CMCADMINGUIDE
CMCADMINGUIDE
1
Patents Business Objects owns the following U.S. patents, which may cover products that are offered and sold by Business Objects: 5,555,403, 6,247,008 B1, 6,578,027 B2, 6,490,593 and 6,289,352. Business Objects, the Business Objects logo, Crystal Reports, and Crystal Enterprise are trademarks or registered trademarks of Business Objects SA or its affiliated companies in the United States and other countries. All other names mentioned herein may be trademarks of their respective owners. Copyright 2006 Business Objects. All rights reserved. Business Objects products in this release may contain redistributions of software licensed from third-party contributors. Some of these individual components may also be available under alternative licenses. A partial listing of third-party contributors that have requested or permitted acknowledgments, as well as required notices, can be found at: http://www.businessobjects.com/thirdparty Trademarks
Contents
Chapter 1 Getting Started 17 About this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 About BusinessObjects Enterprise . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Chapter 2 BusinessObjects Enterprise Architecture 19
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Architecture basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Client tier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 InfoView . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Central Management Console (CMC) . . . . . . . . . . . . . . . . . . . . . . . . . 23 Central Configuration Manager (CCM) . . . . . . . . . . . . . . . . . . . . . . . . 23 Publishing Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Import Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Application tier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Application server and BusinessObjects Enterprise SDK . . . . . . . 25 Web Component Adapter (WCA) . . . . . . . . . . . . . . . . . . . . . . . . . 25 Web development platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Java platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Windows .NET platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Web application environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Intelligence tier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Central Management Server (CMS) . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Event Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 File Repository Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Cache Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Processing tier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Job servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Report Job Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Contents
Program Job Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Web Intelligence Job Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Destination Job Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 List of Values Job Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Desktop Intelligence Job Server . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Web Intelligence Report Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Report Application Server (RAS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Page Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Data tier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Report viewers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Information flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 What happens when you schedule an object? . . . . . . . . . . . . . . . . . . . 36 What happens when you view a report? . . . . . . . . . . . . . . . . . . . . . . . . 37 Report viewing with the Cache Server and Page Server . . . . . . . . 38 Report viewing with the Report Application Server . . . . . . . . . . . . 40 Viewing Web Intelligence documents . . . . . . . . . . . . . . . . . . . . . . . 40 Security management components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Web Component Adapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 CMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Security plug-ins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Chapter 3 Central Management Console Basics 45
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Using the CMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Logging on to the CMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Navigating within the CMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Setting CMC preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Making initial security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Setting the Administrator password . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Disabling a user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Modifying default security levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Managing BusinessObjects Enterprise applications . . . . . . . . . . . . . . . . . . 52 CMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Contents
Crystal Reports Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Designer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Desktop Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Discussions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Accessing the Discussions page . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Searching for discussion threads . . . . . . . . . . . . . . . . . . . . . . . . . 55 Sorting search results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Deleting discussion threads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Setting user rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 InfoView . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Web Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Chapter 4 Setting Rights 59
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Rights and the BusinessObjects Enterprise object security model . . . . . . 60 How rights work in BusinessObjects Enterprise . . . . . . . . . . . . . . . . . 60 Navigating the Rights tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Locating the Rights tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Columns in the Rights tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Reading the Rights tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 BusinessObjects Enterprise top-level folders . . . . . . . . . . . . . . . . . . . 62 Access levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Access levels overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Considerations for setting access levels . . . . . . . . . . . . . . . . . . . . . . . 65 Assigning access levels to groups and users . . . . . . . . . . . . . . . . 66 Assigning No Access and Full Control access levels . . . . . . . . . . 66 Advanced object rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Advanced object rights overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Navigating the Advanced Rights page . . . . . . . . . . . . . . . . . . . . . . . . . 67 Locating the Advanced Rights page . . . . . . . . . . . . . . . . . . . . . . . 67 Columns in the Advanced Rights page . . . . . . . . . . . . . . . . . . . . . 68 Base rights and available rights . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Inheritance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Contents
The rationale for inheritance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Group and folder inheritance concepts . . . . . . . . . . . . . . . . . . . . . . . . . 70 Group inheritance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Folder inheritance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Breaking inheritance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Enabling and disabling inheritance with access levels . . . . . . . . . . . . . 74 Inheritance with advanced rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Priorities affecting advanced inheritance settings . . . . . . . . . . . . . 76 Using rights to delegate administration . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Delegated administration overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Choosing between Modify the rights users have to objects options . . . 79 Modify the rights users have to objects . . . . . . . . . . . . . . . . . . . . . 79 Securely modify rights users have to objects . . . . . . . . . . . . . . . . . 79 Owner rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Summary of recommendations for rights administration . . . . . . . . . . . . . . . 80 Choosing between View and View-on-demand rights . . . . . . . . . . . . . . 81 View-on-demand rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 View rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Chapter 5 Managing User Accounts and Groups 83
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Account management overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 User management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Group management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Available authentication types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Managing Enterprise and general accounts . . . . . . . . . . . . . . . . . . . . . . . . 87 Creating an Enterprise user account . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Creating a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Adding subgroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Specifying group membership . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Adding users to groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Modifying a user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Deleting a user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Contents
Changing password settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Enabling Trusted Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Modifying a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Viewing group members . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Deleting a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Disabling the Guest account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Granting access to users and groups . . . . . . . . . . . . . . . . . . . . . . . . . 96 Controlling access to user inboxes . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Managing aliases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Creating a user and a third-party alias . . . . . . . . . . . . . . . . . . . . . . . . . 98 Creating an alias for an existing user . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Assigning an alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Reassigning an alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Deleting an alias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Disabling an aliases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Chapter 6 Managing Licenses 103
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Managing license information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Adding a license key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Viewing current account activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Chapter 7 Managing Applications 107
