Installation Config
Installation Config
Configuration Guide
Version: 10.5
10.5, October 2016
Copyright © 2016 by MicroStrategy Incorporated. All rights reserved.
If you have not executed a written or electronic agreement with MicroStrategy or any authorized MicroStrategy distributor (any such agreement, a
"Separate Agreement"), the following terms apply:
This software and documentation are the proprietary and confidential information of MicroStrategy Incorporated and may not be provided to any other person. Copyright ©
2001-2016 by MicroStrategy Incorporated. All rights reserved.
THIS SOFTWARE AND DOCUMENTATION ARE PROVIDED “AS IS” AND WITHOUT EXPRESS OR LIMITED WARRANTY OF ANY KIND BY EITHER MICROSTRATEGY
INCORPORATED OR ANYONE WHO HAS BEEN INVOLVED IN THE CREATION, PRODUCTION, OR DISTRIBUTION OF THE SOFTWARE OR DOCUMENTATION,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, GOOD TITLE AND
NONINFRINGMENT, QUALITY OR ACCURACY. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE SOFTWARE AND DOCUMENTATION IS WITH
YOU. SHOULD THE SOFTWARE OR DOCUMENTATION PROVE DEFECTIVE, YOU (AND NOT MICROSTRATEGY, INC. OR ANYONE ELSE WHO HAS BEEN INVOLVED
WITH THE CREATION, PRODUCTION, OR DISTRIBUTION OF THE SOFTWARE OR DOCUMENTATION) ASSUME THE ENTIRE COST OF ALL NECESSARY SERVICING,
REPAIR, OR CORRECTION. SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU.
In no event will MicroStrategy, Incorporated. or any other person involved with the creation, production, or distribution of the Software be liable to you on account of any claim
for damage, including any lost profits, lost savings, or other special, incidental, consequential, or exemplary damages, including but not limited to any damages assessed against
or paid by you to any third party, arising from the use, inability to use, quality, or performance of such Software and Documentation, even if MicroStrategy, Inc. or any such
other person or entity has been advised of the possibility of such damages, or for the claim by any other party. In addition, MicroStrategy, Inc. or any other person involved in
the creation, production, or distribution of the Software shall not be liable for any claim by you or any other party for damages arising from the use, inability to use, quality, or
performance of such Software and Documentation, based upon principles of contract warranty, negligence, strict liability for the negligence of indemnity or contribution, the
failure of any remedy to achieve its essential purpose, or otherwise. The entire liability of MicroStrategy, Inc. and your exclusive remedy, shall not exceed, at the option of
MicroStrategy, Inc., either a full refund of the price paid, or replacement of the Software. No oral or written information given out expands the liability of MicroStrategy, Inc.
beyond that specified in the above limitation of liability. Some states do not allow the limitation or exclusion of liability for incidental or consequential damages, so the above
limitation may not apply to you.
The information contained in this manual (the Documentation) and the Software are copyrighted and all rights are reserved by MicroStrategy, Inc. MicroStrategy, Inc. reserves
the right to make periodic modifications to the Software or the Documentation without obligation to notify any person or entity of such revision. Copying, duplicating, selling, or
otherwise distributing any part of the Software or Documentation without prior written consent of an authorized representative of MicroStrategy, Inc. are prohibited. U.S.
Government Restricted Rights. It is acknowledged that the Software and Documentation were developed at private expense, that no part is public domain, and that the
Software and Documentation are Commercial Computer Software provided with RESTRICTED RIGHTS under Federal Acquisition Regulations and agency supplements to
them. Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer
Software clause at DFAR 252.227-7013 et. seq. or subparagraphs (c)(1) and (2) of the Commercial Computer Software-Restricted Rights at FAR 52.227-19, as applicable.
Contractor is MicroStrategy, Incorporated., 1850 Towers Crescent Plaza, Tysons Corner, VA 22182. Rights are reserved under copyright laws of the United States with respect to
unpublished portions of the Software.
The following terms and notices apply regardless of whether you have executed a Separate Agreement:
Trademark Information
The following are either trademarks or registered trademarks of MicroStrategy Incorporated or its affiliates in the United States and certain other countries:
MicroStrategy, MicroStrategy 10, MicroStrategy 10 Secure Enterprise, MicroStrategy 9, MicroStrategy 9s, MicroStrategy Analytics, MicroStrategy Analytics Platform, MicroStrategy
Desktop, MicroStrategy Operations Manager, MicroStrategy Analytics Enterprise, MicroStrategy Evaluation Edition, MicroStrategy Secure Enterprise, MicroStrategy Web,
MicroStrategy Mobile, MicroStrategy Server, MicroStrategy Parallel Relational In-Memory Engine (MicroStrategy PRIME), MicroStrategy MultiSource, MicroStrategy OLAP
Services, MicroStrategy Intelligence Server, MicroStrategy Intelligence Server Universal, MicroStrategy Distribution Services, MicroStrategy Report Services, MicroStrategy
Transaction Services, MicroStrategy Visual Insight, MicroStrategy Web Reporter, MicroStrategy Web Analyst, MicroStrategy Office, MicroStrategy Data Mining Services,
MicroStrategy Narrowcast Server, MicroStrategy Health Center, MicroStrategy Analyst, MicroStrategy Developer, MicroStrategy Web Professional, MicroStrategy Architect,
MicroStrategy SDK, MicroStrategy Command Manager, MicroStrategy Enterprise Manager, MicroStrategy Object Manager, MicroStrategy Integrity Manager, MicroStrategy
System Manager, MicroStrategy Analytics App, MicroStrategy Mobile App, MicroStrategy Tech Support App, MicroStrategy Mobile App Platform, MicroStrategy Cloud,
MicroStrategy R Integration, Usher, MicroStrategy Usher, Usher Badge, Usher Security, Usher Security Server, Usher Mobile, Usher Analytics, Usher Network Manager, Usher
Professional, MicroStrategy Services, MicroStrategy Professional Services, MicroStrategy Consulting, MicroStrategy Customer Services, MicroStrategy Education, MicroStrategy
University, MicroStrategy Managed Services, BI QuickStrike, Mobile QuickStrike, Transaction Services QuickStrike Perennial Education Pass, MicroStrategy Web Based Training
(WBT), MicroStrategy World, Best in Business Intelligence, Pixel Perfect, Global Delivery Center, Direct Connect, Enterprise Grade Security For Every Business, Build Your Own
Business Apps, Code-Free, Welcome to Ideal, The World’s Most Comprehensive Analytics Platform, The World’s Most Comprehensive Analytics Platform. Period.
Other product and company names mentioned herein may be the trademarks of their respective owners.
Specifications subject to change without notice. MicroStrategy is not responsible for errors or omissions. MicroStrategy makes no warranties or commitments concerning the
availability of future products or versions that may be planned or under development.
Patent Information
This product is patented. One or more of the following patents may apply to the product sold herein: U.S. Patent Nos. 6,154,766, 6,173,310, 6,260,050, 6,263,051, 6,269,393,
6,279,033, 6,567,796, 6,587,547, 6,606,596, 6,658,093, 6,658,432, 6,662,195, 6,671,715, 6,691,100, 6,694,316, 6,697,808, 6,704,723, 6,741,980, 6,765,997, 6,768,788,
6,772,137, 6,788,768, 6,798,867, 6,801,910, 6,820,073, 6,829,334, 6,836,537, 6,850,603, 6,859,798, 6,873,693, 6,885,734, 6,940,953, 6,964,012, 6,977,992, 6,996,568,
6,996,569, 7,003,512, 7,010,518, 7,016,480, 7,020,251, 7,039,165, 7,082,422, 7,113,474, 7,113,993, 7,127,403, 7,174,349, 7,181,417, 7,194,457, 7,197,461, 7,228,303, 7,260,577,
7,266,181, 7,272,212, 7,302,639, 7,324,942, 7,330,847, 7,340,040, 7,356,758, 7,356,840, 7,415,438, 7,428,302, 7,430,562, 7,440,898, 7,486,780, 7,509,671, 7,516,181, 7,559,048,
7,574,376, 7,617,201, 7,725,811, 7,801,967, 7,836,178, 7,861,161, 7,861,253, 7,881,443, 7,925,616, 7,945,584, 7,970,782, 8,005,870, 8,035,382, 8,051,168, 8,051,369, 8,094,788,
8,130,918, 8,296,287, 8,321,411, 8,452,755, 8,521,733, 8,522,192, 8,577,902, 8,606,813, 8,607,138, 8,645,313, 8,761,659, 8,775,807, 8,782,083, 8,812,490, 8,832,588, 8,943,044,
8,943,187. 8,958,537, 8,966,597, 8,983,440, 8,984,274, 8,984,288, 8,995,628, 9,027,099, 9,027,105, 9,037, 577, 9,038,152, 9,076,006, 9,086,837, 9,116,954, 9,124,630,
9,154,303, 9,154,486, 9,160,727, 9,166,986, 9,171,073, 9,172,699, 9,173,101, 9,183, 317, 9,195,814, 9,208,213, 9,208,444, 9,262,481, 9,264,415, 9,264,480, 9,269,358, 9,275,127,
9,292,571, 9,300,646, 9,311,683 9,313,206, 9,330,174, 9,338,157, 9,361,392, 9,378,386, 9,386,416, 9,391,782, 9,397,838, 9,397,980, 9,405,804, 9,413,710, and 9,413,794. Other
patent applications are pending.
Third Party Software
Various MicroStrategy products contain the copyrighted technology or software of third parties ("Third Party Software"). Your use of MicroStrategy products is subject to all
applicable terms and conditions associated with any such Third Party Software.
CONTENTS
Book Overview and Additional Resources 1
About this book 1
1. Planning Your Installation 1
Upgrade considerations 1
MicroStrategy products and components 1
Installation prerequisites 18
Installation considerations 35
Certificates used during Usher Installation and Configuration 35
Methods of installation 44
Licensing information 47
Installation and configuration checklists 48
2. Installing MicroStrategy on Windows 51
Installation procedure 52
Configuring your MicroStrategy installation 76
3. Installing MicroStrategy on UNIX and Linux 77
Installation procedures on UNIX and Linux 77
Usher Security Installation and Configuration 100
Configuring your MicroStrategy installation 117
4. Activating Your Installation 118
Request an Activation Code 118
Activate your installation 120
Configuring your MicroStrategy installation 121
Server Activation FAQ 121
For details on how to progress through the remaining chapters of this guide, see
the section Installation and configuration checklists, page 48 of Chapter 1,
Planning Your Installation.
The appendixes contain the following additional reference information, which you may
require depending on your specific needs:
• Connecting to Databases and Data Sources provides details and steps to configure
ODBC and DSNs for your data warehouse connections.
• Troubleshooting provides various troubleshooting steps and techniques to take in
certain installation and configuration scenarios.
The sample documents and images in this guide, as well as some example steps,
were created with dates that may no longer be available in the MicroStrategy
Tutorial project. If you are re-creating an example, replace the year(s) shown in
this guide with the most recent year(s) available in the software.
MicroStrategy 10.5
• On Linux environments, MicroStrategy now includes Messaging Services. This offers
a fast and scalable message broker for distributed deployments. For new installations,
the Messaging Services is enabled out-of-the-box by default. For upgrades to the 10.5
Feature Release, Messaging Services needs to be configured in conjunction with the
existing Intelligence Server(s). For more information, see MicroStrategy Messaging
Services.
• MicroStrategy has added support for various drivers. For more information, see the
MicroStrategy 10.5 Readme.
MicroStrategy 10.4
• When installing a new instance of the MicroStrategy Platform using the Express
installation option, you can perform the install by a silent installation, enabling the
installation inside custom applications or other installations.
MicroStrategy 10.3
• You can install the entire MicroStrategy Enterprise Platform on one Windows server
using Express Installation, significantly reducing the time for end-to-end installation
and configuration. For steps, see Performing a MicroStrategy Express installation.
• Installation prerequisites and other important information has been updated to
reflect MicroStrategy 10.3. For complete information, see the MicroStrategy 10.3
Readme.
MicroStrategy 10.2
• MicroStrategy 10.2 offers a streamlined Linux installation process for Usher Security
and Usher Analytics. The pre-installation and post-installation steps have been
updated to reflect important changes to the installation process. For detailed Usher
Security installation steps, see Usher Security Installation and Configuration.
MicroStrategy 10
• MicroStrategy Operations Manager is a web-based administrative tool that allows you
to view and monitor all of your MicroStrategy environments in one place. For steps
on deploying Operations Manager, see Chapter 6, Deploying MicroStrategy Web,
Mobile Server, and Operations Manager.
• You can use MicroStrategy Web to import data from various data sources. Some data
sources require you to configure a secure connection between your third-party data
source and MicroStrategy Web, as described in Configuring third-party data sources
for importing data, page 251.
• To define a new database connection directly from Web for users to import data
from a data source into MicroStrategy, see Creating database connections in Web,
page 414.
MicroStrategy 9.5.1
• You can install MicroStrategy Usher on a Linux machine. For steps to install Usher
and the Analytics Platform, see Installing MicroStrategy on UNIX and Linux.
the Usher app and mobile badge on their smartphone, instead of entering a
password, displaying a physical ID card, or using a physical key.
MicroStrategy 9.5 supports Usher as a primary authentication method for logging
into a project through MicroStrategy Mobile and MicroStrategy Web. Using QR code
generation in MicroStrategy, users can scan the code with Usher on their
smartphones and gain access to the MicroStrategy project.
Usher is also supported for two-factor authentication in Web.
MicroStrategy 9.5 also provides support for biometric security, location-based access
restrictions, and time-based access restrictions.
To configure your MicroStrategy 9.5 installation, see the help page for
MicroStrategy 9.5.
MicroStrategy 9.4
• Installation prerequisites and other important information has been updated to
reflect MicroStrategy 9.4. This information is provided in Chapter 1, Planning Your
Installation.
• Information on configuring the MicroStrategy ODBC Driver for Impala Wire
Protocol is provided in MicroStrategy ODBC Driver for Impala Wire Protocol for
Windows and UNIX/Linux, page 386.
Prerequisites
Before working with this document, you should be familiar with:
• The nature and structure of the data to use for your business intelligence application
• Your system’s configuration, including details such as hardware configuration,
installed applications, available memory, and so on
• If installing on UNIX or Linux, the basics of the UNIX or Linux operating system
Resources
Documentation
MicroStrategy provides both manuals and online help; these two information sources
provide different types of information, as described below:
• Manuals: In general, MicroStrategy manuals provide:
▫ Introductory information and concepts
▫ Examples and images
▫ Checklists and high-level procedures to get started
The steps to access the manuals are described in Accessing manuals and other
documentation sources, page 10.
Most of these manuals are also available printed in a bound, soft cover format. To
purchase printed manuals, contact your MicroStrategy Account Executive with a
purchase order number.
• Help: In general, MicroStrategy help provides:
▫ Detailed steps to perform procedures
▫ Descriptions of each option on every software screen
Translations
Due to translation time, manuals in languages other than English may contain
information that is one or more releases behind. You can see the version number on the
title page of each manual.
Finding information
You can search all MicroStrategy books and Help for a word or phrase, with a simple
Google™ search at http://www.google.com. For example, type “MicroStrategy derived
metric” or “MicroStrategy logical table” into a Google search. As described above, books
typically describe general concepts and examples; Help typically provides detailed steps
and screen options. To limit your search to MicroStrategy books, on Google’s main page
you can click More, then select Books.
Additional formats
MicroStrategy manuals are available as electronic publications, downloadable on the
Apple iBookstore or Google Play, and can be read on your iOS or Android device
respectively. To download a book, search for the book’s title in the iBookstore or Google
Play respectively. To view a list of manuals that are currently available, scan the following
QR codes using your device’s camera:
For iOS devices, scan the following QR code:
For new MicroStrategy releases, it may take several days for the latest manuals to
be available on the iBookstore or Google Play.
Help
Each MicroStrategy product includes an integrated help system to complement the
various interfaces of the product as well as the tasks that can be accomplished using the
product.
Some of the MicroStrategy help systems require a web browser to be viewed. For
supported web browsers, see the MicroStrategy Readme.
MicroStrategy provides several ways to access help:
• Help button: Use the Help button or ? (question mark) icon on most software
windows to see help for that window.
• Help menu: From the Help menu or link at the top of any screen, select
MicroStrategy Help to see the table of contents, the Search field, and the index for
the help system.
• F1 key: Press F1 to see context-sensitive help that describes each option in the
software window you are currently viewing.
Adobe Acrobat Reader is required to view these manuals. If you do not have
Acrobat Reader installed on your computer, you can download it from
http://get.adobe.com/reader/.
The best place for all users to begin is with the MicroStrategy Basic Reporting Guide.
To access the installed manuals and other documentation sources, see the following
procedures:
• To access documentation resources from any location, page 10
• To access documentation resources on Windows, page 10
• To access documentation resources on UNIX and Linux , page 11
1 Visit https://microstrategyhelp.atlassian.net/.
1 From the Windows Start menu, choose Programs (or All Programs),
MicroStrategy Documentation, then Product Manuals. A page opens in your
browser showing a list of available manuals in PDF format and other documentation
sources.
2 Click the link for the desired manual or other documentation source.
3 If you click the link for the Narrowcast Services SDK Guide, a File Download dialog
box opens. This documentation resource must be downloaded. Select Open this
file from its current location, and click OK.
If bookmarks are not visible on the left side of an Acrobat (PDF) manual, from the
View menu click Bookmarks and Page. This step varies slightly depending on
your version of Adobe Acrobat Reader.
1 Within your UNIX or Linux machine, navigate to the directory where you installed
MicroStrategy. The default location is /opt/MicroStrategy, or
$HOME/MicroStrategy/install if you do not have write access to
/opt/MicroStrategy.
2 From the MicroStrategy installation directory, open the Help folder.
3 Open the Product_Manuals.htm file in a web browser. A page opens in your
browser showing a list of available manuals in PDF format and other documentation
sources.
4 Click the link for the desired manual or other documentation source.
5 If you click the link for the Narrowcast Services SDK Guide, a File Download dialog
box opens. This documentation resource must be downloaded. Select Open this
file from its current location, and click OK.
If bookmarks are not visible on the left side of an Acrobat (PDF) manual, from the
View menu click Bookmarks and Page. This step varies slightly depending on
your version of Adobe Acrobat Reader.
Documentation standards
MicroStrategy online help and PDF manuals (available both online and in printed
format) use standards to help you identify certain types of content. The following table
lists these standards.
These standards may differ depending on the language of this manual; some
languages have rules that supersede the table below.
Type Indicates
bold • Button names, check boxes, options, lists, and menus that are the focus of actions or
part of a list of such GUI elements and their definitions
Example: Click Select Warehouse .
italic • Names of other product manuals and documentation resources
• When part of a command syntax, indicates variable information to be replaced by the
user
Example: The aggregation level is the level of calculation for the metric.
Example: Type copy c:\filename d:\foldername\filename
Courier • Calculations
font • Code samples
• Registry keys
Type Indicates
+ A keyboard command that calls for the use of more than one key (for example,
SHIFT+F1).
A note icon indicates helpful information for specific situations.
A warning icon alerts you to important information such as potential security risks;
these should be read before continuing.
Education
MicroStrategy Education Services provides a comprehensive curriculum and highly
skilled education consultants. Many customers and partners from over 800 different
organizations have benefited from MicroStrategy instruction.
Courses that can help you prepare for using this manual or that address some of the
information in this manual include:
• MicroStrategy Developer: Reporting Essentials
• MicroStrategy Web: Report Analysis
• MicroStrategy Web: Report Design
For a detailed description of education offerings and course curriculums, visit
www.microstrategy.com/Education.
The MicroStrategy products that you can install depend on your MicroStrategy
license. Contact your MicroStrategy account executive with MicroStrategy
licensing questions.
You can begin determining your installation and configuration plan by reviewing the
following topics:
Upgrade considerations
If you have earlier versions of MicroStrategy products installed and want to upgrade
them, refer to the Upgrade Guide.The upgrade procedures on Windows, UNIX, and
Linux are covered in this guide. It is recommended that you read this guide before
deciding to upgrade an existing metadata.
MicroStrategy Web
MicroStrategy Web is used by most business user roles. It offers an intuitive user
interface instantly accessible from all major web browsers with no installation required.
Business consumers can use Web to consume and interact with published scorecards,
dashboards and reports. Power users benefit from extensive capabilities to create, design
and modify analytics to be used by the business user community. Analysts will enjoy the
all-inclusive set of self-service data discovery capabilities to blend data, explore visually
and share insights.
The Web product also provides a plug-in for the Microsoft Office productivity suite that
allows any user to inject analytics into business documents created in PowerPoint, Excel
or Word, enabling these documents to contain the most up-to-date business data.
• Web Professional: This full-featured version provides all the functionality of Web
Analyst plus the ability to design scorecards, dashboards, and operational reports in
design mode or WYSIWYG view mode. Web Professional users have advanced
formatting capabilities as well as the ability to perform calculations across multiple
data sources.
MicroStrategy Portlets
Though different portal products typically require different integration approaches, you
can integrate MicroStrategy content and functionality into your portal using one of the
out-of-the-box MicroStrategy Portlets. Each out-of-the-box MicroStrategy Portlet
provides a full complement of portlet features that are not found in any single portal
server product, and combines the most useful features of the portlet mechanisms
currently available. These portlets are designed to take advantage of the storage and
repository mechanisms of its particular portal product, without requiring users to make
any adjustments or changes when implementing portlets within a portal.
MicroStrategy Portlets can embed folders, reports, documents, user History Lists, and a
search page into the portals through easy-to-configure screens. The portlets provide the
full range of OLAP manipulations such as sort, pivot, add subtotals, export, and add new
calculations, as well as design functionalities such as changing the report display between
grids and graphs, and toggling thresholds.
In portal environments, users are commonly already logged in and authenticated with
the portal. This authentication can also be used to provide access to MicroStrategy Web
within the portal without having to re-enter their login information. This process is
known as single sign-on. Out-of-the-box MicroStrategy Portlets automatically include
support for single sign-on.
For steps to install and configure out-of-the-box MicroStrategy Portlets for several major
enterprise portal servers, see the Enterprise Portal Integration Help. This resource can
be accessed from the MicroStrategy Product Manuals page, as described in Accessing
manuals and other documentation sources, page xxiii.
MicroStrategy Office
MicroStrategy Office lets every Microsoft Office user run, edit, and format any
MicroStrategy report directly from within Microsoft applications such as Excel,
PowerPoint, and Word. MicroStrategy Office is designed using Microsoft .NET
technology and accesses the MicroStrategy business intelligence platform using XML and
MicroStrategy Web Services.
MicroStrategy Office gives business users open and straightforward access to the full
functionality of the MicroStrategy platform from familiar Microsoft Office applications.
MicroStrategy Office serves as a Microsoft add-in, with MicroStrategy functionality
exposed as a single toolbar in Microsoft Office applications.
To learn how to use MicroStrategy Office, refer to the MicroStrategy Office User Guide
and MicroStrategy Office online help.
MicroStrategy Office requires that MicroStrategy Web Services is also installed. For
information on Web Services, see MicroStrategy Web Services (ASP.NET) and
Web Services (J2EE), page 5.
1 Insert the MicroStrategy installation disk into the disk drive and close the
MicroStrategy Main Menu window that opens automatically.
2 Browse to the Installations folder on the MicroStrategy installation disk.
3 Copy the Office folder and paste it to a network location of your choice.
4 Share the network location with any users who need to install MicroStrategy Office.
5 Notify MicroStrategy Office users to run either MicroStrategyOffice.msi or
MicroStrategyOffice64.msi from within the Office folder to install
MicroStrategy Office. These .msi files are for installing MicroStrategy Office on 32-
bit and 64-bit versions of Microsoft Office, respectively. These users will need
Microsoft Windows Installer 4.5 on their machine to install MicroStrategy Office.
MicroStrategy Mobile
MicroStrategy Mobile is an interactive interface of the MicroStrategy BI platform that
lets mobile business users harness the analytical power of MicroStrategy through the use
of their mobile devices. It’s the easiest, fastest, and most affordable way to mobilize
analytics, and information-rich apps to an increasingly mobile and 24 x 7 workforce.
MicroStrategy Mobile and the MicroStrategy Mobile Server provide MicroStrategy
reporting and analysis capabilities on Apple iOS and Android devices. MicroStrategy uses
the intuitive interfaces of these mobile devices to let users explore information using
touch and smart gestures. MicroStrategy Mobile Business Intelligence applications can
support workflows that lead users through data to decisions.
MicroStrategy Mobile also provides application developers a new way to develop and
deploy Mobile applications that is faster, easier, and more maintainable than using
traditional Integrated Development Environments. MicroStrategy Mobile offers the
following benefits:
• Reduces the time to develop new Mobile applications: MicroStrategy’s
Mobile application platform includes the infrastructure needed to support each new
Mobile application, so that application developers only need to focus on creating the
user experience and not on the back-end infrastructure.
• Easy for non-developers to create professional Mobile applications:
MicroStrategy’s Mobile applications do not require any coding. Using MicroStrategy's
Mobile application platform, Mobile applications are assembled in a point-and-click
fashion. Application designers can choose from an array of finely-designed displays
and controls that are optimized for mobile devices.
• Easy for companies to rapidly deploy Mobile application updates:
MicroStrategy’s Mobile application platform uses an on-demand form of application
deployment called “in-stream” deployment. As soon as new or updated applications
are ready, they are instantly available to Mobile users directly from MicroStrategy’s
Mobile application platform.
• One design for all devices: MicroStrategy Mobile’s ability to render the same
application across different mobile device operating systems means less development
time, less application management, and quicker support for a heterogeneous
deployment of mobile devices.
To learn more about MicroStrategy Mobile, see the MicroStrategy Mobile Design and
Administration Guide and the MicroStrategy Mobile Analysis Guide.
For information on how to deploy MicroStrategy Mobile Server (ASP.NET) and
MicroStrategy Mobile Server (JSP), see Chapter 6, Deploying MicroStrategy Web,
Mobile Server, and Operations Manager.
MicroStrategy Server
MicroStrategy Server benefits all user roles. The fully featured server infrastructure is the
backbone of any MicroStrategy implementation and offers all the core platform services,
which include:
• 64-bit server infrastructure to scale to big data volumes and a large number of users.
• Ability to connect to and join data from multiple data sources.
• In-memory acceleration of analytical processing for instantaneous response.
• Processing of all analytic styles from self-service data discovery to beautiful,
immersive information apps to the industry’s broadest spectrum of advanced
analytics.
• Proactive distribution of personalized reports and alerts.
• Ability to embed actionable intelligence in analytical applications.
In addition to all the features above, the Server product includes highly useful
monitoring and automation tools for organizations to effectively and efficiently manage
their deployments.
All other products in the platform work in conjunction with Intelligence Server and
benefit from its broad functionality.
The subcomponents of MicroStrategy Intelligence Server are as follows:
• MicroStrategy OLAP Services, page 7.
• MicroStrategy Report Services, page 7.
• MicroStrategy Distribution Services, page 8.
• MicroStrategy Transaction Services, page 9.
• MultiSource Option, page 9.
• Clustering Option, which allows you to cluster a group of Intelligence Server
machines (up to four Intelligence Server machines) to take advantage of the many
benefits available in a clustered environment.
For information on clustering Intelligence Servers, see the System Administration
Guide.
formatting information. It is used to format data from multiple reports in a single display
of presentation quality.
For information on Report Services, see the Document Creation Guide and the
Dashboards and Widgets Creation Guide.
MultiSource Option
With MultiSource Option, you can connect a project to multiple relational data sources.
This allows you to integrate all your information from various databases and other
relational data sources into a single MicroStrategy project for reporting and analysis
purpose. All data sources included using the MultiSource Option are integrated as part of
the same relational schema for a project.
For information on using MultiSource Option, see the Project Design Guide.
large numbers of users and user groups. Additionally, Command Manager allows you to
manage various configuration settings within the MicroStrategy platform.
For information on using Command Manager, see the System Administration Guide.
For information on using Enterprise Manager, see the Operations Manager Guide.
The SequeLink ODBC Socket Server that is provided with a MicroStrategy installation is
for exclusive use with the MicroStrategy Product Suite. You are not licensed to use this
product with any application other than MicroStrategy products. You can contact
Progress® DataDirect® to purchase the SequeLink ODBC Socket Server for use with
non-MicroStrategy products.
MicroStrategy Architect
MicroStrategy Architect is designed to meet the needs of application architects and
developers. It includes all the schema development, change management, and modeling
tools that enable architects to manage the full development life cycle of MicroStrategy
applications. The Architect product allows IT organizations to flexibly share and
distribute roles and responsibilities for development, testing, promotions, and migrations
during the application lifestyle, leading to vast improvements in organizational efficiency.
MicroStrategy Developer
MicroStrategy Developer provides analytical features designed to facilitate and perform
the deployment of reports. It governs application objects such as reports, filters, and
metrics.
Developer also enables you to create application objects. The application objects are built
on the schema objects that are created in MicroStrategy Architect. These application
objects are used to analyze and provide insight into relevant data. The following sections
provide a brief description of the subcomponents for these products.
The subcomponents of MicroStrategy Developer include:
• MicroStrategy Analyst is a simplified version of MicroStrategy Developer, providing
the basic interactive reporting functionality required by managers.
• MicroStrategy Developer is a full-featured version for power analysts and application
developers. With a full range of analytical functionality, a rich library of functions,
and intelligent workflow, Developer is well suited for power users.
• MicroStrategy Architect provides project designer functionality such as attribute,
fact, hierarchy, and project creation and modification. Architect contains the
following subcomponents:
▫ MicroStrategy Architect, page 13.
▫ MicroStrategy Function Plug-in Wizard is an add-in to the Microsoft Visual C++
compiler, which comes with a standard MicroStrategy installation. It allows you
to create a C++ project, with which you can implement your own custom
MicroStrategy function plug-in. The option to install this component is enabled
only if Microsoft Visual C++ version 2005 (8.0) or version 2010 (10.0) is present
on the system where the installation is being performed.
Customers interested in deploying analytics from the R programming language
into MicroStrategy can do so using the R Integration Pack, available separately
from the CodePlex open source community web site. For more information, go
to http://www.codeplex.com and search for the RIntegrationPack project
(current as of March 1, 2013).
For information on various options present in Developer to create and run reports, see
the Basic Reporting Guide. After you are familiar with basic Developer concepts, see the
Advanced Reporting Guide for information on advanced Developer functionality.
MicroStrategy Architect
MicroStrategy includes a project design tool known as Architect. Architect allows you to
define all the required components of your project from a centralized interface. Architect
also provides a visual representation of your project as you create it, which helps to
provide an intuitive workflow.
For information on using Architect to design a project in MicroStrategy, see the Project
Design Guide.
To learn more about MicroStrategy Integrity Manager, see the System Administration
Guide.
For information on using Object Manager, see the System Administration Guide.
MicroStrategy SDK
The MicroStrategy SDK is a collection of programming tools, utilities, documentation,
and libraries of functions or classes that are designed to allow users to customize and
extend MicroStrategy products and to integrate them within other applications. The
programming tools provided by the MicroStrategy SDK—including programming
instructions, points of access, and guidelines for developers—allow programmers to
enhance the operation of their software by customizing and embedding the robust
functionality of the MicroStrategy BI platform.
The MicroStrategy SDK and MicroStrategy Developer Library (MSDL) are not included
in the MicroStrategy installation. You can download the MicroStrategy SDK from the
MicroStrategy support site https://resource.microstrategy.com/msdz/default.asp. You
can also access the MicroStrategy Developer Library from the MicroStrategy support site.
The MicroStrategy SDK provides access to the entire MicroStrategy platform and
includes all of the services and utilities required for building a robust, feature-filled
business intelligence-enabled application. The MicroStrategy SDK is made up of the
following components:
• The MicroStrategy SDK includes the following individual SDKs, which are described
in detail in the MicroStrategy Developer Library:
▫ Web SDK
▫ Visualization SDK
▫ Mobile SDK
▫ Web Services SDK
▫ Narrowcast Server SDK
▫ Intelligence Server SDK
▫ MicroStrategy Office SDK
• Each of the individual SDKs listed above is made up of some of or all the following
components:
▫ A comprehensive set of APIs that includes:
— COM-based client-server API
— XML-based Web API with support for Java/COM
— Web Services API
— Narrowcast Server API
MicroStrategy Usher
MicroStrategy Usher is a mobile security platform designed to provide security for
business processes and applications across an enterprise. It replaces traditional forms of
enterprise security such as ID cards, passwords, and physical keys with a mobile badge
on a user’s smartphone. Users with the Usher Security mobile app and badge can
electronically validate their identity without plastic ID cards, log in to online applications
without entering a password, open locked doors without keys, and so on.
Depending on your license key, you can choose to install:
• Usher Security Server: Server system that synchronizes identities with
enterprise identity management systems of record, and presents those identities to
Usher clients for authentication.
• Usher Network Manager: Administrative console that allows you to manage your
network of users, configure access to Usher-enabled systems and resources, and
distribute digital badges and keys.
• Usher Analytics: Reporting functionality to analyze and visualize the activity of
users in your Usher network to gain insights into your enterprise security.
• Usher Professional: Mobile app and server system that allows your users to view
the activity of nearby users in their Usher network.
Each user downloads Usher Security to their mobile device. Usher Security is a mobile
app that allows users to validate their identities or to access Usher-enabled systems and
resources.
For installation instructions, refer to the Usher Security Installation and Configuration.
Installation prerequisites
Before you install MicroStrategy, you must have the following:
• MicroStrategy installation files.
• Before you begin upgrading any MicroStrategy systems, contact your MicroStrategy
account executive to obtain a new license key for the version of software you are
installing. To install MicroStrategy products, you must first obtain a license key
specific to the version of MicroStrategy software you intend to install.
• License key from MicroStrategy.
• You can access the installation files by asking your system administrator to share the
files on a network location.
• You can reduce the amount of data that has to be downloaded for an installation by
excluding some of the installation files in the Installations/DataFiles folder.
During installation, the MicroStrategy Installation Wizard then lists which of these
files are required for your MicroStrategy installation. You can use this technique to
provide only the files required to complete a MicroStrategy installation, which can
then be used to reduce the amount of data packaged and downloaded for other
MicroStrategy installations in your organization. For steps to use this technique to
create custom installation packages, see Creating custom installation packages, page
46.
• Installation location for your MicroStrategy products
To install MicroStrategy, you must have the following permissions and privileges:
Windows:
• You must log on to your machine using a domain account with Windows
administrative privileges for the domain or target machine.
• The user installing MicroStrategy needs write permissions in the installation
directory to complete the installation; otherwise the installation fails.
These are just suggestions to help you get started. Read the rest of this chapter for
more detailed guidelines.
For more details and exact information regarding supported and certified operating
system versions for a MicroStrategy release, see the MicroStrategy Readme or contact
Technical Support.
For UNIX and Linux systems, several system settings can affect the performance of
MicroStrategy Intelligence Server Universal. These settings do not need to be set before a
MicroStrategy installation. For more information on these settings and their
recommended values, see Recommended system settings for UNIX and Linux, page 43.
Product Suite.
MicroStrategy Integrity Manager x64 compatible 2 GB or higher 0.25 GB
MicroStrategy Office x86 or x64 2 GB 0.5 GB
compatible
MicroStrategy Mobile Server The MicroStrategy Mobile Server hardware requirements
are the same as those for MicroStrategy Web Server
hardware requirements.
MicroStrategy Narrowcast Server x86 or x64 4 GB 4 GB
compatible
MicroStrategy SDK The SDK is not included in the MicroStrategy installation
and can instead be downloaded from the MicroStrategy
support site.
compatible
MicroStrategy Mobile Server The MicroStrategy Mobile Server hardware requirements are the
same as those for MicroStrategy Web Server hardware
requirements.
MicroStrategy SDK The SDK is not included in the MicroStrategy installation and can
instead be downloaded from the MicroStrategy support site.
MicroStrategy Web: Web Server Oracle Solaris: 4 GB or higher • 4 GB on IBM
SPARC platforms AIX
AIX 7.5 GB
Solaris 8 GB
Linux 8 GB
If you change the location of the temporary directory, free space is still required in
the default location of the temporary directory to launch the MicroStrategy
installation routine.
Flash memory
Flash memory 32 MB 64 MB
Android devices
Devices with OS minimum 4.x and certain GPUs are certified. Refer to the third-party
documentation for your Android device vendor to determine the Graphics Processing
Unit (GPU) for your device. To see the latest list of devices, see the MicroStrategy
Readme
this section for Intelligence Server Universal and Integrity Manager requirements on
UNIX and Linux platforms.
The following MicroStrategy products require an X-windows-enabled environment on all
UNIX and Linux platforms:
• GUI-based MicroStrategy Installation Wizard
• Diagnostics and Performance Logging tool
• Service Manager
The following requirements also apply to all UNIX and Linux platforms:
• A Web browser (for example, Firefox) is required for viewing the MicroStrategy
Readmes and online help.
• Windows Services for UNIX (http://technet.microsoft.com/en-
us/interopmigration/bb380242.aspx) or Samba (http://www.samba.org) is
required for HTML document support. Samba 3.0 is required for the support of
HTML documents with alphanumeric names.
The requirements listed below describe general requirements as well as requirements
specific to the UNIX and Linux platforms:
• Configuring shared memory resources, page 31
• Oracle Solaris, page 32
• , page 32
• Red Hat and SUSE Linux, page 32
Modifying the system resource limits listed below can affect system-wide behavior
and therefore, steps to modify these values are not given. You should refer to your
UNIX and Linux documentation and contact your system administrator to modify
these settings.
Shared memory settings on UNIX and Linux operating systems that may require
modification to support Intelligence Server execution are listed in the table below:
Semaphores are used to synchronize shared memory communications. The names of the
settings that control semaphores differ between operating systems as listed in the tables
below:
Oracle Solaris
For Oracle Solaris requirements, see the System Requirements in the MicroStrategy
Readme
IBM AIX
For IBM AIX requirements, see the System Requirements in the MicroStrategy Readme
For information on this setting, including how to modify its value, refer to your third-
party Linux operating system documentation.
Supporting IIS 7.0.x or IIS 7.5.x as a web server for MicroStrategy Web
or Mobile Server
If you plan to use IIS 7.0.x or IIS 7.5.x as the web server for MicroStrategy Web or
Mobile Server, you must ensure that some IIS options are enabled. The procedure below
describes how to enable the options that are required to support IIS 7.0.x or IIS 7.5.x as a
web server for MicroStrategy Web or Mobile Server.
Installation considerations
The following section contains guidelines and considerations you must keep in mind
during MicroStrategy installation.
Usher Server /certs/f2_usherservercert.key Usher Private key for the SSL Certificate used
SSL/HTTPS Installation, by the Tomcat instance hosting the
Certificate step 12: field Usher Server
private key 2
Usher Server /certs/f3_usherserverbundle.pem Usher Certificate store that includes all the
Certificate Installation, CA certificates that the Usher Server
Trust Bundle step 12: field will trust. File of concatenated PEM-
3 encoded CA Certificates for Client
Auth.
Name Example file path When to use What the certificate is used for
Usher Server /certs/f9_ Setting up Certificate that will be used by the
Signing ushersigningcertificate.crt Network Usher Server to sign any Certificate
Certificate Manager: Signing Request (Directory Agent,
Authority providing Usher Security apps, Usher SDK-based
Certificate company applications, VPN Agents, etc.). It is
information, used by Usher internally only.
step 4
Usher Server /certs/f10_ Setting up Key for the Usher Signing Certificate
Signing ushersigningcertificate.key Network
Certificate Manager:
Authority providing
Certificate company
private key information,
step 4
Usher SAML /certs/f11_ Setting up SAML Certificate that the Usher Server
Certificate ushersamlcertificate.crt Network will use to sign SAML Requests
Manager:
providing
company
information,
step 4
Usher SAML /certs/f11_ Setting up Private key for the SAML Certificate
Certificate ushersamlcertificate.key Network that the Usher Server will use to sign
Private Key Manager: SAML Requests
providing
company
information,
step 4
Usher Agent /certs/f14_ Synchronizing Private key for the Usher Agent
Certificate usherdirectoryagentcertificate.key users from Certificate
Private Key Active
Directory,
step 8
This section describes only the most basic guidelines. For detailed information
refer to the System Administration Guide.
Number of users
The number of users can be measured in the following ways:
• Total users: Users that are registered in the system. For example, if a corporate
website is available to be viewed by 950 individuals, the site has 950 total users.
• Active users: Users that are logged into the system. If a site is available to be viewed
by 950 total users and 30 of them are logged in to the site, there are 30 active users.
• Concurrent users: Users that have jobs being processed by a server (MicroStrategy
Web, Intelligence Server, and so on) at the same time. For example, a site is available
to 950 total users, and 30 people are logged in. Of 30 active users, 10 have jobs being
processed by the server simultaneously; hence there are 10 concurrent users.
Of these measures, the number of concurrent users is important to consider. Your
system must support the maximum number of concurrent users you expect at any given
time.
Report complexity
The more complex a report, the more Intelligence Server resources are required. In this
context, a “complex” report is one that requires a lot of analytical processing. While
reports with long, complicated SQL are certainly complex in nature, they do not
necessarily require additional Intelligence Server resources to execute. It is the analytical
processing in a report that creates additional stress on an Intelligence Server.
Since analytically complex reports create a heavier load on the Intelligence Server than
simpler reports, you should have a general idea of what the average report complexity is
for your system. Knowing this can help you decide on a caching strategy. For example,
you may decide to pre-cache complex reports and determine the processing power your
Intelligence Server needs.
The database server processes the SQL that Intelligence Server generates, so
reports with extremely complex SQL can place additional stress on the database
server. You should take this into account when sizing your database server
machine.
Therefore, the more complex the ad hoc reporting is in your system, the greater the
overall load on the Intelligence Server. Be sure to take this into account when sizing your
Intelligence Server machine.
The process for element browsing is similar to ad hoc reporting. Element browsing
takes place when you navigate through hierarchies of attribute elements, for
example, viewing the list of months in the year attribute. By default, caching is
enabled for element browsing. In addition, you can limit the number of elements
to be retrieved at a time.
OLAP Services
OLAP Services store reports as Intelligent Cubes in the physical memory of the
Intelligence Server. When these Intelligent Cubes are cached in memory, report
manipulations, such as adding derived metrics and derived elements, formatting, and
drilling within the Intelligent Cube, take considerably less time. This is the case because
the new SQL is not run against the database.
OLAP Services provide enhanced report manipulation functionality at the cost of
Intelligence Server resources, as the cubes are stored in the memory of the Intelligence
Server. Consider the following factors to determine the size of the Intelligent Cubes:
• Intelligence Server resources
• Expected response time
• User concurrency
You must monitor Intelligence Server CPU utilization and memory usage closely as
OLAP Services might have an impact on the performance of the platform, particularly
the memory and report response time. For information on OLAP Services, see the In-
memory Analytics Guide. Additional performance tuning best practices for OLAP
Services are provided in the System Administration Guide.
Additional considerations
Numerous factors can affect system performance, most of them related to system
specifics, which makes them difficult to predict. Listed below are items you might want
to consider when determining the requirements for your system:
• Developer versus MicroStrategy Web usage—MicroStrategy products are designed
with the assumption that the majority of users access the system through
MicroStrategy Web while a smaller percentage use the Developer products.
• Statistics logging—Statistics logging is very useful for analyzing and further refining
the system configuration based on actual usage. However, logging all statistics all the
time can create a noticeable increase in system response time. For this reason, you
might choose to log only a subset of the statistics generated or only log statistics
periodically.
• Backup frequency—Caches can be stored in memory and on disk. When you enable
backup, you allow the Intelligence Server to write all cache files to disk. If the backup
frequency is set to the default of zero, backup files are written to disk as soon as they
are created. However, writing all cache files to disk all the time can cause a
noticeable reduction in system performance.
Set the backup frequency to a value that minimizes disk writes and optimizes
memory usage for your system.
