly Universe Designer) SAP BusinessObjects Mobile

    To provide flexibility, reliability, and scalability, SAP BusinessObjects Enterprise components can beinstalled on one or across many machines. You can even install two different versions of SAPBusinessObjects Enterprise simultaneously on the same computer, although this configuration is onlyrecommended as part of the upgrade process or testing purposes.

    Server processes can be vertically scaled (where one computer runs several, or all, server-sideprocesses) to reduce cost, or horizontally scaled (where server processes are distributed betweentwo or more networked machines) to improve performance. It is also possible to run multiple, redundant,versions of the same server process on more than one machine, so that processing can continue if theprimary process encounters a problem.

    Note:While it is possible to use a mixture of Windows and Unix or Linux platforms, it is recommended thatyou do not mix operating systems for Central Management Server (CMS) processes.

    2.1.1 System overview

    SAP BusinessObjects Enterprise is a Business Intelligence (BI) platform that provides enterprise levelanalysis and reporting tools. Data can be analyzed from any of a large number of supported databasesystems (including text or multi-dimensional OLAP systems) and BI reports can be published in manydifferent formats to many different publishing systems.

    The following diagram illustrates how SAP BusinessObjects Enterprise fits in with your organization'sinfrastructure.

    2010-09-1326

    Architecture

  • SAP BusinessObjects Enterprise reports from a read-only connection to your organization's databases,and uses its own databases for storing its configuration, auditing, and other operational information.The BI reports created by the system can be sent to a variety of destinations, including file systems,and email, or accessed through web sites or portals.

    SAP BusinessObjects Enterprise is a self-contained system that can exist on a single machine (forexample, as a small development or pre-production test environment) or can be scaled up into a clusterof many machines that run different components (for example, as a large-scale production environment).

    2.1.2 Databases

    SAP BusinessObjects Enterprise uses several different databases. Reporting database

    This refers to your organization's information. It is the source information analyzed and reported onby SAP BusinessObjects Enterprise. Most commonly, the information is stored within a rela