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Setting rights on applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Managing CMC settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 Managing Crystal Reports Explorer settings . . . . . . . . . . . . . . . . . . . . . . 110 Managing Designer settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Desktop Intelligence settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Managing Discussions settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Accessing the Discussions page . . . . . . . . . . . . . . . . . . . . . . . . . 111 Searching for discussion threads . . . . . . . . . . . . . . . . . . . . . . . . 112 Sorting search results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Contents
Deleting discussion threads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Setting user rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Managing InfoView settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 Managing Web Intelligence settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Chapter 8 Managing Servers 117
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Server management overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 Server status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Starting, stopping, and restarting servers . . . . . . . . . . . . . . . . . . . . . . 120 Stopping a Central Management Server . . . . . . . . . . . . . . . . . . . 121 Enabling and disabling servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Server settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Server metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Viewing current server metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 The Metrics tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 Viewing system metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Server groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Creating a server group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Working with server subgroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 Modifying the group membership of a server . . . . . . . . . . . . . . . . . . . 128 User access to servers and server groups . . . . . . . . . . . . . . . . . . . . . . . . 128 Object rights for the Report Application Server . . . . . . . . . . . . . . . . . . 129 Chapter 9 Managing Data Sources and Connections 131
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Data source connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Managing universes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Viewing and deleting universes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Controlling access to universes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Managing universe connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Controlling access to universe connections . . . . . . . . . . . . . . . . . . . . 135 Managing OLAP cubes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Contents
Creating an OLAP cube connection . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Editing an OLAP cube connection . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Deleting an OLAP cube connection . . . . . . . . . . . . . . . . . . . . . . . . . . 138 OLAP Data source connection settings . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Connection settings for Microsoft OLAP data sources . . . . . . . . . . . 138 Connection settings for Essbase/DB2 OLAP data sources . . . . . . . . 140 Connection settings for Oracle OLAP data sources . . . . . . . . . . . . . 141 Chapter 10 Managing Objects 143
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 General object management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 Setting object rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 Object rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 Setting access levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Copying, moving, or creating a shortcut for an object . . . . . . . . . . . . 149 Deleting an object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 Searching for an object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 Sending an object or instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150 Available destinations by object type . . . . . . . . . . . . . . . . . . . . . 152 Changing properties of an object . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153 Assigning an object to categories . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 Report object management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155 What are report objects and instances? . . . . . . . . . . . . . . . . . . . . . . 155 Setting report refresh options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 Setting report processing options . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Setting report viewing options . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 Specifying default servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 Changing database information . . . . . . . . . . . . . . . . . . . . . . . . . 161 Updating parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Updating prompts for Web Intelligence document objects . . . . . 163 Using filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 Setting printer and page layout options . . . . . . . . . . . . . . . . . . . . 165 Processing extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Contents
Applying processing extensions to reports . . . . . . . . . . . . . . . . . . . . . 168 Registering processing extensions with the system . . . . . . . . . . . 169 Selecting a processing extension for a report . . . . . . . . . . . . . . . 170 Sharing processing extensions between multiple servers . . . . . . 171 Working with hyperlinked reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Publishing and hyperlinking reports . . . . . . . . . . . . . . . . . . . . . . . 172 Publishing reports with existing hyperlinks . . . . . . . . . . . . . . . . . . 173 Viewing hyperlinks in a report . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 Viewing hyperlinked reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 Viewing the universes for a Web Intelligence document . . . . . . . 174 Rights set on Desktop and Web Intelligence documents . . . . . . . . . . 175 Desktop Intelligence document rights . . . . . . . . . . . . . . . . . . . . . 175 Web Intelligence document rights . . . . . . . . . . . . . . . . . . . . . . . . 177 Program object management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179 What are program objects and instances? . . . . . . . . . . . . . . . . . . . . . 180 Program types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Setting program processing options . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Specifying command-line arguments . . . . . . . . . . . . . . . . . . . . . . 181 Setting a working directory for a program object . . . . . . . . . . . . . 182 Configuring executable programs . . . . . . . . . . . . . . . . . . . . . . . . 183 Configuring Java programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Authentication and program objects . . . . . . . . . . . . . . . . . . . . . . . 186 Object package management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 What are object packages, components, and instances? . . . . . . . . . . 188 Creating an object package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 Adding objects to an object package . . . . . . . . . . . . . . . . . . . . . . . . . 189 Configuring object packages and their objects . . . . . . . . . . . . . . . . . . 190 Authentication and object packages . . . . . . . . . . . . . . . . . . . . . . . . . . 191 Chapter 11 Scheduling Objects 193
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 Scheduling overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 About the scheduling options and parameters . . . . . . . . . . . . . . . . . . 195
10
Contents
Recurrence patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Run options and parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 Scheduling objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 Scheduling objects using object packages . . . . . . . . . . . . . . . . . . . . 198 Scheduling an object with events . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 Setting the scheduling options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202 Setting notification for an objects success or failure . . . . . . . . . . . . . 202 Determining an objects success or failure . . . . . . . . . . . . . . . . . 203 About notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 Specifying alert notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Selecting a destination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Default destination support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Unmanaged Disk destination support . . . . . . . . . . . . . . . . . . . . . 208 FTP support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 Email (SMTP) support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Inbox support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Choosing a format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 Selecting cache options for Web Intelligence documents . . . . . . . . . 216 Scheduling an object for a user or group . . . . . . . . . . . . . . . . . . . . . . 216 Managing instances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Managing and viewing the history of instances . . . . . . . . . . . . . . . . . 218 Viewing an instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 Pausing or resuming an instance . . . . . . . . . . . . . . . . . . . . . . . . 219 Deleting an instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Setting instance limits for an object . . . . . . . . . . . . . . . . . . . . . . . . . . 220 Using Calendars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Calendars overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Creating calendars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 Adding dates to a calendar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 Calendar format options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 Specific dates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 Recurring dates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 Deleting calendars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
11
Contents
Specifying calendar rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Managing events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Managing events overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 File-based events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 Schedule-based events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 Custom events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Specifying event rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Chapter 12 Organizing Objects 235