• Ratio of MicroStrategy Web servers to Intelligence Servers—In a typical system you
should have a 1:1 ratio of Intelligence Servers to MicroStrategy Web servers. This
ensures that resources on both sides are optimized. However, you might find it useful
to add Intelligence Servers or MicroStrategy Web servers depending on your
particular requirements.
• Report Styles—MicroStrategy Web provides a set of different XSL report styles. These
styles provide an easy way for you to customize how reports look. Due to the varying
complexity of these styles, some might require more processing than others.
Why should I increase memory on the machine that hosts Intelligence Server?
If the physical disk is utilized too much on a machine hosting Intelligence Server, it can
indicate that there is a bottleneck in the system’s performance. To monitor this on a
Windows machine, use the Windows Performance Monitor for the object PhysicalDisk
and the counter % Disk Time. If you see that the counter is greater than 80% on
average, it may indicate that there is not enough memory on the machine.
For more detailed information on tuning your machine’s memory for your MicroStrategy
environment, see the section Managing system resources in the System Administration
Guide.
What is the largest Intelligent Cube size that I can store in an Intelligence
Server?
Intelligent Cubes must be stored in Intelligence Server memory for reports to access
their data. While this can improve performance of these reports, loading too much data
onto Intelligence Server memory can have a negative impact on Intelligence Server’s
ability to process jobs. For this reason, it is important to govern how much Intelligent
Cube data can be stored on the Intelligence Server.
For information on governing Intelligent Cube memory usage, loading, and storage, see
the System Administration Guide.
International support
The following table lists the language selection possibilities for different installation
cases.
Installation Result
Fresh installation on a system in The MicroStrategy Installation Wizard prompts you to select the
which MicroStrategy application language from the drop-down list.
has never been installed before
The user language in the product interface is the language that
you select during installation.
Once the product is installed, the Online Help is displayed in the
same language that the user selects in the language prompt of
the installation routine.
Repair or maintenance installation All subsequent executions of the installation routine are
on a system on which MicroStrategy displayed in the language that you selected the first time you
application has been installed installed the product on the system.
before
The user language in the product interface is also the language
that you selected the first time you installed the product on the
system.
Completely uninstalling all the If you uninstall all the products and install either the same
MicroStrategy products and version or a higher version again, the MicroStrategy Installation
installing the same version or a Wizard prompts you to select the language from the drop-down
newer version list.
Note: Even if you select a language from the language prompt
in the installation routine, it has no effect on the default
language of the product interfaces.
Server 8.0.0 or later. For a complete list of compatible MicroStrategy Web and
Intelligence Server versions, refer to the MicroStrategy Readme.
Modifying the system settings listed below can affect system-wide behavior and
therefore, steps to modify these values are not given. You should refer to your
UNIX and Linux documentation and contact your system administrator to modify
these settings.
filesize Maximum Unlimited, or as large as the file system allows. Your system
(file) size for a administrator may enforce limits on the maximum size of files
single file. for reasons unrelated to MicroStrategy. This value must be at
least as large as the maximum size for core dump files
(coredumpsize).
datasize Maximum Unlimited, or as large as the system virtual memory allows. Your
(data) heap size per system's virtual memory constraints affect the data size you can
process. set for a process’s heap size. The value should be the same as
the maximum size for core dump files (coredumpsize).
coredumpsize Maximum Set this value to the same value as the maximum heap size per
(coredump) size for a process (datasize). If core dump files are created that are
single core larger than this value, the files are corrupted and unusable.
dump file.
Methods of installation
The methods of MicroStrategy installation are:
Command line
In command line mode, you type the appropriate information at the prompt and press
ENTER. Instructions are included on each page of the MicroStrategy Installation
Wizard.
In some cases, you are asked to make a selection by pressing 1 or 2, and ENTER. You
then press 0 and ENTER to continue.
Defaults appear next to each prompt and are enclosed in square brackets, for example,
[1]. Press ENTER to use the default, or type a different response to the prompt to
override the default.
In addition, on the command line wizard pages, the following options are available:
• Press 1 and then press ENTER to proceed to the next page.
• Press 2 and then press ENTER to return to the previous page.
• Press 3 and then press ENTER to cancel the installation and close the MicroStrategy
Installation Wizard.
• On the last page, which is MicroStrategy Installation Wizard Complete, press 3 and
then press ENTER to complete the setup and close the wizard.
For information on command line installation, refer to Chapter 3, Installing
MicroStrategy on UNIX and Linux.
Silent installation
A silent, or unattended, installation is one that presents no graphical user interface
(GUI). Silent installations are useful for system administrators who do not want users to
run the installation themselves. It allows you to automate the installation, so it can be
called from a script and executed without user interaction.
For information on silent installation, refer to Silent installation, page 311 in Chapter 8,
Automated Installation on Windows and Silent installation, page 317 in Chapter 9,
Automated Installation on UNIX and Linux.
If you are performing a MicroStrategy hotfix installation, you must include all of
the files provided as part of the hotfix installation in their default location. This
means that you cannot use the steps provided below to create a custom
MicroStrategy hotfix installation package.
1 Retrieve the MicroStrategy installation files from the installation disk or the
MicroStrategy download site. Save these files to a folder. Contact your MicroStrategy
sales representative to determine the location and login credentials for the
MicroStrategy download site.
2 Within the location where you saved the MicroStrategy installation files, browse to
the DataFiles folder.
3 You can determine the required installation files in the following ways:
• For Windows installations, you can use the MicroStrategy Installation Wizard to
determine the required files, as described in To determine the required
installation files for Windows installations, page 47.
• For UNIX and Linux installations, the table below lists which installation files
are required for each MicroStrategy component. Once you determine the
required installation files, you can include them in your custom installation as
described in To specify the location of the installation files, page 47 below.
mstr4.tzp MicroStrategy Web Universal, including Web Analyst, Web Reporter, and Web
Professional
Licensing information
If you have installed the Evaluation version of MicroStrategy, you cannot use its license
key with a Generally Available (GA) license key in the same environment. Hence, the
Evaluation version of MicroStrategy cannot be used for your production environment.
Types of licenses
Refer to your MicroStrategy contract and any accompanying contract documentation for
descriptions of the different MicroStrategy license types.
If you receive access to Usher functionality as part of MicroStrategy analytics software
products, either by purchasing licenses to such software products or receiving such
software products as part of a maintenance upgrade, your use of such Usher functionality
is restricted to use solely for the purpose of authentication in conjunction with
MicroStrategy analytics software products.
The appendixes in this guide are not listed in the checklists below. The checklists
only cover the main steps to install and configure MicroStrategy products. The
appendixes in this guide contain important configuration details that are useful
throughout the life cycle of your MicroStrategy installation.
You can use the Complete column on the left to check off each high-level step as
you complete it.
Chapter 1, Planning Your Installation: Review this chapter for important installation
prerequisites and considerations.
Chapter 2, Installing MicroStrategy on Windows: This chapter describes the procedures for
installing the MicroStrategy products necessary to run your business intelligence
application in a Windows environment.
Or
Chapter 8, Automated Installation on Windows: As an alternative to the regular
installation, you can perform a fully automated and unattended installation including
customization routines available with the product. This chapter describes different types of
unattended and automated installations and provides steps to perform these installations
on Windows.
Additionally, Chapter 10, Deploying OEM Applications explains the common workflow for
deploying the MicroStrategy platform as an Original Equipment Manufacturer (OEM)
application.
Chapter 4, Activating Your Installation: After installing MicroStrategy products, you have 30
days to activate your software installation. If you have not activated your software after 30
days, some MicroStrategy features may become unavailable until you complete the
software activation.
Chapter 5, Configuring and Connecting Intelligence Server : After installing and activating
MicroStrategy products, you must use the MicroStrategy Configuration Wizard to configure
the MicroStrategy metadata repository, statistics tables, history list tables, Intelligence
Server, and project sources. This chapter describes the steps used to configure an installed
MicroStrategy suite of products using the MicroStrategy Configuration Wizard.
Chapter 6, Deploying MicroStrategy Web, Mobile Server, and Operations Manager : You
can deploy your project to your user community using MicroStrategy Web or Web Universal.
This chapter provides information on how to deploy and configure MicroStrategy Web or
Web Universal on Windows, UNIX, and Linux platforms with various Web and application
servers.
You can deploy your project with either MicroStrategy Web or Web Universal. MicroStrategy
Web Universal is platform-independent, whereas MicroStrategy Web can be installed only
on Windows.
Chapter 12, Adding or Removing MicroStrategy Components: This chapter describes the
steps to add and remove MicroStrategy components on Windows, as well as other
operating systems. For Windows platforms, refer to the following sections:
• Adding or removing MicroStrategy components on Windows, page 373.
• Re-installing MicroStrategy components on Windows, page 374.
• Uninstalling MicroStrategy components on Windows, page 376.
You can use the Complete column on the left to check off each high-level step as
you complete it.
Chapter 1, Planning Your Installation: Review this chapter for important installation
prerequisites and considerations.
Chapter 3, Installing MicroStrategy on UNIX and Linux: This chapter describes the
procedures for installing the MicroStrategy products necessary to run your business
intelligence application on a UNIX and Linux environment.
Or
Chapter 9, Automated Installation on UNIX and Linux: As an alternative, you can perform a
fully automated and unattended installation without using the graphical user interface. This
chapter describes different types of unattended and automated installations and steps to
perform these installations on UNIX.
Or
Usher Security Installation and Configuration: This chapter describes the full procedures
for installing Usher Security in conjunction with other MicroStrategy products.
Additionally, Chapter 10, Deploying OEM Applications explains the common workflow for
deploying the MicroStrategy platform as an Original Equipment Manufacturer (OEM)
application.
Chapter 4, Activating Your Installation: After installing MicroStrategy products, you have 30
days to activate your software installation. If you have not activated your software after
these 30 days have passed, some MicroStrategy features may become unavailable until
you complete the software activation.
Chapter 5, Configuring and Connecting Intelligence Server : After installing and activating
MicroStrategy products, you must use the MicroStrategy Configuration Wizard to configure
the MicroStrategy metadata repository, statistics tables, history list tables, Intelligence
Server, and project sources. This chapter addresses the processes necessary to configure
an installed MicroStrategy suite of products using the Configuration Wizard. If no project
sources are defined, then the Configuration Wizard opens.
Or
Chapter 11, Configuring MicroStrategy Using Command Line Tools: MicroStrategy tools
are provided in command line mode on UNIX and Linux so that you can perform various
configuration tasks through the operating system console. This enables you to perform your
required configurations even if you do not have access to the MicroStrategy interface.
Chapter 6, Deploying MicroStrategy Web, Mobile Server, and Operations Manager : You
can deploy your project to your user community using MicroStrategy Web Universal. This
chapter provides information on how to deploy and configure MicroStrategy Web and Web
Universal on Windows, UNIX, and Linux platforms with various Web and application
servers.
You can deploy your project with either MicroStrategy Web or Web Universal. MicroStrategy
Web Universal is platform-independent, whereas MicroStrategy Web can be installed only
on Windows.
Chapter 7, Setting Up Documents and HTML Documents: This chapter explains the setup
required for the Intelligence Server to create and execute HTML documents and
documents. It also describes the steps to create this setup, which are only necessary on a
UNIX or Linux environment.
Chapter 12, Adding or Removing MicroStrategy Components: This chapter describes the
steps to add and remove MicroStrategy components on all supported operating systems.
For UNIX and Linux platforms, refer to the following section:
• Uninstalling MicroStrategy components on UNIX and Linux, page 377
If you have used the Evaluation Edition of the MicroStrategy platform, you may
have installed most of these products already. However, additional considerations
are important when you are setting up a production business intelligence system as
opposed to running the evaluation software. You should read this chapter carefully,
even if you already have a working system from your Evaluation Edition.
Additionally, Chapter 10, Deploying OEM Applications explains the common workflow
for deploying the MicroStrategy platform as an Original Equipment Manufacturer (OEM)
application.
Installation procedure
The MicroStrategy Installation Wizard provides steps to guide you through installing one
or more MicroStrategy products in a Windows environment. The following sections can
assist you in installing MicroStrategy products:
• Installing with the MicroStrategy Installation Wizard, page 52
• Installation verification, page 67
There are a number of installation alternatives and procedures to support your
MicroStrategy installation documented in this guide, including the following:
• For information on installation prerequisites, see Installation prerequisites, page 18
in Chapter 1, Planning Your Installation.
• For information about advanced installation functionality, such as installing in an
SMS environment or using installation response files, see Chapter 8, Automated
Installation on Windows.
• For information about installing and deploying MicroStrategy Web Universal with
other Web and application servers, see Chapter 6, Deploying MicroStrategy Web,
Mobile Server, and Operations Manager.
• For information about deploying MicroStrategy Web Services ASP.NET and J2EE,
see the MicroStrategy Office User Guide.
• For information about installation prerequisites and procedures for Usher Security,
see Usher Security Installation and Configuration.
Prerequisites
The following prerequisites are in addition to those listed in Installation prerequisites,
page 18:
• Usher Security requires a secure web server, contact your IT
administrator for assistance. The following items are needed to
successfully configure and access Usher Security services:
▫ An SSL Certificate Authority Root certificate and Intermediate certificates,
appended into a (.pem) file. You need to obtain this from a third-party signing
authority, such as Verisign or Thawte. Contact your IT administrator for
assistance.
▫ A HTTPS/SSL server certificate (.crt) file, and the matching key (.key) file,
which matches your Fully Qualified Domain Name.
▫ Connectivity information to a SMTP Server, and the port and credentials to
allow the Usher server to send invitation emails.
▫ Your Windows computer hostname has been changed to a Fully Qualified
Domain Name, and registered in the Domain Name System (DNS).
1 Log on to the machine where you are installing one or more MicroStrategy products.
2 Exit all Windows applications before beginning the installation process.
3 Download the files from the MicroStrategy download site. Locate and run the
Setup.exe file. Be aware of the following:
• Contact your MicroStrategy sales representative to determine the location and
login credentials for the MicroStrategy download site.
• You need to extract the downloaded files to locate the Setup.exe file. When
extracting the files, ensure that the extraction software maintains the folder
structure of the compressed files. Most extraction software maintains the folder
structure by default, but if you use WinRAR, ensure that you select the Extract
full paths option.
• To review an alternative, guided introduction to installing MicroStrategy
software, you can locate and run the MICROSTRATEGY.exe file. For
information on this installation alternative, see Installing with a guided
MicroStrategy introduction, page 68.
• You can reduce the amount of data that has to be downloaded for the
installation by excluding all of the .zip files, located in the
Installations/DataFiles folder, from the download. You can use this
technique to download only the files required to complete your MicroStrategy
installation, which can then also be used to reduce the amount of data packaged
and downloaded for other MicroStrategy installations. For steps to create these
custom installation packages, see Creating custom installation packages, page
46. Details on using a response.ini file to provide the location of the
Welcome
Read the information on the welcome screen and proceed to the next step.
If you opened the MicroStrategy Installation Wizard through the Microsoft Control
Panel using the Add/Remove Programs option, the wizard opens the Welcome page in
maintenance mode. For more information on modifying, repairing, or removing all or
part of your MicroStrategy installation, see Chapter 12, Adding or Removing
MicroStrategy Components.
License Agreement
Read the license agreement, and accept or decline the agreement by clicking the
appropriate button. If you decline, you cannot install MicroStrategy products.
Click Print to print a copy of the license agreement for your records.
Customer Information
Enter the following customer information:
• First Name
• Last Name
• Email Address
• License Key
Install Options
Select one of the following install options:
• To easily install the entire platform on a single node environment, click Express.
After installing the complete platform, you will have MicroStrategy Analytics,
Mobility, and Security installed on your Windows server, as well as the required
third-party software libraries.
For steps to use the Express installation, see Performing a MicroStrategy Express
installation.
• To install on an environment with multiple servers, or to select which MicroStrategy
products to install, click Custom, and continue with the Installation Wizard.
Select Features
You can select both the MicroStrategy products to install and their final location.
Once you have selected all required MicroStrategy products and defined the proper
installation locations, if you are prompted to stop your MicroStrategy Web server,
click Yes. If you click No, you cannot continue with the installation until you stop
your MicroStrategy Web server.
The installation pages you see after this step depend on the products you selected to
install. These instructions describe all possible pages to support all products of the
MicroStrategy Product Suite. You do not have to install all of these products on the same
machine. In fact, this is strongly discouraged in a production environment. For basic
guidelines about product deployments, see Recommended installation location and
example deployments, page 19 in Chapter 1, Planning Your Installation.
Depending on your license key, you can install the Universal (platform
independent) version of some of the products listed below.
If you are a MicroStrategy Web administrator, you can allow Web users to
install MicroStrategy Office by making an ‘Install MicroStrategy Office’ link
available in MicroStrategy Web. When a user chooses to install MicroStrategy
Office, MicroStrategy Office is installed as a stand-alone product on his or her
machine. MicroStrategy Office can be installed even if no other MicroStrategy
products are available on his or her machine. For steps to enable users to
install MicroStrategy Office from Web, see Enabling users to install
MicroStrategy Office from Web, page 249 of Chapter 6, Deploying
MicroStrategy Web, Mobile Server, and Operations Manager.
• Other components:
▫ SequeLink ODBC Socket Server is required to support MicroStrategy Narrowcast
Server. It can also be used to access Microsoft Access databases and Microsoft
Excel files stored on a Windows machine from an Intelligence Server hosted on
a UNIX or Linux machine (see MicroStrategy ODBC Driver for SequeLink,
page 390).
The MicroStrategy SDK and MicroStrategy Developer Library (MSDL) are not
included in the MicroStrategy installation. You can download the MicroStrategy
SDK from the MicroStrategy support site
https://resource.microstrategy.com/msdz/default.asp. You can also access the
MicroStrategy Developer Library from the MicroStrategy support site.
Many of the platform components have subcomponents. If you expand the different
MicroStrategy products, you can select the appropriate check boxes to specify the
subcomponents to install. For information on MicroStrategy components and
subcomponents, see MicroStrategy products and components, page 1 in Chapter 1,
Planning Your Installation.
Usher Configuration
You see this page if you have selected to install Usher. If you do not have all the
information and want to configure Usher later, click Skip to proceed with the
installation.
• SSL Certificate Authority Certificate: The file that contains the trusted Root
CA, Intermediate Root CA bundle (.pem). It must be the complete certificate chain
for your SSL Server Certificate that you obtained from your IT Administrator.
• SSL Server Certificate: The server certificate (.crt) file for your Windows server.
• SSL Server Certificate Key: The key for your SSL server certificate (.key) file.
• SSL Certificate Authority Key File Password: If your CA-signed certificate
has a password, create a text file containing this password and enter the text file
location.
• SMTP Server: Your company's SMTP server, followed by the port number in the
next box.
• SMTP Authentication: If your server is password protected, then enter the
username and password for the server.
• Email Sender Address: The email address that is authorized to send emails from
your SMTP server, and will be used to send badge invitations for your Usher
network.
• Host Name: Enter the Fully Qualified Domain Name you are using, for example,
yourFQDN.com.
The user account used to run Health Center must have full administrator
privileges for the local machine. If the administrator default privileges
have been modified for the user account, connection errors can occur.
▫ Password: A valid password for the Windows login entered in the Login field.
▫ Confirmation: Retype the password to confirm that it is correct.
about the Health Center system, such as the list of machines on the network and the
MicroStrategy products they have installed, and also the destination for all exported
diagnostics packages.
• Customer Experience Improvement Program: You can choose to enroll the
installation in the Customer Experience Improvement Program:
▫ Join program: Select this option to enroll the installation in the Customer
Experience Improvement Program. Once enrolled, Health Center transmits
anonymous data about your system to MicroStrategy. No report data or prompt
answers are collected or transmitted. All information sent to MicroStrategy as a
result of this program is stored in the Census subfolder of the Health Center
Repository.
▫ I do not want to participate right now: Select this option to opt out of the
Customer Experience Improvement Program.
Server Activation
If you install one or more MicroStrategy Server products, you can request an Activation
Code to activate your MicroStrategy Server products upon completion of the installation
process. The next few pages of the installation process guide you in providing the
information you must submit to MicroStrategy to request an Activation Code.
MicroStrategy Server products include:
• MicroStrategy Intelligence Server
• MicroStrategy Web or Web Universal
• MicroStrategy Mobile Server
• MicroStrategy Narrowcast Server Delivery Engine
Welcome
Read the information on the Welcome screen and click Next to proceed to the next step.
Server Information
Specify information about your Intelligence Server installation. Enter the following
characteristics:
• Name: Distinguishes the name of this Intelligence Server installation from any
other Intelligence Server installations in your company
• Location: Physical location of the machine on which Intelligence Server is installed
• Use: Description of how Intelligence Server is used
Installer Information
Specify contact information of the person installing the software. After your installation
is complete an email containing the Activation Code is sent to the email address you
confirm in this software activation step. Enter the following installer information:
• Specify whether you are an employee of the licensed company or installing on behalf
of the licensed company.
• For descriptions of what information to include in the other text fields, press F1 to
view the MicroStrategy online help.
Contact Information
You see this page if you indicated that you are not an employee of the company licensed
to use this software, and are installing the software on behalf of that company.
Specify contact information for the employee licensed to use the software. After your
installation is complete an email containing the Activation Code is sent to the email
address you confirm in this software activation step. For descriptions of what
information to include in the text fields, press F1 to view the MicroStrategy online help.
To allow the setting to take effect, the installation stops IIS. After IIS has been
restarted, the MicroStrategy Web application uses the specified number of CPUs.
For more information on the MicroStrategy Web CPU affinity feature, refer to the
System Administration Guide.
Subscription Portal offers you the ability to subscribe to and view Narrowcast
Server services, service descriptions, and their most recent modification dates on
the Web. For complete information about Subscription Portal and other
components of Narrowcast Server, refer to the MicroStrategy Narrowcast Server
documentation.
The name provided for a virtual directory must be unique. You cannot use the
same name as the default for other MicroStrategy products.
The name provided for a virtual directory must be unique. You cannot use the
same name as the default for other MicroStrategy products.
For information about deploying MicroStrategy Web Services ASP.NET and J2EE, see
the MicroStrategy Office User Guide.
The user account used to run Intelligence Server must have full administrator
privileges for the local machine. If the administrator default privileges have
been modified for the user account, connection errors can occur. For
example, if the user account is denied access to the DSN accessed by
Intelligence Server, Intelligence Server connection fails.
• Password: A valid password for the Windows login entered in the Login box
• Confirmation: Retype the password to confirm it is correct
If the password you supply changes, you must reconfigure the Windows service to
use the new password. Otherwise, Intelligence Server connections fail when the
connection attempts to authenticate the login and password.
If you change the password for this account, you must reconfigure the Narrowcast
Server Windows services to use the new password.
Installation verification
During the installation routine, the MicroStrategy Installation Wizard gathers and
records information about your system and your installation selections. You can verify
installation setup information through the installation log file (install.log), located
by default in:
The installation log file can be helpful if you encounter errors during the
installation process. For example, the log can tell you if a registry key or path was
not added or if a critical file was not registered successfully.
If you provide the MicroStrategy installation files on a network location, you must
map a network drive for users to access the MICROSTRATEGY.exe file. If users
run this file without locating it through the use of a mapped network drive, the
links to open various product manuals will not function properly.
Prerequisites
• System requirements:
▫ You have a 64-bit Windows Server: 2008R2, 2012, or 2012R2.
— Windows 7 (64-bit) and Windows 10 (64-bit) are supported for demo
purposes.
— .Net Framework 4.
— You have Windows administrative privileges.
— All components are installed on the local C:\ drive, which requires 12 GB of
disk space.
— To successfully complete the installation process, your server must not have
any MicroStrategy components installed.
▫ 8 GB of RAM.
▫ Multi-core 64bit processor.
▫ The Usher Security app successfully installed on your iPhone or Android phone.
Download the app from the App Store for your iPhone or Google Play for your
Android.
• MicroStrategy Secure Enterprise software requirements:
▫ Download and extract the MicroStrategy installation package from the
MicroStrategy Download Site at
https://download.microstrategy.com/. In the extracted files, locate
MicroStrategy.exe or Setup.exe.
▫ Your MicroStrategy software license key is for 64-bit servers. To request a license
key, go to the license key generator in the MicroStrategy Download Site at
https://software.microstrategy.com, contact your MicroStrategy
Representative or contact MicroStrategy Technical Support at
[email protected].
▫ After installation, a MicroStrategy Landing page containing links to the main
MicroStrategy Platform services is displayed. The page requires JavaScript to be
enabled to execute inside a web browser. Contact your IT administrator for
assistance.
• Host Name: Type the Fully Qualified Domain Name of your Windows server,
for example, webserver.acme-corporation.net.
If you do not have all the required information and want to manually
configure Usher Security later, click Skip and refer to the Usher Security
Documentation. The subsequent steps assume you have entered all the
information required to set up Usher Security.
7 Click Next.
8 The MicroStrategy Express installation relies on MySQL open source components
that are not provided by MicroStrategy. You can choose to provide the necessary
MySQL components by following the instructions given in the installer or authorize
the installer to download MySQL components on your behalf by clicking Next. You
can review the terms of the GPL license v2.0 at http://www.gnu.org/licenses/old-
licenses/gpl-2.0.html.
9 You have now entered all the information required to proceed. To change settings,
click Back.
10 Click Install to begin installing MicroStrategy Secure Enterprise. Installation takes
approximately 20 minutes with the recommended hardware.
11 Once the platform has been installed, a restart is required to configure the new
software and services. It is recommended that you restart your machine now by
clicking Finish. The MicroStrategy software is not functional until after a restart.
12 After your machine has restarted, log in with your administrative account. Platform
configuration automatically begins. This can take up to 30 minutes with the
recommended hardware.
• On Windows 7, 2008, 2012, and 2012R2, it is normal to experience a black
screen, for up to 15 minutes, before a progress bar is displayed.
• On Windows 10, the operating system loads as normal, while the configuration
continues in the background. Wait for the progress bar to display before
resuming normal operations.
• A progress bar displays while the post-configuration steps are processed.
• You will receive two emails with instructions to retrieve your Usher Security
badges during this time period.
13 When the installation is complete, your default browser automatically opens the
MicroStrategy Secure Enterprise launch page.
• If the launch page does not display, use the shortcut on the desktop.
After your MicroStrategy installation is complete, you have 30 days to activate your
installation. Before you activate your installation you must request an Activation
Code from MicroStrategy. You can complete this request when you install
MicroStrategy with the MicroStrategy Installation Wizard or after the installation
using MicroStrategy License Manager. For steps, see Activating Your Installation.
If you did not configure Usher Security, you must log in using the
MicroStrategy Administrator credentials, as described below:
Supporting Information
• MySQL: 3306
• Intelligence Server: 34952
Certificate information
In addition to the certificates provided during installation, an Usher Signing CA is
generated to support all PKI signing operations of the Usher Server, as well as a SAML
Certificate used in all SAML transactions at the time of configuration. These certificates
have an expiration of one year from the time of installation and are located in the
c:\program files (x86)\Common Files\MicroStrategy\Certificates
folder. The keys for the certificates can be found in the c:\program files
(x86)\Common Files\MicroStrategy\Keys folder. To reconfigure this
certificate, see the Usher Server documentation.
Before installing MicroStrategy products, you should refer to Chapter 1, Planning Your
Installation for important pre-installation information.
If you are installing MicroStrategy on Windows, refer to Chapter 2, Installing
MicroStrategy on Windows.
Additionally, Chapter 10, Deploying OEM Applications explains the common workflow
for deploying the MicroStrategy platform as an Original Equipment Manufacturer (OEM)
application.
For supporting installation information, refer to Installing MicroStrategy on Windows.
The MicroStrategy SDK and MicroStrategy Developer Library (MSDL) are not
included in the MicroStrategy installation. You can download the MicroStrategy
SDK from the MicroStrategy support site
https://resource.microstrategy.com/msdz/default.asp. You can also access the
MicroStrategy Developer Library from the MicroStrategy support site.
For more information about these products, see MicroStrategy products and
components, page 1.
It is recommended that you install MicroStrategy products as the root user.
Prerequisites
To install MicroStrategy Usher, complete the prerequisites detailed in Usher installation
prerequisites.
• If you are installing Usher Security Network Manager, you must create a database to
manage Usher identities.
• If you are installing Usher Analytics, you must create a database to store Usher
activity data.
• On the last page, which is MicroStrategy Installation Wizard Complete, press 3 and
then press ENTER to complete the setup and close the wizard.
1 Log on to the machine on which you are installing one or more MicroStrategy
products.
2 Browse to the MicroStrategy Installation folder. Depending on your UNIX or Linux
environment, browse to one of the following folders:
• Solaris: QueryReportingAnalysis_SunOS
• AIX: QueryReportingAnalysis_AIX
• HP-UX: QueryReportingAnalysis_HP-UX
• Linux: QueryReportingAnalysis_Linux
3 Type one of the following commands, depending on the installation mode you chose:
• To run the wizard in GUI mode:
./setup.sh
• To run the wizard in command line mode:
./setup.sh -console
• To run the wizard in silent mode:
./setup.sh -silent -options options.txt
For information on performing a silent installation with an options.txt file, see
Completing a silent installation, page 317.
4 The MicroStrategy Installation Wizard opens and leads you through the rest of the
installation process. The following sections describe the actions you need to take for
each page in the wizard.
Language Setup
Specify the language to be used for the MicroStrategy installation and proceed to the next
step.
Welcome
Read the information on the welcome screen and proceed to the next step.
practices and steps to upgrade your MicroStrategy installation, see the Upgrade
Guide.
▫ Remove hotfix: Select this option to uninstall a MicroStrategy hotfix
installation.
License Agreement
Read the license agreement, and select to accept or decline the agreement. If you choose
to decline, you cannot install MicroStrategy products.
Customer Information
Enter the following customer information:
• User
• Company
• License Key
Select Components
Select the check box of a MicroStrategy product to include that product in the
installation. Alternatively, you can clear a check box to uninstall or exclude a
MicroStrategy product from the installation.
The installation pages you see after this step depend on the products you choose to
install. These instructions describe all possible pages.
Many of the platform components have subcomponents. If you expand the different
MicroStrategy products, you can select the appropriate check boxes to specify the
subcomponents to install. For information on MicroStrategy components and
subcomponents, see MicroStrategy products and components, page 1 in Chapter 1,
Planning Your Installation.
You can see only MicroStrategy products that are available with your license key.
Destination Folder
You can select MicroStrategy products and their subcomponents to define their
installation locations. When you select a MicroStrategy product or subcomponent, the
Destination Folder area near the bottom of the interface displays the current installation
folder for the product. Click Browse to select a different installation folder.
If you select a MicroStrategy product or subcomponent and the Browse button is not
accessible, this means that the installation location cannot be changed. For example, if
you select MicroStrategy Mobile you cannot define an installation location. However, if
you expand this product, you can define the installation location for its subcomponents.
mstr4.tzp MicroStrategy Web Universal, including Web Analyst, Web Reporter, and
Web Professional
• Provide the location of the installation files using an options.txt file. This lets
you access the installation files stored on a folder or stored at a URL and accessed
using HTTP or HTTPS. Details on using an options.txt file as part of an
installation are provided in Chapter 9, Automated Installation on UNIX and Linux
and the parameters used to specify the location of the required installation files are
described in Providing installation files for smaller installations, page 335.
If the files required for the installation are stored in a folder, you can instead click
Browse to navigate to and select the folder that stores the installation files. If all the
required installation files are provided in the folder you select, you can click Enter to
continue the MicroStrategy installation.
Missing Requirements
This page is displayed only if there are system requirements that are not met to install
the MicroStrategy products you selected. Review the list of requirements to determine if
you can proceed with the installation, or if the installation must be cancelled.
If you are installing MicroStrategy Intelligence Server Universal on Linux, you may see a
warning about the value for the Linux kernel setting vm.max_map_count. For
information on this setting and MicroStrategy’s recommendation on its value, see
Supporting Intelligence Server Universal memory allocation on Linux, page 32.
To improve the performance of MicroStrategy Intelligence Server Universal for large
scale production applications, Intelligence Server Universal can be configured to use
shared memory resources. If a semaphore configuration warning is displayed, some
system resource limits are not configured to fully support the use of shared memory
resources. To support this configuration, cancel the installation and refer to the limit
recommendations provided in Configuring shared memory resources, page 31.
System Requirements
This page is displayed only if the machine you are installing Intelligence Server Universal
on does not use the recommended system resource limits to support the use of shared
memory resources. It is recommended that you exit the installation and configure these
system settings to support shared memory resources. For information on this
requirement and the options available to complete the installation, see Configuring
shared memory resources, page 31.
Software Activation
If you have installed one or more MicroStrategy server products, you can request an
Activation Code to activate your MicroStrategy server products upon completion of the
installation process. The next few pages of the installation process guide you in providing
the information you must submit to MicroStrategy to request an Activation Code.
MicroStrategy server products include:
• MicroStrategy Intelligence Server
• MicroStrategy Web or Web Universal
• MicroStrategy Mobile Server
Welcome
Read the information on the welcome screen and proceed to the next step.
Server Information
Specify information about your MicroStrategy server installation. Enter the following
characteristics:
• Name: Distinguishes the name of this MicroStrategy server product installation
from any other MicroStrategy server product installations in your company.
• Location: Physical location of the machine on which MicroStrategy server products
are installed.
• Use: Description of how the server is used.
Installer Information
Specify contact information of the person installing the software. After your installation
is complete an email containing the Activation Code is sent to the email address you
confirm in this software activation step. Enter the following installer information:
• Specify whether you are an employee of the licensed company or installing on behalf
of the licensed company.
• Enter the necessary data into all text fields. Make sure the email address you enter is
correct. This email address is the recipient of the Activation Code.
Contact Information
You see this page if you indicated that you are not an employee of the company licensed
to use this software, and are installing the software on behalf of that company.
Specify contact information for the employee license to use the software. Enter the
necessary data into all text fields. Make sure the email address you enter is correct. After
your installation is complete an email containing the Activation Code is sent to the email
address you confirm in this software activation step.
• If the server and log instances do not exist, that the provided user has the correct
privileges to create the instances.
• The provided user has the correct privileges to create tables.
You need root permissions to access the files and create the necessary links
described in this section.
MicroStrategy cannot package these fonts with Intelligence Server due to licensing
restrictions.
For steps to support fonts such as Microsoft True Type fonts for the MicroStrategy
features listed above, see Setup for executing Report Services documents, page 259.
Verifying installation
During the installation routine, the MicroStrategy Installation Wizard gathers and
records information about your system and your installation selections. You can verify
the setup information through the installation log file (install.log).
By default, the log file is located in INSTALL_PATH where, INSTALL_PATH is the
directory you specified as the install directory in the MicroStrategy Installation Wizard.
The log file includes information about the following:
• Installation date
• Target directory
• Operating system identification
• Selected installation options
• Selected licensing details
This log file can be helpful if you encounter errors during the installation process.
The log file records the reasons due to which the errors occurred.
Directory structure
The following table describes the directories in which MicroStrategy files are installed.
PATH/Directory Contents
PATH/Directory Contents
INSTALL_PATH Files that are not supposed to change after the installation is
complete.
INSTALL_ MicroStrategy Portlet files. This is the default directory for the
PATH/GISConnectors Portlets but another location can be selected during installation.
INSTALL_PATH/Mobile MicroStrategy Mobile and Mobile Server JSP files. This is the
default directory for Mobile but another location can be selected
during installation.
INSTALL_ Support files (fonts) for the PDF generation feature of Intelligence
PATH/PDFGeneratorFiles Server.
INSTALL_PATH/Portlets MicroStrategy Portlet files. This is the default directory for the
Portlets but another location can be selected during installation.
INSTALL_ MicroStrategy System Manager files. This is the default directory for
PATH System Manager but another location can be selected during
installation.
/SystemManager
INSTALL_PATH/Usher MicroStrategy Usher files.
PATH/Directory Contents
Prerequisites
• For new installations, you must be installing on a Unix/Linux environment.
• For upgrades, you must have a Unix/Linux environment.
• To configure Messaging Services, Command Manager is needed.
To successfully install Usher Security, your Linux systems need to be configured to allow
PHP to connect to MySQL and grant privileges to each product.
If you are using Red Hat Linux, Apache has already been installed as part of the system.
If you are using another version of Linux, you need to install Apache.
You need Apache version 2.2.x. To check the version of Apache that you have installed,
enter the following command: > httpd -v.
• If you don't have Apache already installed on your system, enter yum install
httpd to install, then enter the following command to start the service:
> service httpd start
Ensure that you have installed version 2.2.x by checking the version number of
Apache by entering: > httpd -v.
Set your system timezone to GMT localtime for use with the Usher Server.
1 Enter the following commands:
• > cd /etc
• > rm localtime
• > ln -s /usr/share/zoneinfo/GMT localtime
The steps below require you to work with your IT department to change your Linux
hostname. You are also required to obtain a trusted vendor CA-signed certificate, as well
as generate a self-signed certificate. Refer to your company's IT policies for this section.
1 Contact your IT department to learn about your company's policy on Fully Qualified
Domain Names (FQDN).
2 Have your Linux hostname changed to a FQDN per your company's policy. Then
have your new FQDN and IP address mapped.
3 Following the direction of your IT department, obtain a CA-signed certificate from a
trusted vendor.
You may be asked for a certificate request that contains your company's information.
If so, follow the steps below:
a Create a certificate request (*.csr) and private key (*.key) and provide this to
your vendor in the form requested.
b Provide your company's information to your certificate vendor. This information
is incorporated into your certificate request.
4 Upon receiving your certificate from the third-party vendor, create a *.pem by
combining your certificate (*crt) and private key (*.key). If you are installing on
UNIX, enter the following command:
> cat intermediate.crt server.crt server.key > server.pem
5 To complete a successful Usher Security installation, you need to create a self-signed
certificate. To do this, generate a certificate (*.crt) and a private key (*.key). If you
are installing on UNIX, enter the following command:
> openssl req -new -newkey rsa:2048 -days 365 -nodes -x509 -
keyout self.key -out self.crt
To allow Usher Security to connect with the Usher Server, you need to open ports in
your system's firewall. Contact your IT department for specific instructions. It is
recommended to use the default SSL port of 443.
To install memcache
You need memcache to install Usher Security. This allows the database tables that you
create to be saved in the memory. After installing memcache, you need to configure the
modules for Usher Security.
1 You can install memcache by using either yum or rpm. Select a method and enter the
corresponding commands:
• For yum, use the following command: > yum install memcached php-
pecl-memcache.
• For rpm, use the following command: > rpm -i memcached-x.x.x-
x.el6.x86_64.
2 Configure memcache by changing the following in your memcache file:
vi /etc/sysconfig/memcached
PORT="11211"
USER="memcached"
MAXCONN="1024"
CACHESIZE="64"
OPTIONS=""
You may encounter problems while setting up PHP on UNIX. For help
troubleshooting error messages, refer to your IT department and third-party
reference material for more information.
Prior to downloading the installation file, you must configure your system by installing
prerequisites. These are required to successfully build PHP for MicroStrategy products.
1 First, use your subcription manager to enable SCL:
▫ subscription-manager repos --enable rhel-server-rhscl-
6-eus-rpms
2 Enter the following yum installation commands to install php 5.4 and modules:
▫ yum install php54 php54-php php54-php-gd php54-php-
mbstring
3 You must also install the updates database module for MySQL. To do this, enter:
▫ yum install php54-php-mysqlnd
Next, disable the loading of php 2.3 Apache:
▫ mv /etc/httpd/conf.d/php.conf
/etc/httpd/conf.d/php.conf.old
4 Restart Apache to make the changes:
▫ service httpd restart
5 After the installation is complete, you need to enable mod_rewrite. To do this, enter
/InstallPath/etc/httpd/conf/httpd.conf to modify the file. The
parameters are as follows:
<Directory "/var/www/html">
Options FollowSymLinks
AllowOverride All
</Directory>
To successfully install Usher Security, you need to create a MySQL user and grant access
to each MicroStrategy product. MicroStrategy supports MySQL Community Server
version 5.6.23 and above. If you already have MySQL installed on your system, you still
need to install the MySQL Yum Repository.
To check the version of MySQL, connect to the MySQL command client, and
run the following command:
SHOW VARIABLES LIKE "%version%";
1 In a web browser, open https://dev.mysql.com/downloads/mysql. From
the drop-down list, select the correct platform of MySQL Community Server for your
system. Find your OS version, and click to download the RPM file.
2 Navigate to http://dev.mysql.com/downloads/repo/yum/, and click to
download the correct RPM package for your system.
3 Open a command window and begin the installation by entering the following
commands:
• For MySQL yum repository, enter: > yum localinstall mysql-
community-release-el6-5.noarch.rpm.
• For MySQL Community Server, enter: > yum install mysql-community-
server.
• For MySQL JDBC connector, enter: > yum install mysql-connector-
java.
After installation, you need to set the classpath for the JDBC connector, which
depends on the type of shell you are running:
▫ For bourne-compatible shells, enter: > export
CLASSPATH=/home/user/mysql-connector-java-5.1.34-
bin.jar:$CLASSPATH.
▫ For C shell, enter: > setenv CLASSPATH /home/suer/mysql-
connector-java-5.1.34-bin.jar:$CLASSPATH.
• For MySQL ODBC connector, enter: > yum install mysql-connector-
odbc.
• For MySQL python library, enter: > yum install mysql-python.
• For MysQL PDO extension, enter: > yum install with-pdo-mysql.
4 Enter: > mysql_tzinfo_to_sql /usr/share/zoneinfo | mysql -
h127.0.0.1 -P3306 -uroot -p mysql to install the convert_tz functions.
• If an error message displays that the function is unable to load, check to see that
the function has been properly installed. To do this, enter the following
command: > select convert_tz (current_timestamp,
'utc','est. If the file is timestamped, then it is installed.
5 To complete the installation process, restart MySQL.Enter:
service mysqld start
6 Set the root password for MySQL.
a Enter the following command: > mysql_secure_installation.
b Enter: > mysql -u root -p, followed by a password of your choice. Be sure
to note the password, as this is needed in later steps.
7 Create the MySQL user account that you will use to grant privileges to the
MicroStrategy products that you want to install.
a Enter: > GRANT ALL.
b To create the mstr user, enter: > create user
'username'@'localhost' identified by 'username';.
c To grant the mstr user access, enter: > grant all on abcd to
'username'@'localhost';, where abcd is the name of your local
environment.
8 If you are using Usher Analytics to examine the data collected on your Usher
Security server, you need to install crontab for MySQL.
a Check that this directory exists: > /usr/bin/mysql_tzinfo_to_sql
/usr/share/zoneinfo | /usr/bin/mysql -h127.0.0.1 -P3306 -
umstr -p mysql.
b Begin the installation by entering: > yum install crontab*.
c After the installation is complete, restart crontab by entering: service crond
start.
You need to grant required privileges to the MySQL user. For each MicroStrategy
product you plan to install, you need to grant access to make changes to the database.
For example, if you are installing MicroStrategy Usher Security, MicroStrategy Web, and
MicroStrategy Developer, then you need to grant MySQL access to each product.
1 In a command window, open MySQL.
2 Select a username to use, and type the following command:
create userYourUsername@localhost identified by
YourUsername;.
Replace the italicized variables with the user name that you selected and your local
environment name.
3 In MySQL workbench, on your local environment, click the management tab, then
navigate to Users and Privileges.
4 Click to add an account.
5 In the login name field, type your user name.
6 Select standard as the method of authentication.
7 Type your password in the password field, and then confirm your password. (This is
the password that you created in the previous steps.)
8 Click Apply.
9 Click Administrative Roles and select the applicable roles for the product(s) that
you are installing.
10 Click to grant access to the required privileges. The privileges shown below must be
granted for each MicroStrategy product you install:
• ALTER
• ALTER ROUTINE
• ALTER VIEW
• CREATE
• CREATE TEMPORARY TABLES
• CREATE VIEW
• DELETE
• DROP
• EVENT
• EXECUTE ROUTINE
• GRANT OPTION
• INDEX
• INSERT
• LOCK TABLES
• SELECT
• SHOW VIEW
• SUPER
• UPDATE
For example, if you are installing MicroStrategy Web and MicroStrategy Usher
Security, each privilege must be manually granted to each of the products.