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Organizing objects overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 About folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 About categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 Working with folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Creating and deleting folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Creating a new folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Creating a new subfolder at any level . . . . . . . . . . . . . . . . . . . . . 238 Deleting folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Copying and moving folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Adding a new object to a folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 Specifying folder rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 Folder rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 Setting access levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Setting limits for folders, users, and groups . . . . . . . . . . . . . . . . . . . . 245 Managing user folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 Working with categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Creating and deleting categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Creating a new category . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Creating a new subcategory at any level . . . . . . . . . . . . . . . . . . . 248 Deleting categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Moving categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 Adding an object to a new category . . . . . . . . . . . . . . . . . . . . . . . . . . 249 Removing or deleting objects from a category . . . . . . . . . . . . . . . . . . 250
12
Contents
Specifying category rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 Category rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 Managing personal categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Chapter 13 Publishing Objects to BusinessObjects Enterprise 253
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Publishing overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254 Publishing options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Publishing Wizard procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Logging on to BusinessObjects Enterprise via the Publishing Wizard 256 Creating and selecting a folder on the CMS . . . . . . . . . . . . . . . . . . . 257 Moving objects between folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 Duplicating the folder structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 Adding objects to a category . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Changing scheduling options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 Refreshing repository fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 Publishing with saved data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Selecting a program type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Specifying program credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 Changing default values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 Changing object properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 Entering database logon information . . . . . . . . . . . . . . . . . . . . . . . . . 263 Setting parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 Setting the schedule output format . . . . . . . . . . . . . . . . . . . . . . . . . . 264 Adding extra files for programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264 Specifying command line arguments . . . . . . . . . . . . . . . . . . . . . . . . . 264 Finalizing the objects to be added . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 Publishing with the CMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 Saving objects directly to the CMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266 Chapter 14 Managing Profiles 269
13
Contents
Creating profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 Personalizing data with profile targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 Personalizing data for users and groups . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Resolving conflicts between profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 Specifying profile rights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 Appendix A Working with Performance Management Applications 277
About performance management applications . . . . . . . . . . . . . . . . . . . . . 278 Performance management repository . . . . . . . . . . . . . . . . . . . . . . . . . 278 Setting performance management security . . . . . . . . . . . . . . . . . . . . . . . . 278 Setting security for metrics and dimensions . . . . . . . . . . . . . . . . . . . . 279 Setting security for dashboards and analytics . . . . . . . . . . . . . . . . . . . 279 Setting security for performance management functionality . . . . . . . . 280 Troubleshooting performance management applications . . . . . . . . . . . . . 281 Predictive Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281 Appendix B Customizing the appearance of Web Intelligence documents 283
Customizing the appearance of Web Intelligence documents . . . . . . . . . 284 What you can do with the defaultconfig.xml file . . . . . . . . . . . . . . . . . 285 Locating and modifying defaultconfig.xml . . . . . . . . . . . . . . . . . . . . . . 286 Desktop Intelligence Enterprise Java InfoView . . . . . . . . . . . . . . 287 Desktop Intelligence Enterprise .NET InfoView . . . . . . . . . . . . . . 287 List of key values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 Example: Modifying the default font in table cells . . . . . . . . . . . . . . . . 289 Appendix C Synchronizing data source credentials 291
Using data source credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 About DBUSER and DBPASS . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 Enabling data source credential synchronization . . . . . . . . . . . . . . . . 292 Setting data source credentials for user objects . . . . . . . . . . . . . . . . . 293 Using data source credentials with universes . . . . . . . . . . . . . . . . . . . 293 Troubleshooting data source credentials . . . . . . . . . . . . . . . . . . . . . . 294 Report object doesnt use the specified credentials . . . . . . . . . . . 294 Using BOUSER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294
14
Contents
Appendix D
Trusted Authentication
295
Enabling Trusted Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 Configuring the server for Trusted Authentication . . . . . . . . . . . . . . . 296 Configuring trusted authentication for the client . . . . . . . . . . . . . . . . . 297 Appendix E Business Objects Information Resources 301
Documentation and information services . . . . . . . . . . . . . . . . . . . . . . . . . 302 Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 Whats in the documentation set? . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 Where is the documentation? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 Documentation from the products . . . . . . . . . . . . . . . . . . . . . . . . 302 Documentation on the web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 Documentation on the product CD . . . . . . . . . . . . . . . . . . . . . . . 302 Send us your feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 Customer support, consulting and training . . . . . . . . . . . . . . . . . . . . . . . . 303 How can we support you? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 Online Customer Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 Looking for the best deployment solution for your company? . . . . . . 304 Looking for training options? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Useful addresses at a glance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Appendix F Glossary 307
15
Contents
16
Getting Started
chapter
18
chapter
Overview
This section introduces BusinessObjects Enterprise administrators to the architecture of BusinessObjects Enterprise. This section coversthe following topics:
Architecture basics Client tier Intelligence tier Processing tier Data tier Report viewers Information flow
For faster navigation, click on the title of the topic you are interested in.
Architecture basics
BusinessObjects Enterprise is a multi-tier system. Although the components are responsible for different tasks, they can be logically grouped based on the type of work they perform. If you are new to BusinessObjects Enterprise, use this section to gain familiarity with the BusinessObjects Enterprise framework, its components, and the general tasks that each component performs. In BusinessObjects Enterprise, there are five tiers:
The client tier The application tier The intelligence tier The processing tier The data tier
To provide flexibility, reliability, and scalability, the components that make up each of these tiers can be installed on one machine, or spread across many. The following diagram illustrates how each of the components fits within the multi-tier system. Other Business Objects products plug in to the BusinessObjects Enterprise framework in various ways. This section describes the framework itself. Consult each products installation or administration guides for details about how it integrates with the BusinessObjects Enterprise framework.
20
The servers run as services on Windows machines. On UNIX, the servers run as daemons. These services can be vertically scaled to take full advantage of the hardware that they are running on, and they can be horizontally scaled to take advantage of multiple computers over a network environment. This means that the services can all run on the same machine, or they can run on separate machines. The same service can also run in multiple instances on a single machine. For example, you can run the CMS and the Event Server on one machine, while you run the Report Application Server on a separate machine. This configuration is called horizontal scaling. If the Report Application Server is
21
running on a multi-processor computer, then you may choose to run multiple Report Application Servers on it. This configuration is called vertical scaling. The important thing to understand is that, even though these are called servers, they are actually services and daemons that do not need to run on separate computers. Tip: When you are familiar with the architecture and want to customize your system configuration, see the BusinessObjects Enterprise Deployment and Configuration Guide. Note: BusinessObjects Enterprise supports reports created in versions 6 through XI of Crystal Reports. Once published to BusinessObjects Enterprise, reports are saved, processed, and displayed in version XI format.
Client tier
The client tier is the only part of the BusinessObjects Enterprise system that administrators and end users interact with directly. This tier is made up of the applications that enable people to administer, publish, and view reports and other objects.
InfoView Central Management Console (CMC) Central Configuration Manager (CCM) Publishing Wizard Import Wizard
For faster navigation, click on the title of the topic you are interested in.
InfoView
BusinessObjects Enterprise comes with InfoView, a web-based interface that end users access to view, schedule, and keep track of published reports. Each BusinessObjects Enterprise request that a user makes is directed to the BusinessObjects Enterprise application tier. In .NET InfoView, the web server forwards the user request directly to an application server where the request
22
is processed by the Web Component Adapter (WCA); typically, InfoView only uses the WCA when OLAP is installed. In this case, the web server will forward the .csp request to the WCA for processing. InfoView also serves as a demonstration of the ways in which you can use the BusinessObjects Enterprise Software Development Kit (SDK) to create a custom web application for end users. In the case of .NET, InfoView also demonstrates how you can use the BusinessObjects Enterprise .NET Server Components. For more information, see the developer documentation available on your product CD.