For Usher Security, if you want network admin users to be able to create new
user accounts on your network, click CREATE USER for that role.
6 For the Home, Install, and Log directories, it is recommended to use the default
directory locations. Click Next.
7 Select the MicroStrategy products to install, then click Next.
8 Click to browse to your Tomcat location. You can find the location of your Tomcat
directory by running the following command:
echo $CATALINA_HOME
9 In the Database Connection fields, provide your MySQL connection information:
• Server: Your server IP Address
• Port: Your MySQL port (default port number is 3306).
• User: Your MySQL username.
• Password: Your password (if you set one to be required for MySQL user).
• Server DB Instance: Leave the default value (usher_server).
• Log DB Instance: Leave the default value (usher_server_log).
10 Click Next to test your connection. To continue, you must have a successful
connection.
11 In the SSL ports, set the default for your one-way and two-way ports:
• The default for a one-way port is 443.
• The default for a two-way port is 1443.
Record the port numbers, as they are needed for future steps.
12 Click to upload your CA-signed security certificate files (.crt). These signed
certificates were signed by an external certificate authority, like Verisign and Thawte.
• SSL Certificate file: Your .crt file
• Private key file: Your .key file
3 Copy the logback classic 1.1.2 jar file from your Tomcat directory to your Usher
server root. To do this, enter the following command:
> cp /<localdirectory>/apache-tomcat-8.0.26/lib/logback-
classic-1.1.2.jar
/<
serverpath
>/Usher/UsherServer/usherApps/shardIDM/webapps/ROOT/WEB-
INF/lib
4 Copy the CA-signed certification over to your Usher server root, and rename the
certification to saml2.crt. To do this, enter the following one-linecommand:
>cp /<serverpath>/<certificatename
>/Usher/UsherServer/usherApps/shardIDM/webapps/files/saml2.cr
t
5 Restart your Usher server to make the changes permanent. To do this, enter the
following commands:
• > cd
/<serverpath>/Usher/UsherServer/usherApps/shardIDM/bin
• > ./tomcat.sh restart
6 Check to see that your Usher server has restarted. In a web browser, type the
following:
https://FQDN:1-way port
where
• FQDN is your domain name
• 1-way port is your SSL one-way port number (443 is the default one-way port
number)
An example is https://yourdomainname:443.
7 Once your Usher server has been deployed, navigate back to your Usher
Configuration tool. Fill out the required fields with your company information to
receive the activation key for your MicroStrategy server.
To enable SELinux
1 Open the SELinux config file:
2 vi /etc/selinux/config
Replace disabled
3 SELINUX=disabled -> SELINUX=enforcing,
4 Restart SELinux to make the changes.
To enable https
1 Install ssl_module by entering the following command:
> yum install mod_ssl
2 Check to see that the module was enabled during the installation:
> httpd -M | grep ssl_module
3 For Network Manager to communicate with your Tomcat port, you need to change
the ssl port. To do this, enter the following command:
> vim /etc/httpd/conf.d/ssl.conf
4 Change your port numbers from ssl port to Tomcat. For example, listen 443 becomes
listen 9443.
5 The Network Manager configuration file needs to be edited in order to wrap with the
virtual host. Enter the edit command:
> vim /etc/httpd/conf.d/manager.usher.com.conf
6 Refer to the following parameters to determine what values to change:
<VirtualHost *:9443>
SSLEngine on
Prerequisites
You need the following to complete the Usher configuration:
• The SSL port numbers from your MicroStrategy installation steps.
• Your self-signed certificate.
• The key for your self-signed certificate.
• Your trusted vendor CA-signed certificate.
• You have a SMTP server
• If you plan to use Usher Network Manager with Google Maps, your Google Maps
API key.
• The Usher Security application for your smartphone has been downloaded.
1 Open your Usher Network Manager page by typing the following in a browser
window:
http://yourFQDN:443/networkmanager/managesystem
If you have enabled https, your URL should be as follows:
https://yourFQDN:443/networkmanager/managesystem
2 Enter your one-way port server URL, making sure you use your FQDN (for example,
https://FQDN:443), and click Enter.
If you enter an IP Address instead of your FQDN, you will not be able to
proceed.
3 In the License Key field, provide your installation key (universal or Usher), and
click Log In.
4 Fill out the following fields with your company information:
• Security Server Host: Your auto-populated FQDN and one-way port number.
This value cannot be edited.
• System Name: Your system name.
• Usher File Directory: Keep the default value.
• SSL Certificate Authority Certificate: Your trusted vendor CA-signed
.crt.
• SSL Certificate Authority Key: The key for the trusted vendor CA-signed
certificate.
• SSL Certificate Authority Key Password: If you have a password for your
key, select the Required check box, and then enter your password. If you did
not assign a password, leave this field blank.
• AES Key: Your encryption key generated during the Usher Server installation.
Keep the default value.
• SAML Certificate: Your self-signed .crt certificate that was generated using
Openssl.
• SAML Key: Your self-signed *key that was generated using Openssl.
• SMTP Server: Your company’s SMTP server.
• Port: Your company’s SMTP server port.
• SMTP Authentication: If your server is password protected, select the
Required check box. Enter your username and password in the corresponding
fields.
• Email Sender Address:The email address that you are using to send the
badge invitations for your Usher network.
• Security Server Host: The address of your two-way SSL server (default port is
1443). For example, yourFQDN:1443.com. For the Security Server Host,
https:// is not needed.
• Gateway Host: Keep the default URL and enter your Agent Gateway port value
(default value is 9501). For example, yourFQDN:950.com For reference, see To
install Usher Security. For the Gateway Host, https://is not needed.
• Gateway Load Balancer: Keep the default URL and enter your Agent
Gateway port value to match the values for Gateway Host.
• Google Maps API Key: If you are using Google Maps for your Usher
Network, enter the third-party key.
If you do not set the SMTP server and port, the Usher server cannot send
emails
5 Click Next.
6 Fill in the following fields:
• Network Manager Host: Your FQDN URL. Keep the default value.
• Network Manager Path: Keep the default value.
• Security Server Host: Your security server address.
• Network Creation: If you do not want your Usher users to create their own
network on your Usher server, select the Require Authentication check box.
• MicroStrategy Managed Instance: If your system is housed in Amazon
Web Service, select the Restrict LDAP Configuration check box.
• Plugin Host Server: Keep the default value.
• Google Client ID: If you have a business Google Drive account, enter your
Google ID number.
• Google Client Secret: If you want to import users from your Google Drive
account, enter their information.
• Salesforce Client ID: If you have an executive Salesforce account for your
company, enter your Salesforce ID Number.
• Salesforce Client Secret: If you want to import users from your Salesforce
account, enter their information.
7 To save your changes and complete the configuration, click Done.
8 Click to create an Usher Admin.
9 To upload a photo for your Admin account, click to select a file. Supported image
formats are .png, .jpeg, and .jpg.
10 Enter your first and last names in the correct fields.
11 In the Email Address field, type the email address to associate with your Usher
Admin account.
12 Click Create. Usher sends an email invitation to the email address that you
provided.
13 Open the email in your smartphone, then click Get My Badge, which opens the
Usher Security application.
After you have configured Usher Server and Network Manager, you can deploy the
Gateway. These steps must be completed in Linux, not a Windows environment.
Prerequisite
Append your self-signed certificate to the CA-signed .pem file. This allows you to
properly set up the Usher Gateway. For steps, see To set up your Fully Qualified Domain
Name.
1 In a command window, navigate to the Usher Server Gateway using the following:
cd
/<installpath>/Usher/UsherServer/usherApps/shardGateway/bin
2 Start Tomcat:
> ./tomcat.sh start
This deploys the gateway.war file.
3 Check to confirm that the gateway was deployed successfully. In a browser window,
type the following command:
https://yourFQDN:yourgatewayportnumber/gateway/test/. For
example, https://yourFQDN:9501/gateway/test.
4 You can conduct a message push test to verify that the gateway has started. Type a
phrase in the Message field, and click Send to test.
To set up Active Directory with your Usher Network, configure Usher Analytics,
configure your MicroStrategy Mobile Server, and other Usher Network Manager help,
refer to the Usher Help.
If you requested an Activation Code during installation you can skip this procedure and
activate your installation by following the instructions in the next procedure, Activate
2 Select the License Administration tab. Under Server Activation select the
Activate Server Installation option and click Next to continue to the next page.
3 Select the Generate Activation File and Request Activation Code option and
click Next to continue to the next page.
4 Enter the characteristics of your server installation and click Next to continue to the
next page.
5 Enter the contact information for the person who installed the software. Make sure
to correctly select whether you are an employee of the licensed company or installing
the software on the licensed company’s behalf.
• If you select that you are an employee of the licensed company, click Next to
continue to the next page. Once you complete the following step, the Activation
Code is sent to the email address given; therefore it is important that the email
address is valid and entered correctly.
• If you select that you are not an employee of the licensed company, a contact
information page is displayed after you click Next. Enter the contact
information for the licensed company. Click Next to continue to the next page.
Once you complete the following step, the Activation Code is sent to the email
address given; therefore it is important that the email address is valid and
entered correctly.
6 Select Yes, I want to request an Activation Code now and click Next.
An email containing the Activation Code is sent to the email address or addresses you
confirmed in the steps above.
This procedure assumes that you have requested an Activation Code and received an
email from MicroStrategy containing the Activation Code.
1 Open MicroStrategy License Manager:
• Windows: From the Start menu, point to Programs, then MicroStrategy
Tools, and then select License Manager. License Manager opens.
• UNIX/Linux: License Manager can be run in GUI mode or command line
mode.
— GUI: In a UNIX or Linux console window, browse to HOME_PATH where
HOME_PATH is the directory you specified as the home directory during
installation. Browse to the folder bin and type ./mstrlicmgr, then press
ENTER. The MicroStrategy License Manager opens in GUI mode.
— Command line: In a UNIX or Linux console window, browse to HOME_
PATH where HOME_PATH is the directory you specified as the home
directory during installation. Browse to the folder bin and type
./mstrlicmgr -console, then press ENTER. The MicroStrategy
License Manager opens in command line mode.
2 Select the License Administration tab. Under Server Activation select the
Activate Server Installation option and click Next to continue to the next page.
The step above is not necessary for License Manager in command line mode.
3 Select the Server Activation using Activation Code option and enter your
Activation Code in the text field. Click Next to activate your software installation.
4 A verification message is displayed, click OK to close it.
You must restart your Intelligence Server for the activation status to update. You must
also restart your Web server for the activation status to update in MicroStrategy Web.
▫ Locale
▫ Additional information – 4GT mode and hyperthreading in Windows, LPAR ID,
number of pooled CPUs, SMT used in AIX
• MicroStrategy information:
▫ Install Type – new/modify/upgrade
▫ Products and version installed
▫ Number of CPUs allocated for CPU licenses
• Database information:
▫ Metadata database and ODBC driver
▫ Data warehouse database and ODBC driver
If you are configuring MicroStrategy on a UNIX or Linux machine that does not have a
GUI, you can perform configuration tasks with command line tools. For steps to perform
configuration tasks using command line tools in UNIX and Linux, see Chapter 11,
Configuring MicroStrategy Using Command Line Tools.
Intelligence Server requests into commands that the DBMS understands. MicroStrategy
Intelligence Server connects to several databases (at a minimum, the data warehouse and
the metadata repository) to do its work.
Users of MicroStrategy Web can also connect to data sources using database
connections. A database connection supports connecting to data sources through the use
of DSNs, as well as through DSNless connections, to import and integrate data into
MicroStrategy. For steps to create database connections in MicroStrategy Web, see
Creating database connections in Web, page 414.
This section describes the ODBC standard for connecting to databases and creating data
source names (DSNs) for the ODBC drivers that are bundled with the MicroStrategy
applications.
The diagram below illustrates the three-tier metadata and data warehouse connectivity
used in the MicroStrategy system.
The diagram shown above illustrates projects that connect to only one data source.
However, MicroStrategy allows connection to multiple data sources in the following
ways:
• With MicroStrategy MultiSource Option, a MicroStrategy project can connect to
multiple relational data sources. For information on MultiSource Option, see the
Project Design Guide.
• You can integrate MDX cube sources such as SAP BW, Microsoft Analysis Services,
and Hyperion Essbase with your MicroStrategy projects. For information on
integrating these MDX cubes sources into MicroStrategy, see the MDX Cube
Reporting Guide.
This section provides information and instructions on the following tasks:
Setting up ODBC
The following information assists you in setting up ODBC between Intelligence Server
and your metadata database and data warehouse.
ODBC is a standard method of communicating with database servers. Intelligence Server
uses ODBC to connect to and communicate with all database servers in the system.
Specifically, ODBC connects to and transfers data to and from data sources within
relational databases.
ODBC permits maximum interoperability—an application can access data in diverse
DBMSs through a single framework. A client application uses a database driver and a
driver manager to make a connection to the data source. A data source, identified by a
data source name, is the database or file accessed by a driver. Data source is another term
for a logical database within a database server. A database server can contain multiple
logical databases or data sources.
When setting up your MicroStrategy environment, you must create a separate
connection to the data warehouse and metadata repository. This requirement is true
even if both databases are accessed through the same DBMS. Further description of
these two requirements is provided below:
• A data warehouse stores the data that users of the system must analyze to track and
respond to business trends, and to facilitate forecasting and planning efforts.
• Metadata is a repository whose data associates the tables and columns of a data
warehouse with user-defined attributes and facts to enable the mapping of business
views, terms, and needs to the underlying database structure. Metadata can reside on
the same server as the data warehouse or on a different server. It can be stored in
different relational DBMSs.
A successful ODBC connection requires the following information:
• A data source name (DSN) is the name for a pointer used by a client application to
find and connect to a data source. A data source is the database accessed by a driver.
The information obtained through a DSN generally includes the host computer name
or IP address, instance name, and database name. However, the exact information
varies depending on the type of database server.
• An ODBC driver is a type of software that translates information between the client
application (Intelligence Server) and the database server API. For more information
on ODBC drivers and how they work with MicroStrategy, see ODBC drivers, page
131.
• A connection string stores the information required to connect to a database server.
A connection string usually includes a DSN, as well as the user ID and password
required to log in to the database server. This information varies depending on the
particular database server. For MicroStrategy environments, a connection string is
ODBC drivers
ODBC drivers are DBMS-specific and must be installed on MicroStrategy Intelligence
Server prior to creating the ODBC connection to the warehouse and metadata databases.
MicroStrategy embeds and brands DataDirect ODBC drivers in the MicroStrategy
platform. These drivers are certified to work with MicroStrategy products.
The purpose of an ODBC driver is to translate MicroStrategy Intelligence Server requests
into commands that the DBMS understands. Users of the MicroStrategy platform can
employ the MicroStrategy-branded ODBC drivers to connect MicroStrategy products to
various DBMSs. For a list of the available ODBC drivers for Windows, Solaris, AIX, HP-
UX, and Redhat or SUSE Linux that are certified for Intelligence Server and different
DBMS types, see Certified ODBC drivers for MicroStrategy Intelligence Server, page
43.
See the MicroStrategy Readme file for details about supported and certified ODBC
drivers. To access the MicroStrategy Readme:
• On Windows: From the Start menu, point to Programs, then to MicroStrategy
Documentation, and then choose ReadMe.
• On UNIX/Linux: From the UNIX/Linux File Manager, browse to INSTALL_PATH,
where INSTALL_PATH is the directory that you specified as the install directory
during installation. Double-click the ReadMe.htm file.
Default location for ODBC and driver files for UNIX and Linux
MicroStrategy components require 64-bit drivers to achieve ODBC connectivity.
The ODBC driver manager and support libraries are usually installed in the following
default directories:
Solaris INSTALL_PATH/lib
AIX INSTALL_PATH/lib
HP-UX INSTALL_PATH/lib
The database-specific ODBC drivers are installed in the locations specified during the
installation of the drivers. MicroStrategy-branded ODBC drivers are installed in
INSTALL_PATH/lib, where INSTALL_PATH is the directory you specified as the
Install Directory in the Install Wizard.
Defining DSNs
After you install an ODBC driver, you can define one or more data sources for it. The
DSN should provide a unique description of the data, for example, Payroll_Project_
Metadata or Payroll_Warehouse.
The DSN is the name for a pointer used by a client application (in this case
MicroStrategy) to find and connect to a data source. Multiple DSNs can point to the
same data source and one DSN can be used by different applications.
You can define a data source connection with a DSN by using:
• The MicroStrategy Connectivity Wizard—configures connectivity to data sources by
creating a DSN that uses a MicroStrategy-branded ODBC driver (see Creating a DSN
for a data source, page 133).
• The Microsoft ODBC Data Source Administrator—creates a DSN for an ODBC driver
that is not MicroStrategy-branded (see Managing ODBC and data sources with
Microsoft ODBC Data Source Administrator, page 134).
To create a DSN
examples displayed. Once you perform your command, the DSN is created
and you can skip the rest of this procedure. For detailed steps on how to use
the command line version of this tool, see Creating a DSN for a data
source, page 350 in Chapter 11, Configuring MicroStrategy Using
Command Line Tools.
2 Click Next. A list of database drivers is displayed. The list available for Windows is
different than the list available for UNIX/Linux. For a list of the available ODBC
drivers for Windows, Solaris, AIX, HP-UX, and Redhat or SUSE Linux that are
certified for Intelligence Server and different DBMS types, see Certified ODBC
drivers for MicroStrategy Intelligence Server, page 43.
3 Select a database driver with which to create a DSN and click Next. The Driver
Details page opens.
Only a few databases can contain metadata repositories. For details, refer to
the MicroStrategy Readme. Only DSNs created to connect to these databases
can be used to connect to metadata repositories.
4 Enter the information in the appropriate fields for connecting with the selected
database driver. The information to enter varies depending on the database platform
that you selected. For more information, see Creating DSNs for specific data
sources, page 380.
5 Click Test to verify the connection. The Test Connection dialog box opens.
6 Enter the User Name and Password to connect to the database.
7 Click Connect to test and verify the connection. If the test is performed
successfully, the connection with the database is established. If the test fails, verify
the correct connection information with your database administrator and make any
required changes to the information you provided in the previous steps.
8 Click Close, and then Finish to create the new DSN.
If you already have an existing DSN with the same name as the one you
provided, a message box appears. You have the following options:
▫ Select Yes to make sure the DSN points to the location you are
expecting. This overwrites the existing DSN.
▫ Select No to save the DSN with a different name.
9 Repeat the above steps to create as many DSNs as you require. At a minimum, create
one for your metadata and one for your warehouse.
Managing ODBC and data sources with Microsoft ODBC Data Source
Administrator
The Microsoft ODBC Data Source Administrator manages database drivers and data
sources on Windows. The Microsoft ODBC Data Source Administrator utility creates a
log with which to trace calls to data sources and to view, create, and edit DSNs. The
utility is available from Microsoft and is usually included with the purchase of an ODBC
driver.
• It is strongly recommended that you use the Connectivity Wizard when creating a
new DSN for a MicroStrategy-branded ODBC Driver. Use the Microsoft ODBC Data
Source Administrator only if you intend to use a non-MicroStrategy driver.
• If you choose to create DSNs using the Microsoft ODBC Data Source Administrator,
they must be system DSNs. Otherwise, MicroStrategy interfaces cannot recognize
them.
1 Log in to the machine as an administrator. This gives you the ability to create a
system-wide DSN, rather than a user-specific DSN.
2 In most Windows systems you can access the ODBC Data Source Administrator from
the Control Panel. Refer to your third-party Microsoft documentation for steps to
access the ODBC Data Source Administrator tool.
3 Click the System DSN tab. A list displays all the existing system data sources and
their associated drivers.
To view all the installed ODBC drivers, click the Drivers tab.
4 Click Add. The Create New Data Source dialog box opens.
5 Select the desired driver and click Finish. A driver setup dialog box is displayed.
6 Enter the information in the appropriate fields to create a data source for the
selected database driver.
The information to enter varies depending on the database platform that you
selected, which is discussed in Creating DSNs for specific data sources, page 380.
7 Click OK to create a new DSN.
The test method described above reflects the situation when the ODBC driver and
the database network software are bundled. If they are not bundled, they must be
configured and tested separately, using database-specific tools.
Prerequisites
Before you use the DB Query Tool, test the network layer with the network layer utility,
PING.EXE. Consult your operating system or network system documentation for details.
configure the metadata repository, statistics tables and Enterprise Manager repository,
History List tables, MicroStrategy Intelligence Server, and multiple project sources.
If you are configuring MicroStrategy using the Windows operating system, you must have
administrative privileges on the computer on which the Intelligence Server is installed,
so that you can define the parameters necessary to start the Intelligence Server and to
invoke server-definition objects.
You can also configure your MicroStrategy installation using the Configuration Wizard in
silent or unattended mode. This allows you to load an existing setup routine to configure
your MicroStrategy installation. For information on running the Configuration Wizard
with a response file, see Configuring MicroStrategy with a response file, page 161.
You can also use the Configuration Wizard to:
• Configure MicroStrategy Health Center, which can help you prevent, diagnose, and
fix problems in your MicroStrategy system. Health Center detects known problems
and provides an immediate solution to many of them. For steps on how to configure
Health Center using the Configuration Wizard, see the System Administration Guide.
• Create an Enterprise Manager project, which provides insights about governing and
tuning all areas of your MicroStrategy environment. For steps on how to create an
Enterprise Manager project, see the Operations Manager Guide.
— Browse to the folder bin and type ./mstrcfgwiz, then press ENTER. The
Configuration Wizard opens. Continue to the steps provided in To select a
configuration task, page 141.
• UNIX or Linux from the command line, then perform the following steps:
— From a UNIX/Linux console window, browse to HOME_PATH, where HOME_
PATH is the directory that you specified as the home directory during
installation.
— Browse to the folder bin and type ./mstrcfgwiz-editor, then press
ENTER.
This command displays the command line version of the Configuration
Wizard. You can configure the connection of a data source to Intelligence
Server by creating a response file or using an existing response file. The
command line prompts guide you through configuring the connection of a
data source to Intelligence Server by creating a response file or using an
existing response file and should be used in place of the steps below. For
information on using a response file to configure MicroStrategy, see
Configuring MicroStrategy in command line mode, page 337.
MicroStrategy environment and migrate various features to the new version. For
all available upgrade and migration options, see the Upgrade Guide.
• Health Center Configuration: You can use the Configuration Wizard to
configure MicroStrategy Health Center, which can help you prevent, diagnose,
and fix problems in your MicroStrategy system. Health Center detects known
problems and provides an immediate solution to many of them. For steps on
how to configure Health Center using the Configuration Wizard, see the System
Administration Guide.
The remainder of this chapter describes each configuration option in detail.
After completing these steps, an empty metadata repository is created. To learn how to
add projects to your metadata repository, see the Project Design Guide.
It is recommended that you create the metadata, History List, and statistics
repository tables in different databases to ensure enhanced performance.
For steps to create metadata, History List, and statistics repositories, see:
• Creating a metadata repository, page 143
• Creating a History List repository, page 146
• Creating statistics and Enterprise Manager repositories to maintain and monitor
system activity, page 148
As you complete the configuration process, messages may be displayed. For details on
system messages displayed during the configuration process, see Configuration
messages, page 151.
You can choose to create metadata, History List, and statistics repositories using a
response file with the Configuration Wizard. This lets you provide users with a
configuration file to complete the configuration tasks rather than requiring users to step
through the Configuration Wizard. Creating and using a response file can be done using
the Configuration Wizard interface or a command line tool available for UNIX and
Linux. The steps to perform these two configuration options are provided in the sections
listed below:
• Configuring MicroStrategy with a response file, page 161
• Configuring MicroStrategy with a response.ini file, page 353 in Chapter 11,
Configuring MicroStrategy Using Command Line Tools
While creating metadata, History List, and statistics repositories, the Configuration
Wizard provides an option to preview the SQL statements that will be executed.
You can review this SQL preview to have a better understanding of the tasks that
will be required as part of creating metadata, History List, and statistics
repositories.
Refer to your third-party database documentation for specific names and details on
database permissions and database objects.
Prerequisites
• Before you create a metadata repository, you should ensure that you are storing it on
a certified database, ODBC driver, and operating system combination. For a list of
certified metadata repository environments, see the MicroStrategy Readme.
• A database user account to associate with the metadata tables. MicroStrategy
recommends that the database user account used to create a metadata repository is
granted full permissions for the database. If the database user account cannot be
granted full permissions to the database, refer to Required database permissions to
create metadata, History List, and statistics repositories, page 143 for additional
details on the database permissions required for this configuration.
• While metadata creation errors are rare in general, you can review a list of potential
errors in Metadata and other repository creation errors, page 424 to prepare for or
avoid specific scenarios that can cause errors.
Although it is possible to use the Microsoft Access database for the metadata
repository, it is not a suitable metadata repository for a production project.
You should not use Microsoft Access for anything other than a proof-of-
concept or demonstration type of application.
5 Type a User Name and Password that can connect to the data source.
The database user that you provide becomes the owner of all metadata tables and
objects. The database user is required to have the Select, Insert, and Update
permissions. Intermediate tables are created in the metadata for recursive search
queries, which requires Create and Drop permissions as well. Updating the schema
requires the Delete permission.
6 After providing a valid user name and password, you can click SQL Preview to
open the SQL Preview dialog box. This dialog box provides the SQL statements that
will be executed on your data source to create the metadata tables. Click Close once
you are done reviewing the SQL statements to return to the Configuration Wizard.
If you use the advanced options to change the SQL script, you can click SQL Preview
after selecting the new script to see an updated listing of the SQL statements that will
be executed.
You can click Save to save the configuration as a response (.ini) file to configure
metadata repositories on other systems or to run silent configurations at a later time.
For information on running the Configuration Wizard with a response file, see
Configuring MicroStrategy with a response file, page 161.
12 Click Finish to apply the configuration and create the metadata repository. The
summary information is updated as the configurations are completed, providing a
way to track the progress of the configurations.
If you are upgrading your History List repository from a previous version of
MicroStrategy rather than creating a brand new History List repository, see the
Upgrade Guide.
Prerequisites
• Before you create a History List repository, you should ensure that you are storing it
on a certified database, ODBC driver, and operating system combination. For a list of
certified History List repository environments, see the MicroStrategy Readme.
• A database user account to associate with the History List tables. MicroStrategy
recommends that the database user account used to create History List Tables is
granted full permissions for the database. If the database user account cannot be
granted full permissions to the database, refer to Required database permissions to
create metadata, History List, and statistics repositories, page 143 for additional
details on the database permissions required for this configuration.
• The steps below are specific to creating a History List repository. If you also select to
create a metadata repository, you must first complete the steps described in Creating
a metadata repository, page 143.
• While History List creation errors are rare in general, you can review a list of
potential errors in Metadata and other repository creation errors, page 424 to
prepare for or avoid specific scenarios that may cause errors.
To specify a History List table prefix and complete History List repository
creation
7 Click Advanced. Options to specify a table prefix and a SQL script to create History
List tables are displayed.
8 In the Table Prefix field, you can specify a prefix to be used when History List
tables are created in the database you select. This is an optional configuration.
However, you must use different prefixes for your metadata tables and your History
List tables if you store them in the same database.
Most databases use a prefix of two characters. However, you can supply as many
letters, numbers, underscores (_), and periods (.) as required to support your
database prefixes. To determine character limits for a prefix, refer to your third-party
database vendor documentation.
If you use a table prefix for your History List tables, you must also define this table
prefix when you create a database instance to connect to the History List tables. For
For details on how to configure projects to log statistics, refer to the Monitoring System
Usage chapter in the System Administration Guide.
If you create statistics and Enterprise Manager repositories as part of the same
configuration routine to create a metadata repository, and the configuration is being
done on a Windows environment, a database instance is automatically created for the
statistics repository. If you create the statistics repository separately, you create it for an
existing metadata repository, or you create it on a UNIX or Linux environment, you must
create a database instance for the statistics repository. For information on creating a
database instance, see Creating a database instance, page 175.
If you are upgrading your statistics and Enterprise Manager repositories from a
previous version of MicroStrategy rather than creating a brand new statistics
repository, see the Upgrade Guide.
Prerequisites
• Before you create statistics and Enterprise Manager repositories, you should ensure
that you are storing them on a certified database, ODBC driver, and operating system
combination. For a list of certified environments, see the MicroStrategy Readme.
• A database user account to associate with the repositories. MicroStrategy
recommends that the database user account used to create the tables is granted full
permissions for the database. If the database user account cannot be granted full
permissions to the database, refer to Required database permissions to create
metadata, History List, and statistics repositories, page 143 for additional details on
the database permissions required for this configuration.
• The steps below are specific to creating statistics and Enterprise Manager
repositories. If you also select to create a metadata repository or History List
repository, you must first complete the steps described in Creating a metadata
repository, page 143 or Creating a History List repository, page 146, respectively.
• While statistics creation errors are rare in general, you can review a list of potential
errors in Metadata and other repository creation errors, page 424 to prepare for or
avoid specific scenarios that may cause errors.
If an applicable DSN does not exist, you can select New to open the Connectivity
Wizard and create a new DSN. The steps to create a new DSN with the Connectivity
Wizard are described in the section Creating a DSN for a data source, page 133.
5 Type a User Name and Password that can connect to the data source.
The database user you provide becomes the owner of all tables and objects. The
database user is required to have the Select, Create, Insert, and Drop permissions.
6 After providing a valid user name and password, you can click SQL Preview to
open the SQL Preview dialog box. This dialog box provides the SQL statements that
will be executed on your data source to create the statistics and Enterprise Manager
tables. Click Close once you are done reviewing the SQL statements to return to the
Configuration Wizard.
If you use the advanced options to change the SQL script, you can click SQL Preview
after selecting the new script to see an updated listing of the SQL statements that will
be executed.
SQL scripts
MicroStrategy has database-specific SQL scripts for creating metadata, History List, and
statistics tables. The scripts for each certified database platform are shipped with the
Configuration messages
Depending on the selected ODBC database, different messages might be displayed
prompting you to complete the configuration successfully. Two examples are described
below:
• Metadata tables already exist at this location. Would
you like to recreate them? (This will drop all existing
information in the Metadata)
This message is displayed if the Configuration Wizard detects an existing metadata
repository in the database location you specified.
Multiple server definitions can be available, but you can install only one
Intelligence Server on one server machine and Intelligence Server uses only one
server definition at a time.
For steps to set up Intelligence Server, see To set up MicroStrategy Intelligence Server,
page 152 below.
You can choose to configure the server definition, project source names, and the
metadata and statistics repositories using a response file with the Configuration Wizard.
This lets you provide users with a configuration file to complete the configuration tasks
rather than requiring users to step through the Configuration Wizard. Creating and using
a response file can be done using the Configuration Wizard interface or a command line
tool available for UNIX and Linux. The steps to perform these two configuration options
are provided in the sections listed below:
• Configuring MicroStrategy with a response file, page 161
• Configuring MicroStrategy with a response.ini file, page 353 in Chapter 11,
Configuring MicroStrategy Using Command Line Tools
Prerequisites
• You must run the Configuration Wizard locally on the Intelligence Server machine.
You cannot create, use, or delete server definitions remotely.
Although it is possible to use the Microsoft Access database for the metadata
repository, it is not a suitable metadata repository for a production project.
You should not use Microsoft Access for anything other than a proof-of-
concept or demonstration type of application.
4 Click Next. If a message is displayed that your metadata is not up to date with the
most recent version of MicroStrategy, you must upgrade your metadata to take
advantage of the new features available in the most recent version of MicroStrategy.
You can upgrade your MicroStrategy metadata as described in the Upgrade Guide.
5 In the Server Configuration: MicroStrategy Authentication page, specify the
MicroStrategy administrator’s User Name and Password. By default, the user
name is Administrator and it has no password. If you are setting up Intelligence
Server for the first time, use the default user name and password.
For security reasons, you should change the Administrator user name and
password as soon as possible after you initially configure the system. Refer to
the System Administration Guide for details about passwords and other user
management information.
Running the Configuration Wizard again and clearing this check box does not
unregister Intelligence Server as a service. To unregister Intelligence Server on
UNIX or Linux, you must stop the service, and then use the mstrctl
command line tool. The syntax is mstrctl -s IntelligenceServer
us, where IntelligenceServer is the name of a server definition. For
information on starting, stopping, and registering Intelligence Server as a
service, see the System Administration Guide.
• Projects to load at startup: This pane displays all the projects that are in the
metadata repository. You can select projects to use with the server definition that
you have chosen. The projects that you select are loaded on the server at startup.
• Start Intelligence Server when finished: Select this check box to have
Intelligence Server start once you complete this configuration.
If you use Windows NT authentication with SQL Server, you must type the
Windows NT account user name and password in the Service Manager to
successfully start Intelligence Server. For information on how to access and use
the Service Manager, see the System Administration Guide.
• Identify missing DSNs: Select this check box to verify that all DSNs, which
are used for database instances created in MicroStrategy, are locally available.
This helps to ensure that your database instances in MicroStrategy can connect
successfully to their associated data sources.
By default, this check box is cleared, which means the availability of all local
DSNs used in database instances is not verified. While this may mean that all
DSNs used in database instances are not available, it can save system resources
required for the Intelligence Server configuration process.
9 Click Next. The SSL Configuration Page opens.
When defining the default statistics repository, you must provide the following
configuration details:
▫ DSN: Select the data source name for your statistics repository.
If a DSN for your statistics repository does not exist, you can click New to
open the MicroStrategy Connectivity Wizard and create a new DSN.
▫ User Name: Type the database user name for the user that can connect to
the statistics data source.
▫ Password: Type the password for the user that can connect to the
statistics data source.
▫ Enable Basic Statistics (For newly created projects and existing
projects not logging statistics): Select this check box to start logging
basic statistics for new projects and any projects that are not currently
logging statistics. You must use the Project Configuration Editor available in
MicroStrategy Developer to:
— Enable additional statistics for a project.
— Enable basic and additional statistics for a project if you cleared this
check box.
13 Click Next. The Summary page opens.
Prerequisites
• For Windows, the Project Source option is available only if the Developer product is
installed on the machine.
2 Select Project Sources, and click Next. The Project Source Creation: Name page
opens.
3 In the Project Source Name field, type a name for the project source.
4 Under Connection Type, select Direct (2-tier), and click Next. The Project
Source Creation: Metadata Location page opens.
5 From the DSN drop-down list, select a DSN for the data source that stores the
metadata and specify a User Name and Password.
You can also click New to create a new DSN (see Creating a DSN for a data source,
page 133) and click Advanced to specify a metadata table prefix if necessary.
6 Click Next. The Project Source Creation: Authentication page opens.
7 Select the authentication mode for the project source. For information on the
available authentication modes, see the Authentication modes, page 160.
8 Click Next. The Summary page opens.
9 Review the summary information.
You can click Save to save the configuration as a response (.ini) file to configure a
direct project source on other systems or to run silent configurations at a later time.
For information on running the Configuration Wizard with a response file, see
Configuring MicroStrategy with a response file, page 161.
10 Click Finish to create the project source. The summary information is updated as
the configurations are completed, providing a way to track the progress of the
configurations.
Prerequisites
• For Windows, the Project Source option is available only if the Developer product is
installed on the machine.
Authentication modes
Authentication is the process through which the system identifies the user. Several
authentication modes are supported for MicroStrategy project sources. They vary
primarily by the system that verifies and accepts the login/password credentials provided
by the user.
Some authentication modes require a server project source (three-tier). Therefore, if you
are creating a direct project source (two-tier) some of the authentication options listed
below cannot be used:
• Network login ID: Windows authentication, page 160
• Login ID and password entered by the user: Standard authentication, page 160
• Guest account: Anonymous authentication, page 160
• LDAP authentication, page 161
• Login ID and password entered by the user for the warehouse: Database
authentication, page 161
• Integrated authentication, page 161
For information on the benefits of the various authentication modes and other
authentication topics, see the System Administration Guide
modifying the Public user group. Guest users inherit their privileges from the Public
group; they are not part of the Everyone group.
LDAP authentication
Lightweight Directory Access Protocol (LDAP) authentication identifies users within a
repository of users stored in an LDAP server (such as Novell Directory Services). If you
use an LDAP directory to centrally manage users in your environment, you may want to
use LDAP authentication. Group membership can be maintained in the LDAP directory
without having to also be defined in the MicroStrategy Intelligence Server. When using
LDAP authentication, LDAP users or groups are linked to users or groups in the
MicroStrategy environment.
Login ID and password entered by the user for the warehouse: Database
authentication
This mode of database authentication identifies users using a login ID and password
stored in the data warehouse database. Under this mode of authentication, a warehouse
database is associated with each project. When users log in to a project source, they are
logging in to the Intelligence Server. Use database authentication if you want the data
warehouse RDBMS to be the authority for identifying users and you do not want to
maintain user credentials in the Intelligence Server as well as the RDBMS.
Integrated authentication
Integrated authentication enables a Windows user to log in once to their Windows
machine. The user does not need to log in again separately to MicroStrategy Developer or
MicroStrategy Web. This type of authentication uses Kerberos to validate a user’s
credentials.
• For steps to create an Enterprise Manager project with a response file, see the
Operations Manager Guide.
The steps below are specific to configuring MicroStrategy installed on Windows. For
steps to create and use a response file as well as perform other configurations using
command line tools in UNIX and Linux, see Chapter 11, Configuring MicroStrategy
Using Command Line Tools.
1 Type the following command in the Windows command line:
macfgwiz.exe -r “Path\response.ini”
Where Path\ is the fully qualified path to the response file. For example, the
common location of a response file is:
C:\Program Files\Common Files\MicroStrategy\RESPONSE.I
NI
2 If an error message is displayed, check the path and name you supplied for the
response file and make any required changes. Repeat the previous step to execute the
configuration.
The response file for configuring MicroStrategy is divided into three areas of
configuration, which are described in the sections below:
• Creating metadata, History List, and statistics repositories, page 164
• Setting up MicroStrategy Intelligence Server, page 166
• Creating and configuring project sources, page 170
Options Description
[Repositor This section configures the metadata repository and statistics tables. You can have
y] more than one [Repository] section. Additional repository sections can be
included as [Repository1], [Repository2], and so on.
Repository Defines whether a metadata, History List, and statistics repositories are configured,
= as determined by the following values:
• 1: Configures metadata, History List, and statistics repositories.
• 0: Does not configure metadata, History List, and statistics repositories.
Options Description
CreateHist Defines whether a History List repository is created, as determined by the following
ListTables values:
= • 1: Creates a History List repository.
• 0: Does not create a History List repository.
CreateStat Defines whether statistics and Enterprise Manager repositories are created, as
Tables= determined by the following values:
• 1: Creates statistics and Enterprise Manager repositories.
• 0: Does not create statistics and Enterprise Manager repositories.
MetadataPa Locates the SQL scripts for creating the metadata tables. Example paths to SQL
th= scripts in different environments are listed below:
• 64-bit Windows environment: C:\Program Files
(x86)\Common Files\MicroStrategy\MD8SQL8.sql.
• UNIX/Linux: /INTELLIGENCE_SERVER_INSTALL_PATH/mdsql.sql.
HistoryLis Locates the SQL scripts for creating the History List repository. Example paths to
tPath= SQL scripts in different environments are listed below:
• 64-bit Windows environment: C:\Program Files
(x86)\Common Files\MicroStrategy\content_server_db_
Oracle.sql.
• UNIX/Linux: /INTELLIGENCE_SERVER_INSTALL_PATH/content_
server_db_Oracle.sql.
Statistics Locates the SQL scripts for creating the statistics and Enterprise Manager
Path= repositories. Example paths to SQL scripts in different environments are listed
below:
• 64-bit Windows environment: C:\Program Files
(x86)\Common Files\MicroStrategy\StatisticsEnterpriseM
anagerScripts\DDLScripts\CreateTablesScript.sql
• UNIX/Linux: /INTELLIGENCE_SERVER_INSTALL_PATH/statistics_
DB2.sql.
DSNName= Defines the Data Source Name for configuring a metadata repository in the ODBC
database.
UserName= Defines the user name to log in to the database containing the metadata
repository.
UserPwd= Defines the password to log in to the database containing the metadata repository.
Options Description
DSNNameHis Defines the Data Source Name for configuring the History List repository in the
t= ODBC database.
UserNameHi Defines the user name to log in to the database for configuring the History List
st= repository.
UserPwdHis Defines the password to log in to the database for configuring the History List
t= repository.
DSNNameSta Defines the Data Source Name for configuring the statistics and Enterprise
ts= Manager repositories in the ODBC database.
UserNameSt Defines the user name to log in to the database for configuring the statistics and
ats= Enterprise Manager repositories.
UserPwdSta Defines the password to log in to the database for configuring the statistics and
ts= Enterprise Manager repositories.
EncryptPas Defines whether the password is encrypted in the response file, as determined by
sword= the following values:
• 0: The password is not encrypted in the response file, which enables you to modify
the password in the response file later using a text editor. You can then distribute the
response file to multiple users with various login and password credentials. However,
be aware that this can compromise your database security if you do not remove the
password from the response file before distributing it.
• 1: Encrypts the password in the response file, which ensures that your password is
secure. This is the default behavior.
DBName= Defines the database name to create tables in DB2 z/OS. This option should only
be used when connecting to a DB2 z/OS database.
TBName= Defines the tablespace name to be created in the database.This option should only
be used when connecting to a DB2 z/OS database.
Options Description
Options Description
Options Description
Options Description
SSLPort= Defines the port to use for SSL access. By default, the port
is 39321.
CertificatePath= Locates the SSL certificate file you created for Intelligence
Server. Type the full path to the SSL certificate file.
KeyPath= Locates private key file you created while requesting the
certificate for Intelligence Server. Type the full path to the
private key file.
KeyPassword= Defines the password that you used while creating the
private key for the SSL certificate.
DefaultStatisticsRep Specifies whether you can create a default statistics
database instance for the all of the projects of the local
Intelligence Server metadata, as determined by the
following values:
• 1: You can create a default statistics database instance,
using the statistics parameters listed in this table below.
• 0: A default statistics database instance is not created.
Options Description
Options Description
[Client] In this section you can configure the project source name. You can have
more than one [Client] section. Additional client sections can be
included as [Client1], [Client2], and so on.
ConnType= Defines the database connection type for a project source. The following
connection types are supported:
• 2: Connects a project source to the metadata using an ODBC DSN
(Windows only).
• 3: Connects a project source to the metadata through a MicroStrategy
Options Description
DSN= If using connection type 2 (ConnType=2), defines the name of the ODBC
database.
Port= If using connection type 3 (ConnType=3), defines the port number for
the Intelligence Server when creating a server (three-tier) project source.
The default port number for MicroStrategy Intelligence Server is 34952.
Timeout= Defines and enforce a connection time out for inactive users connected to
a project source. The following values are supported:
• 0: Defines that users are not disconnected from project sources due to
inactivity.
• Numerical value greater than 0: A numerical value (in minutes) greater than 0
defines the amount of inactivity that is allowed before a user is automatically
disconnected from a project source.
also support History Lists, statistics, and including data from multiple data sources into
your MicroStrategy project.
You can perform data source connection tasks from the Project Configuration Editor,
which can be accessed by right-clicking a project and selecting Project Configuration.
The steps to create the required components of a database instance are provided in
the following sections: Creating a database instance, page 175, Creating a
database connection, page 178, and Creating a database login, page 182.
When a project architect creates a project, the architect assigns a database instance to
that project. A project specifies only one warehouse database instance at a time, but a
database instance can be assigned to multiple projects. Since only one data source can be
included in the project’s relational schema, all reports and documents return information
from a single data source.
If you have a license for the MultiSource Option feature, you can connect a project to
multiple warehouse database instances. There can be multiple data sources that connect
to the Warehouse Catalog for the project. Since these data source can be integrated as
part of the project’s relational schema, all reports and documents can return information
from multiple data sources. For information on accessing multiple data sources in a
project, see the Project Design Guide.
Regardless of whether you have a license for the MultiSource Option, you can also
extend a project’s access to multiple data sources through other MicroStrategy features.
Freeform SQL, Query Builder, and supporting access through MicroStrategy to other
MDX cube sources such as SAP BW, Hyperion Essbase, and Microsoft Analysis Services
allows non-project database instances to be included and used in a project along with the
warehouse database instances. For information on Freeform SQL and Query Builder, see
the Advanced Reporting Guide. For information on MDX cube sources, see the MDX
Cube Reporting Guide
These non-project database instances can allow a project to connect to the data sources
for the various features and additional data sources mentioned above, instead of
accessing the data from the project’s relational schema. For more information on the
Warehouse Catalog, see the Project Design Guide.
The database instances that you create are separated into two categories:
• SQL data warehouses database instances, page 173
• MDX cube database instances, page 174
Selecting a database instance check box makes that database instance available in the
project for standard MicroStrategy reporting, data marts, Query Builder, and Freeform
SQL. If you have a license for the MultiSource Option, selecting a check box for a
database instance also makes the database instance available from the Warehouse Catalog
to be part of the project’s relational schema.
Database instances can be created as part of the Import Data feature. A database
instance used for the Import Data feature is displayed with the icon. These
database instances are created with security permissions for the user that created
them while using the Import Data feature. If you select one of these database
instances to be included as an available database instance in the project, it is
recommended that you change the security permissions to a MicroStrategy user
with administrative privileges. This includes taking ownership of the database
instance and defining an appropriate access control list. This ensures that no
changes are made to the database instance by other users, which could cause a loss
of connectivity to the data source. For information on the Import Data feature,
refer to the MicroStrategy Web online help.
The shading and color of a database instance in the list of relational database instances
reflects how the database instance is being used in the project:
• Blue text: This is the warehouse database instance, as selected from the warehouse
database instance drop-down list. There can only be one warehouse database
instance for a project, because this database instance’s data is populated in the
Warehouse Catalog to define the project’s relational schema. You cannot choose to
disable the warehouse database instance for the project without first selecting a
different warehouse database instance.
If you have a license for the MultiSource Option, the primary database instance acts
as the main source of data for a project and is used as the default database instance
for tables added to the project.
For information on the Warehouse Catalog as well as accessing multiple data sources
with the MultiSource Option, see the Project Design Guide.
• Bold text: The project contains objects that are dependent on the database
instance. You cannot choose to disable a database instance that has dependent
objects for the project.
• Normal text: The database instance is not being used in the project.
Clearing the check box of a database instance removes the database instance from the
project and deletes any unused Freeform SQL or Query Builder schemas. You can clear a
database instance from a project only if there are no dependent objects in the project for
the database instance. For more information on removing a database instance and
related Freeform SQL and Query Builder schemas from a project, refer to the System
Administration Guide.
A database instance that has an MDX cube schema is represented with bold text. The
shading and color of a database instance in the list of relational database instances
reflects how the database instance is being used in the project:
• Bold: The project contains objects that are dependent on the database instance. You
cannot choose to disable a database instance that has dependent objects for the
project.
• Normal: The database instance is not being used in the project.
If you remove an MDX cube database instance from a project, you can delete any unused
MDX cube schema objects. You can remove database instance from a project only if
there are no dependent objects in the project for the database instance. For more
information on removing a database instance and related MDX cube managed objects
from a project, refer to the System Administration Guide.
For additional information on configuring MDX cube database instances, refer to the
MDX Cube Reporting Guide.
You can also create a new database instance using the Database Instance Wizard
that is available in the Database Instance Manager shortcut menu.
The database connection type you choose should match your data source and
determines whether the database instance is a relational or an MDX cube
database instance.
The Advanced tab is not available for MDX cube database instances.
• Job Prioritization—specifies the job prioritization scheme for the instance and the
number of prioritized connections.
3 From the File menu, point to New, and then select Database Instance. The
Database Instances Editor opens.
4 On the General tab, in the Database instance name field, type the name of the
database instance.
5 In the Database connection type drop-down list, select the data source
connection type according to the data source hosting your database.
If you have upgraded from a previous version of MicroStrategy, you can click
Upgrade to retrieve any database connection types that have been included
since the previous version of MicroStrategy that you used.
6 On the Advanced tab, you can configure various options for the database instance,
including:
• Intermediate table storage: You can specify the database name and table
name space to use when intermediate tables are created. Intermediate tables are
created to support various queries.
• Database gateway support: You can support backwards compatibility for
database gateway support from MicroStrategy version 6.x.
To enable database gateway support, select the Primary database instance
check box, and then select a primary database instance from the drop-down list.
The primary database instance is the database instance that should be used for
element browsing against the selected table and for queries that do not require
joins to other tables. For information on database gateway support, see the
Project Design Guide.
• Data mart optimization: You can support data mart optimization if the data
source for the database instance is in the same data source that contains data
marts.
To enable data mart optimization, select the This database instance is
located in the same warehouse as check box, and then select a database
instance from the drop-down list.
• Table prefix: If the tables in your data source use a table prefix, you can
include the table prefix to identify the proper collection of tables. Click Select to
select a table prefix or define a new table prefix.
• ODBC Version: You can define which ODBC version to use for the database
instance, as described below:
— Use 2.0 ODBC Calls: ODBC 2.0 was used in pre-9.0 versions of
MicroStrategy. You can use this option for backward compatibility if your
database management system does not support ODBC 3.x. This also allows
you to use extended fetch to retrieve blocks of data from the database into
memory, instead of row by row, which is included in the steps To create a
database connection, page 179.
— Use 3.x ODBC Calls: The support of ODBC 3.x is introduced in
MicroStrategy 9.0. You should use this option if your database management
system supports ODBC 3.x.
7 On the Job Prioritization tab, you can configure how jobs are prioritized for the
database instance. For information on configuring job prioritization, see the System
Administration Guide.
8 On the General tab, in the Database connection (default) pane, select the
default data source connection and click OK.
If the necessary database connection does not exist, you can create one by clicking
New. For steps to create a database connection, see Creating a database
connection, page 178 below.
The Database Connections dialog box has different options depending on the database
instance type.
• SQL data warehouse database instances
▫ General: Specifies the database connection name, the warehouse DSN, and the
default database login.
▫ Advanced: Specifies the database driver mode, driver execution mode, and other
miscellaneous warehouse connection settings.
• MDX cube database instances
▫ General: Specifies the database connection name, the default database login, and
additional connection information that you must provide. For more information
on creating a database connection for MDX cube sources, see the MDX Cube
Reporting Guide.
▫ Advanced: Specifies the connection settings, additional connection string
parameters, and connection caching settings.
• HiveThrift Connector database instances
▫ General: Specifies the database connection name, the default database login, and
additional connection information that you must provide. For more information
on defining connection information to Hadoop Hive distributions by using a
database connection, see ODBC Driver for Red Brick for UNIX/Linux, page
395.
▫ Advanced: Specifies the database driver mode, driver execution mode, and other
miscellaneous warehouse connection settings.
The steps below show you how to create a database connection for a relational database
instance. For information on creating a database connection for MDX cube sources,
refer to the MDX Cube Reporting Guide.
Prerequisites
• A database instance has been created, as described in Creating a database instance,
page 175.
1 On the General tab, in the Database connection name box, type a name to
identify the database connection.
2 In the Local system ODBC data sources pane, select the data source name for
the data source.
3 On the Advanced tab, you can define various options per your requirements and
the requirements of the database you are connecting to, including:
• Database driver mode: Select one of the following database driver modes:
Many newer ODBC drivers do not support asynchronous mode because the
driver is capable of opening a new thread and executing a new query while
simultaneously running an earlier query. The MicroStrategy Readme gives
recommendations for the driver execution mode options that can be used for
different ODBC drivers.
• Use extended fetch: Select this check box to enable Intelligence Server to
fetch blocks of data from the database into memory, instead of row-by-row. Be
aware that this functionality is only applied if the database instance is defined to
use 2.0 ODBC calls, which is included in the steps To create a database
instance, page 176.
When defining the connection lifetime, you should determine whether the
data source for the database connection also enforces connection lifetimes.
Most databases enforce some type of limit on a connection lifetime. You
should define the connection lifetime in MicroStrategy to be less than any
limits on connection lifetimes for the data source. This is to avoid the
scenario that the data source ends the database connection before
MicroStrategy can complete the processing being done for that same
database connection.
— Connection idle timeout (sec): Defines the amount of time an inactive
connection to the database remains cached until it is terminated. You must
also set the Connection lifetime, described above, to a value greater than
zero for database connections to be used by more than a single job.
Enforcement of the connection idle timeout can cause a database
connection to be removed before it reaches its connection lifetime. You can
use this connection idle timeout to ensure that database connections do not
remain in Intelligence Server memory in an idle state for an extended
amount of time.
If you type a value of 0, when the job associated with a database connection
is completed, the database connection is deleted and not put into a cache. If
you type a value of -1, a database connection can remain idle and considered
for new jobs until the database connection lifetime is reached.
4 On the General tab, in the Default database login name pane, select the
default database login and click OK.
If the necessary database login does not exist, you can create one by clicking New.
For steps to create a database connection, see Creating a database login, page 182
below.
You create database logins in the Database Connections dialog box by clicking New on
the General tab. Any database login created within the Database Connections dialog box
is available for use across all database connections in the project source.
MicroStrategy reporting and analysis features require a general set of database login
permissions that can connect to and modify the data source and metadata, as described
below:
• For the metadata, the Select, Insert, and Update permissions are required.
Intermediate tables are created in the metadata for recursive search queries, which
requires Create and Drop permissions as well. Updating the schema requires the
Delete permission.
• For the data warehouse, the Select, Create, Insert, and Drop permissions are
required.
When you choose to create a new database login, the Database logins dialog box opens.
Prerequisites
• A database instance has been created, as described in Creating a database instance,
page 175.
• A database connection has been created, as described in Creating a database
connection, page 178.
1 In the Database Login field, type the name of the database login.
2 Provide the user ID and password required to access the data source, using one of
the following methods:
• Type the user ID in the Login ID field, and type the password for that user ID
in the Password field.
• Select the Use network login ID check box to connect to the data source
using the network user credentials which are also used to run Intelligence
Server. If Intelligence Server is running as a service, this is the user that is
running the mstrsvr.exe process. To determine this user, in MicroStrategy
Service Manager, select MicroStrategy Intelligence Server and click
Options. The user is listed on the Service Startup tab, in the Login field. If the
Service Account Name is defined as System Account, the Windows user
credentials are used to access the data source.
3 Click OK.
Database logins are passed to the data source any time a user executes a report or
browses attribute elements. Therefore, all database logins created in MicroStrategy
Developer must be also be created as valid logins in the data source.
• Database Instance: The database instance which connects to the data source
required for the connection mapping.
• User: The user or user group to apply the connection mapping to.
• Language: The language of the data accessed by the connection mapping. You
can use connection mappings to support data internationalization. For
information on supporting data internationalization with connection mappings,
see the Project Design Guide.
• Database connection: The data source to connect to.
• Database Login: The database login for the connection mapping.
6 Click OK.
Creating a project
Now you have configured Intelligence Server and are ready to create a project. There are
various ways to create a project to get your MicroStrategy project started. The different
methods to create a project are described in the Project Design Guide.
Web application servers are not MicroStrategy products, so detailed steps cannot
be provided for every combination of application server and operating system. This
chapter supplies instructions for a few of the most common combinations. The
procedures for different operating systems are similar, but you should refer to the
vendor-provided information and documentation for details specific to your
configuration, or contact MicroStrategy Technical Support.
MicroStrategy Web simplifies the job of deploying to large user groups because end users’
machines only need a supported browser. MicroStrategy Web can be accessed from any
supported browser because no code must be downloaded. Working as a thin client,
MicroStrategy Web provides the functionality that end users and power users require to
take full advantage of the MicroStrategy product suite.
This chapter has the following sections:
• Deploying with IIS (Windows), page 187
Deploying with IIS is the only setup given for the ASP.NET versions of
MicroStrategy Web, Mobile Server, and Operations Manager. The other
deployment procedures use the JSP, platform-independent versions, which
can be deployed with different Web and application servers.
Prerequisites
• For information on supporting IIS 7.x, see and Supporting IIS 7.0.x or IIS 7.5.x as a
web server for MicroStrategy Web or Mobile Server, page 34.
• You must have administrative privileges to deploy MicroStrategy Web for your
project. If this is the first time you are logging in and you have not changed the
default MicroStrategy administrative login, you can use Administrator as the login
with no password. After the first time, the user name and password should be
changed for security purposes.
• The Microsoft Windows’ Users group must have read and execute permissions to all
of the files within the MicroStrategy common files folder. This ensures that Internet
Information Services has the required permissions to host MicroStrategy Web. By
default, this folder is stored in the following directory location:
▫ 32-bit Windows environments:
C:\Program Files\Common Files\MicroStrategy
Prerequisites
• For information on supporting IIS 7.x, see Supporting IIS 7.0.x or IIS 7.5.x as a web
server for MicroStrategy Web or Mobile Server, page 34.
• You must have administrative privileges to deploy MicroStrategy Mobile Server for
your project. If this is the first time you are logging in and you have not changed the
default MicroStrategy administrative login, you can use Administrator as the login
with no password. After the first time, the user name and password should be
changed for security purposes.
• The Users group for Microsoft Windows must have read and execute permissions to
all of the files within the MicroStrategy common files folder. This ensures that IIS
has the required permissions to host MicroStrategy Mobile Server. By default, this
folder is stored in the following directory location:
▫ 32-bit Windows environments:
C:\Program Files\Common Files\MicroStrategy
▫ 64-bit Windows environments: C:\Program Files
(x86)\Common Files\MicroStrategy
Prerequisites
• For information on supporting and IIS 7.x, see Supporting IIS 7.0.x or IIS 7.5.x as a
web server for MicroStrategy Web or Mobile Server, page 34.
• You must have administrative privileges to deploy MicroStrategy Operations
Manager. If this is the first time you are logging in and you have not changed the
default MicroStrategy administrative login, you can use Administrator as the login
with no password. After the first time, the user name and password should be
changed for security purposes.
• The Users group for Microsoft Windows must have read and execute permissions to
all of the files within the MicroStrategy common files folder. This ensures that IIS
has the required permissions to host MicroStrategy Operations Manager. By default,
this folder is stored in the following directory location:
▫ 32-bit Windows environments:
C:\Program Files\Common Files\MicroStrategy
▫ 64-bit Windows environments: C:\Program Files
(x86)\Common Files\MicroStrategy
MicroStrategy 1 Log on to the application server by using the proper user name and password.
Web (JSP) 2 Locate the MicroStrategy.war file in the MicroStrategy Web (JSP) Deployment Directory
you specified during installation.
3 To increase the performance of the application before proceeding with the deployment, see the
Performance-based setup information section, if available, for your environment and configure as
necessary. Also, after deploying MicroStrategy Web (JSP) on your machine, there may be a few
performance-based setup steps that you should complete.
4 Choose the desired deployment method and follow the deployment procedure.
5 Log on to the MicroStrategy Web Administrator Page.
6 Launch MicroStrategy Web.
7 Start working with the application.
You must perform extra configuration steps to allow graphs to support non-Western
European fonts on MicroStrategy Web (JSP) for a UNIX system. For more
information, see Graph and document support of non-Western European fonts,
page 422 of Appendix , Troubleshooting.
MicroStrategy 1 Log on to the application server by using the proper user name and password.
Mobile 2 Locate the MicroStrategyMobile.war file in the MicroStrategy Mobile Server (JSP)
Server (JSP) Deployment Directory you specified during installation.
3 To increase the performance of the application before proceeding with the deployment, see the
Performance-based setup information section, if available, for your environment and configure as
necessary. Also, after deploying MicroStrategy Mobile Server (JSP) on your machine, there may be
a few performance-based setup steps that you should complete.
4 Choose the desired deployment method and follow the deployment procedure.
5 Log on to the MicroStrategy Mobile Server Administrator Page.
6 From the MicroStrategy Mobile Server Administrator Page, configure your MicroStrategy Mobile
applications to communicate with Mobile Server and Intelligence Server. For steps on how to
define this configuration, as well as steps to deploy and configure a certificate server for Mobile
Server, see the MicroStrategy Mobile Design and Administration Guide.
7 Start working with the application.
MicroStrategy 1 Log on to the application server by using the proper user name and password.
Operations 2 Locate the MicroStrategyOM.war file in the MicroStrategy Operations Manager (JSP)
Manager deployment directory you specified during installation.
(JSP)
3 Choose the desired deployment method and follow the deployment procedure.
4 Log on to the MicroStrategy Operations Manager console to connect to the MicroStrategy
environment that is to be monitored and managed using Operations Manager. For steps to create
an environment, see the Operations Manager Guide.
To deploy the application, you must follow a set of steps that are specific to the
application server you are using. For more details, see the application server vendor
documentation or follow the instructions within this guide.
After deploying a WAR file, you can view the WEB-INF folder, which contains a
subfolder named log. The log folder retains all the log files. For more information on
the directory structure after deploying the WAR file, see Directory structure after
deploying the WAR file, page 192.
MicroStrategy Web
Directory Contents
Directory Contents
Directory Contents
Directory Contents
• Re-deploy the application, page 204: Instructions for re-deploying the application.
• Performance-based setup information, page 204: Optional configuration settings to
increase the application’s performance.
The additional configuration steps are not required for MicroStrategy Web
(JSP) to run, but these settings can increase its performance. Review the
performance-based setup information prior to deploying the system to see if
these changes are of interest to you.
Preconfiguration information
This section provides the preconfiguration information necessary to deploy your
MicroStrategy JSP applications on your machine. This includes the following sections:
• Locating the WAR file, page 191
• Setting up Apache Web server to proxy requests to WebLogic, page 196
This section supports the configuration outlined in the following table. While your setup
may vary slightly, for example, you may have different versions of these applications, the
overall process remains the same.
Requirement Recommended
You can deploy MicroStrategy Web, Mobile Server, or Operations Manager using one of
the following deployment methods:
• The automatic deployment feature is the easiest and fastest way. See Deploying
automatically (development mode), page 197. Choose the development mode in the
/WEBLOGIC_MYDOMAIN_FOLDER/bin/startWebLogic.sh file, within the
WebLogic Server folder structure.
• The manual deployment feature can be used for environments where the server is
running in production mode and the automatic deployment is turned OFF. For more
information, see Deploying manually (production mode), page 200.
1 Locate the WAR file for your MicroStrategy JSP application, as described in Locating
the WAR file, page 191.
2 Rename the WAR file to a name you can easily identify and remember. This name is
the context_name used in the uniform resource locator (URL) to access the file.
This step is optional.
If you do not change the name of the file, remember to replace context_
name with MicroStrategy when accessing the application from the URL.
The WAR file must be uncompressed by the same Solaris user who started the
application.
1 Locate the WAR file for your MicroStrategy JSP application, as described in Locating
the WAR file, page 191.
2 Create the following new folder:
/home/username/context_folder
where username is your account name used to access the Web server machine, and
context_folder is the name of the new folder.
You can create the new folder anywhere except in the following location:
/WEBLOGIC_MYDOMAIN_FOLDER/autodeploy
3 Copy the WAR file to the new folder.
4 To explode the WAR file inside the folder you created, run the following command:
# jar -xvf FileName.war
Where FileName is the name of the WAR file for your MicroStrategy
JSP application.
5 Delete the WAR file by using the following command:
# rm FileName.war
Where FileName is the name of the WAR file for your MicroStrategy JSP
application.
6 Move the folder to the autodeploy folder with the following commands:
# cd..
# mv context_folder /WEBLOGIC_MYDOMAIN_
FOLDER/autodeploy
The application is automatically deployed. To add and connect to an Intelligence Server,
see Configuring administrative access to MicroStrategy JSP applications, page 202.
1 Locate the WAR file for your MicroStrategy JSP application, as described in Locating
the WAR file, page 191.
1 Locate the WAR file for your MicroStrategy JSP application, as described in Locating
the WAR file, page 191.
2 Create a folder in the /WEBLOGIC_MYDOMAIN_FOLDER/autodeploy directory
and transfer the WAR file to this directory.
3 Unzip the WAR file using the following command:
#jar -xvf FileName.war
Where FileName is the name of the WAR file for your MicroStrategy JSP
application.
4 Open the WebLogic Server Administration Console by accessing the following
address:
http://IP address:Port/console/
where IP address is the IP address of the machine on which you
installed the WebLogic application server and Port is the port number for
the WebLogic application server.
5 Type a valid user ID and password at the prompt. The user ID and password are the
ones you specified when installing the WebLogic Server on your machine.
6 To complete this operation, see Configuring from the WebLogic Server
Administration Console , page 201 below.
Once you have installed the JSP version of MicroStrategy Web, Mobile Server, or
Operations Manager as a WebLogic Server Administration Console web application, you
have completed the steps required to deploy the application.
To launch the administrative page for MicroStrategy Web (JSP), Mobile Server (JSP), or
Operations Manager (JSP), see Configuring administrative access to MicroStrategy JSP
applications, page 202.
1 The following table lists the URL to access MicroStrategy Web Administrator,
MicroStrategy Mobile Server Administrator, and Operations Manager for each
deployment method.
The servlet names are case-sensitive. Make sure to use the correct case when typing
the mstrWebAdmin name.
If the application server is enabled with security, a dialog box related to the
administrator authentication opens.
Deployment Address
Method
Automatic Access the Administrator page from a web browser using this URL:
deployment
• For Web (JSP): http://IPaddress:7001/context_folder_
Web/servlet/mstrWebAdmin
In the URL listed above, context_folder_Web is the name of the folder where the Web
(JSP) application was exploded and IPaddress is the IP address of your machine.
Deployment Address
Method
Manual Access the Administrator page from a browser using this address:
deployment
• For Web (JSP): http://IPaddress:7001/Web_
name/servlet/mstrWebAdmin
In the URL listed above, IPaddress is the IP address of your machine. Replace the Web_name
variable with the name you specified in the deployed name field when configuring Web (JSP) from
WebLogic Server Administration Console, for example, MyWebApp.
2 Type the same user ID and password that was used to start the WebLogic Server on
your machine.
In WebLogic, the deployment of a MicroStrategy JSP application automatically
associates the WebLogic administrative user with the MicroStrategy JSP application
administrator. The WebLogic administrative user is the user who has permissions to
start the WebLogic Server on a given machine.
3 After you are authenticated:
• If you are deploying MicroStrategy Web (JSP), the MicroStrategy Web
Administrator page appears. Add and connect to an Intelligence Server.
• If you are deploying MicroStrategy Mobile Server (JSP), the MicroStrategy
Mobile Server Administrator page appears. Add and connect to an Intelligence
Server. Once connected, click Mobile Configuration to configure your
MicroStrategy Mobile applications to communicate with Mobile Server and
Intelligence Server. For steps on how to define this configuration, see the
MicroStrategy Mobile Design and Administration Guide. Creating a
configuration completes the steps required to deploy Mobile Server (JSP).
• If you are deploying MicroStrategy Operations Manager (JSP), you can begin to
monitor and manage your MicroStrategy server systems. For steps to create an
environment, see the Operations Manager Guide.
4 For MicroStrategy Web (JSP) deployments, launch the MicroStrategy Web (JSP)
project, as described in Launching the project, page 204.
Deployment Address
Method
Automatic Access MicroStrategy Web (JSP) from a web browser using this URL:
deployment
http://IPaddress:7001/context_folder/servlet/mstrWeb
where context_folder is the name of the folder where the application was
exploded and IPaddress is the IP address of your machine.
Manual Access MicroStrategy Web (JSP) from a browser using the address:
deployment
http://IPaddress/name/servlet/mstrWeb
where IPaddress is the IP address of your machine. Replace the name variable with
the name you specified in the deployed name field when configuring from WebLogic
Server Administration Console, for example, MyWebApp.
Value Description
1 To change the Alias parameter, add the following lines in the httpd.conf file:
Alias /MicroStrategy/images/"/WEBLOGIC_MYDOMAIN_
FOLDER/autodeploy/MicroStrategy/images/"
<Directory "/WEBLOGIC_MYDOMAIN_
FOLDER/autodeploy/MicroStrategy/images">
Options Indexes MultiViews
AllowOverride None
2 Repeat the previous step for the JavaScript and style sheet folders, replacing the
word images in the previous code with the folder name where the JavaScript and
style sheet files are located.
3 Change the MatchExpression parameter by typing */servlet/* in the
MatchExpression parameter. For example,
<IfModule mod_weblogic.c>
WebLogicHost 10.15.133.56
WebLogicPort 7001
MatchExpression */servlet/*
</IfModule>
4 Stop and start the Apache Web server using the commands apachectl start and
apachectl stop.
The Web server now serves image (GIF), style sheet (CSS), JavaScript, and all other static
files, thus reducing the load on the application server and increasing the application’s
performance.
These additional settings are not required, but can increase the performance
of MicroStrategy Web (JSP). Review this information prior to deployment to
see if any of these options are of interest to you.
Preconfiguration information
This section provides the preconfiguration information necessary to deploy
MicroStrategy JSP applications on your machine. Preconfiguration includes the
following step:
• Locating the WAR file, page 191: This file is used as part of the steps for Preparing
for the application installation, page 211.
This section also provides additional setup information for the machine where the
application server and Web server are already installed.
This section supports the following configuration. While your configuration may vary
slightly, for example, you may have different versions of these applications, the overall
process remains the same.
Requirement Recommended
2 Ensure that the Administrative Server has started successfully. Execute the following
commands:
cd WAS_HOME/bin
# ./serverStatus.sh -all
1 In a browser, type the URL for the administrative console. The URL is of the
following form:
http://IP Address:Port/ibm/console
where IP Address is the IP address of the computer on which you installed the
WebSphere application server and Port is the port number for the WebSphere
Administrative Console. Refer to your third-party WebSphere documentation to
confirm the default port number for the administrative console.
Prerequisites
• Copy the WAR file (see Locating the WAR file, page 191) for the MicroStrategy JSP
placation to the WAS_HOME/installableApps directory, where WAS_HOME is the
WebSphere application server home path.
1 To begin the installation for IBM WebSphere, expand Applications, then expand
Application Types, and then select WebSphere enterprise applications. A
list of enterprise applications is displayed.
2 Click Install. Options to specify the path to the new application are displayed.
3 You must specify the path to the WAR file by selecting either the local file system or
remote file system option. For local file systems, you can click browse to navigate to
the location of the WAR file. For remote file systems, type in the full path for the
location of the WAR file.
4 Click Next to continue the installation.
Security must be enabled for the WebSphere Server for this feature to work.
Regenerating plugin-cfg.xml
To regenerate plugin-cfg.xml
The option to stop and start the application server through the administrative
console is available only for the Websphere Network Deployment and Websphere
Enterprise Editions. To stop and start the application server in Websphere Express
and Websphere Base editions, see below.
1 Expand Servers, and then click the WebSphere Application Servers link. A
table listing the application servers and an icon indicating their status appears:
• red: stopped
• green: started
2 Select the box next to the application server you want to stop, and click Stop. The
status icon changes from green to red.
3 Select the application server you want to start and click Start. The application server
starts and the status icon changes to green.
To stop and start the application server in Websphere Express and Websphere Base
editions, use the following commands:
• stopServer.sh server1 to stop the application server
• startServer.sh server1 to start the application server.
The servlet names are case-sensitive. Use the correct case when typing the
mstrWebAdmin name. If the application server is enabled with security, a
dialog box related to the administrator authentication opens.
2 Type the user ID and password assigned with the admin role.
3 After you are authenticated:
• If you are deploying MicroStrategy Web (JSP), the MicroStrategy Web
Administrator page appears. Add and connect to an Intelligence Server.
• If you are deploying MicroStrategy Mobile Server (JSP), the MicroStrategy
Mobile Server Administrator page appears. Add and connect to an Intelligence
Server. Once connected, click Mobile Configuration to configure your
MicroStrategy Mobile applications to communicate with Mobile Server and
Intelligence Server. For steps on how to define this configuration, see the
MicroStrategy Mobile Design and Administration Guide. Creating a
configuration completes the steps required to deploy Mobile Server (JSP).
• If you are deploying MicroStrategy Operations Manager (JSP), you can begin to
monitor and manage your MicroStrategy server systems. For steps to create an
environment, see the Operations Manager Guide.
4 If you are deploying MicroStrategy Web (JSP), proceed to launch the project. For
more information, see Launching the project, page 215.
In these addresses, ContextRoot is the name you provided for the context root
for Web Module box on Preparing for the application installation page. For
example, the default name of the WAR file, which is MicroStrategy. For more
information, refer to Preparing for the application installation, page 211.
4 Click the application server name, scroll to Additional Properties and click Process
Definition.
5 Click JVM Settings to set the Java heap size settings. MicroStrategy recommends
that you initially set the Java heap size to a minimum of 500MB, assuming the
machine has enough memory space.
This value may need to be modified to reflect the requirements of your specific
environment. Refer to your third-party application server documentation for
information on how to determine a satisfactory Java heap size for your environment.
6 Click Apply and save your changes.
7 Stop and start the application server.
For each JSP file compiled without error, the following message appears: Code
generation successful.
Preconfiguration information
This section provides the preconfiguration information necessary for deploying
MicroStrategy JSP applications on your machine, which includes Locating the WAR file,
page 191. It also provides additional setup information that needs to be done on the
machine on which the application server and Web server are already installed.
While your configuration may vary slightly, for example you may have different versions
of these applications, the overall process remains the same:
For information on the version numbers certified and supported by MicroStrategy, see
the MicroStrategy Readme.
The administration and deployment tools in Oracle Glassfish Server have the same
interface regardless of the operating system on which they run. Therefore, the
deployment process is the same for all operating systems, and is described below.
There are some minor changes in the Windows environment, which are
highlighted where necessary.
Prerequisites
• The Oracle Glassfish Server is installed. This installation should also include a default
domain, commonly named domain1. If you plan to use a different domain, refer to
your third-party Oracle documentation for creating a domain.
• Copy the WAR file (see Locating the WAR file, page 191) for your MicroStrategy JSP
application to the same machine as the Oracle Glassfish Server, or to a location that
is accessible to the Oracle Glassfish Server machine.
Prerequisites
• Save the WAR file (see Locating the WAR file, page 191) to the same machine as the
Oracle Glassfish Server, or to a location that is accessible to the Oracle Glassfish
Server machine.
• Access to the administrative pages for MicroStrategy Web (JSP), Mobile Server
(JSP), and Operations Manager (JSP) can be granted by using the admin security
role and the associated mstradmin group. Granting this access to users can be done
within the Oracle Glassfish Server Administration Console after deploying the WAR
file. While this default behavior supports most deployment requirements, if you have
specific security requirements for your system, you must modify the security role
details prior to deploying the WAR file, as described in Deploying MicroStrategy
Web, Mobile Server, or Operations Manager, page 219.
Selecting the WAR file in this manner is recommended as the Packaged File to
Be Uploaded to the Server option uploads the WAR file via HTTP, which can
require considerable time and system resources.
7 Browse to the location where you saved the MicroStrategy JSP application WAR file.
8 Once you select the appropriate WAR file, click Choose File.
9 From the Type drop-down list, select Web Application.
10 In the Context Root field, type the context root for the application, which is
included in various URLs for the application.
• The URL to access MicroStrategy Web (JSP)
(http://IPAddress:PortNumber/ContextRoot/servlet/mstrWeb)
includes the applications context root, which should be replaced by any name of
your choice. For example, you can use the default name of the WAR file, which
is MicroStrategy.
• The URL to access the MicroStrategy Mobile Server Administrator Page
(
http://
IPAddress:PortNumber/ContextRoot/servlet/mstrWebAdmin)
includes the applications context root, which should be replaced by any name of
your choice. For example, you can use the default name of the WAR file, which
is MicroStrategyMobile.
• The URL to access the MicroStrategy Operations Manager
(http://IPAddress:PortNumber/ContextRoot/servlet/mstrOM)
includes the applications context root, which should be replaced by any name of
your choice. For example, you can use the default name of the WAR file, which
is MicroStrategyOM.
11 In the Application Name field, type a descriptive name to distinguish the
application from within the Administration Console.
12 In the Virtual Servers list, select the appropriate server.
13 Select or clear the additional deployment option check boxes according to your
requirements.
It is recommended you select the Precompile JSPs check box to quickly load
the Web pages in the application server when you access it for the first time.
A realm, also called a security policy domain or security domain, is a scope over
which a common security policy is defined and enforced by the security
administrator of the security service. For more information, see the following
resource:
http://docs.oracle.com/cd/E18930_01/html/821-
2435/ggkuk.html#gkbiy
In Oracle Glassfish Server, the file realm is the default realm. For controlling access to
the Administration pages, you can create users and user groups and assign the
mstradmin group to users in your security realm.
To create users that are assigned to the mstradmin group in the file
realm
1 In the Administration Console, from the Tree pane on the left, click server
(Admin Server). Ensure that the server is running or click Start to start the
server.
2 From the Tree pane on the left, expand Configuration, then server-config, then
Security, then Realms, and then select file. The Edit Realm page is displayed.
3 Click Manage Users. The File Users page is displayed.
4 Click New to create a new user. The New File Realm User page is displayed.
5 Type the following information for the new user:
• User ID: The ID that the user provides when authenticating with the system.
• Group List: The groups that the user is a member of. Type mstradmin to
provide the user administrative access to MicroStrategy Web Administrator,
MicroStrategy Mobile Server Administrator, and Operations Manager.
• New Password: The password used to authenticate a user.
• Confirm New Password: A confirmation of the password, required when
creating a new user.
6 Click OK to create the user. You are returned to the File Users page, where you can
continue to create and manage users for the administration realm.
7 To apply all of these changes, stop and restart the application server:
a In the Administration Console, from the Tree pane on the left, select server
(Admin Server). The General Information page is displayed.
b Click Restart.
While this default behavior supports most deployment requirements, you can modify this
glassfish-web.xml file if you have specialized group authentication requirements to
use a group other than the default mstradmin group defined for the admin security
role. Any groups that are used must be included as part of the admin security role.
The contents of this file are as follows, which may differ depending on your installation
of Oracle Glassfish Server:
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glassfish-web-app PUBLIC "-//GlassFish.org//DTD
GlassFish Application Server 3.1 Servlet 3.0//EN"
"http://glassfish.org/dtds/glassfish-web-app_3_0-1.dtd">
<glassfish-web-app>
<security-role-mapping>
<role-name>admin</role-name>
<group-name>mstradmin</group-name>
</security-role-mapping>
</glassfish-web-app>
Once you make any changes to this file, you must deploy the application (see Deploying
your MicroStrategy JSP application, page 220) and assign the security role to the
necessary user accounts (see Configuring administrative access to MicroStrategy JSP
applications, page 222).
IPAddress
:PortNumber/ContextRootMobile/servlet/mstrWebAdmin
In the URL listed above, ContextRootMobile is the name you provided for
the ContextRoot for Web Module box in the section Deploying your
MicroStrategy JSP application, page 220. For example, you can use the default
name of the WAR file, which is MicroStrategyMobile. The default port
number is 8080.
• For Operations Manager (JSP):
http://
IPAddress:PortNumber/ContextRootMobile/servlet/mstrOM
In the URL listed above, ContextRootMobile is the name you provided for
the ContextRoot for Web Module box in the section Deploying your
MicroStrategy JSP application, page 220. For example, you can use the default
name of the WAR file, which is MicroStrategyOM. The default port number is
8080.
The servlet names are case-sensitive. Use the correct case when typing the
mstrWebAdmin name. If the application server is enabled with security, a
dialog box related to the administrator authentication opens.
2 Type the user ID and password for a user who is a member of the mstradmin group,
as described in Configuring administrative access to MicroStrategy JSP
applications, page 222.
3 After you are authenticated:
• If you are deploying MicroStrategy Web (JSP), the MicroStrategy Web
Administrator page appears. Add and connect to an Intelligence Server.
• If you are deploying MicroStrategy Mobile Server (JSP), the MicroStrategy
Mobile Server Administrator page appears. Add and connect to an Intelligence
Server. Once connected, click Mobile Configuration to configure your
MicroStrategy Mobile applications to communicate with Mobile Server and
Intelligence Server. For steps on how to define this configuration, see the
MicroStrategy Mobile Design and Administration Guide. Creating a
configuration completes the steps required to deploy Mobile Server (JSP).
• If you are deploying MicroStrategy Operations Manager (JSP), you can begin to
monitor and manage your MicroStrategy server systems. For steps to create an
environment, see the Operations Manager Guide.
4 If you are deploying MicroStrategy Web (JSP), proceed to launch the MicroStrategy
project. For more information, see Connecting to the Web (JSP) project page, page
225 immediately below.
1 In the Administration Console, from the Tree pane on the left, click Applications.
The Applications page is displayed.
2 Select the check box for the MicroStrategy JSP application.
3 Click Undeploy.
4 After the undeployment is finished, stop and restart the application server for the
changes to take effect.
Preconfiguration information
This section provides the preconfiguration information necessary to deploy
MicroStrategy JSP applications on Tomcat on your machine.
While your setup may vary slightly, for example, you may have different versions of these
applications, the overall process remains the same.
Requirement Recommended
The download site displays a number of software options. These might include
terms such as JRE, JDK, and Java SDK. You must install a development kit (which
is termed JDK or SDK) rather than installing only the JRE.
To configure the JDK, a system variable must point to the folder where you install
the JDK. If you install the JDK to a simple folder path such as C:\ setting the
system variable is easier and more likely to be correct.
After you install the Oracle JDK, you must configure it.
1 On your Windows machine, access the environment variables using the steps below:
a From the Start menu, select Computer. The Computer dialog box opens.
b Click System properties. The System dialog box opens.
c Click Advanced system settings. The System Properties dialog box opens.
d Click Environment Variables. The Environment Variables dialog box opens.
2 Under System Variables, click New to create a system variable. The New System
Variable dialog box opens.
3 In the Variable Name field, type JAVA_HOME.
4 In the Variable Value field, type the path of the folder where you installed the
JDK and click OK.
If you have installed JDK under the Program Files folder, type Progra~1
when specifying the folder name in the Variable Value box; otherwise the system
does not recognize the folder. For example, type C:\Progra~1\jdk1.6.0 in
the Variable Value box.
Configuring Tomcat
This procedure assumes that you have downloaded and installed Tomcat on your
machine. You can download Tomcat from the Apache website; depending on the version
you want to download, you may need to locate the appropriate file in Apache’s Archive
area. Instructions for downloading and installing Tomcat are also available on the
Apache website.
To configure Tomcat, a system variable must point to the folder where you install
Tomcat. Installing Tomcat to a simple folder path such as C:\Tomcat makes it easier
to define the system variable.
After you install Tomcat, you must configure it.
To configure Tomcat
1 On your Windows machine, access the environment variables using the steps below:
a From the Start menu, select Computer. The Computer dialog box opens.
b Click System properties. The System dialog box opens.
c Click Advanced system settings. The System Properties dialog box opens.
d Click Environment Variables. The Environment Variables dialog box opens.
2 Under System Variables, click New to create a system variable. The New System
Variable dialog box opens.
3 In the Variable Name field, type CATALINA_HOME.
4 In the Variable Value field, specify the path of the folder where you installed
Tomcat and click OK. For example, if you installed Tomcat directly to the C drive,
the destination folder is C:\Tomcat.
1 Locate the WAR file for your MicroStrategy JSP application, as described in Locating
the WAR file, page 191.
2 Copy the WAR file to the Tomcat\webapps folder.
5 Browse to the Tomcat\bin folder, where Tomcat is the folder in which you
installed Tomcat. For example, in the command prompt, type
cd C:\Tomcat\bin
6 Press ENTER.
C:\Tomcat\bin> is displayed at the command prompt.
7 Type the required commands to start and stop Tomcat, which depends on your
version of Tomcat. For example, for Tomcat 7, type Tomcat7 start to start
Tomcat and type Tomcat7 stop to stop Tomcat. Refer to your third-party Apache
documentation for information on the commands to start and stop Tomcat.
If you installed Tomcat under the Program Files folder, type Progra~1 when
you change folders in the command prompt. Otherwise, the system does not
recognize the folder. For example, type C:\Progra~1\Tomcat\bin in the
command prompt.
You can specify any value in the user name and password fields.
If you are using Tomcat integrated with IIS, you do not need to specify the
port number in the URL. However, when using Tomcat as a stand-alone Web
container, you must specify the port number. The default port for Tomcat is
8080.
2 When prompted for a user name and password, use the same values you specified in
the tomcat-users.xml file.
3 After you are authenticated:
• If you are deploying MicroStrategy Web (JSP), the MicroStrategy Web
Administrator page appears. Add and connect to an Intelligence Server.
• If you are deploying MicroStrategy Mobile Server (JSP), the MicroStrategy
Mobile Server Administrator page appears. Add and connect to an Intelligence
Server. Once connected, click Mobile Configuration to configure your
MicroStrategy Mobile applications to communicate with Mobile Server and
Intelligence Server. For steps on how to define this configuration, see the
MicroStrategy Mobile Design and Administration Guide. Creating a
configuration completes the steps required to deploy Mobile Server (JSP).
• If you are deploying MicroStrategy Operations Manager (JSP), you can begin to
monitor and manage your MicroStrategy server systems. For steps to create an
environment, see the Operations Manager Guide.
4 If you are deploying MicroStrategy Web (JSP), proceed to launch the MicroStrategy
project. For more information, see Launching the project, page 232.
Preconfiguration information
This section provides the preconfiguration information necessary to deploy
MicroStrategy JSP applications with Tomcat on your Linux machine:
• Installing the JDK, page 233
• Configuring the JDK, page 233
• Installing Tomcat, page 234
• Configuring Tomcat, page 234
• Locating the WAR file, page 191
While your setup may vary slightly, for example, you may have different versions of these
applications, the overall process remains the same.
Requirement Recommended
The download site displays a number of software options. These might include
terms such as JRE, JDK, and Java SDK. You must install a development kit (which
is termed JDK or SDK) rather than installing only the JRE.
To configure the JDK, a system variable must point to the folder where you install
the JDK. If you install the JDK to a simple folder path such as C:\ setting the
system variable is easier and more likely to be correct.
From the location in which to install the JDK, run the file you downloaded:
jdk-Version-linux-i586.bin
For example, to install version 1.6.0, type the following:
jdk-1_6_0-linux-i586.bin
1 Open the /etc/profile file using a program that allows you to edit the file.
2 Add the following line:
export JAVA_HOME=/PathName/jdkVersion;
where PathName is the destination folder where you installed the JDK and
Version is the version, such as 1_6_0, of the JDK.
Installing Tomcat
This procedure assumes that you have downloaded and installed Tomcat in a directory
named Tomcat on your machine. If you have not installed Tomcat yet, download the zip
file from the following website
• Tomcat 7.0.x: website. http://tomcat.apache.org/download-70.cgi
• Tomcat 8.0.x: website. http://tomcat.apache.org/download-80.cgi
Contact your System Administrator or visit the Apache website for instructions on
downloading and installing Tomcat.
Configuring Tomcat
After you install Tomcat, you must configure Tomcat. The Tomcat configuration includes
creating the environment variable CATALINA_HOME and defining this environment
variable to point to the Tomcat directory.
To configure Tomcat
1 Open the etc/profile file in a program that allows you to edit the file.
2 Type the following:
export CATALINA_HOME = /PathName
where PathName is the directory where you have installed Tomcat.
For example,
export CATALINA_HOME = /Tomcat
follows:
JAVA_OPTS = "-Xms1024m -Xmx2048m"
This value may need to be modified to reflect the requirements of your specific
environment. Refer to your third-party application server documentation for information
on how to determine a satisfactory Java heap size for your environment.