Publishing Wizard
The Publishing Wizard is a locally installed Windows application that enables both administrators and end users to add reports to BusinessObjects Enterprise. By assigning object rights to BusinessObjects Enterprise folders,
23
you control who can publish reports and where they can publish them to. The Publishing Wizard publishes reports from a Windows machine to BusinessObjects Enterprise servers running on Windows or on UNIX. For more information, see Chapter 13: Publishing Objects to BusinessObjects Enterprise.
Import Wizard
The Import Wizard is a locally installed Windows application that guides administrators through the process of importing users, groups, reports, and folders from an existing BusinessObjects Enterprise, Crystal Enterprise, or Crystal Info implementation to BusinessObjects Enterprise. The Import Wizard runs on Windows, but you can use it to import information into a new BusinessObjects Enterprise system running on Windows or on UNIX. For more information, see the BusinessObjects Enterprise Installation Guide.
Application tier
The application tier hosts the server-side components that process requests from the client tier as well as the components that communicate these requests to the appropriate server in the intelligence tier. The application tier includes support for report viewing and logic to understand and direct web requests to the appropriate BusinessObjects Enterprise server in the intelligence tier. For both the Java and .NET platforms, the application tier includes the following components:
Application server and BusinessObjects Enterprise SDK Web Component Adapter (WCA)
24
Note: In Crystal Enterprise 10 on Windows, the communication between the web server and the application server was handled through the Web Connector; the functionality of the Web Component Adapter (WCA) was provided through the Web Component Server (WCS). In BusinessObjects Enterprise XI, the web server communicates directly with the application server and the WCA handles the WCS functionality, both on Windows and Unix platforms.
It processes ASP.NET (.aspx) and Java Server Pages (.jsp) files It also supports Business Objects applications such as the CMC (CMC) and Crystal report viewers (that are implemented through viewrpt.aspx requests).
Note: In Crystal Enterprise 10 on Windows, the communication between the web server and the application server was handled through the Web Connector; the functionality of the Web Component Adapter (WCA) was provided through the Web Component Server (WCS). In BusinessObjects Enterprise XI, the web server communicates directly with the application server and the WCA handles the WCS functionality, both on Windows and Unix platforms.
25
Java platform
All UNIX installations of BusinessObjects Enterprise include a Web Component Adapter (WCA). In this configuration, a Java application server is required to host the WCA and the BusinessObjects Enterprise Java SDK. The use of a web server is optional as you may choose to have static content hosted by the application server.
26
Note: For backward compatibility, BusinessObjects Enterprise continues to support Crystal Server Pages (.csp) and Active Server Pages (.asp). BusinessObjects Enterprise also includes Primary Interop Assemblies (PIAs) that enable you to use the BusinessObjects Enterprise SDK and Report Application Server SDK with ASP.NET. It also includes a set of .NET Server Components which simplify development of custom BusinessObjects Enterprise applications in ASP.NET. For more information, see the developer documentation available on your product CD.
Intelligence tier
The intelligence tier manages the BusinessObjects Enterprise system. It maintains all of the security information, sends requests to the appropriate servers, manages audit information, and stores report instances.
Central Management Server (CMS) Event Server File Repository Servers Cache Server
Maintaining security
27
By maintaining a database of users and their associated object rights, the CMS enforces who has access to BusinessObjects Enterprise and the types of tasks they are able to perform. These tasks include enforcing and maintaining the licensing policy of your BusinessObjects Enterprise system.
Managing objects The CMS keeps track of the location of objects and maintains the containment hierarchy, which includes folders, categories, and inboxes. By communicating with the Job Servers and Program Job Servers, the CMS is able to ensure that scheduled jobs run at the appropriate times.
Managing servers By staying in frequent contact with each of the servers in the system, the CMS is able to maintain a list of server status. Report viewers access this list, for instance, to identify which Cache Server is free to use for a report viewing request.
Managing auditing By collecting information about user actions from each BusinessObjects Enterprise server, and then writing these records to a central audit database, the CMS acts as the system auditor. This audit information allows system administrators to better manage their BusinessObjects Enterprise deployment.
Typically, you provide the CMS with database connectivity and credentials when you install BusinessObjects Enterprise, so the CMS can create its own system database and BusinessObjects Enterprise Repository database using your organizations preferred database server. For details about setting up CMS databases, see the BusinessObjects Enterprise Installation Guide. See the Platforms.txt file included with your product distribution for a complete list of tested database software and version requirements. Note:
It is strongly recommended that you back up the CMS system database, and the audit database frequently. The backup procedure depends upon your database software. If you are unsure of the procedure, consult with your database administrator. The CMS database should not be accessed directly. System information should only be retrieved using the calls that are provided in the BusinessObjects Enterprise Software Development Kit (SDK). For more information, see the developer documentation available on your product CD.
28
You can access the audit database directly to create custom audit reports. See the BusinessObjects Enterprise Auditors Guide for more information.
On Windows, the Setup program can install and configure its own Microsoft Data Engine (MSDE) database if necessary. MSDE is a client/server data engine that provides local data storage and is compatible with Microsoft SQL Server. If you already have the MSDE or SQL Server installed, the installation program uses it to create the CMS system database. You can migrate your default CMS system database to a supported database server later. For details about configuring the CMS, its system database, and CMS clusters, see the BusinessObjects Enterprise Deployment and Configuration Guide. For more information about Auditing, see the BusinessObjects Enterprise Auditors Guide.
Event Server
The Event Server manages file-based events. When you set up a file-based event within BusinessObjects Enterprise, the Event Server monitors the directory that you specified. When the appropriate file appears in the monitored directory, the Event Server triggers your file-based event: that is, the Event Server notifies the CMS that the file-based event has occurred. The CMS then starts any jobs that are dependent upon your file-based event. After notifying the CMS of the event, the Event Server resets itself and again monitors the directory for the appropriate file. When the file is newly created in the monitored directory, the Event Server again triggers your file-based event. Note: Schedule-based events, and custom events are managed by the CMS.
29
The Output File Repository Server manages all of the report instances generated by the Report Job Server or the Web Intelligence Report Server, and the program instances generated by the Program Job Server. The File Repository Servers are responsible for listing files on the server, querying for the size of a file, querying for the size of the entire file repository, adding files to the repository, and removing files from the repository. Note:
The Input and Output File Repository Servers cannot share the same directories. This is because one of the File Repository Servers could then delete files and directories belonging to the other. In larger deployments, there may be multiple Input and Output File Repository Servers, for redundancy. In this case, all Input File Repository Servers must share the same directory. Likewise, all Output File Repository Servers must share a directory. Objects with files associated with them, such as text files, Microsoft Word files, or PDFs, are stored on the Input File Repository Server.