1 Locate the WAR file for your MicroStrategy JSP application, as described in Locating
the WAR file, page 191.
2 Copy the WAR file to the Tomcat/webapps directory.
You can specify any value in the user name and password fields. These are
used to log in to the MicroStrategy Web Administrator and Mobile Server
Administrator pages. The roles field must be admin.
steps provided below to deploy MicroStrategy Web (JSP), MicroStrategy Mobile Server
(JSP), or MicroStrategy Operations Manager (JSP):
• Preconfiguration information, page 238: Configuration that must occur before you
begin deploying MicroStrategy Web (JSP), Mobile Server (JSP), or Operations
Manager (JSP).
• Deploying MicroStrategy Web, Mobile Server, or Operations Manager, page 238:
Instructions for deploying the application.
Preconfiguration information
This section provides the preconfiguration information necessary to deploy
MicroStrategy JSP applications on your machine. It also provides additional setup
information for the machine where the application server and web server are already
installed.
The configuration required to deploy MicroStrategy JSP applications on SAP is provided
in the following table. While your configuration may vary slightly, for example, you may
have different versions of these applications, the overall process remains the same.
Requirement Recommended
1 Locate the WAR file for your MicroStrategy JSP application, as described in Locating
the WAR file, page 191.
2 Copy the WAR file to the Windows machine hosting your application server. The
location in which you store the file is used later and referred to as path_to_war_
file.
3 From the Windows Start menu, select Run. The Run dialog box opens.
4 In the Open drop-down list, type cmd, and click OK. A command prompt opens.
5 Using the command prompt, browse to the following directory within the SAP
Application Server installation directory:
/usr/sap/SID/Instance_Number/j2ee/deployment/scripts/
The SID and Instance_Number parameters are defined during installation and
configuration of the SAP Application Server. The port number above refers to the P4
port number. The default port number is 50004.
6 Type the following command and press ENTER to deploy the WAR file:
Deploy.bat
user_name:password@localhost:port_number path_to_war_
file
The user name and password must have administrative access. The port number
above refers to the P4 port number. The default port number is 50004.
7 Access NetWeaver web admin console using the following URL:
http://localhost:PortNumber/nwa
The PortNumber above refers to the J2EE engine port number. The default port
number is 50000.
8 Log in as an administrative user.
9 From the Operation Management tab, select the Systems tab, and then click
Start & Stop.
10 Select Java EE Applications. A list of applications deployed on the application
server are displayed.
11 Select the MicroStrategy JSP application just deployed from the list.
12 From the Application Details section, select the Status tab, and then click
Start.
13 Select On all instances and Set "Started" as Initial State.
When application is started, the status is displayed as Started.
The servlet names at the end of the URLs listed above are case-sensitive. Use
the correct case when typing the servlet name.
Preconfiguration information
This section provides the preconfiguration information necessary to deploy
MicroStrategy JSP applications on your machine.
This section uses the following setup. While your setup may vary slightly, for example,
you may have different versions of these applications, the overall process remains the
same.
Requirement Recommended
1 Start the Apache Web Server. From the Start menu, point to OracleAS 10g -
DEFAULT_HOME1, and then choose Start
ApplicationServerName.MachineName.domain.
2 To verify that the Apache Web Server has started, open Oracle Enterprise Manager,
select HTTP Server, and then click Start.
3 Select the OC4J instance where you want to deploy your MicroStrategy JSP
application. This procedure assumes you are using the default instance name home.
Click home. The OC4J: home page opens.
4 Select the Applications tab.
5 Click Deploy. The Deploy: Select Archive page opens.
6 In the Archive area, select Archive is present on local host.
7 Click Browse to navigate to and select the WAR file for your MicroStrategy JSP
application. For more information on locating the WAR file, see Locating the WAR
file, page 191.
8 In the Deployment Plan area, select Automatically create a new
deployment plan and click Next. The Deploy: Application Attributes page opens.
9 Enter the Application Name and Context Root. This section on deploying
MicroStrategy Web (JSP) with Oracle 10g uses MicroStrategy as the Application
Name and /MicroStrategy as the Context Root. For Mobile Server (JSP), this
section uses MicroStrategyMobile as the Application Name and
1 In a Web browser, access the administrative page by specifying the following URL:
• For Web (JSP):
http://
IPAddress:PortNumber/MicroStrategy/servlet/mstrWebAdmin
• For Mobile Server (JSP):
http://
IPAddress:PortNumber
/MicroStrategyMobile/servlet/mstrWebAdmin
• For Operations Manager (JSP):
http://IPAddress:PortNumber/MicroStrategyOM/servlet/mstrOM
Where IPAddress is the IP address of the Oracle machine and PortNumber is the
port number used by the Oracle Application Server. The servlet name at the end of
the URLs listed above are case-sensitive, so be sure to use the correct case when
typing the servlet name.
2 When prompted for a user name and password, specify the values you used earlier
when creating the user mapped to the admin security role (see Deploying using the
Oracle Enterprise Manager, page 242 above).
3 After you are authenticated:
• If you are deploying MicroStrategy Web (JSP), the MicroStrategy Web
Administrator page appears. Add and connect to an Intelligence Server.
• If you are deploying MicroStrategy Mobile Server (JSP), the MicroStrategy
Mobile Server Administrator page appears. Add and connect to an Intelligence
Server. Once connected, click Mobile Configuration to configure your
MicroStrategy Mobile applications to communicate with Mobile Server and
Intelligence Server. For steps on how to define this configuration, see the
MicroStrategy Mobile Design and Administration Guide. Creating a
configuration completes the steps required to deploy Mobile Server (JSP).
• If you are deploying MicroStrategy Operations Manager (JSP), you can begin to
monitor and manage your MicroStrategy server systems. For steps to create an
environment, see the Operations Manager Guide.
4 If you are deploying MicroStrategy Web (JSP), you can now launch the
MicroStrategy project. In a Web browser, access MicroStrategy Web (JSP) using this
URL:
http://
IPAddress:PortNumber/MicroStrategy/servlet/mstrWeb
Where IPAddress is the IP address of the Oracle machine and PortNumber is the
port number used by the Oracle Application Server.
Preconfiguration information
This section provides the preconfiguration information necessary to deploy
MicroStrategy JSP applications on JBoss on your machine.
This section uses the following configuration. While your setup may vary slightly, for
example, you may have different versions of these applications, the overall process
remains the same.
Requirement Recommended
When you go to the download site, you may be presented with a number of
software options. These might include terms such as JRE, JDK, and Java SDK.
You must install a developer kit (which can be termed JDK or SDK) rather than
installing only the JRE.
To configure the JDK, a system variable must point to the folder where you install
the JDK. If you install the JDK to a simple folder path such as C:\ then setting
the system variable is easier and more likely to be correct.
After you install the Oracle JDK, you must configure it.
1 On your Windows machine, access the environment variables using the steps below:
a From the Start menu, select Computer. The Computer dialog box opens.
b Click System properties. The System dialog box opens.
c Click Advanced system settings. The System Properties dialog box opens.
If you have installed JDK under the Program Files folder, type Progra~1 in
the destination folder; otherwise the system does not recognize the folder. For
example, C:\Progra~1\jsdk1.6.0.
Installing JBoss
You can download and install JBoss from the following website:
http://www.jboss.org/jbossas/downloads
Keep track of the location in which you install JBoss, as this location is used later
(referred to as JBOSS_HOME) to configure JBoss with a MicroStrategy JSP application
deployment.
1 Locate the WAR file for your MicroStrategy JSP application, as described in Locating
the WAR file, page 191.
2 Copy the WAR file to the JBOSS_HOME\server\default\deploy directory.
1 In a Web browser, access the administrative page by specifying the following URL:
• For Web (JSP):
http://localhost:8080/MicroStrategy/servlet/mstrWebAdmin
Prerequisites
• You must install and deploy MicroStrategy Web Services to allow the installation of
MicroStrategy Office from MicroStrategy Web. For information on deploying
MicroStrategy Web Services, see the MicroStrategy Office User Guide.
1 From the Windows Start menu, select Programs, MicroStrategy Tools, and
then Web Administrator. The MicroStrategy Web Administrator page opens.
http://localhost/MicroStrategyWS/office/Lang_
1033/officeinstall.htm
4 Test the URL path by clicking Go. If the path you specified is correct, the
MicroStrategy Office Installation page is displayed.
5 Click your browser's Back button to return to the Web Administration -
MicroStrategy Office settings page.
6 To ensure that an Install MicroStrategy Office link is displayed at the top
of users’ project selection and login pages in MicroStrategy Web, select the Show
link to installation page for all users on the Projects and Login pages
check box. When users click the 'Install MicroStrategy Office' link, a page opens with
instructions on how to install MicroStrategy Office on their machine.
7 Click Save to save the settings.
The steps below show you how to make these third-party data sources available for
import into MicroStrategy Web.
Prerequisites
• Your third-party data source environment contains the data you plan to integrate in
MicroStrategy Web. You also need the proper credentials to perform some of the
steps below. For example, you need a Salesforce.com login with developer credentials
to perform some of the steps provided below.
• You have deployed MicroStrategy Web so that it uses secure, encrypted
communications. For steps to enable secure communications for your MicroStrategy
Web deployment, refer to the System Administration Guide.
• If you are connecting to Salesforce.com, to ensure proper numeric value integration
and formatting when using Data Import, your Salesforce.com reports must use the
English locale. If you use a different locale for your Salesforce.com reports, you can
still integrate this data into MicroStrategy using Data Import if you connect to
Salesforce.com using the MicroStrategy ODBC Driver for Salesforce. For steps to
configure this type of a connection to Salesforce.com, see MicroStrategy ODBC
Driver for Salesforce, page 394.
1 Access the administrative options for your third-party data source. For example, if
you are integrating data from Salesforce.com, log in to Salesforce.com by accessing
https://login.salesforce.com/.
2 You must configure MicroStrategy Web as a remote access application for the third-
party data source. For the steps to define remote access applications in your third-
party data source, refer to your third-party documentation.
When configuring MicroStrategy Web as a remote access application, you must
define the callback URL as the URL to access MicroStrategy Web, including the
event 3172. Depending on how you deployed MicroStrategy Web, the syntax for this
URL can take one of the following forms:
• For MicroStrategy Web (ASP.NET) deployments:
https://
WebServer
/
WebApplicationName
/asp/Main.aspx?evt=3172&src=Main.aspx.3172
• For MicroStrategy Web (JSP) deployments:
https://
WebServer
:
PortNumber
/
WebApplicationName
/servlet/mstrWeb?evt=3172&src=mstrWeb.3172
In the example URLs above:
• WebServer is the full domain name of your web server that is hosting
MicroStrategy Web. Ensure that you use the full domain name rather than using
an IP address, as using an IP address can require re-authentication when making
the connection.
• PortNumber is the port number of your web server.
• WebApplicationName is the name of the MicroStrategy Web application. The
default name for the MicroStrategy Web application is MicroStrategy.
3 When you save MicroStrategy Web as a remote access application, your third-party
data source provides a Client ID and a Client Secret. Save these two values as they are
required later to configure the connection.
4 Restart the web server that hosts MicroStrategy Web. The next time you log in to
Web and use Data Import, the data source is now an available option.
5 When connecting to your data source using Data Import in MicroStrategy Web, you
must supply the Client ID and Client Secret provided by the data source. Additionally,
the callback URL is the MicroStrategy Web URL you used above to configure
MicroStrategy Web as a remote access application for your data source. The Client
ID, Client Secret, and Callback URL are all defined as OAuth parameters of the
connection to your data source using Data Import.
For steps to use Data Import to integrate data into MicroStrategy, refer to the
MicroStrategy Web Help.
Prerequisites
This chapter assumes the following:
• You are familiar with UNIX or Linux.
• You are familiar with MicroStrategy Developer and MicroStrategy Intelligence Server
Universal.
• You are familiar with MicroStrategy HTML documents and Report Services
documents.
• You have a Report Services product license if you are using Report Services
documents. HTML documents do not require a Report Services product license.
• You have installed MicroStrategy Developer on a Windows machine.
• You have installed MicroStrategy Intelligence Server Universal on a UNIX or Linux
machine.
In this chapter, the term document signifies a Report Services document. For
additional information on Report Services documents, refer to the Document
Creation Guide.
Using the Project Configuration dialog box in MicroStrategy Developer, you must specify
the location of the HTML document directory as an absolute path. This document
directory can be on a local machine or on a remote machine. Users require appropriate
read and write permissions to access this directory. When MicroStrategy Intelligence
Server Universal executes HTML documents, it requires read permission to the HTML
document directory to access the HTML files.
For the procedure of setting up an HTML document directory between Windows and
UNIX and Linux computers below, the following assumptions are made:
• You have installed MicroStrategy Developer on a Windows computer and installed
MicroStrategy Intelligence Server Universal on a UNIX or Linux computer.
1 Create a directory to hold the HTML document directory on the desired UNIX or
Linux computer. This procedure assumes that the path of the HTML document
directory is machine-name:/share/htmldocuments. This is the machine that
is referenced as machine-name in the steps below. To create this directory, enter
the commands below:
# cd /
# mkdir share
# cd share
# mkdir htmldocuments
2 Install Samba software on the UNIX or Linux computer that you created the HTML
documents directory in the step above. With this software, the HTML documents
directory is accessible to the Windows computer with MicroStrategy Developer
installed. You can get the latest version of Samba at http://www.samba.org.
Notice that Samba uses a .org extension and not the more common .com
extension. Using a .com extension takes you to an incorrect website.
3 Share the directory machine-name:/share across the network through NFS. For
example, you must share UNIX1:/share. Make sure read and write permissions are
set for the share. This step allows other UNIX/Linux computers to access the
directory.
4 Create a Samba share, named “share”, with read and write permissions that points to
the directory machine-name:/share. For example, you must share
UNIX1:/share.This step allows Windows computers to access the directory.
The Samba share is created in the Samba smb.conf file. For specific instructions on
how to setup a Samba share, refer to the Samba website at
http://www.samba.org.
5 Restart Samba.
6 Mount the HTML document directory on the computer that has the Intelligence
Server installed on it. Root privileges are required for this.
On the computer with Intelligence Server, type the command su and the root
password at the command prompt to log in as a superuser, or log in as root. The
command prompt changes to the pound sign (#). Perform the commands below:
cd /
mkdir machine-name
cd machine-name
mkdir share
cd share
mkdir htmldocuments
cd /
mount machine-name:/share/htmldocuments /machine-
name/share/htmldocuments
7 You can cache the connection to the UNIX/Linux HTML documents directory from
the Windows computer so that you are not prompted for authentication each time
the directory is accessed:
a From the Windows computer that has MicroStrategy Developer installed, click
Start, and select Run. The Run dialog box opens.
b Type \\machine-name\share\htmldocuments, and click OK to open the
top-level shared HTML documents directory. For example, type
\\UNIX1\share\htmldocuments.
8 Using the Project Configuration dialog box in MicroStrategy Developer, set the
HTML document directory as an absolute path by following the steps below:
a In Developer, right-click the project associated with the HTML documents and
select Project Configuration. The Project Configuration dialog box opens.
b Expand Project definition and click Advanced. The Project Configuration -
Advanced options are displayed.
c In the HTML document directory box, type the absolute path \\machine-
name\share\htmldocuments. For example, type
\\UNIX1\share\htmldocuments.
d Click OK to accept the changes.
9 Create a directory named xsls under the HTML document directory and copy the
XSL files you require for creating HTML documents to the xsls directory,
/machine-name/share/htmldocuments/xsls. If you stored XSL files in a
different directory or did not copy them from their original default directory, you
must copy them into the new xsls directory. For example, the default HTML
document directory for the Tutorial project is
Program Files\MicroStrategy\Tutorial Reporting.
10 If you want to insert images into the HTML document, create a directory named
images under the HTML document directory, and copy the images to the directory
/machine-name/share/htmldocuments/images.
You are now ready to create and execute your HTML documents. Remember to create
your HTML documents in the HTML document directory, otherwise, Intelligence Server
cannot execute the HTML documents correctly.
1 Copy the HTML file for any existing HTML document to /machine-
name/share/htmldocuments.
2 View the source code of each HTML file and copy the XSL file used by each HTML
document in an appropriate directory under /machine-
name/share/htmldocuments.
For example, if the location of the XSL file in the source code is
xsl="\xsls\myxsl.xsl, then copy myxsl.xsl to /machine-
name/share/htmldocuments/xsls. If the location of the XSL file in the source
code is xsl="\myxsl.xsl, then copy myxsl.xsl to /machine-
name/share/htmldocuments.
3 View the source code for the images used by each HTML document in an
appropriate directory under /machine-name/share/htmldocuments.
For example, if the location of the image file in the source code is
\images\myimage.gif, then copy myimage.gif to /machine-
name/share/htmldocuments/images. If the location of the XSL file in the
source code is \myimage.gif, then copy myimage.gif to /machine-
name/share/htmldocuments.
You are now ready to execute your HTML documents.
MicroStrategy does not distribute or license Microsoft fonts, and therefore cannot
package Microsoft fonts with Intelligence Server Universal.
To resolve this issue, you must install the font files in the PDFGeneratorFiles folder
within the MicroStrategy installation path on the UNIX or Linux machine, as described
below.
1 Log in to your UNIX or Linux machine that hosts Intelligence Server Universal.
2 Install the Microsoft True Type fonts. Refer to the following resources for
information on licensing requirements for and installing Microsoft True Type fonts:
• http://www.microsoft.com/typography/RedistributionFAQ.mspx
• http://www.ascendercorp.com/msfonts/msfonts_main.html
• http://corefonts.sourceforge.net/
3 Copy the font files into the INSTALL_PATH/PDFGeneratorFiles directory,
where INSTALL_PATH is the directory you specified as the MicroStrategy install
directory during installation.
4 To update the list of fonts available, you must restart the Intelligence Server.
Before installing MicroStrategy products, you should refer to Chapter 1, Planning Your
Installation for important pre-installation information.
Methods of installation
The installation methods discussed in this chapter are:
• Installing and configuring with a response.ini file, page 263
• Silent installation, page 311
The response.ini file should not be confused with the setup.iss file, which
is used by the MicroStrategy Installation Wizard to perform silent installation.
When both response.ini and setup.iss are included in the setup,
response.ini overrides setup.iss. For details on the setup.iss file, see
Silent installation, page 311.
Component dependencies
When you use a response.ini file to install MicroStrategy products, there are some
key dependencies among separate components you should be aware of. The products
listed below require either pre-installed software or certain MicroStrategy components to
be selected to successfully install the products with a response.ini file:
• MicroStrategy Enterprise Manager requires MicroStrategy Command Manager to be
included in the installation.
• MicroStrategy Delivery Engine, MicroStrategy Subscription Portal, MicroStrategy
Tutorial – Delivery Installation and MicroStrategy Tutorial – Delivery Configuration
The following tables describe the parameters and options for the all the sections, such as
Installer, Paths, and so on in the response.ini file. It is followed by sample
response.ini files for your reference.
The options are case sensitive, therefore they must be entered as indicated in the
tables below.
Installer
Options Description
PreventReboot = TRUE or FALSE. TRUE prevents the machine from rebooting after
installation is done. Note the following conditions:
• If both ForceReboot = TRUE and PreventReboot =
TRUE, then PreventReboot applies first.
• If both ForceReboot and PreventReboot are FALSE and
HideDialog for [Finish] is set to TRUE, then the machine
reboots only if it is required.
ForceReboot = TRUE or FALSE. TRUE reboots the machine after the installation is
done. The default is FALSE.
EnterpriseManagerOve TRUE or FALSE. If you select FALSE, the warehouse and metadata
rwrite = files are not updated but the rest of the files for Enterprise Manager
are updated. This prompt only impacts the files in the Microsoft
Access database. The default is FALSE.
ShowConfigWizard = TRUE or FALSE. When using silent install, set to FALSE to prevent
the Configuration Wizard from coming up after reboot. The default is
TRUE.
RunConfigWizard = TRUE or FALSE. Set this option to specify whether to run the
Configuration Wizard. The default is FALSE.
ConfigWizardResponse Specify the name of the response file for the Configuration Wizard;
Options Description
BackupFiles = TRUE or FALSE. If you set the value to TRUE, it creates a backup of
the following files:
• *.pds
• *.xsl
• *.asp
• *.css
• *.js
• *.sql
StopIIS = TRUE or FALSE. Set this option to stop Internet Information Services
(IIS) during installation. The default is FALSE.
AnalyticsOverwrite = TRUE or FALSE. This option overwrites the Analytics Modules from
a previous install. The default is FALSE.
TutDeliveryOverwrite TRUE or FALSE. Set this option to overwrite the Delivery Tutorial
= from a previous installation. The default is FALSE.
If you enter FALSE, the prompt does not display. The default is
TRUE.
EnableTracing = TRUE or FALSE. Set this option to trace the setup process in a log
file that is saved in the Temp folder. The log file records errors that
are encountered during the installation. The default is FALSE.
EnableASPNETServices TRUE or FALSE. Set this option to enable the ASP.NET MicroStrategy
= Web Services extensions that IIS Admin requires. The default is
FALSE.
Options Description
EnableASPServices = TRUE or FALSE. Set this option to enable the ASP MicroStrategy
Web Services extensions that IIS Admin requires. The default is
FALSE.
ShowWelcomeScreen = TRUE or FALSE. Set to TRUE to display the Welcome screen after
reboot. The Welcome screen is displayed only once after reboot. The
default is TRUE.
PropertiesFilesOverw TRUE or FALSE. Set to TRUE to create new properties files. These
rite= files are related to the Tutorial Delivery component. The default is
FALSE, which uses the current version of the properties files. The
default is FALSE.
CheckTCPIP= TRUE or FALSE. Set to TRUE to check that the TCP/IP network
protocol is active. If set to FALSE, the setup doesn't check for it. The
default is TRUE.
Options Description
HideDialog = TRUE or False. Indicates whether the installation uses Express Install or
Custom Install.
Paths
Options Description
[InitialPaths] Section for specifying the path for the products that you select to install.
Options Description
Developer = Location where Developer will be installed. If left empty, it takes the default
location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Desktop
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Desktop
ObjectManager = Location where Object Manager will be installed. If left empty, it takes the
default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Object Manager
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Object Manager
CommandManager Location where Command Manager will be installed. If left empty, it takes
= the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Command Manager
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Command Manager
EnterpriseManag Location where Enterprise Manager will be installed. If left empty, it takes
er = the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Enterprise Manager
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Enterprise Manager
Server = Location where the MicroStrategy Intelligence Server will be installed. If left
empty, it takes the default location of:
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Intelligence Server
Options Description
Web = Location where MicroStrategy Web will be installed. If left empty, it takes
the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Web ASPx
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Web ASPx
WebUniversal = Location where MicroStrategy Web Universal will be installed. If left empty, it
takes the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Web JSP
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Web JSP
WebServices = Location where MicroStrategy Web Services will be installed. If left empty, it
takes the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Web Services
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Web Services
WebServicesUniv Location where MicroStrategy Web Services Universal will be installed. If left
ersal = empty, it takes the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Web Services JSP
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Web Services JSP
Office = Location where MicroStrategy Office will be installed. If left empty, it takes
the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Office
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Office
Options Description
AnalyticsModule Location where the Analytics Modules will be installed. If left empty, it takes
s = the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Analytics Modules
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Analytics Modules
NCSAdminDeliver Location where the Narrowcast Server Delivery Engine will be installed. If
yEngine = left empty, it takes the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Narrowcast Server\
Delivery Engine
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Narrowcast Server\Delivery En
gine
SubscriptionPor Location where the Subscription Portal will be installed. If left empty, it
tal = takes the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Narrowcast Server\
Subscription Portal
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Narrowcast Server\Subscriptio
n Portal
Mobile = Location where MicroStrategy Mobile will be installed. If left empty, it takes
the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Mobile Clients
Options Description
MobileASPPath = Location where MicroStrategy Mobile Server ASP.NET will be installed. If left
empty, it takes the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Mobile Server ASPx
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Mobile Server ASPx
MobileJSPPath = Location where MicroStrategy Mobile Server JSP will be installed. If left
empty, it takes the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Mobile Server JSP
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Mobile Server JSP
Portlets = Location where MicroStrategy Portlets will be installed. If left empty, it takes
the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\Portlets
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\Portlets
MDXCubeProvider Location where the MicroStrategy MDX Cube Provider will be installed. If left
= empty, it takes the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\MDX Cube Provider
Options Description
GISConnectors = Location where the MicroStrategy GIS Connectors will be installed. If left
empty, it takes the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\GISConnectors
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\GISConnectors
SystemManager = Location where the MicroStrategy System Manager will be installed. If left
empty, it takes the default location of:
• 32-bit Windows environments:
C:\Program Files\MicroStrategy\SystemManager
• 64-bit Windows environments: C:\Program Files
(x86)\MicroStrategy\SystemManager
Options Description
HideDialog TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
=
RemoveAll TRUE or FALSE. This option is for the uninstall process only. Setting it to TRUE
= removes all MicroStrategy products during the uninstall process. The default is
FALSE.
For an example of a response file used to uninstall all MicroStrategy products, see
Uninstalling with a response.ini file, page 309.
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is
FALSE.
UserFirstName = Indicates the user name of the currently logged user or a user who is
already registered. If no information is provided, you cannot proceed
to the next page. If you are installing Usher, this is the first name of the
Options Description
UserLastName = Indicates the user name of the currently logged user or a user who is
already registered. If no information is provided, you cannot proceed
to the next page. If you are installing Usher, this is the last name of the
Usher Security Administrator.
UserEmail = Indicates the email of the currently logged user, or a user who is
already registered. This email address is also used receive the badge
invitation for your Usher Security network. If no information is
provided, you cannot proceed.
CompanyName = The name of the company for which the software is registered. The
default is the company name in the registry. This is also the default
company name when your Usher Security network is created.
LicenseKey = Specify the license key for the software. If you do not specify the
license key, the MicroStrategy Installation Wizard will ask for it when it
reaches that step. By default it is blank for a fresh install or displays
the license key from a previous install.
Options Description
[SuiteTarget] Section specifying the name of the target directory from where you can run
the MicroStrategy products.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
TargetDirectory Location of the root directory for the Program Files. The default is set to:
= • 32-bit Windows environment:
C:\Program Files\MicroStrategy
• 64-bit Windows environment: C:\Program Files
(x86)\MicroStrategy
Options Description
Options Description
Options Description
During the installation process in the MicroStrategy Installation Wizard, the Select
Components dialog box contains check boxes to select or clear for products to be
installed. You can either specify TRUE to install a product or FALSE to uninstall it. If
you do not specify a TRUE or FALSE value for each product, the installation always uses
the most recent selection from a previous install.
This means that if you have a product installed and you do not specify a TRUE or
FALSE value, the product is upgraded.
If you specify TRUE, the product check box is selected. The [ComponentSelection]
options specify whether the check box for each product will be selected or cleared.
Options Description
Options Description
Installation Files
Options Description
[IODSourceLocation] Section specifying the location of the files required to install the
MicroStrategy components you have selected for installation.
Specifying the location of the installation files is only required if you
have downloaded only a subset of the MicroStrategy installation files
and stored some of the files in another location. For steps to
determine the files required for your installation, see Creating custom
installation packages, page 46.
Options Description
SourceLocation = Location of the folder that stores any required installation files. Type
the location of the local file path. If you store the files in a local folder,
do not provide a location in the URL parameter.
URL = Location of the URL for the HTTP or HTTPS location that stores any
required installation files. Type the URL for the location that stores any
required installation files. If you store the files at an HTTP or HTTPS
location, do not provide a location in the SourceLocation
parameter.
UserName = If you retrieve the installation files from a URL location, type a user
name that has access to the URL location. If there is no login required
to the URL or you retrieve the installation files from a local folder, you
can leave this field blank.
Password = If you retrieve the installation files from a URL location, type a
password for the user name. If there is no login required to the URL or
you retrieve the installation files from a local folder, you can leave this
field blank.
Usher Configuration
Options Description
Options Description
ServerCertificate = The SSL Server Certificate (.crt) file for your Windows
server. The path must be specified in an absolute
format such as C:\folder\example.crt.
ServerCertificateKey = The key file for your SSL Server Certificate (.crt). The
path must be specified in an absolute format such
C:\folder\example.key.
Repository Configuration
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is
FALSE.
Options Description
Please note that if you choose TRUE, you are authorizing the
installer to download MySQL components on your behalf. These
MySQL components are open-source software provided under the
GPL licenses. These MySQL components are not provided by
MicroStrategy. For access to the source code for these MySQL
components, please visit please visit
http://www.mysql.com and related links.
MySQL:
http://dev.mysql.com/get/Downloads/MySQL-5.6/mysql-
5.6.28-winx64.zip
MySQL Connector/ODBC 5.3.4:
http://dev.mysql.com/get/Downloads/Connector-
ODBC/5.3/mysql-connector-odbc-5.3.4-winx64.msi
MySQL Connector/Java 5.1.22:
http://dev.mysql.com/get/Downloads/Connector-J/mysql-connector-
java-5.1.22.zip
MySQL Connector/Python 2.1.3
http://dev.mysql.com/get/Downloads/Connector-
Python/mysql-connector-python-2.1.3-py2.7-
winx64.msi
MySQL time zone description tables:
http://downloads.mysql.com/general/timezone_2015g_
posix.zip
Options Description
[WebVirtualDirectory] Section that specifies the virtual directory to be used for the
MicroStrategy Web application.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is
FALSE.
RemoveVD = YES or NO. This option is for the uninstall only. Set this option to
remove an existing MicroStrategy Web virtual directory from a
previous installation. The default is NO.
Options Description
RemoveVD = YES or NO. This option is for the uninstall only. Set this
option to remove an existing MicroStrategy Mobile Server
virtual directory from a previous installation. The default is
NO.
Options Description
Options Description
Options Description
Options Description
Options Description
RemoveVD = YES or NO. This option is for the uninstall only. Set
this option to remove an existing MicroStrategy
MDX Cube Provider virtual directory from a
previous installation. The default is NO.
Options Description
Options Description
RemoveVD = YES or NO. This option is for the uninstall only. Set this option
to remove an existing MicroStrategy Subscription Portal virtual
directory from a previous installation. The default is NO.
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is
FALSE.
RemoveVD = YES or NO. This option is for the uninstall only. Set this option to
remove an existing MicroStrategy Subscription Portal virtual
directory from a previous installation. The default is NO.
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is
FALSE.
SkipAccountSetting = TRUE or FALSE. Set TRUE to bypass the service account setting
in the MicroStrategy Intelligence Server Setting dialog box. If you
bypass it, then the service runs with the local system account
that is installing the products. The default is FALSE.
Options Description
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default
is FALSE.
Options Description
[OfficeWebServicesURL] Section specifying the URL for MicroStrategy Web Services and
Web Services Universal.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is
FALSE.
Options Description
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is
FALSE.
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default
is FALSE.
OverwriteServerDefinition TRUE or FALSE. This option relates to the Tutorial. Set this
= option to overwrite existing MicroStrategy Intelligence Server
definitions from a previous install. The default is FALSE.
Options Description
[AnalyticsSetting] Section that specifies the DSN used to connect to the MicroStrategy
Analytics Modules.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
OverwriteDSN = TRUE or FALSE. Set this option to overwrite an existing DSN with the
same name. The data source names are as follows:
• Analytics_Metadata
• CAM_WH_AC
• FRAM_WH_AC
• HRAM_WH_AC
• MicroStrategy_Tutorial_Data
• SAM_WH_AC
• SDAM_WH_AC
Options Description
[Summary] Section that specifies the installation summary in the Start Copying Files dialog
box.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
Options Description
[Finish] Section that specifies the MicroStrategy Installation Wizard Complete dialog
box.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
[Installer]
ExpressMode=FALSE
PropertiesFilesOverwrite=FALSE
EnableTracing=FALSE
HideAllDialogs=TRUE
ForceReboot=TRUE
PreventReboot=FALSE
CheckTCPIP=TRUE
CheckIIS=TRUE
CreateShortcuts=TRUE
CheckRenameOperations=TRUE
AnalyticsOverwrite=TRUE
TutDeliveryOverwrite=TRUE
BackupFiles=TRUE
RunConfigWizard=FALSE
StopAllServices=TRUE
StopIIS=TRUE
EnableASPServices=TRUE
EnableASPNETServices=TRUE
ShowWelcomeScreen=FALSE
ShowConfigWizard=TRUE
EnterpriseManagerOverwrite=TRUE
ConfigWizardResponseFile=
LogFile=C:\Program Files (x86)\Common
Files\MicroStrategy\install.log
[Welcome]
HideDialog=TRUE
RemoveAll=FALSE
[UserRegistration]
HideDialog=TRUE
UserFirstName=<UserFirstName>
UserLastName=<UserLastName>
UserEmail=<UserEmail>
CompanyName=<CompanyName>
LicenseKey=<CustomerLicenseKey>
[SetupExpress]
HideDialog=TRUE
[SuiteTarget]
HideDialog=TRUE
TargetDirectory=C:\Program Files (x86)\MicroStrategy
[ComponentSelection]
HideDialog=TRUE
### Visible Components ###
DeveloperVisible=TRUE
AnalystVisible=TRUE
ArchitectVisible=TRUE
ServerAdminVisible=TRUE
FunctionPluginVisible=FALSE
CommandManagerVisible=TRUE
EnterpriseManagerVisible=TRUE
ObjectManagerVisible=TRUE
IntegrityManagerVisible=TRUE
IServerVisible=TRUE
IServerOLAPServicesVisible=TRUE
IServerReportServicesVisible=TRUE
IServerDistributionServicesVisible=TRUE
IServerTransactionServicesVisible=TRUE
WebAnalystVisible=TRUE
WebProfessionalVisible=TRUE
WebReporterVisible=TRUE
WebServerASPNETVisible=TRUE
WebServerJSPVisible=TRUE
WebServicesASPNETVisible=TRUE
WebServicesJSPVisible=TRUE
OfficeVisible=TRUE
MobileVisible=TRUE
MobileClientVisible=TRUE
MobileServerASPVisible=TRUE
MobileServerJSPVisible=TRUE
AnalyticsModulesVisible=TRUE
NCSAdminVisible=TRUE
DeliveryEngineVisible=TRUE
SubscriptionPortalVisible=TRUE
TutorialDeliveryInstallVisible=TRUE
TutorialDeliveryConfigureVisible=TRUE
SequeLinkVisible=TRUE
PortletsVisible=TRUE
MDXCubeProviderVisible=TRUE
GISConnectorsVisible=TRUE
SystemManagerVisible=TRUE
OperationsManagerASPVisible=TRUE
OperationsManagerJSPVisible=TRUE
UsherServerVisible=TRUE
UsherNetworkManagerVisible=TRUE
UsherAnalyticsVisible=TRUE
UsherProfessionalVisible=TRUE
### Components To Install (TRUE) or Remove(FALSE) ###
DeveloperSelect=TRUE
AnalystSelect=TRUE
ArchitectSelect=TRUE
ServerAdminSelect=TRUE
FunctionPluginSelect=FALSE
CommandManagerSelect=TRUE
EnterpriseManagerSelect=TRUE
ObjectManagerSelect=TRUE
IntegrityManagerSelect=TRUE
IServerSelect=TRUE
IServerOLAPServicesSelect=TRUE
IServerReportServicesSelect=TRUE
IServerDistributionServicesSelect=TRUE
IServerTransactionServicesSelect=TRUE
WebAnalystSelect=TRUE
WebProfessionalSelect=TRUE
WebReporterSelect=TRUE
WebServerASPNETSelect=TRUE
WebServerJSPSelect=TRUE
WebServicesASPNETSelect=TRUE
WebServicesJSPSelect=TRUE
OfficeSelect=TRUE
MobileSelect=TRUE
MobileClientSelect=TRUE
MobileServerASPSelect=TRUE
MobileServerJSPSelect=TRUE
AnalyticsModulesSelect=TRUE
NCSAdminSelect=TRUE
DeliveryEngineSelect=TRUE
SubscriptionPortalSelect=TRUE
TutorialDeliveryInstallSelect=TRUE
TutorialDeliveryConfigureSelect=TRUE
SequeLinkSelect=TRUE
PortletsSelect=TRUE
MDXCubeProviderSelect=TRUE
GISConnectorsSelect=TRUE
SystemManagerSelect=TRUE
OperationsManagerASPSelect=TRUE
OperationsManagerJSPSelect=TRUE
UsherServerSelect=TRUE
UsherNetworkManagerSelect=TRUE
UsherAnalyticsSelect=TRUE
UsherProfessionalSelect=TRUE
[UsherConfig]
HideDialog=TRUE
ExpressSkipUsherConfig=FALSE
CACertificateChain=<AbsolutePath_CACertificateChainFile>
ServerCertificate=<AbsolutePath_SSLServerCertificateFile>
ServerCertificateKey=<AbsolutePath_
SSLServerCertifiateKeyFile>
ServerCertificateKeyPasswordFile=<Optional_AbsolutePath_
ServerCertificateKeyPasswordFile>
SMTPServer=<SMTPServer>
SMTPServerPort=<SMTPServerPort>
SMTPUser=<Optional_SMTPUser>
SMTPUserPassword=<Optional_SMTPUserPassword>
SMTPEmail=<EmailSenderAddress>
FQDN=<FQDN>
[MySQLDialog]
HideDialog=TRUE
AgreeToDownloadMySql=TRUE
[ServerDefinitionSetting]
HideDialog=TRUE
OverwriteServerDefinition=FALSE
[HealthCenterServiceAccount]
HideDialog=TRUE
Port=<PortNumber>
AccessCode=<AccessCode>
SkipAccountSetting=FALSE
Domain=<WindowsLoginDomain>
Login=<WindowsLogin>
Password=<WindowsLoginPassword>
MasterHealthAgent=TRUE
RepositoryPath=C:\HealthCenterRepo
CustomerExperienceProgram=FALSE
[AnalyticsSetting]
HideDialog=TRUE
OverwriteDSN=FALSE
[WebVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategy
ReconfigureVirtualDirectory=TRUE
[MobileVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategyMobile
ReconfigureVirtualDirectory=TRUE
[OperationsManagerVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategyOM
ReconfigureVirtualDirectory=TRUE
[PortalVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=NarrowcastServer
ReconfigureVirtualDirectory=TRUE
[WebServicesVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategyWS
ReconfigureVirtualDirectory=TRUE
[OfficeWebServicesURL]
HideDialog=TRUE
AllowBlankURL=FALSE
URL=http://localhost/MicroStrategyWS/mstrws.asmx
[MSOfficeLoadOptions]
HideDialog=TRUE
ConfigureExcel=TRUE
ConfigurePowerpoint=TRUE
ConfigureWord=TRUE
[IServerServiceAccount]
HideDialog=TRUE
SkipAccountSetting=TRUE
Login=<NT_UserLoginHere>
Password=<UserPasswordHere>
Domain=<DomainHere>
ServiceStartUp=AUTO
[NarrowcastServiceAccount]
HideDialog=TRUE
SkipAccountSetting=TRUE
Login=<NT_UserLoginHere>
Password=<UserPasswordHere>
Domain=<DomainHere>
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
Your license key determines which MicroStrategy components will be available for
your installation. For example, if your license key does not include MicroStrategy
OLAP Services, then you cannot use IServerOLAPServicesSelect=TRUE and
IServerOLAPServicesVisible=TRUE to install these components.
[Installer]
ExpressMode=TRUE
PropertiesFilesOverwrite=
EnableTracing=
HideAllDialogs=TRUE
ForceReboot=TRUE
PreventReboot=
CheckTCPIP=
CheckIIS=TRUE
CreateShortcuts=
CheckRenameOperations=
AnalyticsOverwrite=
TutDeliveryOverwrite=
BackupFiles=
RunConfigWizard=FALSE
StopAllServices=TRUE
StopIIS=TRUE
EnableASPServices=
EnableASPNETServices=
ShowWelcomeScreen=FALSE
ShowConfigWizard=FALSE
EnterpriseManagerOverwrite=
ConfigWizardResponseFile=
LogFile=
[Welcome]
HideDialog=TRUE
RemoveAll=FALSE
[UserRegistration]
HideDialog=TRUE
UserFirstName=<UserFirstName>
UserLastName=<UserLastName>
UserEmail=<UserEmail>
CompanyName=<CompanyName>
LicenseKey=<CustomerLicenseKey>
[SetupExpress]
HideDialog=TRUE
[UsherConfig]
HideDialog=TRUE
ExpressSkipUsherConfig=FALSE
CACertificateChain=<AbsolutePath_CACertificateChainFile>
ServerCertificate=<AbsolutePath_SSLServerCertificateFile>
ServerCertificateKey=<AbsolutePath_
SSLServerCertifiateKeyFile>
ServerCertificateKeyPasswordFile=<Optional_AbsolutePath_
ServerCertificateKeyPasswordFile>
SMTPServer=<SMTPServer>
SMTPServerPort=<SMTPServerPort>
SMTPUser=<Optional_SMTPUser>
SMTPUserPassword=<Optional_SMTPUserPassword>
SMTPEmail=<EmailSenderAddress>
FQDN=<FQDN>
[MySQLDialog]
HideDialog=TRUE
AgreeToDownloadMySql=TRUE
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
[Welcome]
HideDialog=TRUE
RemoveAll=FALSE
[UserRegistration]
HideDialog=TRUE
UserName=<UserNameHere>
CompanyName=<CompanyNameHere>
LicenseKey=<CustomerLicenseKeyHere>
[SuiteTarget]
HideDialog=TRUE
TargetDirectory=C:\Program Files\MicroStrategy
[ComponentSelection]
HideDialog=TRUE
### Visible Components ###
ServerAdminVisible=TRUE
CommandManagerVisible=TRUE
EnterpriseManagerVisible=TRUE
ObjectManagerVisible=TRUE
IServerVisible=TRUE
IServerOLAPServicesVisible=TRUE
IServerReportServicesVisible=TRUE
IServerDistributionServicesVisible=TRUE
IServerTransactionServicesVisible=TRUE
IntegrityManagerVisible=TRUE
SystemManagerVisible=TRUE
DeveloperVisible=FALSE
AnalystVisible=FALSE
ArchitectVisible=FALSE
FunctionPluginVisible=FALSE
WebAnalystVisible=FALSE
WebProfessionalVisible=FALSE
WebReporterVisible=FALSE
WebServerASPNETVisible=FALSE
WebServerJSPVisible=FALSE
WebServicesASPNETVisible=FALSE
WebServicesJSPVisible=FALSE
OfficeVisible=FALSE
MobileVisible=FALSE
MobileClientVisible=FALSE
MobileServerASPVisible=FALSE
MobileServerJSPVisible=FALSE
AnalyticsModulesVisible=FALSE
NCSAdminVisible=FALSE
DeliveryEngineVisible=FALSE
SubscriptionPortalVisible=FALSE
TutorialDeliveryInstallVisible=FALSE
TutorialDeliveryConfigureVisible=FALSE
SequeLinkVisible=FALSE
PortletsVisible=FALSE
MDXCubeProviderVisible=FALSE
GISConnectorsVisible=FALSE
OperationsManagerASPVisible=FALSE
OperationsManagerJSPVisible=FALSE
### Components To Install (TRUE) or Remove
(FALSE) ###
ServerAdminSelect=TRUE
CommandManagerSelect=TRUE
EnterpriseManagerSelect=TRUE
ObjectManagerSelect=TRUE
IServerSelect=TRUE
IServerOLAPServicesSelect=TRUE
IServerReportServicesSelect=TRUE
IServerDistributionServicesSelect=TRUE
IServerTransactionServicesSelect=TRUE
IntegrityManagerSelect=TRUE
SystemManagerSelect=TRUE
DeveloperSelect=FALSE
AnalystSelect=FALSE
ArchitectSelect=FALSE
FunctionPluginSelect=FALSE
WebAnalystSelect=FALSE
WebProfessionalSelect=FALSE
WebReporterSelect=FALSE
WebServerASPNETSelect=FALSE
WebServerJSPSelect=FALSE
WebServicesASPNETSelect=FALSE
WebServicesJSPSelect=FALSE
OfficeSelect=FALSE
MobileSelect=FALSE
MobileClientSelect=FALSE
MobileServerASPSelect=FALSE
MobileServerJSPSelect=FALSE
AnalyticsModulesSelect=FALSE
NCSAdminSelect=FALSE
DeliveryEngineSelect=FALSE
SubscriptionPortalSelect=FALSE
TutorialDeliveryInstallSelect=FALSE
TutorialDeliveryConfigureSelect=FALSE
SequeLinkSelect=FALSE
PortletsSelect=FALSE
MDXCubeProviderSelect=FALSE
GISConnectorsSelect=FALSE
OperationsManagerASPSelect=FALSE
OperationsManagerJSPSelect=FALSE
[IServerServiceAccount]
HideDialog=TRUE
SkipAccountSetting=FALSE
Login=<UserName>
Password=<Password>
Domain=<Domain>
ServiceStartUp=AUTO
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
Copy and paste this example to create a response.ini file. Replace any text between
angled brackets (<>) with your own specific information. For example, change
UserName=<UserNameHere> to UserName=jsmith. Make sure to check that all file
paths are entered with correct spacing.