Cache Server
The Cache Server is responsible for handling all report viewing requests. The Cache Server checks whether or not it can fulfill the request with a cached report page. If the Cache Server finds a cached page that displays exactly the required data, with data that has been refreshed from the database within the interval that you have specified as the default, the Cache Server returns that cached report page. If the Cache Server cannot fulfil the request with a cached report page, it passes the request along to the Page Server. The Page Server runs the report and returns the results to the Cache Server. The Cache Server then caches the report page for future use, and returns the data to the viewer. By storing report pages in a cache, BusinessObjects Enterprise avoids accessing the database each and every time a report is requested. If you are running multiple Page Servers for a single Cache Server, the Cache Server automatically balances the processing load across Page Servers.
Processing tier
The processing tier accesses the data and generates the reports. It is the only tier that interacts directly with the databases that contain the report data.
30
Job servers Web Intelligence Report Server Report Application Server (RAS) Page Server
Job servers
A Job Server processes scheduled actions on objects at the request of the CMS. When you add a Job Server to the BusinessObjects Enterprise system, you can configure the Job Server to:
Process report objects Process program objects Send objects or instances to specified destinations
If you configure a Job Server to process report objects, it becomes a Report Job Server. If you configure a Job Server to process program objects, it becomes a Program Job Server, and so on. The processing tier includes:
Report Job Server Program Job Server Web Intelligence Job Server Destination Job Server List of Values Job Server Desktop Intelligence Job Server
31
32
If the request is for an object, it retrieves the object from the Input File Repository Server. If the request is for a report or program instance, it retrieves the instance from the Output File Repository Server.
The Destination Job Server can send objects and instances to destinations inside the BusinessObjects Enterprise system, for example, a users inbox, or outside the system, for example, by sending a file to an email address. The Destination Job Server does not run the actual report or program objects. It only handles objects and instances that already exist in the Input or Output File Repository Servers.
33
Page Server
The Page Server is primarily responsible for responding to page requests by processing reports and generating Encapsulated Page Format (EPF) pages. The EPF pages contain formatting information that defines the layout of the report. The Page Server retrieves data for the report from an instance or directly from the database (depending on the users request and the rights he or she has to the report object). When retrieving data from the database, the Page Server automatically disconnects from the database after it fulfills its initial request and reconnects if necessary to retrieve additional data. (This behavior conserves database licenses.) The Cache Server and Page Server work closely together. Specifically, the Page Server responds to page requests made by the Cache Server. The Page Server and Cache Server also interact to ensure cached EPF pages are reused as frequently as possible, and new pages are generated as soon as they are required. BusinessObjects Enterprise takes advantage of this behavior by ensuring that the majority of report-viewing requests are made to the Cache Server and Page Server. (However, if a users default viewer is the Advanced DHTML viewer, the report is processed by the Report Application Server.) The Page Server also supports COM, ASP.NET, and Java viewer Software Development Kits (SDKs).
34
Data tier
The data tier is made up of the databases that contain the data used in the reports. BusinessObjects Enterprise supports a wide range of corporate databases.
See the Platforms.txt file included with your product distribution for a complete list of tested database software and version requirements.
Report viewers
BusinessObjects Enterprise includes report viewers that support different platforms and different browsers in the client tier, and which have different report viewing functionality. (For more information on the specific functionality or platform support provided by each report viewer, see the BusinessObjects Enterprise Users Guide or the Crystal Reports Developers Guide.) All of the viewers fall into two categories:
client-side viewers Client-side viewers are downloaded and installed in the users web browser. zero client viewers The code to support zero client viewers resides in the application tier.
All report viewers help process requests for reports, and present report pages that appear in the users browser. Client-side viewers Client-side viewers are downloaded and installed in the users browser. When a user requests a report, the application server processes the request, and retrieves the report pages (in .epf format) from the BusinessObjects
35
Enterprise framework. The application server then passes the report pages to the client-side viewer, which processes the report pages and displays them directly in the browser. Zero client viewers Zero client viewers reside on the application server. When a user requests a report, the application server processes the request, and then retrieves the report pages (in .epf format) from the BusinessObjects Enterprise framework. The SDK creates a viewer object on the application server which processes the report pages and creates DHTML pages that represent both the viewer controls and the report itself. The viewer object then sends these pages through the web server to the users web browser. Installing viewers If they havent already done so, users are prompted to download and install the appropriate viewer software before the report is displayed in the browser. The Active X viewer is downloaded the first time a user requests a report, and then remains installed on the users machine. The user will be prompted to reinstall the ActiveX viewer only when a new version becomes available on the server.
Information flow
This section describes the interaction of the server components in order to demonstrate how report-processing is performed. This section covers two different scenarios:
What happens when you schedule an object? What happens when you view a report?
36
4. 5. 6.
The CMS checks to see if the user has sufficient rights to schedule the object. If the user has sufficient rights, the CMS schedules the object to be run at the specified time(s). When the time occurs, the CMS passes the job to the appropriate job server. Depending on the type of object, the CMS will send the job to one of the following job servers:
7.
If the object is Web Intelligence document, it sends the job to the Web Intelligence Job Server, which sends the request to the Web Intelligence Report Server. If the object is a report, it sends the job to the Report Job Server. If the object is program, it sends the job to the Program Job Server.
The job server retrieves the object from the Input File Repository Server and runs the object against the database, thereby creating an instance of the object. The job server then saves the instance to the Output File Repository Server, and tells the CMS that it has completed the job successfully. If the job was for a Web Intelligence document, the Web Intelligence Report Server notifies the Web Intelligence Job Server. The Web Intelligence Job Server then notifies the CMS that the job was completed successfully.
8.
Note:
The Cache Server and the Page Server do not participate in scheduling reports or in creating instances of scheduled reports. This can be an important consideration when deciding how to configure BusinessObjects Enterprise, especially in large installations. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide. When you schedule program objects or object packages, the interaction between servers follows the same pattern as it does for reports.
Report viewing with the Cache Server and Page Server Report viewing with the Report Application Server Viewing Web Intelligence documents
37
When you view a report through BusinessObjects Enterprise, the processing flow varies depending upon your default report viewer, the type of report, and the rights you have to the report. In addition, the processing flow for custom applications may differ. In all cases, however, the request that begins at the web server must be forwarded to the application server. The actual request is constructed as a URL that includes the reports unique ID. This ID is passed as a parameter to a server-side script that, when evaluated by the application server, verifies the users session and retrieves the logon token from the browser. The script then checks the users InfoView preferences and redirects the request to the viewing mechanism that corresponds to the users default viewer. Different report viewers require different viewing mechanisms:
The zero-client DHTML viewer is implemented through report_view_dhtml.aspx. When evaluated by the application server, this script communicates with the framework (through the published SDK interfaces) in order to create a viewer object and retrieve a report source from the Cache Server and Page Server.
The zero-client Advanced DHTML viewer is implemented through report_view_advanced.aspx. When evaluated by the application server, this script communicates with the framework (through the published SDK interfaces) in order to create a viewer object and retrieve a report source from the Report Application Server.
The client-side report viewers (the ActiveX and Java viewers) are implemented through viewrpt.aspx, hosted by the WCA. The Crystal Web Request is executed internally through viewer code on the application server. The viewer code communicates with the framework in order to retrieve a report page (in .epf format) from the Cache Server and Page Server. If they havent already done so, users are prompted to download and install the appropriate viewer software.
38
2.
If a cached page for the report (.epf file) is available: a. b. The Cache Server checks with the CMS to see if the user has rights to view the cached page. If the user is granted the right to view the report, the Cache Server sends the cached page (.epf file) to the application server. The Cache Server requests new cached pages (.epf files) from the Page Server. The Page Server checks with the CMS to see if the user has rights to view the report. If the user is granted the right to view the report, the Page Server retrieves the report from the Input File Repository Server. If the report is an instance, and the user only has View rights, the Page Server will generate pages of the report instance using the data stored in the report instance. That is, the Page Server will not retrieve the latest data from the database. If the report is an object, the user must have View On Demand rights to view the report successfully (because the Page Server needs to retrieve data from the database). e. f. g. If the user has sufficient rights, the Page Server generates the cached page (.epf files) and forwards them to the Cache Server. The Cache Server then caches the pages (.epf files). The Cache Server sends the pages (.epf files) to the application server.
3.
4.
The application server sends the report to the users Web browser in one of two ways, depending on how the initial request was made:
If the initial request was made through a DHTML viewer (report_view_dhtml.aspx), the viewer SDK (residing on the application server) is used to generate HTML that represents both the DHTML viewer and the report itself. The HTML pages are then returned through the web server to the users web browser. If the initial request was made through an Active X or Java viewer (viewrpt.aspx), the application server forwards the cached pages (.epf files) through the web server to the report viewer software in the users web browser.
39
2.
d.
5.
40
2. 3. 4. 5.
The web application server sends the request to the application server, which creates a new session with the Web Intelligence Report Server. The Web Intelligence Report Server checks if the user has rights to use the Web Intelligence application. The web application server then sends the request to the Web Intelligence Report Server. The Web Intelligence Report Server contacts the CMS to check whether the user has the right to view the document, and to check when the document was last updated. If the user has the right to view the document, the Web Intelligence Report Server checks whether it has up-to-date cached content for the document. If cached content is available, the Web Intelligence Report Server sends the cached document information to the SDK. If cached content is not available, the following happens: a. The Web Intelligence Report Server obtains the document information from the CMS and checks what rights the user has on the document. The Web Intelligence Report Server obtains the Web Intelligence document from either the Input or Output File Repository Server and loads the document file. Note: Which FRS is used depends on whether the request was for a Web Intelligence document that was saved to BusinessObjects Enterprise or for an instance of the document. Documents are stored on the Input FRS. Instances are generated when an object is run according to a schedule, and they are stored on the Output FRS. c. If the document is set to refresh on open and the user has the View On Demand rights, the Web Intelligence Report Server refreshes the data in the document with data from the database. Note: If the document is set to refresh on open but the user does not have View On Demand rights, an error message is displayed. d. e. The Web Intelligence Report Server stores the document file and the new document information in cache. The Web Intelligence Report Server sends the document information to the SDK.
6.
7.
b.
8.
The viewer script calls the SDK to get the requested page of the document. The request is passed to the Web Intelligence Report Server.
41
9.
If the Web Intelligence Report Server has cached content for the page, it returns the cached XML to the SDK. If the Web Intelligence Report Server does not have the cached content for the page, it renders the page to XML using the current data for the document. It then returns the XML to the SDK.
10. The SDK applies an XSLT style sheet to the XML to transform it to HTML. 11. The viewer script returns the HTML to the browser.
Note: Because these components are responsible for additional tasks, several of the components discussed here are described in additional detail elsewhere in this section.
42
CMS
In relation to system security, the Central Management Server (CMS) performs a number of important tasks. The majority of these tasks rely upon the database that the CMS uses to keep track of BusinessObjects Enterprise system data. This data includes security information, such as user accounts, group memberships, and object rights that define user and group privileges. When you first set up your system, the CMS allows you to create user accounts and groups within BusinessObjects Enterprise. And, with its thirdparty security plug-ins, the CMS allows you to reuse existing user accounts and groups that are stored in a third-party system (a Windows NT user database, an LDAP directory server, or a Windows AD server). The CMS supports third-party authentication, so users can log on to BusinessObjects Enterprise with their current Windows NT, LDAP, or Windows AD credentials. When users log on, the CMS coordinates the authentication process with its security plug-ins; the CMS then grants the user a logon token and an active session on the system. The CMS also responds to authorization requests made by the rest of the system. When a user requests a list of reports in a particular folder, the CMS authorizes the request only when it has verified that the users account or group membership provides sufficient privileges.. For more information about the CMS and the CMS database, see Central Management Server (CMS) on page 27.