Your license key determines which MicroStrategy components will be available for
your installation. For example, if your license key does not include MicroStrategy
OLAP Services, then you cannot use IServerOLAPServicesSelect=TRUE and
IServerOLAPServicesVisible=TRUE to install these components.
FunctionPluginVisible=FALSE
WebAnalystVisible=FALSE
WebProfessionalVisible=FALSE
WebReporterVisible=FALSE
WebServerASPNETVisible=FALSE
WebServerJSPVisible=FALSE
WebServicesASPNETVisible=FALSE
WebServicesJSPVisible=FALSE
OfficeVisible=FALSE
MobileVisible=FALSE
MobileClientVisible=FALSE
MobileServerASPVisible=FALSE
MobileServerJSPVisible=FALSE
AnalyticsModulesVisible=FALSE
NCSAdminVisible=FALSE
DeliveryEngineVisible=FALSE
SubscriptionPortalVisible=FALSE
TutorialDeliveryInstallVisible=FALSE
TutorialDeliveryConfigureVisible=FALSE
SequeLinkVisible=FALSE
PortletsVisible=FALSE
MDXCubeProviderVisible=FALSE
GISConnectorsVisible=FALSE
SystemManagerVisible=FALSE
OperationsManagerASPVisible=FALSE
OperationsManagerJSPVisible=FALSE
### Components To Install (TRUE) or Remove
(FALSE) ###
ServerAdminSelect=TRUE
IServerSelect=TRUE
IServerOLAPServicesSelect=TRUE
IServerReportServicesSelect=TRUE
IServerDistributionServicesSelect=TRUE
IServerTransactionServicesSelect=TRUE
CommandManagerSelect=FALSE
EnterpriseManagerSelect=FALSE
ObjectManagerSelect=FALSE
IntegrityManagerSelect=FALSE
DeveloperSelect=FALSE
AnalystSelect=FALSE
ArchitectSelect=FALSE
FunctionPluginSelect=FALSE
WebAnalystSelect=FALSE
WebProfessionalSelect=FALSE
WebReporterSelect=FALSE
WebServerASPNETSelect=FALSE
WebServerJSPSelect=FALSE
WebServicesASPNETSelect=FALSE
WebServicesJSPSelect=FALSE
OfficeSelect=FALSE
MobileSelect=FALSE
MobileClientSelect=FALSE
MobileServerASPSelect=FALSE
MobileServerJSPSelect=FALSE
AnalyticsModulesSelect=FALSE
NCSAdminSelect=FALSE
DeliveryEngineSelect=FALSE
SubscriptionPortalSelect=FALSE
TutorialDeliveryInstallSelect=FALSE
TutorialDeliveryConfigureSelect=FALSE
SequeLinkSelect=FALSE
PortletsSelect=FALSE
MDXCubeProviderSelect=FALSE
GISConnectorsSelect=FALSE
SystemManagerSelect=FALSE
OperationsManagerASPSelect=FALSE
OperationsManagerJSPSelect=FALSE
[IServerServiceAccount]
HideDialog=TRUE
SkipAccountSetting=FALSE
Login=<UserName>
Password=<Password>
Domain=<Domain>
ServiceStartUp=AUTO
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
Copy and paste this example to create a response.ini file. Replace any text between
angled brackets (<>) with your own specific information. For example, change
UserName=<UserNameHere> to UserName=jsmith. Make sure to check that all
file paths are entered with correct spacing.
Your license key determines which MicroStrategy components will be available for
your installation. For example, if your license key does not include MicroStrategy
OLAP Services, then you cannot use IServerOLAPServicesSelect=TRUE and
IServerOLAPServicesVisible=TRUE to install these components.
HideDialog=TRUE
RemoveAll=FALSE
[UserRegistration]
HideDialog=TRUE
UserName=<UserNameHere>
CompanyName=<CompanyNameHere>
LicenseKey=<CustomerLicenseKeyHere>
[SuiteTarget]
HideDialog=TRUE
TargetDirectory=C:\Program Files\MicroStrategy
[ComponentSelection]
HideDialog=TRUE
### Visible Components ###
WebReporterVisible=TRUE
WebAnalystVisible=TRUE
WebProfessionalVisible=TRUE
WebServerASPNETVisible=TRUE
WebServerJSPVisible=TRUE
WebServicesASPNETVisible=TRUE
WebServicesJSPVisible=TRUE
ServerAdminVisible=FALSE
IServerVisible=FALSE
IServerOLAPServicesVisible=FALSE
IServerReportServicesVisible=FALSE
IServerDistributionServicesVisible=FALSE
IServerTransactionServicesVisible=FALSE
CommandManagerVisible=FALSE
EnterpriseManagerVisible=FALSE
ObjectManagerVisible=FALSE
IntegrityManagerVisible=FALSE
DeveloperVisible=FALSE
AnalystVisible=FALSE
ArchitectVisible=FALSE
FunctionPluginVisible=FALSE
OfficeVisible=FALSE
MobileVisible=FALSE
MobileClientVisible=FALSE
MobileServerASPVisible=FALSE
MobileServerJSPVisible=FALSE
AnalyticsModulesVisible=FALSE
NCSAdminVisible=FALSE
DeliveryEngineVisible=FALSE
SubscriptionPortalVisible=FALSE
TutorialDeliveryInstallVisible=FALSE
TutorialDeliveryConfigureVisible=FALSE
SequeLinkVisible=FALSE
PortletsVisible=FALSE
MDXCubeProviderVisible=FALSE
GISConnectorsVisible=FALSE
SystemManagerVisible=FALSE
OperationsManagerASPVisible=FALSE
OperationsManagerJSPVisible=FALSE
### Components To Install (TRUE) or Remove
(FALSE) ###
WebReporterSelect=TRUE
WebAnalystSelect=TRUE
WebProfessionalSelect=TRUE
WebServerASPNETSelect=TRUE
WebServerJSPSelect=TRUE
WebServicesASPNETSelect=TRUE
WebServicesJSPSelect=TRUE
ServerAdminSelect=FALSE
IServerSelect=FALSE
IServerOLAPServicesSelect=FALSE
IServerReportServicesSelect=FALSE
IServerDistributionServicesSelect=FALSE
IServerTransactionServicesSelect=FALSE
CommandManagerSelect=FALSE
EnterpriseManagerSelect=FALSE
ObjectManagerSelect=FALSE
IntegrityManagerSelect=FALSE
DeveloperSelect=FALSE
AnalystSelect=FALSE
ArchitectSelect=FALSE
FunctionPluginSelect=FALSE
OfficeSelect=FALSE
MobileSelect=FALSE
MobileClientSelect=FALSE
MobileServerASPSelect=FALSE
MobileServerJSPSelect=FALSE
AnalyticsModulesSelect=FALSE
NCSAdminSelect=FALSE
DeliveryEngineSelect=FALSE
SubscriptionPortalSelect=FALSE
TutorialDeliveryInstallSelect=FALSE
TutorialDeliveryConfigureSelect=FALSE
SequeLinkSelect=FALSE
PortletsSelect=FALSE
MDXCubeProviderSelect=FALSE
GISConnectorsSelect=FALSE
SystemManagerSelect=FALSE
OperationsManagerASPSelect=FALSE
OperationsManagerJSPSelect=FALSE
[WebVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategy
ReconfigureVirtualDirectory=TRUE
[WebServicesVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategyWS
ReconfigureVirtualDirectory=TRUE
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
Copy and paste this example to create a response.ini file. Replace any text between
angled brackets (<>) with your own specific information. For example, change
UserName=<UserNameHere> to UserName=jsmith. Make sure to check that all file
paths are entered with correct spacing.
Your license key determines which MicroStrategy components will be available for
your installation. For example, if your license key does not include MicroStrategy
Web Reporter, then you cannot use WebReporterVisible=TRUE and
WebReporterSelect=TRUE to install these components.
ArchitectVisible=FALSE
FunctionPluginVisible=FALSE
WebAnalystVisible=FALSE
WebProfessionalVisible=FALSE
WebReporterVisible=FALSE
WebServerASPNETVisible=FALSE
WebServerJSPVisible=FALSE
WebServicesASPNETVisible=FALSE
WebServicesJSPVisible=FALSE
OfficeVisible=FALSE
MobileVisible=FALSE
MobileClientVisible=FALSE
MobileServerASPVisible=FALSE
MobileServerJSPVisible=FALSE
AnalyticsModulesVisible=FALSE
NCSAdminVisible=FALSE
DeliveryEngineVisible=FALSE
SubscriptionPortalVisible=FALSE
TutorialDeliveryInstallVisible=FALSE
TutorialDeliveryConfigureVisible=FALSE
SequeLinkVisible=FALSE
PortletsVisible=FALSE
MDXCubeProviderVisible=FALSE
GISConnectorsVisible=FALSE
SystemManagerVisible=FALSE
OperationsManagerASPVisible=FALSE
OperationsManagerJSPVisible=FALSE
### Components To Install (TRUE) or Remove
(FALSE) ###
EnterpriseManagerSelect=TRUE
ServerAdminSelect=FALSE
CommandManagerSelect=FALSE
ObjectManagerSelect=FALSE
IServerSelect=FALSE
IServerOLAPServicesSelect=FALSE
IServerReportServicesSelect=FALSE
IServerDistributionServicesSelect=FALSE
IServerTransactionServicesSelect=FALSE
IntegrityManagerSelect=FALSE
DeveloperSelect=FALSE
AnalystSelect=FALSE
ArchitectSelect=FALSE
FunctionPluginSelect=FALSE
WebAnalystSelect=FALSE
WebProfessionalSelect=FALSE
WebReporterSelect=FALSE
WebServerASPNETSelect=FALSE
WebServerJSPSelect=FALSE
WebServicesASPNETSelect=FALSE
WebServicesJSPSelect=FALSE
OfficeSelect=FALSE
MobileSelect=FALSE
MobileClientSelect=FALSE
MobileServerASPSelect=FALSE
MobileServerJSPSelect=FALSE
AnalyticsModulesSelect=FALSE
NCSAdminSelect=FALSE
DeliveryEngineSelect=FALSE
SubscriptionPortalSelect=FALSE
TutorialDeliveryInstallSelect=FALSE
TutorialDeliveryConfigureSelect=FALSE
SequeLinkSelect=FALSE
PortletsSelect=FALSE
MDXCubeProviderSelect=FALSE
GISConnectorsSelect=FALSE
SystemManagerSelect=FALSE
OperationsManagerASPSelect=FALSE
OperationsManagerJSPSelect=FALSE
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
Copy and paste this example to create a response.ini file. Replace any text between
angled brackets (<>) with your own specific information. For example, change
UserName=<UserNameHere> to UserName=jsmith. Make sure to check that all file
paths are entered with correct spacing.
Your license key determines which MicroStrategy components will be available for
your installation. For example, if your license key does not include MicroStrategy
Enterprise Manager, then you cannot use EnterpriseManagerVisible=TRUE
and EnterpriseManagerSelect=TRUE to install these components.
HideDialog=TRUE
TargetDirectory=C:\Program Files\MicroStrategy
[ComponentSelection]
HideDialog=TRUE
### Visible Components ###
AnalystVisible=TRUE
DeveloperVisible=TRUE
ArchitectVisible=TRUE
CommandManagerVisible=TRUE
EnterpriseManagerVisible=TRUE
ObjectManagerVisible=TRUE
FunctionPluginVisible=TRUE
ServerAdminVisible=FALSE
IServerVisible=FALSE
IServerOLAPServicesVisible=FALSE
IServerReportServicesVisible=FALSE
IServerDistributionServicesVisible=FALSE
IServerTransactionServicesVisible=FALSE
IntegrityManagerVisible=FALSE
WebAnalystVisible=FALSE
WebProfessionalVisible=FALSE
WebReporterVisible=FALSE
WebServerASPNETVisible=FALSE
WebServerJSPVisible=FALSE
WebServicesASPNETVisible=FALSE
WebServicesJSPVisible=FALSE
OfficeVisible=FALSE
MobileVisibile=FALSE
MobileClientVisible=FALSE
MobileServerASPVisible=FALSE
MobileServerJSPVisible=FALSE
AnalyticsModulesVisible=FALSE
NCSAdminVisible=FALSE
DeliveryEngineVisible=FALSE
SubscriptionPortalVisible=FALSE
TutorialDeliveryInstallVisible=FALSE
TutorialDeliveryConfigureVisible=FALSE
SequeLinkVisible=FALSE
PortletsVisible=FALSE
MDXCubeProviderVisible=FALSE
GISConnectorsVisible=FALSE
SystemManagerVisible=FALSE
OperationsManagerASPVisible=FALSE
OperationsManagerJSPVisible=FALSE
### Components To Install (TRUE) or Remove (FALSE) ###
AnalystSelect=TRUE
DeveloperSelect=TRUE
ArchitectSelect=TRUE
CommandManagerSelect=TRUE
EnterpriseManagerSelect=TRUE
ObjectManagerSelect=TRUE
FunctionPluginSelect=TRUE
ServerAdminSelect=FALSE
IServerSelect=FALSE
IServerOLAPServicesSelect=FALSE
IServerReportServicesSelect=FALSE
IServerDistributionServicesSelect=FALSE
IServerTransactionServicesSelect=FALSE
IntegrityManagerSelect=FALSE
WebAnalystSelect=FALSE
WebProfessionalSelect=FALSE
WebReporterSelect=FALSE
WebServerASPNETSelect=FALSE
WebServerJSPSelect=FALSE
WebServicesASPNETSelect=FALSE
WebServicesJSPSelect=FALSE
OfficeSelect=FALSE
MobileSelect=FALSE
MobileClientSelect=FALSE
MobileServerASPSelect=FALSE
MobileServerJSPSelect=FALSE
AnalyticsModulesSelect=FALSE
NCSAdminSelect=FALSE
DeliveryEngineSelect=FALSE
SubscriptionPortalSelect=FALSE
TutorialDeliveryInstallSelect=FALSE
TutorialDeliveryConfigureSelect=FALSE
SequeLinkSelect=FALSE
PortletsSelect=FALSE
MDXCubeProviderSelect=FALSE
GISConnectorsSelect=FALSE
SystemManagerSelect=FALSE
OperationsManagerASPSelect=FALSE
OperationsManagerJSPSelect=FALSE
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
Copy and paste this example to create a response.ini file. Replace any text between
angled brackets (<>) with your own specific information. Make sure to check that all file
paths are entered with correct spacing.
Your license key determines which MicroStrategy components will be available for
your installation. For example, if your license key does not include MicroStrategy
Developer, then you cannot use DeveloperVisible=TRUE and
DeveloperSelect=TRUE to install these components.
TutorialDeliveryInstallVisible=FALSE
TutorialDeliveryConfigureVisible=FALSE
SequeLinkVisible=FALSE
PortletsVisible=FALSE
MDXCubeProviderVisible=FALSE
GISConnectorsVisible=FALSE
SystemManagerVisible=FALSE
OperationsManagerASPVisible=FALSE
OperationsManagerJSPVisible=FALSE
### Components To Install (TRUE) or Remove
(FALSE) ###
AnalystSelect=TRUE
DeveloperSelect=TRUE
ArchitectSelect=FALSE
FunctionPluginSelect=FALSE
CommandManagerSelect=FALSE
EnterpriseManagerSelect=FALSE
ObjectManagerSelect=FALSE
ServerAdminSelect=FALSE
IServerSelect=FALSE
IServerOLAPServicesSelect=FALSE
IServerReportServicesSelect=FALSE
IServerDistributionServicesSelect=FALSE
IServerTransactionServicesSelect=FALSE
IntegrityManagerSelect=FALSE
WebAnalystSelect=FALSE
WebProfessionalSelect=FALSE
WebReporterSelect=FALSE
WebServerASPNETSelect=FALSE
WebServerJSPSelect=FALSE
WebServicesASPNETSelect=FALSE
WebServicesJSPSelect=FALSE
OfficeSelect=FALSE
MobileSelect=FALSE
MobileClientSelect=FALSE
MobileServerASPSelect=FALSE
MobileServerJSPSelect=FALSE
AnalyticsModulesSelect=FALSE
NCSAdminSelect=FALSE
DeliveryEngineSelect=FALSE
SubscriptionPortalSelect=FALSE
TutorialDeliveryInstallSelect=FALSE
TutorialDeliveryConfigureSelect=FALSE
SequeLinkSelect=FALSE
PortletsSelect=FALSE
MDXCubeProviderSelect=FALSE
GISConnectorsSelect=FALSE
SystemManagerSelect=FALSE
OperationsManagerASPSelect=FALSE
OperationsManagerJSPSelect=FALSE
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
Copy and paste this example to create a response.ini file. Replace any text between
angled brackets (<>) with your own specific information. Make sure to check that all file
paths are entered with correct spacing.
Your license key determines which MicroStrategy components will be available for
your installation. For example, if your license key does not include MicroStrategy
Developer, then you cannot use DeveloperVisible=TRUE and
DeveloperSelect=TRUE to install these components.
1 Save your response.ini file to the directory C:\. You can save to a different
directory, but the example command provided in these steps assumes the response
file is saved to the directory location C:\.
2 From the Windows Start menu, select Programs, then select Accessories, and
then right-click Command Prompt and select Run as Administrator. The
User Account Control dialog box opens.
3 Click Yes to open the command prompt with administrator privileges. The
command prompt is displayed.
4 Type the following command in the Windows command line:
Path\setup.exe --ResponseFile=”C:\response.ini”
Where Path is the directory where the setup.exe file is stored.
• Press ENTER to begin the installation.
For details on creating a response.ini file, see Creating a response.ini file, page 264.
After you have created a response.ini file, open a Windows command prompt to
uninstall all MicroStrategy products. From the Windows Start menu, select Programs,
then select Accessories, and then right-click Command Prompt and select Run as
Administrator. The User Account Control dialog box opens.
The steps to open a Windows command prompt with administrator privileges may
be different depending on your version of Windows.
Click Yes to open the command prompt with administrator privileges. The command
prompt is displayed. Type the following script at the command prompt to uninstall all
MicroStrategy products:
Path1\setup.exe --ResponseFile= “Path2\response.ini”
Where the Path1 for setup.exe must be the path to the original setup.exe used to
install MicroStrategy products. The Path2 for the response file is the path where you
saved your response.ini file.
Silent installation
A silent, or unattended, installation is one that presents no user interface. Silent
installations are useful for system administrators who do not want users to interfere with
the installation. They are typically implemented by IT departments that perform
package-based installations across the network.
You can use silent installation to easily embed MicroStrategy products with other
applications. This can be done to develop an OEM application that includes
MicroStrategy functionality. For information on deploying a silent installation for OEM
applications, see OEM silent installations, page 343.
The table below identifies the information that the MSTRInst.log file includes.
Line Description
Warning Includes feedback that you must verify related to the setup. For example, in normal
[W] mode, when MicroStrategy applications are running on a machine where the setup is
being run, you are prompted to close all MicroStrategy applications before proceeding.
In silent mode, you are not prompted, and instead the setup terminates.
Severe Includes fatal problems that prevent the setup from proceeding. For example, the
[S] Intelligence Server Service cannot be created and setup fails as a result.
A typical line in the MSTRInst.log file includes source file name, function name,
source line number, and time. It appears as follows:
[Z:\InstallMaster\Setup\Script Files\MALicense.rul]
[UseDLL][l: 28][1318179ms][W] Le file C:\WINDOWS\TEMP\
{84D0D5E2-719A-11D7-847C-000C293B5019}\{B339F3B3-E78C-
45E8-B4D2-3C46C1C13663}\MAInst.dll couldn't be loaded
in memory.
When reviewing warning messages in the MSTRInst.log file, look for [W] and
[S] to find related problems.
Prerequisites
• You must obtain and unzip the MicroStrategy hotfix files. These files include
HFResponse.ini and HFsetup.iss. The rest of this procedure assumes you have
saved these files to the file path C:\. If you save it to another file path, replace C:\
with the file path to the HFReponse.ini and HFsetup.iss.
1 Insert the disk containing the Hotfix installable in the disk drive.
2 From the Windows Start menu, select Programs, then select Accessories, and
then right-click Command Prompt and select Run as Administrator. The
User Account Control dialog box opens.
3 Click Yes to open the command prompt with administrator privileges. The
command prompt is displayed.
4 Access the disk drive through the command prompt.
5 Run the silent installation with the following command:
InstallPath\setup.exe -LLanguageValue --
ResponseFile="C:\HFresponse.ini" -s -f1”C:\HFsetup.iss”
In the command listed above, you must supply the following information:
• InstallPath: The location in which to install the MicroStrategy
hotfix.
• LanguageValue: Determines the language for the installation. Refer to
Language settings for silent installations, page 346, for an explanation of the
LanguageValue parameter. For example, to select English, the command is as
follows: InstallPath\setup.exe -LL0009 --
ResponseFile="C:\HFresponse.ini" -s -f1”C:\HFsetup.iss”
You can check the status of the silent installation in Windows Task Manager. After
applying the Hotfix, you can view it in the Add/Remove Programs window.
You can also perform an installation of MicroStrategy Office as its own stand-alone
installation, but with the assistance of a MicroStrategy Office installation wizard.
The steps to use the MicroStrategy Office installation wizard are provided in the
MicroStrategy Office User Guide.
Prerequisites
• You must have Microsoft .NET Framework and Microsoft Web Services
Enhancement Runtime to install and support MicroStrategy Office. For the required
versions of these components, see the MicroStrategy Readme.
• You must have Microsoft Windows Installer 4.5 to install MicroStrategy Office.
• Microsoft Office must already be installed on the machine.
1 Download the MicroStrategy Office stand-alone installation files. You can retrieve
these from the MicroStrategy installation disk, or from the MicroStrategy download
site. The MicroStrategy Office stand-alone installation files include files named
MicroStrategyOffice.msi and MicroStrategyOffice64.msi. These .msi
files are for installing MicroStrategy Office on 32-bit and 64-bit versions of Microsoft
Office, respectively.
2 From the Windows Start menu, select Programs, then select Accessories, and
then right-click Command Prompt and select Run as Administrator. The
User Account Control dialog box opens.
3 Click Yes to open the command prompt with administrator privileges. The
command prompt is displayed.
4 From a command prompt, navigate to the MicroStrategy Office hotfix installation
folder.
5 To view information on the options to run the silent install command, enter the
following command:
msiexec.msi /?
This includes information on options to log the installation details to a log file.
6 To run the silent installation using installation options defined by the current
MicroStrategy Office configuration, enter one of the following commands:
• To install on 32-bit versions of Microsoft Office:
msiexec.exe /i MicroStrategyOffice.msi /qn
• To install on 64-bit versions of Microsoft Office:
msiexec.exe /i MicroStrategyOffice64.msi /qn
You can also use additional parameters as part of the silent installation
command, including the following:
creates the shortcut. You can set this option to 0 to exclude the creation of
this shortcut.
Silent installation
A silent or unattended installation is one that presents no graphical user interface (GUI).
Silent installations allow you to automate the installation, so it can be called from a script
and executed without user interaction. Silent installations are useful for system
administrators who do not want users to run the installation themselves. The silent
installation can be done on one or more computers.
1 Log on to the computer where you are installing one or more MicroStrategy
products.
2 You can access the installation files by asking your system administrator to share the
files in a network location.
3 Browse to the MicroStrategyInstallation/QueryReportingAnalysis_
UNIX directory. Depending on your UNIX or Linux environment, browse to one of
the following folders:
• Solaris: QueryReportingAnalysis_SunOS
• AIX: QueryReportingAnalysis_AIX
• HP-UX: QueryReportingAnalysis_HP-UX
• Linux: QueryReportingAnalysis_Linux
4 Open options.txt in a text editor.
5 Specify a value for a setting by replacing the character’s Value. For detailed
information on the parameters and values that can be supplied with the
options.txt file for a silent installation, see Parameters for a silent installation,
page 321.
6 Save the changes to the options.txt file.
7 To use the options file on a silent installation, specify -silent -options
FileName as a command line argument to the wizard, where FileName is the
name of this options file, for example, options.txt. For example, type the
command:
setup.sh -silent -options options.txt
If you are installing a MicroStrategy hotfix, use the setupHF.sh file instead. For
example, type the command:
setupHF.sh -silent -options options.txt
• The example below assumes you are not using a CPU-based license for
MicroStrategy Intelligence Server. For CPU-based licenses, you must add the
parameter:
cpuCount.number=maximum
• The example below assumes you are using the full set of installation files to
support the MicroStrategy installation. If you have downloaded only a subset of
the .tzp files that are required for the MicroStrategy installation, you must
define where these files are stored, using the parameters described in Providing
installation files for smaller installations, page 335.
licenseAgreement.accept=true
userRegistration.user=UserName
userRegistration.company=CompanyName
userRegistration.cdKey=License
install.Instance=new
install.Operation=FRESH_INSTALL
suite.homeDirectory=Path
suite.installDirectory=Path
suite.logDirectory=Path
SelectComponents.visible=true
IntelligenceServer.visible=true
IntelligenceServer.active=true
ReportServices.visible=true
ReportServices.active=true
OLAPServices.visible=true
OLAPServices.active=true
DistributionServices.visible=true
DistributionServices.active=true
TransactionServices.visible=true
TransactionServices.active=true
WebAnalyst.visible=true
WebAnalyst.active=true
WebReporter.visible=true
WebReporter.active=true
WebProfessional.visible=true
WebProfessional.active=true
Portlets.visible=true
Portlets.active=true
GISConnectors.visible=true
GISConnectors.active=true
WebServices.visible=true
WebServices.active=true
MobileClient.visible=true
MobileClient.active=true
MobileServer.visible=true
MobileServer.active=true
CommandManager.visible=true
CommandManager.active=true
EnterpriseManager.visible=true
EnterpriseManager.active=true
SystemManager.visible=true
SystemManager.active=true
IntegrityManager.visible=true
IntegrityManager.active=true
OperationsManager.visible=true
OperationsManager.active=true
UsherSecurityServer.visible=true
UsherSecurityServer.active=true
UsherNetworkManager.visible=true
UsherNetworkManager.active=true
UsherAnalytics.visible=true
UsherAnalytics.active=true
UsherMobile.visible=true
UsherMobile.active=true
WebUniversal.deployDirectory=Path
Portlets.installDirectory=Path
GISConnectors.installDirectory=Path
OperationsManager.installDirectory=Path
WebServices.installDirectory=Path
MobileServer.installDirectory=Path
CommandManager.installDirectory=Path
SystemManager.installDirectory=Path
UsherSecurityServer.installDirectory=Path
UsherNetworkManager.installDirectory=Path
UsherAnalytics.installDirectory=Path
UsherMobile.installDirectory=Path
HealthCenter.port=PortNumber
HealthCenter.accessCode=AccessCode
HealthCenter.configureDaemon=true
HealthCenter.master=false
HealthCenter.repository=Path
HealthCenter.customerExperienceProgram=false
UsherSecurityServer.tomcatDir=Path
UsherSecurityServer.serverDBHost=IP_Address
UsherSecurityServer.serverDBPort=Port
UsherSecurityServer.serverDBUser=UserName
UsherSecurityServer.serverDBPassword=UserPassword
UsherSecurityServer.serverDBInstance=DatabaseInstance
UsherSecurityServer.serverLogDBInstance=DatabaseInstance
UsherSecurityServer.serverPortOne=Port
UsherSecurityServer.serverPortTwo=Port
UsherSecurityServer.serverSslCert=Path
UsherSecurityServer.serverSslKey=Path
UsherSecurityServer.serverCaCert=Path
UsherSecurityServer.gatewayPort=Port
UsherSecurityServer.gatewaySslCert=Path
UsherSecurityServer.gatewaySslKey=Path
UsherSecurityServer.gatewayCaCert=Path
UsherNetworkManager.apacheDir=Path
UsherNetworkManager.apacheUser=UserName
UsherNetworkManager.apacheGroup=GroupName
UsherNetworkManager.useSameDBSetting=false
UsherNetworkManager.DBHost=IP_Address
UsherNetworkManager.DBPort=Port
UsherNetworkManager.DBUser=UserName
UsherNetworkManager.DBPassword=UserPassword
UsherNetworkManager.DBInstance=DatabaseInstance
UsherAnalytics.useSameDBSetting=false
UsherAnalytics.DBHost=IP_Address
UsherAnalytics.DBPort=Port
UsherAnalytics.DBUser=UserName
UsherAnalytics.DBPassword=UserPassword
License agreement
Define whether the license agreement is accepted by default.
licenseAgreement.accept=Value
You can define this parameter with one of the following values:
• true: The MicroStrategy license agreement is accepted by default. If you perform
the installation as a silent installation that does not display the MicroStrategy
Installation Wizard, you must use this value to install MicroStrategy successfully.
• false: The MicroStrategy license agreement is not accepted by default. The user
that installs MicroStrategy must select to accept the license agreement to continue
with the MicroStrategy installation.
Customer information
Your name, the name of the company for which you work, and the license key.
• User:
userRegistration.user=Value
• Company:
userRegistration.company=Value
• License key:
userRegistration.cdKey=Value
MicroStrategy operations
In addition to installing MicroStrategy, you can also modify, repair, uninstall, and
upgrade existing MicroStrategy installations.
• To install a new instance of MicroStrategy:
install.Operation=FRESH_INSTALL
• To modify an existing MicroStrategy installation:
install.Operation=MODIFY
• To repair an existing MicroStrategy installation by performing the previous
installation attempt:
install.Operation=REPAIR
• To uninstall an existing MicroStrategy installation:
install.Operation=UNINSTALL
• To upgrade an existing MicroStrategy installation:
install.Operation=UPGRADE
• To install a MicroStrategy hotfix installation:
install.Operation=HOTFIX_INSTALL
• To uninstall an existing MicroStrategy hotfix installation:
install.Operation=HOTFIX_UNINSTALL
suite.homeDirectory=Path
• Install directory: The location where the MicroStrategy products are to be installed.
suite.installDirectory=Path
• Log directory: The location where the MicroStrategy application logs are to be
created.
silent.logDirectory=Path
Product features
When you install products using an options file, the following two values may be
specified for each product:
• Each product includes a visible option, which can use one of the following values:
▫ true: Indicates that the feature is displayed in the MicroStrategy Installation
Wizard as available for installation.
▫ false: Indicates that the feature is not displayed in the MicroStrategy
Installation Wizard as available for installation. If you define a product’s visible
option as false, it cannot be installed.
If you do not specify a true or false value for each product, true is used for all
products. You can also define the visible option for all products using the parameter
SelectComponents.visible. You can exclude these visible options for each
product if you are using the options file as part of a completely silent installation
where no user interface is displayed to the user.
• Each product includes an active option, which can use one of the following values:
▫ true: Indicates that the feature is selected for installation.
▫ false: Indicates that the feature is not selected for installation, or the product
is to be uninstalled as part of an installation that modifies or uninstalls previously
installed MicroStrategy software.
To review a description of each MicroStrategy project, see MicroStrategy products and
components, page 1.
IntelligenceServer.active=true
MicroStrategy Intelligence Server Universal is installed if you select to install any of the
following MicroStrategy products:
• MicroStrategy Report Services, page 324
• MicroStrategy OLAP Services, page 324
• MicroStrategy Distribution Services, page 324
• MicroStrategy Transaction Services, page 325
DistributionServices.active=Value
For example, to select MicroStrategy Distribution Services for installation, use:
DistributionServices.visible=true
DistributionServices.active=true
WebReporter.visible=true
WebReporter.active=true
MicroStrategy Portlets
The state of whether MicroStrategy Portlets is displayed in the MicroStrategy Installation
Wizard:
Portlets.visible=Value
The selection state of MicroStrategy Portlets.
Portlets.active=Value
For example, to select MicroStrategy Portlets for installation, use:
Portlets.visible=true
Portlets.active=true
Usher Analytics
The state of whether Usher Analytics is displayed in the MicroStrategy Installation
Wizard:
UsherAnalytics.visible=Value
The selection state of Usher Analytics.
UsherAnalytics.active=Value
For example, to select Usher Analytics for installation, use:
UsherAnalytics.visible=true
UsherAnalytics.active=true
Usher Mobile
The state of whether Usher Mobile is displayed in the MicroStrategy Installation Wizard:
UsherMobile.visible=Value
The selection state of Usher Mobile.
UsherMobile.active=Value
For example, to select Usher Mobile for installation, use:
UsherMobile.visible=true
UsherMobile.active=true
Portlets.installDirectory=Value
• MicroStrategy GIS Connectors Install Location
GISConnectors.installDirectory=Value
• MicroStrategy Operations Manager Install Location
OperationsManager.installDirectory=Value
• MicroStrategy Web Services J2EE Install Location
WebServices.installDirectory=Value
• MicroStrategy Mobile Server JSP Install Location
MobileServer.installDirectory=Value
• MicroStrategy Command Manager Install Location
CommandManager.installDirectory=Value
• MicroStrategy System Manager Install Location
SystemManager.installDirectory=Value
• Usher Security Server Install Location:
UsherSecurityServer.installDirectory=Value
• Usher Network Manager Install Location:
UsherNetworkManager.installDirectory=Value
• Usher Analytics Install Location:
UsherAnalytics.installDirectory=Value
• Usher Mobile Install Location:
UsherMobile.installDirectory=Value
If no access code is provided, then the Health Center Agent can be accessed without
supplying an access code.
• Configure the Health Center Agent as a daemon:
HealthCenter.configureDaemon=Value
You can define this parameter as true or false.
▫ HealthCenter.configureDaemon=true
Configures this Health Agent as a daemon, so that the Health Agent process is
constantly running in the background. This requires you to configure the Health
Agent using an account that has root access privileges to the machine.
▫ HealthCenter.configureDaemon=false
Configures the Health Agent as an application, which is required if you do not
have root access to the machine. In this case, be careful not to stop the Health
Agent process, so that the machine can remain part of the Health Center system
at all times.
• Configure the Master Health Agent:
HealthCenter.master=Value
You can define this parameter as true or false, with the value of true
configuring the machine as a Master Health Agent, which is responsible for most of
the Health Center operations, such as scheduling system checks and transmitting
diagnostics packages to MicroStrategy Technical Support. If you configure the
machine as a Master Health Agent, you must specify the following configurations:
▫ The location to store the Health Center repository. The repository contains
configuration information about the Health Center system, such as the list of
machines on the network and the MicroStrategy products they have installed,
and also the destination for all exported diagnostics packages:
HealthCenter.repository=Value
▫ You can choose to enroll the installation in the Customer Experience
Improvement Program:
— HealthCenter.customerExperienceProgram=true
Enrolls the installation in the Customer Experience Improvement Program.
Once enrolled, Health Center transmits anonymous data about your system
to MicroStrategy. No report data or prompt answers are collected or
transmitted. All information sent to MicroStrategy as a result of this
program is stored in the Census subfolder of the Health Center Repository.
— HealthCenter.customerExperienceProgram=false
Opts out of the Customer Experience Improvement Program.
UsherSecurityServer.serverSslKey=Path
• The location of the SSL certificate chain:
UsherSecurityServer.serverCaCert=Path
UsherNetworkManager.DBHost=IP_Address
• The port number for the database connection:
UsherNetworkManager.DBPort=Port
• The account name for the database user that administers the database:
UsherNetworkManager.DBUser=UserName
• The password for the database user specified above:
UsherNetworkManager.DBPassword=UserPassword
• The name of the Usher Network Manager database:
UsherNetworkManager.DBInstance=DatabaseInstance
The Usher Analytics database needs to be on the same MySQL instance as the
Usher Security Server database.
MicroStrategy installation, which can then also be used to reduce the amount of data
packaged and downloaded for other MicroStrategy installations.
If you are performing a MicroStrategy hotfix installation, you must include all of
the files provided as part of the hotfix installation in their default location. This
means that you cannot use the options provided below to point to the location of
the hotfix installation files.
To reduce the amount of data required for MicroStrategy installations, you first need to
determine the files required to support your installation of MicroStrategy, as described in
Creating custom installation packages, page 46. Once you determine and collect the
.tzp files required to support your MicroStrategy installation, you can specify the
location of these files using the following parameters:
• InstallOnDemand.style=Value
Determines whether the required installation files are provided in a folder or at a
URL. You must define this parameter with one of the following values:
▫ FileSystem: Type this value if the required installation files are stored in a
folder on the local machine or a server machine. You must also provide the
location of the files using the InstallOnDemand.sourceLocation
parameter.
▫ HTTP: Type this value if the required installation files are stored at an unsecured
URL. You must also provide the location of the files using the
InstallOnDemand.url parameter.
▫ HTTPS: Type this value if the required installation files are stored at a secured
URL. You must also provide the location of the files using the
InstallOnDemand.url parameter, as well as the user name and password to
access the URL using the InstallOnDemand.username and
InstallOnDemand.password parameters.
• InstallOnDemand.sourceLocation=Value
Location of the folder that stores any required installation files. Type the location of
the local file path. If you store the files in a local folder, do not provide a location for
the InstallOnDemand.url parameter.
• InstallOnDemand.url=Value
Location of the URL for the HTTP or HTTPS location that stores any required
installation files. Type the URL for the location that stores any required installation
files. If you store the files at an HTTP or HTTPS location, do not provide a location
for the InstallOnDemand.sourceLocation parameter.
• InstallOnDemand.bypassCertificateChecking=Value
If you retrieve the installation files from a URL location using HTTPS, you can use
this setting to skip any certificate checking by defining this option to true. To
maintain certificate checking, define this option as false.
• InstallOnDemand.username=Value
If you retrieve the installation files from a URL location, type a user name that has
access to the URL location. If there is no login required to the URL or you retrieve
the installation files from a local folder, you do not need to define a value for this
parameter.
• InstallOnDemand.password=Value
If you retrieve the installation files from a URL location, type a password for the user
name. If there is no login required to the URL or you retrieve the installation files
from a local folder, you do not need to define a value for this parameter.
If the installation fails on any of the steps before it starts copying the files, it does
not give any feedback other than the return value different from 0.
Complete Task
Create DSNs using the Connectivity Wizard, as described in Creating DSNs for OEM
environments, page 340.
Configure MicroStrategy using the Configuration Wizard. This tool allows you to save
configurations as response files that can be used to automate the configuration for the
Complete Task
OEM deployment. This allows you to re-use all the configurations performed when
developing an OEM application for the deployment process as well, as described in
Configuring a MicroStrategy installation, page 341.
Design projects and a reporting environment. You can use the various MicroStrategy
products and relevant documentation to create the required MicroStrategy environment.
For additional best practices when designing a reporting environment, see Designing a
project and reporting environment, page 341.
Customize MicroStrategy Web through the use of the MicroStrategy SDK, as described in
Customizing MicroStrategy Web, page 342.
Deploy a MicroStrategy OEM application on an OEM’s customer environment, as described
in Deploying a MicroStrategy OEM application, page 342.
Create DSNs on the OEM’s customer environment as necessary, as described in Creating
DSNs for OEM environments, page 340.
Configure and tune an OEM deployment through the use of various MicroStrategy tools, as
described in Tuning an OEM deployment, page 347.
If you are modifying a project that has already been deployed as an OEM application, see
Updating OEM applications, page 348 for best practices on how to incorporate any custom
reports or objects that may have been created for the deployed application.
Troubleshoot your MicroStrategy OEM applications using MicroStrategy Health Center, as
described in Troubleshooting support for MicroStrategy OEM applications, page 349
stored in a different relational database than your data warehouse. A metadata can be
created using the Configuration Wizard, as described in Configuring a
MicroStrategy installation, page 341.
A DSN can be created using the MicroStrategy Connectivity Wizard, as described in
Defining DSNs, page 132.
• If you are modifying a project that has already been deployed as an OEM application,
see Updating OEM applications, page 348 for best practices on how to incorporate
any custom reports or objects that may have been created for the deployed
application.
Prerequisites
• Ensure that the MicroStrategy installation files are accessible on the machine in
which the installation is being performed. If a required installation file is not
accessible, the installation can fail, often providing a warning about missing
requirements.
When MicroStrategy products are installed as software bundled with another product,
the following procedure is strongly recommended:
1 Create an installation response file (response.ini) for the MicroStrategy products
to install. The table that follows shows which sections of the file are mandatory and
which are optional.
For detailed information regarding the contents of the response.ini file, see
Configuring a response.ini file to install MicroStrategy, page 263.
[Installer] Required
HideAllDialogs = Required
PreventReboot = Optional
StopAllServices = Optional
StopIIS = Optional
CheckRenameOperations = Optional
[UserRegistration] Required
[ComponentSelection] Required
EnterpriseManagerSelect = Required
[InitialPaths] Required
EnterpriseManager = Required
Setting HideAllDialogs = TRUE causes the script for the response file to:
3 From the Windows Start menu, select Programs, then select Accessories, and
then right-click Command Prompt and select Run as Administrator. The
User Account Control dialog box opens.
4 Click Yes to open the command prompt with administrator privileges. The
command prompt is displayed.
5 Run the silent install with the response.ini file in conjunction with the
setup.iss file as follows:
INSTALL_PATH\setup.exe -LLanguageValue --
ResponseFile="C:\response.ini" -s -f1”c:\setup.iss” -
f2”c:\setup.log”
In the syntax shown above, the -s parameter indicates that the installation is to be
completely silent. If the -s parameter is not included in the command, then an
interface is displayed during the installation that shows the progress of the
installation.
Language Value
Danish 0006
Dutch 0019
English 0009
French 0012
German 0007
Italian 0016
Japanese 0017
Korean 0018
Portuguese 0022
Spanish 0010
Swedish 0029
For the command line option, you must type -L in front of the language code
to signify that you are entering a language.
These tasks can be achieved using the MicroStrategy Project Duplication Wizard and
Project Merge Wizard. Both of these tools can perform their tasks from the command
line, which can allow the project duplication and replacement process to be automated.
The steps to use these tools to duplicate and replace a project are provided in the System
Administration Guide.
You can create DSNs using the MicroStrategy Connectivity Wizard on Windows,
UNIX, and Linux machines, as described in Communicating with databases, page
128.
The test method described above reflects the situation when the ODBC driver and
the database network software are bundled. If they are not bundled, they must be
configured and tested separately, using database-specific tools.
Prerequisites
Before you use the DB Query Tool, test the network layer with the network layer utility,
PING.EXE. Consult your operating system or network system documentation for details.
Direct (two-tier) data sources are available only on the Windows operating
system.
Using the Configuration Wizard in command line mode creates a response.ini file.
This file can then be used from the command line to configure MicroStrategy without
stepping through the pages of the Configuration Wizard. You can also distribute a
response.ini file to other users and machines to perform multiple configurations
without stepping through the Configuration Wizard for each configuration.
This section covers the following procedures and information related to configuring
MicroStrategy from the command line on a Linux or UNIX machine using a
response.ini file:
• Creating a response.ini file, page 354
You can also configure MicroStrategy using the Configuration Wizard in command
line mode on a Windows machine. However, on a Windows machine, it is
recommended to use the Configuration Wizard graphical user interface to create
and use a response file, which is described in Configuring MicroStrategy with a
response file, page 161.
Before you can configure MicroStrategy with the Configuration Wizard in command line
mode, you must ensure that you meet the prerequisites listed in Configuration Wizard
prerequisites, page 138.
Configuration tasks
6 You can support the configuration tasks described in the sections listed below:
• Type 1, and then press ENTER to create metadata, History List, and statistics
tables. Refer to Creating metadata, History List, and statistics tables, page 355
for steps to create metadata and statistics tables.
If metadata tables already exist in the location you plan to store your metadata
tables in and you do not want to overwrite the current metadata tables, you should
use the option described below.
Prerequisite
• This procedure assumes you have already opened the Configuration Wizard in
command line mode and selected to create metadata and statistics tables, as
described in Creating a response.ini file, page 354.
1 In the prompt asking whether to create metadata tables, type Y, and then press
ENTER. You are then prompted for ODBC data source information.
2 Type the number corresponding to the ODBC DSN for the database to store your
metadata tables, and then press ENTER.
If you do not have a DSN defined on your UNIX or Linux machine, see
Creating a DSN for a data source, page 350.
4 Depending on your database type, you may be prompted to provide a login and
password to your DSN:
a Type a login name for your database that stores your metadata tables, and then
press ENTER. You are then prompted to provide a password for the login name.
b Type a password for the login name provided, and then press ENTER. You are
then prompted to provide a metadata prefix for the metadata tables.
5 Depending on your database type, you can enter characters to use as a prefix for the
names of your metadata tables or use no prefix, as described below:
• Type the required prefix characters, and then press ENTER.
• Leave the prompt blank, and then press ENTER to provide no metadata prefix.
6 The next configuration displayed depends on your ODBC data source details:
• If the data source points to a DB2 MVS database, steps to configure a DB2 MVS
database are displayed. These are described in the To configure DB2 MVS
database options, page 356 section within this procedure.
• If the data source does not point to a DB2 MVS database, the step to select a
metadata script is displayed. This step is described in the To select a metadata
script, page 356 section within this procedure.
• Leave the field blank, and then press ENTER to use the default script for your
database type.
You are then prompted to create History List tables.
Prerequisite
• This procedure assumes you have already opened the Configuration Wizard in
command line mode and selected to create metadata, History List, and statistics
tables, as described in Creating a response.ini file, page 354.
1 After you create metadata tables (see Creating metadata tables, page 355) or skip
both of the creation of metadata tables, you are prompted to create History List
tables.
To create History List tables, type Y, and then press ENTER. You are then prompted
for ODBC data source information.
2 You can supply ODBC DSN information in various ways described below, which
depend on whether you previously created metadata tables as part of the
configuration process:
• If you did not create metadata tables as part of the configuration process, you are
prompted to enter ODBC DSN information. The steps to enter this information
is described in the To provide ODBC DSN information, page 358 section within
this procedure.
• If you created metadata tables as part of the configuration process, you are
prompted whether to use the same metadata table ODBC DSN information for
your History List tables. You have the following options:
— Type Y, and then press ENTER to create History List tables with the same
ODBC DSN information entered for your metadata tables. You are then
prompted to select a History List script to create the History List tables,
which is described in the To select a History List script, page 359 section
within this procedure.
— Type N, and then press ENTER to provide different ODBC DSN information,
which is described in the To provide ODBC DSN information, page 358
section within this procedure.
If you do not have a DSN defined on your UNIX or Linux machine, see
Creating a DSN for a data source, page 350.
4 Depending on your database type, you may be prompted to provide a login and
password to your DSN:
a Type a login name for your database to create your History List tables in, and
then press ENTER. You are then prompted to provide a password for the login
name.
b Type a password for the login name provided, and then press ENTER.
5 The next configuration displayed depends on your ODBC data source details:
• If the data source points to a DB2 MVS database, steps to configure a DB2 MVS
database are displayed. These are described in the To configure DB2 MVS
database options, page 359 section within this procedure.
• If the data source does not point to a DB2 MVS database, the step to select a
statistics script to create statistics tables is displayed. This step is described in the
To select a History List script, page 359 section within this procedure.
Prerequisites
• This procedure assumes you have already opened the Configuration Wizard in
command line mode and selected to create metadata, History List, and statistics
tables, as described in Creating a response.ini file, page 354.
1 After you create metadata tables (see Creating metadata tables, page 355), create
History List tables (Creating History List tables, page 357), or skip both of these
procedures, you are prompted to create statistics tables.
To create statistics tables, type Y, and then press ENTER. You are then prompted for
ODBC data source information.
2 You can supply ODBC DSN information in various ways described below, which
depend on whether you previously created metadata tables as part of the
configuration process:
• If you did not create metadata tables as part of the configuration process, you are
prompted to enter ODBC DSN information. The steps to enter this information
is described in the To provide ODBC DSN information, page 361 section within
this procedure.
• If you created metadata tables as part of the configuration process, you are
prompted whether to use the same metadata table ODBC DSN information for
your statistics tables. You have the following options:
— Type Y, and then press ENTER to create statistics tables with the same ODBC
DSN information entered for your metadata tables. You are then prompted
to select a statistics script to create the statistics tables, which is described in
the To select a statistics script, page 362 section within this procedure.
— Type N, and then press ENTER to provide different ODBC DSN information,
which is described in the To provide ODBC DSN information, page 361
section within this procedure.
1 Type the corresponding number for the ODBC DSN for a database to connect
Intelligence Server to. This should be the data source that stores your metadata.
Then press ENTER. You are then prompted to provide a login to your DSN.
2 Type a login name for your database to create your statistics tables in, and then press
ENTER. You are then prompted to provide a password for the login name.
3 Type a password for the login name provided, and then press ENTER. You are then
prompted to provide a metadata prefix.
4 You can enter characters to use as a prefix for the names of your metadata tables or
use no prefix, as described below:
• Type the required prefix characters, and then press ENTER.
• Leave the prompt blank, and then press ENTER to provide no metadata prefix.
You are then prompted to provide a temp table prefix.
5 You can enter characters to use as a prefix for the names of temp tables or use no
prefix, as described below:
• Type the required prefix characters, and then press ENTER.
• Leave the prompt blank, and then press ENTER to provide no temp table prefix.
You are then prompted to provide a MicroStrategy user login.
6 Type a valid MicroStrategy user login that has administrator privileges, and then
press ENTER.You are then prompted to provide a password for the login name.
7 Type a password for the MicroStrategy user login provided, and then press ENTER.
You are then prompted to choose the type of Intelligence Server configuration to
complete.
8 You can perform one of the Intelligence Server configuration tasks, which are
described in the sections below:
• Type 1, and then press ENTER to create a new server definition. Refer to
Creating and using a server definition, page 363 for steps to create a new server
definition.
• Type 2, and then press ENTER to use an exiting server definition. This
configuration follows the same steps for creating a new server definition, which
are described in Creating and using a server definition, page 363.
• Type 3, and then press ENTER to delete a server definition. Refer to Deleting a
server definition, page 365 for steps to delete a server definition.
• Type 4, and then press ENTER to create a new server definition and use it as the
default server definition. This configuration follows the same steps for creating a
new server definition, which are described in Creating and using a server
definition, page 363.
The action taken depends on what action you selected to complete in the procedure To
set up MicroStrategy Intelligence Server, page 362.
Prerequisites
• This procedure assumes you have already opened the Configuration Wizard in
command line mode and entered configuration information for your Intelligence
Server, as described in Setting up MicroStrategy Intelligence Server, page 362.
1 In the prompt that asks for a server definition name, type the name that
distinguishes the server definition, and press ENTER. You can press ENTER without
entering any information to use the default server definition. You are then prompted
to choose the projects to load for the server definition.
2 Type the names of projects to load when the server definition starts, and then press
ENTER. Separate the project names with the \ character. You are then prompted to
choose projects to not load for the server definition.
3 Type the names of projects to not load when the server definition starts, and then
press ENTER. Separate the project names with the \ character. You are then
prompted to provide a TCP port to use for Intelligence Server.
4 You can use the default port number or enter a different port number for
Intelligence Server, as described below:
• Leave the prompt blank, and then press ENTER to use the default port number.
• Type a port number, and then press ENTER.
You are then prompted whether to register Intelligence Server as a service.
5 You can choose whether to register Intelligence Server as a service, as described
below:
• Type Y, and then press ENTER to register Intelligence Server as a service. To
perform this configuration, you must be logged into your UNIX or Linux
machine with an account that has root level access and permissions.
• Type N, and then press ENTER to not register Intelligence Server as a service.
You are then prompted whether to start Intelligence Server when finished
6 Type Y and press ENTER to start Intelligence Server after the response file is
executed. You are then prompted to provide a name for the response.ini file.
8 You can choose to run the configuration you just completed or to run the
configuration using the response.ini file at a different time, as described below:
• Type Y, and then press ENTER to run the configuration.
You can also use the response.ini file created for future configurations, as
described in Using the response.ini file to configure MicroStrategy, page 367.
• Type N, and then press ENTER to quit without running the configuration. You
can use the response.ini file created for future configurations, as described
in Using the response.ini file to configure MicroStrategy, page 367.
1 In the prompt that asks for server definitions to be removed, type the name that
distinguishes the server definition, and press ENTER. You can list multiple server
definitions to be deleted, separating server definition names with the \ character.
You are then prompted to provide a name for the response.ini file.
1 In the prompt that asks for a project source name, type the name for the project
source to be created, and then press ENTER. You are then prompted to provide the
Intelligence Server name.
2 Type the Intelligence Server name, and then press ENTER. You can also press ENTER
without typing any information to accept the default Intelligence Server. You are
then prompted to provide a TCP port to use for Intelligence Server.
3 You can use the default port number or enter a different port number for
Intelligence Server, as described below:
• Leave the prompt blank, and then press ENTER to use the default port number.
• Type a port number, and then press ENTER.
You are then prompted to define a time interval for a project source connection time
out.
4 Type a numerical value (in minutes) for the amount of inactivity that is allowed
before a user is automatically disconnected from a project source. This enforces a
connection time out for inactive users connected to a project source. Type 0 to
define that users are not disconnected from project sources due to inactivity. Then
press ENTER.
You are then prompted to select an authentication type for the project source.
5 You can type the corresponding number to select one of the authentication types
listed in the command line. For information on each authentication type, see
Authentication modes, page 160.
You are then prompted to provide a name for the response.ini file.
• Type N, and then press ENTER to quit without running the configuration. You
can use the response.ini file created for future configurations, as described
in Using the response.ini file to configure MicroStrategy, page 367.
There are some commands that can output information to a file, or require a long
definition that can be retrieved from a file. For information on using files to store
output from and provide input to mstrctl commands, see Using files to store
output and provide input, page 370.
You do not need to enter any command to quit the mstrctl tool because it is a one-line
command line tool.
The components that are currently installed are displayed with their check
boxes selected. These components are not re-installed during the modification
process. If you clear any of the check boxes, that particular component is
uninstalled during the modification process. You are advised not to clear the
check boxes of the components that are already installed, unless you want to
remove the component.
8 If you are prompted to stop your Web server, click Yes to stop it and continue with
adding or removing files.
9 Verify the settings and click Next to begin copying or removing the files.
10 After the modification routine is complete, click Finish to close the maintenance
program. To fully remove MicroStrategy Office or MicroStrategy Health Center, see
Uninstalling MicroStrategy Office, page 377 and Uninstalling MicroStrategy Health
Center, page 377.
For more details on each page of the MicroStrategy Installation Wizard, see Chapter 2,
Installing MicroStrategy on Windows.
3 Within the list of installed programs, select MicroStrategy and click Change. The
MicroStrategy Setup Maintenance program opens.
4 Select Repair and click Next.
5 Accept the license agreement and click Next.
6 You are prompted to select Yes to continue with the re-installation procedure and
overwrite the components. If you do not want to overwrite the components, select
No.
7 If you are prompted to stop your Web server, click Yes to stop it and continue with
the re-installation.
8 As part of a repair installation, you can also designate this machine as a Health
Agent. Provide this configuration information as required and continue with the re-
installation routine.
9 After the re-installation routine is complete, click Finish to close the maintenance
program.
For details on each page of the MicroStrategy Installation Wizard, see Chapter 2,
Installing MicroStrategy on Windows.
You can also install products as part of the uninstallation by selecting the
check box for any MicroStrategy product not previously installed.
11 On the Product Uninstallation page, select the products to uninstall. Click Next.
Driver Details
Driver Details
• Database name
Driver Details
MicroStrategy ODBC Driver for The MicroStrategy ODBC Driver for SequeLink allows you to access
SequeLink, page 390 Microsoft Access databases or Microsoft Excel files stored on a
Windows machine from an Intelligence Server hosted on a UNIX or
Linux machine.
MicroStrategy ODBC Driver for The MicroStrategy ODBC Driver for Salesforce allows you to access
Salesforce, page 394 resources on Salesforce.com, from an Intelligence Server hosted
on a UNIX or Linux machine.
This section also provides information on how to install and configure drivers from other
vendors with MicroStrategy:
• ODBC Driver for Red Brick for UNIX/Linux, page 395
• ODBC Driver for Sybase Adaptive Server IQ for UNIX/Linux, page 396
• ODBC Driver for Teradata for UNIX/Linux, page 397
• ODBC Driver for Informix 8 for UNIX, page 399
• ODBC Driver for Netezza for UNIX/Linux, page 400
• ODBC Driver for MySQL 5.x for Linux, page 401
• ODBC Driver for Aster Database for Linux, page 403
• ODBC Driver for DataDirect Cloud for Linux, page 404
• ODBC Driver for Amazon Redshift for Linux, page 406
• ODBC Driver for Vertica for Linux or Solaris, page 407
• ODBC Driver for SAP HANA for Windows and Linux, page 409
• Other data sources and relational databases for Windows, page 412
• Port Number: The port number for the connection. The default port number for
Apache Hive is usually 20000. Check with your database administrator for the
correct number.
• Use Native Catalog Functions: By default, native catalog functions are used to
retrieve catalog information, rather than using ODBC catalog functions. This
commonly improves performance of this type of data retrieval. However, this is only
supported for HiveServer2 instances. Clear this check box if your data source
connection supports the use of HiveServer1 instances.
• Package Collection: The collection or location name where bind packages are
created and stored for searching purposes.
• Package Owner (Optional): The package's AuthID if you want to specify a fixed
user to create and modify the packages on the database. The AuthID must have
authority to execute all the SQL in the package.
• TCP Port: The DB2 DRDA listener process's port number on the server host
machine provided by your database administrator. The default port number is usually
446.
Inserting date data into SQL Server 2000 tables can cause errors if the
system’s Regional Settings are not set properly. Ensure that the date format is
defined to be in an English format.
• Enable SQL Database (Azure) support: Defines whether the DSN is created
to support SQL Azure. Select this check box if the DSN is used to access a SQL Azure
data source.
— Service Name: The global database name, which includes the database
name and the domain name. For example, if your database name is
finance and its domain is business.com the service name is
finance.business.com.
▫ Alternate Servers: A list of alternate database servers to enable connection
failover for the driver. If the primary database server entered as the SID or
service name is unavailable, a connection to the servers in this list is attempted
until a connection can be established. You can list the servers in SID or service
name format, as shown in the following examples:
— Using an SID: (HostName=DB_server_name:
PortNumber=1526:SID=ORCL)
— Using a Service Name: (HostName=DB_server_name:
PortNumber=1526:ServiceName=service.name.com)
• TNSNames Connection: A TNSNames connection uses a TNSNAMES.ORA file to
retrieve host, port number, and SID information from a server (alias or Oracle net
service name) listed in the TNSNAMES.ORA file. A TNSNames connection requires
the following parameters:
▫ Server Name: A server name, which is included in a TNSNAMES.ORA file
included in the TNSNames File text box below.
▫ TNSNames File: The location of your TNSNAMES.ORA file. Make sure to enter
the entire path to the TNSNAMES.ORA file, including the file name itself. You
can specify multiple TNSNAMES.ORA files.
Prerequisites
• On the Windows machine where the Access database is stored, you must create a
DSN to connect to the Access database. For instructions on creating a DSN, see
Creating a DSN for a data source, page 133.
1 On the Windows machine that stores the Access database to connect to, install the
SequeLink ODBC Socket Server. This can be installed as part of a MicroStrategy
installation, and is included in the Other components options of the MicroStrategy
Product Suite (see Select Features, page 55).
8 In the Value field, type DSN=AccessDSN, where AccessDSN is the DSN you
created to connect to your Access database. This is different from the data source
you created as part of the steps to configure the SequeLink ODBC Socket Server.
9 Click OK.
10 Within the same data source, select User Security.
11 Right click DataSourceLogonMethod and select Properties. The
DataSourceLogonMethod Properties dialog box opens.
12 From the Value drop-down list, select Anonymous. This allows connection to the
Access database without using a user name and password.
13 Click OK.
14 Right-click the data source, point to All Tasks, and select Save configuration.
15 On the UNIX or Linux machine that hosts your Intelligence Server, you must
configure the MicroStrategy ODBC driver for SequeLink to connect to the Access
database. For instructions on how to perform this configuration, see Configuring the
MicroStrategy ODBC driver for SequeLink, page 393.
Prerequisites
• On the Windows machine where the Excel file is stored, you must prepare the Excel
file as a valid data source. For instructions to prepare an Excel file, see Prepare an
Excel file as a valid data source, page 413.
• On the Windows machine where the Excel file is stored, you must create a DSN to
connect to the Excel file. For instructions to create a DSN for an Excel file, see Use
your Excel file as a data source, page 414.
1 On the Windows machine that stores the Excel files to connect to, install the
SequeLink ODBC Socket Server. This can be installed as part of a MicroStrategy
installation, and is included in the Other components options of the MicroStrategy
Product Suite (see Select Features, page 55).
Service for ODBC Socket, and then select SequeLink Management Console
Snap-in.
3 Under Console Root, expand SequeLink 5.5 Manager, expand Connected to
SLAgent55, expand SequeLink Services, expand SLSocket55, expand
Configuration, and then select Data Source Settings.
4 From the Action menu, point to New, and select Data Source. A new data source
is created underneath Data Source Settings.
5 Type a descriptive name for the new data source, such as Excel Data Source.
6 Expand the new data source, and select Advanced.
7 Right-click DataSourceSOCODBCConnStr and select Properties. The
DataSourceSOCODBCConnStr Properties dialog box opens.
8 In the Value field, type DSN=ExcelDSN, where ExcelDSN is the DSN you created
to connect to your Excel file. This is different from that data source you created as
part of the steps to configure the SequeLink ODBC Socket Server.
9 Click OK.
10 Within the same data source, select User Security.
11 Right click DataSourceLogonMethod and select Properties. The
DataSourceLogonMethod Properties dialog box opens.
12 From the Value drop-down list, select Anonymous. This allows connection to the
Excel file without using a user name and password.
13 Click OK.
14 Right-click the data source, point to All Tasks, and select Save configuration.
15 On the UNIX or Linux machine that hosts your Intelligence Server, you must
configure the MicroStrategy ODBC driver for SequeLink to connect to the Excel
files. For instructions on how to perform this configuration, see Configuring the
MicroStrategy ODBC driver for SequeLink, page 393.
1 On the UNIX or Linux machine that hosts Intelligence Server, browse to HOME_
PATH where HOME_PATH is the directory you specified as the Home Directory during
installation.
2 Open the odbc.ini.example file and find the section that starts with
[SequeLinkODBC]. Copy this section into the odbc.ini file. For information on
You can also use MicroStrategy Web and Import Data to integrate Salesforce.com
data into MicroStrategy. For steps to configure a connection to Salesforce.com to
support this type of integration, see Configuring third-party data sources for
importing data, page 251.
The following information is required for setting up the driver connection for the
MicroStrategy ODBC driver for Salesforce:
• Data Source Name: A name to identify the Salesforce data source configuration
in MicroStrategy. For example, Finance or Salesforce-1 can serve to identify the
connection.
• Host Name: The URL used to log in to the Salesforce.com system. You can keep
the default of login.salesforce.com to connect to the production instance. However,
you can also connect to other systems such as test.salesforce.com if you are
connecting to testing environments.
If you attempt to test the connection to your Salesforce.com system, the password syntax
is PasswordSecuritytoken, where Password is the password for the user account
and Securitytoken is the additional security token required to access Salesforce.com.
Do not use any spaces or other characters to separate the password and security token.
As part of configuring a connection to your Salesforce.com system, you can include the
password and security token as part of the database login, which is a component of a
database instance used to access the DSN in MicroStrategy. For steps to create a database
login, which you can use to provide the Salesforce.com password and security token, see
Creating a database login.
1 Install ODBC Driver for Red Brick for the correct operating system. For information
on installation, refer to the Installation and Configuration Guide for UNIX and
Linux provided by IBM.
Make sure you install the Red Brick Client Products (version 6.2 and higher)
so that they can be accessed by the appropriate users. You need the following
components:
The directory where Red Brick Client Products are installed should always be
accessible to MicroStrategy Intelligence Server.
Replace this <RB_CONFIG> placeholder with the location of where the Red Brick
Client Products are installed. Do not modify any other occurrences of <RB_
CONFIG> within odbc.sh.
5 Save the ODBC.sh file and remove Write privileges from the file by entering the
following command:
chmod a-w ODBC.sh
To configure a DSN
6 In a UNIX/Linux console window, browse to HOME_PATH where HOME_PATH is the
directory you specified as the Home Directory during installation.
7 Open the odbc.ini.example file and find the section that starts with [RED_
BRICK_62] if you are using Red Brick 6.2 or [RED_BRICK_63] if you are using
Red Brick 6.3. Copy the section into the odbc.ini file.
8 Edit the DSN parameters SERVER and DATABASE, and modify the value of RB_
CONFIG with the location of the directory where the Red Brick Client Products are
installed. For information on the available parameters, refer to your third-party Red
Brick driver documentation. This can often be found along with the driver
installation.
9 Save the odbc.ini file.
For details on these DSN parameters, refer to the product documentation provided
directly by the database vendor.
1 Install ODBC Driver for Sybase Adaptive Server IQ for the correct operating system.
For information on installation, refer to the Installation and Configuration Guide
provided by Sybase.
The directory where ODBC driver for Sybase Adaptive Server IQ is installed
should always be accessible to MicroStrategy Intelligence Server.
To configure a DSN
6 In a UNIX/Linux console window, browse to HOME_PATH where HOME_PATH is the
directory you specified as the home directory during installation.
7 Open the odbc.ini.example file and find the section that starts with [SAP
SYBASEIQVersion], where Version is the version of Sybase Adaptive Server IQ.
Copy the section into the odbc.ini file.
8 Edit the DSN parameters EngineName, DatabaseName and CommLinks, and modify
the value of ASDIR with the location of the directory where the ODBC Driver for
Sybase Adaptive Server IQ is installed. For information on the available parameters,
refer to your third-party Sybase driver documentation. This can often be found along
with the driver installation.
9 Save the odbc.ini file.
For details on these DSN parameters, refer to the product documentation provided
directly by the database vendor.
1 Install the ODBC Driver for Teradata for the correct operating system. For
information on installation, refer to the product documentation provided directly by
the database vendor.
To configure a DSN
6 In a UNIX/Linux console window, browse to HOME_PATH where HOME_PATH is the
directory you specified as the Home Directory during installation.
7 Open the odbc.ini.example file and find the section that starts with
[TERADATA_SERVER]. Copy that section into the odbc.ini file in the [ODBC
Data Sources] section.
8 Edit the DSN parameters DBCName, Database, and DefaultDatabase, and modify the
value of MSTR_TERADATA_PATH with the location of the directory where the ODBC
Driver for Teradata is installed.
You can also edit the parameters in the odbc.ini file to reflect your environment.
To support parameterized queries, define the EnableExtendedStmtInfo parameter as
EnableExtendedStmtInfo=Yes. For information on the other available
parameters, refer to your third-party Teradata driver documentation. This can often
be found along with the driver installation.
9 Save the odbc.ini file.
The ODBC Driver for Informix 8 for UNIX and Linux is a MicroStrategy-branded
ODBC driver, but it is not accessible through the Connectivity Wizard.
However, the Informix Client Software Developer’s Kit (CSDK) must be installed before
you create a DSN. This software is not included in the MicroStrategy product suite
installation and must be obtained through the database vendor or a third party. For
information on installation, refer to the product documentation provided directly by the
database vendor.
The following steps show how to configure the MicroStrategy ODBC driver for Informix
8.
To configure a DSN
6 In a UNIX console window, browse to HOME_PATH where HOME_PATH is the
directory you specified as the home directory during installation.
7 Open the odbc.ini.example file and search for the section that starts with [IBM
INFORMIX]. Copy the section into the odbc.ini file.
8 Edit the DSN parameters Database, Servername, and Service. For information on the
available parameters, refer to your third-party Teradata driver documentation. This
can often be found along with the driver installation.
9 Save the odbc.ini file.
For details on these DSN parameters, refer to the product documentation provided
directly by the database vendor.
1 Install the ODBC Driver for Netezza for the correct operating system. For
information on installation, refer to the product documentation provided directly by
the database vendor.
1 Install the 64-bit ODBC Driver for MySQL for the Linux operating system, found at
the hyperlink http://dev.mysql.com/downloads/connector/odbc/. This site is valid
as of the release of this manual. For information on installation, refer to the product
documentation provided by the database vendor.
• Ensure that the driver files are installed to the /usr/lib directory.
• For exact version numbers of MySQL drivers certified with MicroStrategy, refer
to the MicroStrategy General Information Readme.
Ensure that there is no white space between the equals sign (=) which
separates the parameter and its value.
You can test a connection to your MySQL database with the MicroStrategy DB
Query Tool.
This completes the steps to create a DSN and configure an ODBC driver for MySQL
Community Server 5.x. To create a database instance and database connection, see
Creating a database instance, page 175 and Creating a database connection, page 178.
1 Install the Aster ODBC Driver for the Linux operating system. For information on
installation, refer to the product documentation provided by the database vendor.
• The path to the installation location you choose for the ODBC driver is used later
in this procedure as the value for the Driver parameter in the odbc.ini file.
• For exact version numbers of Aster drivers certified with MicroStrategy, refer to
the MicroStrategy General Information Readme.
Ensure that there is no white space between the equals sign (=) which
separates the parameter and its value.
1 Install the DataDirect Cloud ODBC Driver for the Linux operating system. For
information on installation, refer to the product documentation provided by the
database vendor.
• The path to the installation location you choose for the ODBC driver is used later
in this procedure as the value for the Driver parameter in the odbc.ini file.
• For exact version numbers of DataDirect Cloud drivers certified with
MicroStrategy, refer to the MicroStrategy General Information Readme.
Ensure that there is no white space between the equals sign (=) which
separates the parameter and its value.
1 Install the Amazon Redshift ODBC Driver for the Linux operating system. For
information on installation, refer to the product documentation provided by the
database vendor.
• The path to the installation location you choose for the ODBC driver is used later
in this procedure as the value for the Driver parameter in the odbc.ini file.
• For exact version numbers of Amazon Redshift drivers certified with
MicroStrategy, refer to the MicroStrategy General Information Readme.
5 Save the ODBC.sh file and remove Write privileges from the file by entering the
following command:
chmod a-w ODBC.sh
Ensure that there is no white space between the equals sign (=) which
separates the parameter and its value.
1 Install the ODBC Driver for Vertica for the Linux or Solaris operating system. For
information on installation, refer to the product documentation provided by the
database vendor.
Ensure that there is no white space between the equals sign (=) which
separates the parameter and its value.
Prerequisites:
• MicroStrategy recommends that the SAP HANA user account used to create the
database is granted full permissions for the database. If the database user account
cannot be granted full permissions to the database, you can use the
recommendations listed in Required database permissions to create metadata,
History List, and statistics repositories, page 143 to determine the required
permissions for the SAP HANA database user account. In addition, ensure the
following permissions are defined for your SAP HANA user account:
▫ Insert permission for the _SYS_BIC schema.
▫ Select permission for the _SYS_REPO schema.
1 Install the SAP HANA ODBC driver files on the Windows system that will host the
MicroStrategy Intelligence Server. For specific installation steps, refer to your third-
party SAP documentation.
For exact version numbers of SAP HANA drivers certified with MicroStrategy,
refer to the MicroStrategy General Information Readme.
2 Using the Microsoft ODBC Data Source Administrator, create a data source name to
connect to your SAP HANA data source.
For best practices on using the Microsoft ODBC Data Source Administrator to
create data source names that are to be used in MicroStrategy, see Managing
ODBC and data sources with Microsoft ODBC Data Source Administrator,
page 134.
3 You can use the MicroStrategy DB Query Tool to test whether data can be retrieved
data from your SAP HANA data source. For information on how to use the
MicroStrategy DB Query Tool, see Using the DB Query Tool, page 351.
4 To use an SAP HANA as a data source, you must create a database instance in
MicroStrategy. For information on creating a database instance, see Creating a
database instance, page 175.
This completes the steps for the initial connection to SAP HANA in MicroStrategy for
Windows environments. For additional configuration requirements, see Additional
requirements to support SAP HANA, page 412.
1 Install the SAP HANA ODBC driver files on the Linux system that will host the
MicroStrategy Intelligence Server. For specific installation steps, refer to your third-
party SAP documentation.
For exact version numbers of SAP HANA drivers certified with MicroStrategy,
refer to the MicroStrategy General Information Readme.
To configure a DSN
6 In a Linux console window, browse to HOME_PATH where HOME_PATH is the
directory you specified as the Home Directory during your MicroStrategy installation.
7 Open the odbc.ini.example file and find the section that starts with [SAP
HANA]. Copy the section into the odbc.ini file.
8 Edit the following information from the syntax that you copied to odbc.ini:
• Driver=<SAPHANA_PATH>/libodbcHDB.so
Replace <SAPHANA_PATH> with the location where you installed the SAP
HANA ODBC driver files.
• Servernode=ip_address:port
▫ Replace ip_address with the IP address for the machine that hosts the
SAP HANA database.
▫ Replace port with the port number for the connection to the SAP HANA
database. Contact your SAP HANA database administrator for the required
port number.
• USER=uid
Replace uid with a valid SAP HANA user account.
• PASSWORD=pwd
Replace pwd with the password for the SAP HANA user account described
above.
For information on the available parameters, refer to your third-party SAP HANA
driver documentation. This can often be found along with the driver installation.
9 Save the odbc.ini file.
10 You can use the MicroStrategy DB Query Tool to test whether data can be retrieved
data from your SAP HANA data source. For information on how to use the
MicroStrategy DB Query Tool, see Using the DB Query Tool, page 351.
11 To use an SAP HANA as a data source, you must create a database instance in
MicroStrategy. For information on creating a database instance, see Creating a
database instance, page 175.
This completes the steps for the initial connection to SAP HANA in MicroStrategy for
Windows environments. For additional configuration requirements, see Additional
requirements to support SAP HANA, page 412 below.
Teradata
If you intend to use Teradata, which is certified by MicroStrategy, you need to:
• Pre-install the NCR ODBC Driver for Teradata RDBMS.
• Ensure that Teradata DSNs are set to Run in Quiet Mode.
If you use Teradata, the following settings are required for setting up the driver
connection.
In the Teradata ODBC Driver Options dialog box, click Options to set the following
required options:
• Session Mode: Select Teradata as the session mode to apply for the duration of the
session.
• Date Time Format: Set this value to AAA format so the ODBC driver handles the
Dates, Time, and Timestamps as ANSI-compatible strings. The ANSI-compatible
strings are only available with the V2R3 or later databases.
• Disable Parsing: Select this check box to disable parsing of SQL statements by the
ODBC driver.
You can enable Teradata Parallel Transporter for your connections to Teradata. This can
improve performance when retrieving large amounts of data, typically 0.5 Gigabytes and
larger, which can occur most commonly in MicroStrategy when publishing Intelligent
Cubes. For steps to configure this support, refer to the MicroStrategy Web Help.
For information on other options, refer to the online help by clicking Help.
Microsoft Excel
A Microsoft Excel file can be used as a data source in MicroStrategy. The information
provided below explains how to prepare an Excel file for use with MicroStrategy and how
to connect to the Excel file.
This data can be used as part of a MicroStrategy project in various ways. For example,
you can integrate the Excel data in your project using tools such as Architect, as
described in the Project Design Guide. You can also use Freeform SQL and Query Builder
to access your Excel data, as described in the Advanced Reporting Guide.
Do not use the column headings at the top of the Excel spreadsheet,
marked as A, B, C, and so on to select the whole column. Doing so may
include numerous empty cells with NULL values.
b In the Name Box, type a name for the highlighted cells, and then press
ENTER. The name you type in is used in MicroStrategy as a table name.
The Name Box is the drop-down list on the left-hand side below the
toolbars.
You can create multiple tables in one Excel file by highlighting different parts of
the file and assigning them different names.
3 Save the Excel file.
Text files
A text file can be used as a data source in MicroStrategy. You can use Data Import to
quickly include data from text files in your MicroStrategy project. Steps to use Data
Import to import data and begin your analysis is included in the MicroStrategy Web
Help.
Prerequisite
• You must have the Create and Edit Database Instances and Connections and Create
and Edit Database Logins privileges to define a new database connection.
• If you plan to connect to a data source using a DSN, the DSN must be created and
available. If a DSN is not available, you can use the DSNLess Connection option to
connect to your data source.
• If you want to manually type or paste a query to import your data, select Type a
Query.
4 Click OK. The Import from Tables page opens.
5 From the Data Sources panel, click Add. The Data Source dialog box opens.
6 Select the type of connection to your database, as follows:
• To connect to a data source using a DSN, select DSN Connections. Select the
DSN of the database that you want to connect to from the DSN drop-down list,
then select the appropriate database management system (DBMS) from the
DBMS drop-down list.
• To connect directly to a data source, select DSNless Connections.
▫ If you clear the Show databases whose drivers were not found
check box, only databases that have an installed and configured driver are
available for selection. These databases can be connected to by selecting the
required Database and Version from the drop-down lists, and supplying
the required connection information. For a detailed list of the information
required for each database type, see Creating DSNs for specific data sources,
page 380.
▫ If you select the Show databases whose drivers were not found
check box, additional databases that do not have a configured driver are
available for selection. These databases can be connected to by selecting the
required Database and Version from the drop-down lists, and then
configuring a connection to the database by completing the following steps:
a Click Show connection string.
b Type the value for each configuration requirement listed. Depending on the
database you are connecting to, this includes the server name, port
number, and database name. For a detailed list of the information
required for each database type, see Creating DSNs for specific data
sources, page 380.
c Select the Edit connection string check box. You can now edit the
connection string.
d Modify the Driver={DriverName} part of the connection string, where
DriverName is the default name used for the driver. Replace the default
DriverName with the name of the driver that your administrator
installed for the database.
e If there were any optional configuration parameters that you chose not to
define, modify the connection string to remove the parameters completely
from the string. These parameters are listed with an equal sign (=)
followed immediately by a semicolon (;), indicating no value is provided.
For example, if the connection string includes AlternateServers=;
remove this text from the connection string.
7 Type a user name and password with access to the database in the User and
Password fields.
8 Type a name for the database connection in the Data Source Name field.
MicroStrategy supports ODBC drivers from other vendors that you can install
separately. This involves manually defining the DSN parameters in the odbc.ini
file.
Modification of the odbc.ini file is necessary to configure the full list of ODBC driver
settings or for ODBC drivers that are not accessible through the MicroStrategy
Connectivity Wizard. However, caution should be taken when modifying the odbc.ini
file as incorrect modifications can cause unintended functionality and errors.
Refer to the odbc.ini.example file installed in HOME_PATH, where HOME_PATH is
the directory you specified as the home directory during installation on UNIX or Linux.
It is recommended copy the examples in the odbc.ini.example file to odbc.ini, to
act as a basis for your configurations. This example file uses commonly used settings for
the driver parameters.
If you require additional information on the purpose of and available options for each
parameter, refer to the following resources:
• For any data source listed in odbc.ini.example as a MicroStrategy driver, refer
to DataDirect’s documentation at
http://media.datadirect.com/download/docs/odbc/allodbc/help.html.
• For any data source that is not listed in odbc.ini.example as a MicroStrategy
driver, refer to the documentation for the third-party vendor of the driver. This can
often be found along with the driver installation.
Detailed steps to install and deploy the Hadoop Gateway are below.
Prerequisites
• You have installed Hadoop on UNIX/Linux servers.
• You have set up your Hadoop cluster, with at least one edge node. The edge node is
the interface between your Hadoop cluster and external servers.
• You have created a user account that the BDQE can use to communicate with the
servers in your cluster. For example, mstr-hadoop-gateway.
• You have created a Secure Shell (SSH) private key for your BDQE node using the
RSA algorithm, so that the edge node can use SSH to communicate with the cluster.
By default, the file name for a private key created with the RSA algorithm is id_rsa.
• You know the host name or IP address of the edge node that you install the BDQE
on.
• You know the host names or IP addresses of all the nodes that you want to install
the BDEE on.
• On all the nodes that you are installing the Hadoop Gateway components on, you
have created a folder for the components. The paths for the folder must be identical
for all nodes. For example, if you want to install the Hadoop Gateway in
/var/lib/mstr-hadoop-gateway, you must create the /var/lib/mstr-
hadoop-gateway folder in all the nodes of your Hadoop cluster.
4 Copy the appropriate package to the edge node that you want to install the BDQE on.
5 On the node that you are installing the BDQE on, open a UNIX/Linux terminal, and
navigate to the folder that you copied the Hadoop Gateway package to.
6 Extract the contents of the package, using the following command:
tar -xzf package
Where package is the appropriate package for your environment.
The package is extracted, creating a folder with the same name as the package. For
example, if you extracted bde-1.0-2.3.0-cdh5.1.0-SNAPSHOT-
dist.tar.gz for a Cloudera CDH 5.1.0 environment, the contents of the package
are extracted to a folder called bde-1.0-2.3.0-cdh5.1.0-SNAPSHOT-dist.
To configure the Hadoop Gateway components and add information about your
environment
7 In the terminal, navigate to the folder that you extracted the Hadoop Gateway
package to, and navigate to the conf folder.
8 Open bde.xml.tempate. The configuration file for the Hadoop Gateway opens.
The file is in the XML format, with a list of <property> elements.
9 In the configuration file, add the following information by editing the following
properties:
a Add a path to deploy the BDEE component to, for all the nodes in your cluster.
To add the path, edit the following property:
<property>
<name>com.microstrategy.bde.bde_remote_deploy_dir
</name>
<value>path-to-BDEE</value>
</property>
Where path-to-BDEE is the path that you want to deploy the BDEE to on all
the nodes of your Hadoop cluster. The steps to deploy the BDEE are described
later in this procedure.
Ensure that you have created the above folder in all the nodes of your Hadoop
cluster.
b Add the path to your SSH private key, which the BDQE uses to communicate
with the other nodes in your cluster. To add the path, edit the following
property:
<property>
<name>com.microstrategy.bde.local_key</name>
<value>path-to-ssh-private-key</value>
</property>
Where path-to-ssh-private-key is the path to the private key that you
created.
c Add the user name that the BDQE uses to communicate with the nodes in your
cluster. To add the user name, edit the following property:
<property>
<name>com.microstrategy.bde.account</name>
<value>bdqe-user-name</value>
</property>
Where bdqe-user-name is the user name that you created.
d Add the host name of the edge node that runs the BDQE. To add the host name,
edit the following property:
<property>
<name>com.microstrategy.bde.multicoordinator.coordin
atorHostList</name>
<value>bdqe-host-name</value>
</property>
Where bdqe-host-name is the host name or IP address of the edge node that
runs the BDQE.
10 Save and close bde.xml.template.
11 Rename bde.xml.tempate to bde.xml.
12 In the conf folder, create a new text file called slaves.
13 Open the slaves file in a text editor.
14 Type the host names or IP addresses of the nodes that you want to install the BDEE
on, with each node on a new line. For example:
node1-bdee.example.com
node2-bdee.example.com
node3-bdee.example.com
message above) for the table space to be large enough to store the History List repository
(PageSizeRequirement in the error message above). As a general rule, the page size
for the History List repository should be at least 4 KB.
Permission errors
This section provides troubleshooting information on permission errors in a UNIX or
Linux environment.
GLOSSARY
A
account
Creates a relationship between access privileges and user login credentials.
Account permissions are based on granted roles, and each role has specific
privileges. See also: application administrator, application designer, subscription
administrator, system administrator.
Activation Code
A code used to activate MicroStrategy Intelligence Server after installation. This
code is sent to an email address provided during activation.
ad hoc query
A SQL query dynamically constructed by desktop tools and whose results are not
known before it is sent to the server. The user is asking a new question that has
not been answered by an existing report.
address
Set of information that tells Narrowcast Server how to send services to a
particular subscriber. Each address can be associated with one and only one
login/user. Each address is defined to use a specific device. See also: device.
address display
A name that is displayed by receiving systems. For email delivery, the address
display is used to identify the email address. For example,
[email protected] might be displayed as “Smith, John” by
the receiving email client.
address ID
An ID value that identifies individual addresses. Each address can be subscribed
to a subscription set multiple times.
administration object
Narrowcast Server components that control the processing of Narrowcast
messages, providing the means to acquire, format, and transmit messages to
recipients. These objects are created and configured by the system administrator.
administrator
A user who installs and monitors software and user configurations, maintains
the state of the software, and administers the MicroStrategy servers in the
platform. An administrator also defines users, assigns user login accounts and
user privileges, and analyzes the performance of the system.
aggregate data
Information or facts added together or "aggregated" to form summaries of
information considered as a whole.
aggregate function
A numeric function that acts on a column of data and produces a single result.
Examples include SUM, COUNT, MAX, MIN, and AVG.
aggregate table
A fact table that stores data that has been aggregated along one or more
dimensions.
analyst
A user who analyzes business data by accessing reports, performing drilling, and
otherwise manipulating reports and documents to see required business data. An
analyst receives useful data from information devices like smart phones and
email without necessarily understanding how such information is derived or
delivered.
analytical application
In MicroStrategy, a software application designed to provide predefined reports
and other analytics based on a predefined metadata repository, for various
industries to gain insight into their business data. The application is not fixed to a
specific physical schema, giving it the flexibility to be ported to a company's
existing data warehouse.
Analytical Engine
A component of the MicroStrategy Intelligence Server that performs all
advanced analytical functions. The Analytical Engine evaluates functions not
supported by the data warehouse RDBMS and it cross-tabulates reports.
analytics
Predefined tools that allow analysis within the Analysis Module's functional
areas. Analytics include reports (graph, grid, and so on), scorecards, dashboards,
and so on.
analytics library
The collection of reports and related objects in the MicroStrategy metadata
repository. Library objects include reports, metrics, filters, and prompts. Library
objects are defined based on attributes and facts (objects in the logical data
model.)
application administrator
Narrowcast Administrator user role. This role is designed for a Narrowcast
Administrator console user who performs some of the same tasks as the
application designer but has the ability to modify application objects created by
any Narrowcast Administrator account. This role is intended for quality
managers, development managers, configuration managers, and other users
requiring full access to all application objects. See also: application designer.
application designer
A Narrowcast Administrator user role. This role is designed for a Narrowcast
Administrator console user who develops and tests services, which include
documents, publications, schedules, and subscription sets. Configures and
manages Subscription Portals that allow end users to subscribe to a variety of
Narrowcast services via the Web. Configures data sources, content, and portal
layout. Publishes services and device types, and selects default devices for
Subscription Portals. Specifies information source properties and default site
preferences. Installs, configures, and administers the development environment.
Administers subscribers and subscriptions for development and testing purposes.
See also: application administrator.
application object
MicroStrategy object used to provide analysis of and insight into relevant data.