Security plug-ins
Security plug-ins expand and customize the ways in which BusinessObjects Enterprise authenticates users. BusinessObjects Enterprise currently ships with the system default BusinessObjects Enterprise security plug-in and with the Windows NT, LDAP, and Windows AD security plug-ins. Each security plug-in offers several key benefits. Security plug-ins facilitate account creation and management by allowing you to map user accounts and groups from third-party systems into BusinessObjects Enterprise. You can map third-party user accounts or groups to existing BusinessObjects Enterprise user accounts or groups, or you can create new Enterprise user accounts or groups that corresponds to each mapped entry in the external system. The security plug-ins dynamically maintain third-party user and group listings. So, once you map a Windows NT, LDAP, or Windows AD group into BusinessObjects Enterprise, all users who belong to that group can log on to BusinessObjects Enterprise. When you make subsequent changes to the third-party group membership, you need not update or refresh the listing in
43
BusinessObjects Enterprise. For instance, if you map a Windows NT group to BusinessObjects Enterprise, and then you add a new NT user to the NT group, the security plug-in dynamically creates an alias for that new user when he or she first logs on to BusinessObjects Enterprise with valid NT credentials. Moreover, security plug-ins enable you to assign rights to users and groups in a consistent manner, because the mapped users and groups are treated as if they were Enterprise accounts. For example, you might map some user accounts or groups from Windows NT, and some from an LDAP directory server. Then, when you need to assign rights or create new, custom groups within BusinessObjects Enterprise, you make all of your settings in the CMC. Each security plug-in acts as an authentication provider that verifies user credentials against the appropriate user database. When users log on to BusinessObjects Enterprise, they choose from the available authentication types that you have enabled and set up in the Authorization management area of the CMC: Enterprise (the system default), Windows NT, LDAP, or Windows AD. Note: The Windows NT and Windows AD security plug-ins cannot authenticate users if the BusinessObjects Enterprise server components are running on UNIX, or if your system uses the BusinessObjects Enterprise Java SDK. BusinessObjects Enterprise supports the following security plug-ins:
BusinessObjects security plug-in Windows NT security plug-in LDAP security plug-in Windows AD security plug-in
For more information, refer to the BusinessObjects Enterprise Deployment and Configuration Guide.
44
chapter
Overview
This section provides a general description of system administration as it relates to BusinessObjects Enterprise. It then introduces the administration tools that allow you to manage and configure BusinessObjects Enterprise, and it shows how to make some common changes to the systems default security settings. This section covers the following topics:
Using the CMC Making initial security settings Managing BusinessObjects Enterprise applications
For faster navigation, click on the title of the topic you are interested in.
46
Any user with valid credentials to BusinessObjects Enterprise can log on to the CMC and set his or her preferences. However, users who are not members of the Administrators group cannot perform any of the available management tasks unless they have been granted rights to do so. For complete details about rights, see Chapter 4: Setting Rights.
To use the BusinessObjects Enterprise .NET Administration Launchpad, go to the following page:
http://webserver/businessobjects/Enterprise115/ WebTools/adminlaunch/default.aspx
To use the BusinessObjects Enterprise Java Administration Launchpad, go to the following page:
http://webserver:8080/businessobjects/enterprise115/ adminlaunch/launchpad.html
Replace webserver with the name of the web server machine. If you changed this default virtual directory on the web server, you will need to type your URL accordingly. If necessary, change the default port number to the number you provided when you installed BusinessObjects Enterprise. Tip: On Windows, you can click Start > Programs > BusinessObjects XI Release 2> BusinessObjects Enterprise > BusinessObjects Enterprise .NET Administration Launchpad or Start > Programs > BusinessObjects XI Release 2> BusinessObjects Enterprise >BusinessObjects Enterprise Java Administration Launchpad. 2. 3. Click Central Management Console. Type your User Name and Password.
47
If youre using LDAP or Windows NT authentication, you may log on using an account that has been mapped to the BusinessObjects Enterprise Administrators group. Note: If this is the first time an administrator from your organization is accessing the CMC, type Administrator as the User Name. This default Enterprise account does not have a password until you create one. For details, see Setting the Administrator password on page 50. 4. Select Enterprise in the Authentication Type list. Windows AD, Windows NT and LDAP authentication also appear in the list; however, third-party user accounts and groups must be mapped to BusinessObjects Enterprise before you can use these types of authentication. 5. Click Log On. The CMC Home page appears.
Click the links or icons on the Home page to go to specific management areas. Select the same management areas from the drop-down list in the title area of the window. Click Go if your browser doesnt take you directly to the new page.
Once you leave the Home page, your location within the CMC is indicated by a path that appears above the title of each page. For example, Home > Users > New User indicates that youre on the New User page. You can click the hyperlinked portions of the path to jump quickly to different parts of the application. In this example, you could click Home or Users to go to the corresponding page.
48
For a summary of preference options and an explanation of their functions, see Table 3-1: CMC Preference options. 3. Click OK.
Table 3-1: CMC Preference options
Explanation This list sets the default report viewer that is loaded when you view a Crystal report in the CMC. For information on setting the available and default viewers for all users and configuring the processing tier, see The BusinessObjects Enterprise Deployment and Configuration Guide. This list sets the default viewer that is loaded when you view a Web Intelligence document in the CMC. This list sets the default viewer that is loaded when you view a Desktop Intelligence document in the CMC. This option limits the number of objects listed on any page or tab in the CMC. Note: This setting does not limit the number of objects displayed, simply the number displayed per page. For details about limiting the number of objects displayed on a page or in a search, see Managing CMC settings on page 109. When a list of objects spans multiple pages, the full list is sorted alphanumerically and indexed before being subdivided. At the top of every page, hyperlinks are displayed as an index to each of the remaining pages. This setting determines the number of characters that are included in each hyperlink. Note: To specify an unlimited maximum number of characters, select the Unlimited check box.
Web Intelligence Viewer Desktop Intelligence Viewer Maximum number of objects per page
49
CMC Preference option Measuring units for report page layout Time zone
Explanation This option lets you customize a reports page layout on the report objects Print Setup tab. Specify inches or millimeters as the measuring units used by default. If you are managing BusinessObjects Enterprise remotely, use this list to specify your time zone. BusinessObjects Enterprise synchronizes scheduling patterns and events appropriately. For instance, if you select Eastern Time (US & Canada), and you schedule a report to run at 5:00 a.m. every day on a server that is located in San Francisco, then the server will run the report at 2:00 a.m. Pacific Time. Click the Change Password link to change the password for the account under which you are currently logged on.
My password
50
2. 3. 4. 5. 6. 7.
Click OK. Go to the Users management area of the CMC. Click the link for the Administrator account. In the Enterprise Password Settings area, type and confirm the new password. If it is selected, clear the User must change password at next logon check box. Click Update.
For more information about user accounts, see Managing Enterprise and general accounts on page 87.
51
3. 4. 5.
As required, change the value selected in the Access Level list for each user or group that is displayed. Click Update. Click Add/Remove to grant different levels of security to additional users or groups.
CMC Crystal Reports Explorer Designer Desktop Intelligence Discussions InfoView Web Intelligence
The next several sections deal with these topics. For faster navigation, click on the title of the topic you are interested in.
CMC
From the Business Objects Applications area of the CMC, you can change the following CMC settings: Query size threshold By default, when you go to the Objects, Folders, Groups, or Users management areas of the CMC, a list of objects in that management area is displayed. Because BusinessObjects Enterprise loads each of the objects in the list, if you have numerous objects this can heavily tax your system resources. You can adjust this list using the Query size threshold setting.