Application objects are developed in MicroStrategy Developer and they are the
building blocks for reports and documents. Application objects include these
object types: report, document, template, filter, metric, custom group,
consolidation, prompt.
attachment
Any file that is included in an email message. Attachments can originate from
outside Narrowcast Server (that is, any pre-existing file can be sent as part of a
service) or can be created by Narrowcast Server (that is, Narrowcast Server can
create an Excel attachment on the fly).
attribute
A data level defined by the system architect and associated with one or more
columns in a data warehouse lookup table. Attributes include data classifications
like Region, Order, Customer, Age, Item, City, and Year. They provide a means
for aggregating and filtering at a given level.
attribute element
A value of any of the attribute forms of an attribute. For example, New York and
Dallas are elements of the attribute City; January, February, and March are
elements of the attribute Month.
attribute form
One of several columns associated with an attribute that are different aspects of
the same thing. Every attribute supports its own collection of forms.
attrition rate
The number of lost employees divided by the number of employees in a given
time period.
authentication object
Object used by an information source that specifies who the user is and the
security context within which that user will interact with that information
source. Contains the security information required to make a connection or
perform task execution. Depending on the information source module, it should
contain information such as the user login name and password. For a
MicroStrategy Information Source, the object is a MicroStrategy user. See also:
personalization object.
autostyle
A set of predefined formatting that can be easily applied to many reports in
either MicroStrategy Developer or MicroStrategy Web. Autostyles are a good way
to apply a corporate look and feel to reports.
axes (axis)
(1) A vector along which data is displayed. There are three axes—Row, Column,
and Page. When a user defines a template for a report, he places template units—
attributes, dimensions, metrics, consolidations, and custom groups—along each
axis. (2) One part of a multi-part graphical diagram. Many SDAM reports display
data on more than one graphical axis, such as the Quotation Activity Summary
report and the Quarterly Conversion Summary report.
banding
A method of organizing values according to a set of descriptive or meaningful
data ranges called buckets. Banding is also used for display purposes, where every
other row is a different color and the two colors alternate. Compare:
consolidation.
base table
A fact table that stores data at the lowest level of dimensionality.
block
A logical display element used to control the display of large reports in the
limited page and slide dimensions of Microsoft Word and PowerPoint. A block
may consist of multiple fetches. Blocks are defined by Microsoft Office product-
specific configuration settings.
break by
An attribute or hierarchy where calculations for an OLAP function restart. To
break by an attribute or hierarchy means to restart calculations that use OLAP,
or Relative, functions when the analytical engine reaches the next instance of
the specified attribute or hierarchy. Examples of OLAP functions include
RunningStdevP, Rank, NTile, and various expressions that calculate percent
values. To break by an attribute or hierarchy in an expression, you must set the
BreakBy parameter.
cache
A special data store holding recently accessed information for quick future
access. This is normally done for frequently requested reports, whose execution
is faster because they need not run against the database. Results from the data
warehouse are stored separately and can be used by new job requests that require
the same data. In the MicroStrategy environment, when a user runs a report for
the first time, the job is submitted to the database for processing. However, if the
results of that report are cached, the results can be returned immediately without
having to wait for the database to process the job the next time the report is run.
caching
A special data storage method in which recently accessed values are stored for
quick future access. Caching is used primarily to improve report execution
performance.
calculated expression
A metric obtained dynamically, directly from metrics on a document dataset, by
using at least one of the metrics in the document. Calculated expressions allow
you to use simple arithmetic operators (+, -, *, /) to combine metrics from
different datasets in the document. See also: Derived metric.
catalog
A table that contains the names of all non-temporary tables in a data warehouse.
characteristic attribute
An attribute that is a parent of a child attribute, but not part of the "main"
hierarchy associated with the child attribute. For example, consider a hierarchy
consisting of Year, Month, Day. Day of Week is a parent of Day, and a
characteristic attribute.
child attribute
The lower-level attribute in an attribute relationship. See also: parent attribute or
relationship.
clustering
A way of using machine resources to provide an efficient and robust processing
environment for a Narrowcast Server system. A cluster consists of two or more
machines, each machine running at least one Narrowcast Server component.
These components are: MicroStrategy Logging Server, distribution manager
(DM), execution engine (EE).
column
(1) A one-dimensional vertical array of values in a table. (2) The set of fields of a
given name and datatype in all rows of a given table. (3) MicroStrategy object in
the schema layer that can represent one or more physical table columns or no
columns.
component
A computing unit that provides a specific piece of the Narrowcast Server
functionality and interacts with other components. Examples are the Narrowcast
Administrator, execution engine, distribution manager, MicroStrategy Logging
Server, Object Repository, and Subscription Book Repository.
compound metric
A metric that cannot have a level placed on the entire metric, although it can be
set separately on each of the components.
conditional formatting
A method used to format specified controls in a document depending on
predefined criteria. It allows certain properties of controls, including sections, to
be controlled by data-driven conditions.
conditional metric
A metric containing filter criteria in its definition.
conditionality
Conditionality of a metric enables you to associate an existing filter object with
the metric so that only data that meets the filter conditions is included in the
calculation.
configuration objects
A MicroStrategy object appearing in the system layer and usable across multiple
projects. Configuration objects include (among others) these object types: users,
database instances, database logins, schedules.
connection string
Stores the information required to connect to a database server. A connection
string usually includes a DSN and the user ID and password required to log in to
the database server. This information varies depending on the particular database
server.
console user
A user who works with the Narrowcast Administrator console, managing
subscriptions, developing services, and administering the system, in contrast to
consolidation
An object that can be placed on a template and is made up of an ordered
collection of elements called consolidation elements. Each element is a grouping
of attribute elements that accommodates inter-row arithmetic operations.
Compare: custom group.
content
The information in services, including all reports, miscellaneous text, and file
attachments that are accessible to the user. Content is dynamic in the sense that
personalization, error handling conditions, and device settings all influence the
overall content output and format of each service.
control
Any item in the document’s Layout area that you can select. This can be a text
field, line, rectangle, image, panel stack, selector, Grid/Graph, or HTML
container. These different kinds of controls are referred to as control types. See
also: Grid/Graph, HTML container, Panel stack, Selector, Text field.
control default
A set of options that can be set for each type of control and each section in a
document. You can set the defaults according to the control that is currently
selected; afterward, its format is applied to any object of the same type that you
create in the document.
custom group
An object that can be placed on a template and is made up of an ordered
collection of elements called custom group elements. Each element contains its
own set of filtering qualifications.
custom SQL
Additional SQL code independently created by the user for execution against the
data warehouse. MicroStrategy provides tools to write custom SQL, including
Freeform SQL and Query Builder.
dashboard
An interactive, visually intuitive display of data. A dashboard can summarize key
business indicators (KPIs) to provide a status check. Users can change how they
view the dashboard's data using interactive features, such as selectors, grouping,
widgets, and visualizations. Users can explore their data via multiple paths, using
text, data filtering, and layers of organization. See also: Visual Insight dashboard,
Dashboard-style document.
dashboard-style document
A visually intuitive display of data that summarizes key business indicators for a
quick status check. A special type of document, dashboard-style documents
usually provide interactive features that let users change how they view the
dashboard-style document’s data.
Data Explorer
A portion of the interface used to browse through data contained in the
warehouse. Users can navigate through hierarchies of attributes that are defined
by the administrator to find the data they need.
data field
Dynamic text that is populated from a dataset with data that originated in the
data warehouse (or an Intelligence Server cache). A data field is only a reference
to the metric, attribute, consolidation, or custom group on a report. Data fields
are contained in text field controls on a document. See also: Auto text code, Text
field.
data mart
A database, usually smaller than a data warehouse, designed to help managers
make strategic decisions about their business by focusing on a specific subject or
department.
data modeling
A method used to define and analyze data requirements needed to support the
business functions of an enterprise. These data requirements are recorded as a
conceptual data model with associated data definitions. Data modeling defines
the relationships between data elements and data structures.
data source
A data source is any file, system, or storage location which stores data that is to
be used in MicroStrategy for query, reporting, and analysis. A data warehouse
can be thought of as one type of data source, which refers more specifically to
using a database as your data source. Other data sources include text files, Excel
files, and MDX cube sources such as SAP BW, Microsoft Analysis Services,
Oracle Essbase, and IBM Cognos TM1.
data warehouse
A database, typically very large, containing the historical data of an enterprise.
Used for decision support or business intelligence, it organizes data and allows
coordinated updates and loads.
database connection
Stores all database-specific connection information such as DSN, driver mode
and SQL execution mode as well as connection caching information.
database instance
(1) Database server software running on a particular machine. Though it is
technically possible to have more than one instance running on a machine, there
is usually only one instance per machine. (2) The MicroStrategy object that
represents a logical definition of a data warehouse. It stores all information
necessary for MicroStrategy to access the data warehouse for a particular project.
database login
The login ID and password that MicroStrategy Intelligence Server uses to log in
to a particular database on behalf of a user. See also: login ID.
dataset
A MicroStrategy report used to define the data available on a Report Services
document.
Datasets
(1) A pane in the Document Editor that shows all objects (grouped by datasets)
that can be used in the document. (2) All objects that can be used in the
document as supplied by the datasets. Dataset objects are attributes,
consolidations, custom groups, and metrics.
decile(deciling)
The method by which a group is broken up into ten groups of equal elements.
The first decile consists of the top ten percent; the second, the 11th to 20th
percent; the third, the 21st to 30th percent; and so on. demographics,
demographic data. Data that locates, identifies, and describes a population and its
properties; for example, data describing the age groups of people living in certain
geographical areas or income categories. Other dimensions of demographic data
include race, religion, political preference, spending preferences, and family size.
derived attribute
An attribute calculated from a mathematical operation on columns in a
warehouse table. For example, Age can be calculated from the expression
[Current Date–Birth Date]. See also: attribute.
derived metric
A metric based on data already available in a report. It is calculated by the
Intelligence Server, not in the database. Use a derived metric to perform
calculations on report data after it has been returned from the database.
description column
Optional columns that contain text descriptions of attribute elements.
device
MicroStrategy object that represents message-receiving technology employed by
end users, such as a mobile phone or tablet. The device object specifies how a
publication should be formatted and transmitted to a specific device type. For
example, an Outlook 98 Device might specify that the first document in the
publication must be plain text and no longer than 128 characters. It might also
specify that the second document could be either plain text or HTML, and if it is
HTML, image references can be embedded. A device includes specifications for
both formatting and transmission. Devices are used in the definition of addresses
to specify what information transmitter will be used to transmit content to those
addresses and how that content should be formatted and packaged. See also:
address, content, information transmitter, administration object.
device ID
Numeric ID value that indicates the delivery method and device that a recipient
prefers. Devices are specified for subscriptions in dynamic subscription sets by
providing the device ID for each recipient. Device IDs are found under the
properties for each device within Narrowcast Administrator. For example, one
subscription might specify Outlook 2000, while another recipient might specify a
mobile device. One subscriber then only receives email content formatted for
Outlook while the other subscriber only receives mobile device content
formatted for this phone.
dimension
An element or factor making up a complete entity or variable (a quantity that
may assume any one of a set of values).
directory server
A directory service provider running on a particular machine. Directory servers
are often part of email servers, and stores user names, addresses, and
authentication information. Unlike the Subscription Book, however, they are
neither intended nor well-suited to store and retrieve subscriptions. Directory
servers usually enable client connections through the lightweight directory
access protocol (LDAP), and are often used for centralized user authentication
across many systems. See also: Subscription Book, Lightweight Directory Access
Protocol (LDAP).
display locale
Controls which object names are shown in Narrowcast Administrator. Since
objects can have multiple names to support end users in more than one
language, one name must be chosen for display in Narrowcast Administrator.
The display locale serves this role. The locale selected for this purpose should be
the one that the Narrowcast Administrator needs to use most frequently when
defining objects. See also: locale, execution locale, selection locale, system locale,
user locale.
distribution set
A schedule and subscription set pair, created during service definition. Specifies
when and to whom Narrowcast Server will send a service. See also: schedule,
subscription set.
document
A display representing data coming from one or more reports, as well as
positioning and formatting information. A Report Services document is used to
format data from multiple reports in a single display of presentation quality.
document (Narrowcast)
A Narrowcast document contains the static information from the document
template and the dynamic content from document elements, and is ready to be
transmitted by Narrowcast Server. Each document has a specific type, such as
HTML, plain text, Excel, or derived from an imported file.
document element
Part of a Narrowcast document containing dynamic content that is generated
when that document is executed as part of a service. Consists of at least one
information object, plus error-handling instructions. Might include an XSL
stylesheet selection, depending on the type of information object chosen.
document formatter
Transforms the raw data of the information objects and the structure of the
Narrowcast document templates into a complete, formatted Narrowcast
document. The operations of document formatters include such tasks as XSL
processing and transformation, XML merging, character replacement, and string
padding. Formatting rules might account for device characteristics, locale
definition, and other recipient-specific formatting control information.
document template
Provides the structure and layout for a Narrowcast document. For example, an
Excel document template includes the basic workbook structure, any predefined
macros, and static worksheet content.
drill
A method of obtaining supplementary information after a report has been
executed. The new data is retrieved by re-querying the Intelligent Cube or
database at a different attribute or fact level.
dynamic content
Document content that is dynamically retrieved at service execution time and
that can be personalized for each message recipient. Dynamic content is created
using content information objects. This content changes depending on the
results returned by the information object and can return different results for
different subscribers. For example, a weekly report returns different information
from week to the next, and each subscriber might request different content in
his report. Examples include a MicroStrategy report, a Web query, a SQL query,
or content from an external system. See also: static content.
editor
A dialog used to create and edit MicroStrategy Objects. There is a Filter Editor,
Template Editor, Attribute Editor, Metric Editor, Report Editor, and so on.
end user
A subscriber, the person receiving messages from Narrowcast Server service, in
contrast to a console user. See also: console user.
entry level
The lowest level set of attributes at which a fact is available for analysis.
ETL
Short for extraction, transformation, and loading. (1) The process used to
populate a data warehouse from disparate existing database systems. (2) Third-
party software used to facilitate such a process.
execution locale
Determines how content is generated for the users who receive it. When a
document is created, the application designer can specify that the document
should be executed in a specific execution locale. The definition of the locale
then controls how information should be gathered, formatted, packaged and
delivered for this document. For example, an application designer might define a
French and a German locale to gather information in the appropriate languages.
If one of these locales is chosen as the execution locale for a document, all
dynamic content in this document is retrieved using the corresponding language.
See also: locale, display locale, selection locale, system locale, user locale.
expression
Formulas built from functions, attributes, facts, metrics, and consolidations that
can be used to define attribute forms, fact calculations, metrics, or filters.
fact
(1) A measurement value, often numeric and typically aggregatable, stored in a
data warehouse. (2) A schema object representing a column in a data warehouse
table and containing basic or aggregated numbers—usually prices, or sales in
dollars, or inventory quantities in counts. See also: metric.
fact table
A database table containing numeric data that may be aggregated along one or
more dimensions. Fact tables may contain atomic or summarized data. Compare:
base table.
fetch
The amount of report data retrieved from one call to MicroStrategy Web
Services. Fetches are used to control the amount of network traffic between
MicroStrategy Office and MicroStrategy Web Services and the amount of
memory used by MicroStrategy Intelligence Server. When you execute a report
or document into a Microsoft product, the Execution Status dialog box displays
the progress of each fetch. Fetch size is controlled by Microsoft Office product-
specific configuration settings. Maximum fetch size is governed by an
Intelligence Server setting in MicroStrategy Developer.
filter
A MicroStrategy object that specifies the conditions that the data must meet to
be included in the report results. Using a filter on a report narrows the data to
consider only the information that is relevant to answer your business question,
since a report queries the database against all the data stored in the data
warehouse. A filter is composed of at least one qualification, which is the actual
condition that must be met for the data to be included on a report. Multiple
qualifications in a single filter are combined using logical operators. Examples
include "Region = Northeast" or "Revenue > $1 million". A filter is normally
implemented in the SQL WHERE clause.
Flash-enabled document
A Report Services document in which Flash Mode is selected as an available
display mode in the Document Properties dialog box.
flattened
A report display type in which the results of a report are displayed with all
attributes and metrics flattened side-by-side on one axis. Also, any subtotals
within the report are not displayed. It is convenient to execute your report or
HTML document in this display type if you intend to use Excel’s drop-down lists
to filter, hide/show data, and more.
folder
A MicroStrategy object used for grouping and storing in a single place a set of
objects that are similar, such as filters, templates, and reports.
folder list
A portion of the interface that lists all the folders found in the project in a
hierarchical fashion. It helps a user to visualize and browse through a
MicroStrategy project.
form
One of several columns that are different representations of the same thing, as
ID, Name, Long Description, Abbreviation.
function plug-in
Allows user-defined functions to be used by the MicroStrategy Analytical Engine.
governing parameters
Designed to keep the execution profile of a system within acceptable limits.
Protects the system from overconsumption of resources such as memory, disk
space, network capacity, and CPU cycles.
graph
A graphical image display of data. Sometimes referred to as a chart. See also
report.
graph analytic
An analytic showing data as points, lines, or bars, arranged according to axes
based on the chosen metrics. Although not all analytics can be displayed in every
graph type available, many analytics can be viewed in several ways. Choices for
graph display include bars, lines, area graphs, and three-dimensional graphs.
graph view
Report viewing mode that displays results as a graphical chart.
grid
A spreadsheet-style two-dimensional display of data. See also report.
grid analytic
An analytic consisting of rows and columns. Each row or column has a heading,
and each heading represents a prompt from the analytic. Grid analytics can be
modified easily, by drilling, moving columns, converting columns to rows,
sorting, and using page-by to display subsets of the analytic data as separate
pages.
grid view
Report viewing mode that displays result data in a tabular format.
Grid/Graph
A control placed in a document that displays information in the same way a
MicroStrategy report does.
grouping
A way to create a hierarchical structure for a document.
hierarchy
A set of attributes defining a meaningful path for element browsing or drilling.
The order of the attributes is typically—though not always—defined such that a
higher attribute has a one-to-many relationship with its child attributes.
hint
A comment that passes instructions to a database optimizer about choosing an
execution plan for a given SQL statement. In MicroStrategy, a hint can be
defined in VLDB properties to appear within a MicroStrategy-issued SQL
statement.
History List
A folder where users can retrieve the results of previously executed or scheduled
reports and documents.
HTML container
A control that either displays real-time information from the web or displays
formatted HTML.
HTML document
(1) A compound report displaying multiple grids and graphs. (2) The
MicroStrategy object that supports such a report.
ID column
A column that contains attribute element identification codes. All attributes must
have an ID column.
imported file
A file imported from outside of Narrowcast Server and stored in its original
format. For example, a text file contains only plain text and an HTML file
contains only HTML. Storing information in the file format preserves the
integrity of the original data since files cannot be modified with Narrowcast
Server. Files cannot be directly included in publications; they must first be
associated with imported documents, which serve as containers to allow them to
be attached to publications. Imported files can also be used as stylesheets or
templates for documents.
incremental fetch
A feature that returns a large set of information, such as subscriptions, to the
console in numerous small pieces as those pieces are needed. This ensures that
network traffic and client processing is kept to a minimum.
information object
Application object containing a set of instructions that specify how to get data
from a particular type of information source. Defined by using an information
source module, it is set up when a service is built and executed when the service
that uses it is run. Plays one of three roles: content, subscription, or
information source
Contains information about how to connect to a specific source of content using
an information source module. The Delivery Engine requests and acquires
information from information sources. An information source uses
personalization objects for personalization. See also: information source module
(ISM), personalization object.
information transmitter
Administration object that delivers formatted content, in the form of
publications, to end user devices. An information transmitter might serve the
purpose of sending email via SMTP or mobile device messages using an SMS
gateway. In general, an information transmitter supports one type of
transmission technology, such as SMTP, FTP, HTTP, or ODBC, but this is not a
requirement. Information transmitters depend on information transmission
modules. See also: device, document (Narrowcast), information transmission
module (ITM), publication.
Intelligent Cube
A copy of the report data saved in memory and used for manipulation of the view
definition. This division allows multiple reports with different views to share a
common data definition.
join
A SQL operation that combines data from multiple tables into a single result
table.
Layout area
The middle panel of the Document Editor in which you place data or other
controls to determine the appearance of the document when it is viewed as a
PDF.
level
(1) In a data warehouse, facts are said to be stored at a particular level defined by
the attribute IDs present in the fact table. For example, if a fact table has a Date
column, an Item_ID column, and a fact column, that fact is stored at the
Date/Item level. (2) With regard to metric calculation, the level is the level of
calculation for the metric.
link
A connection from a document to another document or a report. A link lets an
analyst execute another document or report (the target) from a document (the
source), and to pass parameters to answer any prompts that are in the target.
load balancing
A strategy aimed at achieving even distribution of MicroStrategy Web Universal
user sessions across MicroStrategy Intelligence Servers. MicroStrategy achieves
four-tier load balancing by incorporating load balancers into MicroStrategy Web
Universal.
locale
Specifies what regional characteristics to apply to data and formatting, including
number format, date format, time format, and character sets. Your system might
support multiple locales. See also: display locale, execution locale, selection
locale, system locale, user locale.
Locale ID
Numeric ID value used to indicate the locale that a recipient prefers. Locales are
specified for subscriptions in dynamic subscription sets by providing the Locale
ID. Locale IDs are found under the properties for each locale within Narrowcast
Administrator. For example, one subscription might specify French, while
another recipient might specify German. One subscriber then only receives
French content while the other subscriber only receives German content.
login ID
Login identifier, typically supplied with a password.
lookup table
A database table used to uniquely identify attribute elements. They typically
consist of descriptions of dimensions. Lookup tables are usually joined to fact
tables to group the numeric facts in the fact table by dimensional attributes in
the lookup tables.
managed object
A schema object unrelated to the project schema, which is created by the system
and stored in a separate system folder. Managed objects are used to map data to
attributes, metrics, hierarchies and other schema objects for Freeform SQL,
Query Builder, and MDX cube reports.
manual fetch
A type of incremental report result fetching in which you are asked to confirm
each fetch. For example, when you execute a report, you are prompted to
confirm that each fetch, or section of report results, is displayed.
many-to-many relationship
An attribute relationship in which multiple elements of a parent attribute can
relate to multiple elements of a child attribute, and vice versa.
many-to-one relationship
An attribute relationship in which (1) multiple elements of a parent attribute
relate to only one element of a child attribute, and (2) every element of the child
attribute can relate to multiple elements of the parent.
MDX cube
An MDX cube is a collection or set of data retrieved from an MDX cube source,
which is imported into MicroStrategy and mapped to various objects to allow
query, reporting, and analysis on the data.
metadata
A repository whose data associates the tables and columns of a data warehouse
with user-defined attributes and facts to enable the mapping of the business
view, terms, and needs to the underlying database structure. Metadata can reside
on the same server as the data warehouse or on a different database server. It
can even be held in a different RDBMS.
metric
(1) A business calculation defined by an expression built with functions, facts,
attributes, or other metrics. For example: Sum(dollar_sales) or [Sales] - [Cost].
(2) The MicroStrategy object that contains the metric definition. It represents a
business measure or key performance indicator. See also: fact.
multidimensional analysis
A form of analysis of the data in a data warehouse that includes many
relationships, each representing a dimension. For example, a retail analysis may
seek to understand the relationships among sales by region, by quarter, by
demographic distribution (income, education level, gender), and by product.
Multidimensional analysis provides results for these complex relationships.
multipart MIME
Part of the MIME specification, which includes more than one body part in a
body section within a MIME message. This is typically used to enable the
inclusion of separate text and HTML message bodies, embedded images, and
other body parts within an email message. See also: multipurpose Internet mail
extensions (MIME).
object
Conceptually, an object is the highest grouping level of information about one
concept, used by the user to achieve the goal of specified data analysis. More
concretely, an object is any item that can be selected and manipulated, including
folders, reports, facts, metrics, and so on.
object template
A MicroStrategy object that allows you to start with a predefined structure when
creating a new object. You can use object templates for many MicroStrategy
objects, including metrics, documents, reports, and report templates.
ODBC driver
Software interface to an ODBC service provider. See also: open database
connectivity (ODBC).
one-to-many relationship
An attribute relationship in which every element of a parent attribute can relate
to multiple elements of a child attribute, while every element of the child
attribute relates to only one element of the parent. The one-to-many attribute
relationship is the most common in data models.
one-to-one relationship
An attribute relationship in which every element of the parent attribute relates to
exactly one element of the child attribute, and vice versa.
outline mode
Report viewing mode that creates indented, collapsible groupings of related
elements to make reports neater and easier to read.
page
An amount of data that is analogous to a page in a page-by report. Each page of a
page-by report represents one combination of elements from each attribute on
the page-by axis. For example, one page may contain data related to 2006 as well
as the Southeast region. A report with no attributes on the page-by axis is
considered to have one page. When you execute a report or document into a
Microsoft product, the Execution Status dialog box displays the progress of each
page.
page-by
Segmenting data in a grid report by placing available attributes, consolidations,
and metrics on a third axis called the Page axis. Since a grid is two-dimensional,
only a slice of the cube can be seen at any one time. The slice is characterized by
the choice of elements on the Page axis. By varying the selection of elements, the
user can page through the cube.
panel
A way of grouping data in a document so that users can navigate subsets of data
as if the subsets were pages in a smaller document. Each “page”, or layer of data,
is a panel; a group of panels is called a panel stack.
panel stack
The holder for a collection of panels, or layers of data, in a document. A user can
navigate or flip through the panels in a panel stack; only one panel is displayed at
a time.
parent attribute
The higher-level attribute in an attribute relationship with one or more children.
See also: child attribute or relationship.
partition
A relational database table broken down into smaller component tables. This can
be done at the database level or at the application level. See the MicroStrategy
System Administration Guide for more information.
partition mapping
The division of large logical tables into smaller physical tables based on a
definable data level, such as month or department. Partitions minimize the
number of tables and records within a table that must be read to satisfy queries
issued against the warehouse. By distributing usage across multiple tables,
partitions improve the speed and efficiency of database queries.
persistence
A default behavior in MicroStrategy Office ensuring that every report and
document you run in an Excel workbook, PowerPoint presentation, or Word
document retains a link to MicroStrategy Intelligence Server. This ensures that
you and other users can refresh the reports and documents to retrieve the latest
data from the data warehouse or other data sources. Every report or document
executed also contains properties that are persisted; these properties determine
how the report or document is displayed and can be modified by users once it is
refreshed.
personalization
The process that allows each subscriber to receive data that has been filtered and
formatted specifically for him. Narrowcast Server uses locale, subscription, and
personalization objects to personalize services. See also: locale, personalization
object, subscription.
personalization object
An object handled by information sources for personalization. The three types
are: authentication, preference and security. The combination of the
authentication, preference, and security objects control the data that is returned
by an information object. See also:authentication object, information object,
information source, preference object, question object, security object.
personalization set
A combination of locale, authentication, security, and preference objects to
achieve personalized information, or information filtered and formatted
specifically for a subscriber.
physical address
The address location used to locate recipients and deliver messages. For email
delivery, this is a standard SMTP address in the form [email protected]. No
physical address is required for delivery to the Subscription Portal. The physical
address required by other information transmitters depends on the individual
information transmitter.
PIN
The personal identification number required by some delivery methods. A PIN is
not used for email, mobile device, or Subscription Portal delivery. The use of a
PIN by other information transmitters depends on the individual information
transmitter.
plug-in
An additional processing component integrated with MicroStrategy products.
For example, advanced statistical and financial functions can be added as
additional processing components.
plugin
An application that can easily be installed and executed by the MicroStrategy
Intelligence Server in one of several identical interfaces. For example, advanced
statistical and financial functions can be added as additional processing
components.
port number
The port number is how a server process identifies itself on the machine on
which it is running. For example, when the Intelligence Server machine receives
a network call from a client (Developer, Web Universal, Narrowcast Server,
Command Manager, and so on), it knows to forward those calls to the
Intelligence Server port number that is specified in the call.
portability
The ability of an analytical application to be integrated into an existing data
warehouse. To port the Analysis Module, you “map” the module to the physical
schema of an existing data warehouse.
portal
A site that offers a centralized access point for finding and managing
information via a variety of different services. It offers a broad array of resources
and services, such as email, discussion forums, search engines, and other online
services. A portal is accessible through the use of a web browser. See also:
Subscription Portal.
preference object
Type of personalization object that uses the answers to question objects to
specify the information that the user wants. At run-time, the preference object is
applied to information objects to personalize them. Preferences are usually
controlled by the user, but can be set by the subscription administrator. For an
Information Source, preference objects are prompt answers. See also:
personalization object, question object.
prefix
A prefix is stored in the project metadata associated with a table or tables and is
used by the Engine to generate SQL. Also, the Catalog Server uses it to obtain
table sample values and row counts. In most cases, it should match the name
space field since it is used to qualify on a specific table belonging to a certain
owner or name space. Prefixes can be defined and modified from the Warehouse
Catalog interface.
preview fetch
A type of incremental report result fetching in which you can see a preview of
the report data as it runs. You specify how many rows of the report you want to
preview at a time, and fetching automatically stops after one fetch.
primary key
In a relational database, the set of columns required to uniquely identify a record
in a table.
privilege
Assigned to users, a privilege defines the functionality available to a user, for
example, which objects a given user can create and which applications and
editors he can use.
process
An executing application comprising one or more threads. Processes use
temporary private address spaces and control operating system resources such as
files, dynamic memory allocations, pipes, and synchronization objects.
production metadata
The repository you create during the configuration portion of the installation
process, and which works with your data warehouse and serves as your working
metadata repository.
productivity analysis
A process that measures company productivity and identifies ways to increase it.
project
(1) The highest-level intersection of a data warehouse, metadata repository, and
user community, containing reports, filters, metrics, and functions. (2) An object
containing the definition of a project, as defined in [1]. The project object is
specified when requesting the establishment of a session.
project designer
The user category of one who creates projects and all of the schema objects
(facts, attributes, hierarchies) for a project. A project designer is thoroughly
familiar with the data model and schema object editors.
project source
Defines a connection to the metadata database and is used by various
MicroStrategy components to access projects. A direct project source is a two-
tier connection directly to a metadata repository. A server project source is a
three-tier connection to a MicroStrategy Intelligence Server. One project source
can contain many projects and the administration tools found at the project
source level are used to monitor and administer all projects in the project source.
prompt
MicroStrategy object in the report definition that is incomplete by design. The
user is asked during the resolution phase of report execution to provide an
answer that completes the information. A typical example with a filter is
choosing a specific attribute on which to qualify.
Property List
The list of settings used to specify the appearance or any other characteristic of a
control on a document.
publication
An ordered collection of documents that completely defines the content of a
service for a specific set of devices. Each publication is used for exactly one locale
and one information transmission module. A publication specifies: An
information transmitter, At least one device or A set of documents. See also:
device, document (Narrowcast), information transmitter.
qualification
The actual condition that must be met for data to be included on a report.
Examples include “Region = Northeast” or “Revenue > $1 million”.
Qualifications are used in filters and custom groups. You can create multiple
qualifications for a single filter or custom group, and then set how to combine
the qualifications using the logical operators AND, AND NOT, OR, and OR NOT.
query
A request for data from a database or data warehouse. A report is a database
query.
Query Engine
The MicroStrategy component responsible for submitting SQL code to the
database.
question object
Type of personalization object that specifies the questions to ask the user to
determine the user’s preferences. Answers are used as preference objects. For a
MicroStrategy Information Source, a question object is defined by choosing a
report, and the questions to be asked depend on the definition of that report. In
personalized page execution mode, the user is asked what page to display, using
the page-by functionality. In personalized report execution mode, the questions
include all prompt objects defined on the selected report except the security
object prompt. See also: page-by, personalization object, preference object.
Quick Grid
A report display type in MicroStrategy Office in which the report is run as a CSV
and bulk-loaded into Excel in one fetch. Although this results in a fast report
execution time, formatting from the report definition, such as fonts, colors, and
thresholds is not applied. You can apply formatting to Quick Grids using
Microsoft Excel’s AutoFormats.
ranking
A type of OLAP function that returns the rank of a value in a group of values.
Rows with equal values with respect to the ordering are assigned the same rank.
relate table
A table containing the ID columns of two or more attributes, thus defining
associations between them.
relationship
An association specifying the nature of the connection between one attribute
(the parent) and one or more other attributes (the children). See also: child
attribute or parent attribute.
report
The central focus of any decision support investigation, a report allows users to
query for data, analyze that data, and then present it in a visually pleasing
manner.
report designer
The user category of one who creates all application objects such as grid and
graph reports, filters, templates, documents, consolidations, and custom groups.
The report designer understands all of the business intelligence capabilities of the
system.
report resolution
The process of filling placeholders such as prompts with information determined
at run time.
report template
A MicroStrategy object that allows you to define the layout of general categories
of information in a report. In a report template, you specify the information that
you want to retrieve from your data source, and the way that you want the data
to be displayed in Grid view. A report template does not include filter
information. Report templates are often referred to as just as templates.
retention(employee)
The process of maintaining or securing employee loyalty to minimize loss of key
talent.
role
A feature of the security subsystem that defines which objects a given user can
create and which operations he can perform. The different Narrowcast Server
roles are: System administrator (who manages the entire system), Application
administrator (who administers application objects only), Application designer
(who develops application objects only and cannot modify objects owned by
other users), Subscription administrator (who manages the Subscription Book),
Portal administrator (who configures and manages Subscription Portals).
schedule
Sets the time or frequency that a service is executed. A schedule represents a
recurrence pattern, not a fixed date. It is defined relative to time zones to
account for daylight savings, date boundaries, and other time zone-specific
issues. To allow subscribers globally to receive services at specific local times, a
service can contain more than one schedule.
schema
(1) The set of tables in a data warehouse associated with a logical data model. The
attribute and fact columns in those tables are considered part of the schema
itself. (2) The layout or structure of a database system. In relational databases,
the schema defines the tables, the fields in each table, and the relationships
between fields and tables.
schema object
MicroStrategy object created, usually by a project designer, that relates the
information in the logical data model and physical warehouse schema to the
MicroStrategy environment. These objects are developed in MicroStrategy
Architect, which can be accessed from MicroStrategy Developer. Schema objects
directly reflect the warehouse structure and include attributes, facts, functions,
hierarchies, operators, partition mappings, tables, and transformations.
scorecard
A type of tally sheet displaying a company's performance using key performance
indicators (KPIs) that gauge how well a company progresses in areas such as
finance, customer service, and product availability and distribution. See also KPI
(key performance indicator).
security filter
A qualification associated with a user that is applied to all queries executed by
that user.
security object
Type of personalization object that specifies what information the user should
have access to. Security filtering criteria applied to an information source during
subscriber interaction. For a MicroStrategy Information Source, it is a response
to a prompt in the form of a single attribute element. Each user can have one
security object per information source. See also: personalization object, security
object prompt.
security role
In a MicroStrategy security model, the set of privileges that a user can have.
segment
A group of subscriptions within a subscription set. Subscription sets are divided
into multiple pieces, or segments, so that the work required to execute a service
for all subscriptions can be distributed across multiple systems to allow parallel
work processing. The size of the segment is part of the service definition and
controls the work packages that are sent to each execution engine.
segmentation
The task of dividing the subscriptions within a subscription set into equal-sized
groups or segments. Segmentation ensures that all subscription information
objects and content information objects return only information for
subscriptions in the current segment. Subscription sets are always segmented
using the subscription ID, and the boundaries of segments are specified as
subscription ID values. For the MicroStrategy Information Source, segmentation
can be performed automatically by Narrowcast Server, or the application
designer can control how the subscription set is segmented and how subscription
information objects and content information objects constrain the information
they return.
segmentation prompt
A prompt that controls the information returned in a report used as a content
information object or subscription information object. Segmentation can be
performed automatically by Narrowcast Server, or prompts can be added to
content information objects and subscription information objects manually. This
process limits the number of subscriptions and content pages returned to only
provide information for subscriptions in the current segment.
selection locale
Determines which users should receive which content. When a user is created,
the subscription administrator (using Narrowcast Administrator) or the user
(using the Subscription Portal) selects a locale for which the user will receive
content. When a publication is created, the application designer chooses a
selection locale that determines which users receive the content in a publication.
If a user chooses Locale A, the application designer must choose Locale A as the
selection locale for a publication for the user to receive this publication. See also:
locale, display locale, execution locale, system locale, user locale.
selector
A type of control in a document that allows a user to: Flip through the panels in
a panel stack, to see different predefined layers of data, or “pages”, in the same
document. Display different attribute elements or metrics in a Grid/Graph.
SequeLink
Third-party (non-MicroStrategy) software that configures and manages data
access across multiple data stores, operating systems, and deployment options.
SequeLink machine
The machine where SequeLink is installed. This machine can be independent
from the rest of the Subscription Portal.
SequeLink services
SequeLink creates two NT services: SLAgent 54, which is the Administrator, and
SLSocket54, which is the Server.
server definition
A MicroStrategy object stored in the metadata containing information about the
configuration of an Intelligence Server.
server instance
The combination of an Intelligence Server running with a particular server
definition.
service
An object that provides all the information needed for the Delivery Engine to
correctly generate messages. That information includes the delivery conditions,
content, personalization rules, and subscriptions for sending messages for a
particular purpose. For example, one service delivers a daily message containing a
stock portfolio update, while another delivers alerts to mobile devices when the
value of a stock changes significantly. A service comprises at least one schedule-
subscription pair and a set of publications.
service designer
Narrowcast Administrator user role. This role is for a Narrowcast Administrator
console user who develops and tests services, which include documents,
publications, schedules, and subscription sets. Configures and manages
Subscription Portals that allow end users to subscribe to a variety of Narrowcast
services via the web. Configures data sources, content, and portal layout.
Publishes services and device types, and selects default devices for Subscription
Portals. Specifies information source properties and default site preferences.
Installs, configures, and administers the development environment. Administers
subscribers and subscriptions for development and testing purposes. See also:
application administrator.
service queue
In Narrowcast Administrator, a visual display of upcoming services to be
processed.
simple metric
A type of metric that can stand alone or be used as a building block for
compound metrics. Simple metrics always contain at least one aggregate
function, such as sum or average, applied to a fact, attribute, or another metric.
The entire metric can only contain one level.
slice
One page of content in a multi-page report. Narrowcast Server divides a single
multi-page report into multiple individual pages of content that are used as
personalized content for individual subscriptions. slicing attribute. A slicing
attribute is the attribute used to divide multi-page reports executed using
personalized page execution mode into multiple individual pages of content. The
first attribute on the page axis is used as the slicing attribute.
smart fetch
A type of report result fetching in which fetching continues until completion or
you cancel the operation. This is the default fetch method used in MicroStrategy
Office.
sort
Arranging data according to some characteristic of the data itself (alphabetical
descending, numeric ascending, and so forth). See also: drill, page-by, subtotal.
sort by
The order of the return values of an expression in relation to the order of the
value or metadata object given. A sort by includes whether to sort in ascending
or descending order, and which metadata object to sort by. Sort by may also be
performed on the value of the subexpression, which is the input argument. To
sort by a value or metadata object in an expression, you must set the SortBy
parameter.
SQL Engine
The MicroStrategy Intelligence Server component that in report execution
converts report requests into SQL to be used for a database query.
static content
Document content that is contained directly in the document and does not
change from one service execution to the next. It cannot be personalized for
different subscribers. Examples include an HTML template, a static URL, and so
on. Compare with: dynamic content.
subscriber
A person who receives content from at least one service. Each individual who
receives messages from Narrowcast Server has a login that provides password-
controlled access to subscription and user preference information for the
individual and his addresses. Subscribing at least one of these addresses to a
particular service allows the individual to receive messages.
subscription
An enrollment in a service; a subscription is composed of one user and one
address. subscription administrator Narrowcast Administrator user role.This role
is designed for a console user who manages the Subscription Book, including
users, addresses, and subscription sets. Also installs, configures, and administers
the Subscription Book Module.
Subscription Book
Contains all users, addresses, and subscription sets. Stored in the Subscription
Book Repository. See also: subscription set.
Subscription ID
The ID value used by Narrowcast Server to segment subscription sets. It is also
called Segmentation ID. This value is required for dynamic subscription sets.
subscription information
All information related to an individual subscription. This information allows
Narrowcast Server to deliver services to individual recipients in the desired
manner.
Subscription Portal
A feature of Narrowcast Server that allows end users to subscribe to Narrowcast
Server services offered through a web-based portal. This enables end users to
experience personalized and proactive interactions, based on user-defined
permissions and preferences. See also: portal.
subscription set
A collection of addresses that can be subscribed to a service. Subscription sets are
either static or dynamic. A static subscription set is an application object that
retrieves subscription information from the Subscription Book Repository.
Useful when the set of end user addresses that should receive a service does not
change. A dynamic subscription set is an application object containing at least
one piece of subscription information retrieved from an information object
instead of from the Subscription Book Repository. Useful for changing or alert-
driven subscription sets. Dynamic subscription sets can acquire some or all of
their information from the information object. The rest of the subscription
information is acquired from the Subscription Book Repository. See also:
subscription set object.
Subscription Set ID
A numeric value used to identify each subscription set.
subtotal
A totaling operation performed for a portion of a result set. See also: drill and
page-by.
summary metric
A shortcut to a subtotal, or a subtotal metric allowing explicit aggregation in
documents. A summary metric allows you to select the function to use to
calculate the subtotal.
system administrator
Narrowcast Administrator user role. This role is designed for a console user who
performs the following tasks: Installs and configures the information delivery
platform, Migrates system objects and application objects, Monitors, analyzes,
and tunes the system to ensure the smooth and balanced operation of the
decision support or business intelligence environment, Performs troubleshooting
and error recovery.
system developer
Narrowcast Administrator user role. This role is designed for a Narrowcast
Server user who employs the SDK and embeds Narrowcast Server technology
into another product or application.
system locale
A language in which all objects are guaranteed to have a name. Since objects can
have names in several locales (languages), it is necessary to have one locale
where a name always exists for all objects. The system locale serves this role,
because the system locale cannot be deleted. See also: locale, display locale,
execution locale, selection locale, user locale, text container See: document
(Narrowcast).
table
The primary physical component of a data warehouse, logically consisting of
columns of data of varying types.
template
A MicroStrategy object that serves as a base on which you can build other objects
of the same type. You can create a template for almost any kind of MicroStrategy
object, such as filters or reports. Also see: Object template and Report template.
text field
A type of control in a document that displays text in the document. These
different types of text content are: Static text, which does not change and serves
as a label. Dynamic text, which is populated by the document or dataset. There
are two types of dynamic text: Data field, which is populated from a dataset with
data that originated in the data warehouse (or an Intelligence Server cache). A
data field is only a reference to an object on a report. Auto text code, which is
populated by the document or dataset, consisting of their settings rather than
data from the data warehouse. A combination of any or all of the above types in
one text field. See also: Data field, Auto text code.
threshold
Used to create conditional formatting for metric values. For example, a threshold
triggers the report that, if dollar sales is greater than $200, format that cell to
have a blue background with bold type.
transformation
A schema object that encapsulates a business rule used to compare results of
different time periods. Transformations are used in the definition of a metric to
alter the behavior of that metric.
user hierarchy
Named sets of attributes and their relationships, arranged in specific sequences
for a logical business organization. They are user-defined and do not need to
follow the logical model.
user ID
A numeric value used to identify individual users.
user information
The collection of information, including first name, last name, address, zip code,
and other personal information, that changes from one subscriber to the next.
user locale
Defines which content the user receives. This is set up by either the subscription
administrator via Narrowcast Administrator or by the user via Subscription
Portal. The user locale must match the selection locale. See also:locale, display
locale, selection locale, system locale.
view filter
The set of criteria that restricts the report data that is currently being viewed. It
may include filtering conditions based on any of the objects on the report.
widget
A type of control that presents data in a visual and interactive way; an interactive
Flash-only graph that dynamically updates when a new set of data is selected.
Some types include Gauge, Heat Map, and Stacked Area widgets.
Amazon Redshift Wire Protocol 384 Sybase ASE Wire Protocol 390
X
XSL report style 39