52
You can modify the number of objects displayed by setting the Query size threshold in the Business Objects Applications management area of the CMC. By default, the Query size threshold value is 500. This means that BusinessObjects Enterprise prompts users to use the search function of the CMC if the return size exceeds 500 objects.
CMC Access URL Specifying the CMC Access URL allows other applications, such as Crystal Reports, to get this URL from the CMS in order to call pages in the CMC. Crystal Reports, for example, needs to call these pages in order to support the previewing of reports and to enable administration tasks to be performed from Crystal Reports.
1. 2. 3.
To manage settings for the CMC Go to the BusinessObjects Enterprise Applications management area of the CMC. Click the BusinessObjects Enterprise CMC link. The Properties page appears. In the Prompt for search if the return size exceeds field, type the maximum number of objects you want to be returned in searches and on the initial pages of the Objects, Folders, Groups, and Users management areas. In the CMC Access URL field, type the URL for the CMC. Click Update.
4. 5.
Note: To modify the number of objects displayed on a page (rather than the total number of objects displayed), see Setting CMC preferences on page 48.
Setting user access to Business Views and report data sources. Controlling the Crystal Reports Explorer features that are available to each user. Providing users with standardized report templates by setting the Default Template folder.
53
For more information about administering Crystal Reports Explorer, click Help in the bottom right corner of Crystal Reports Explorer.
Designer
You can grant access to the Designer application by setting the rights through the CMC. 1. 2. 3. 4. To manage settings for Designer Go to the BusinessObjects Enterprise Applications management area of the CMC. Click Designer. Click the Rights tab, then assign the appropriate rights to each group or user. Click Apply.
Desktop Intelligence
You can grant access to the Desktop Intelligence application by setting the rights through the CMC. 1. 2. 3. 4. To manage settings for Desktop Intelligence Go to the BusinessObjects Enterprise Applications management area of the CMC. Click Desktop Intelligence. Click the Rights tab, then assign the appropriate rights to each group or user. Click Apply.
Discussions
BusinessObjects Enterprise administrators are responsible for maintaining the discussion threads and for granting the appropriate access rights to BusinessObjects Enterprise users. This section provides procedures for managing Discussions, including:
Accessing the Discussions page Searching for discussion threads Sorting search results
54
For faster navigation, click on the title of the topic you are interested in.
4.
Thread title. Search by the title of a thread. Creation date. Search by the date the thread was created. Last modified date. Search based on the date a thread was last modified. Author. Search by the author of a specific thread.
From the second list, refine your search. If you search by Thread title or Author, the second field provides you with the following options.
55
is: The DMC searches for any discussion threads where the thread title, or the author name, exactly match the text that you type into the third field. Searches are not case sensitive. is not: The DMC searches for any discussion threads where the thread title, or the author name, do not exactly match the text that you type into the third field. contains: The DMC searches for any discussion threads that contain the search text string within any part of the thread title or the authors name. does not contain: The DMC searches for any discussion threads that do not contain the text string within any part of the thread title.
If you search by Creation date or Last modified date, there are the following options.
5.
before: The DMC searches for any discussion threads that were created or modified before the search date. after: The DMC searches for any discussion threads that were created or modified after the search date. between: The DMC searches for any discussion threads that were created or modified between the two search dates.
Use the third field to further refine your search. If you selected a text-based search in the first two fields, type in the text string. If you selected a date-based search, enter the date or dates in the appropriate fields.
6.
Click Search to display all the records that match your search criteria.
Thread title. Sort by the title of a thread. Creation date. Sort by the date the thread was created. Last modified date. Sort based on the date a thread was last modified. Author. Sort by the author of a specific thread.
56
2. 3. 4.
In the second list, select whether you want the records to be displayed in ascending or descending order. In the third category, enter how many results you want to be displayed on each page. Click Search.
InfoView
In the BusinessObjects Enterprise Applications area of the CMC, the Properties tab for the InfoView allows you to change several display options. You can also control user and administrator access by changing the rights associated with each user and group on the Rights tab. 1. 2. 3. To change display settings for InfoView Go to the BusinessObjects Enterprise Applications management area of the CMC. Click InfoView. On the Properties tab, select the options that you want.
57
Header and style: You can change the colors of the header and the logo displayed in the header. If you have a cascading style sheet for your intranet, you can specify it here to format InfoView with the same styles. Display: Choose the functionality that your users can see. You can choose whether or not to display the Preferences button, the Type list, and the Filters tab. You can also choose a default navigation method for your users (folders or categories), and you can specify the maximum number of pages of objects to show at a time. Object Listing: Choose whether to display the original object or the latest instance of the object. Viewers: You can also configure settings that control which viewers are available to users. When users view a report using the Advanced DHTML viewer, the report is processed by the Report Application Server. If you are using the Java version of InfoView and want users to be able to use the Active X or Java viewers, you must enter the context path of the Web Component Adapter. Consult the BusinessObjects Enterprise Installation Guide for more information.
4.
Click Update.
Web Intelligence
For the Web Intelligence application, you can control which interactive features your users have access to for Web Intelligence documents by setting Web Intelligence rights in the CMC. Note that in order for users to be able to use the Interactive view format and use the Query HTML panel, you must grant access to the Allows interactive HTML viewing (as per license) option. The user can select this view format and report panel option in the Web Intelligence Document Preferences tab in InfoView. 1. 2. 3. 4. To set rights for Web Intelligence features Go to the BusinessObjects Enterprise Applications management area of the CMC. Click Web Intelligence. Click the Rights tab, and click Web Intelligence to expand the list of available rights. Select the options that you want, and then click Apply.
58
Setting Rights
chapter
Overview
This section introduces BusinessObjects Enterprise administrators to concepts and procedures related to regulating user and administrator access to objects, users, and servers. This section explains:
Rights and the BusinessObjects Enterprise object security model Access levels Advanced object rights Inheritance Using rights to delegate administration Summary of recommendations for rights administration
For faster navigation, click the title of the topic you are interested in.
How rights work in BusinessObjects Enterprise Navigating the Rights tab BusinessObjects Enterprise top-level folders
For faster navigation, click the title of the topic you are interested in.
60
Setting Rights Rights and the BusinessObjects Enterprise object security model
principalsis used for granting other principals (such as delegated administrators) access to the manager as an object in the system. In this way, principals are themselves like objects for others with greater rights to manage. Each right on an object can be Explicitly Granted, Explicitly Denied, Inherited, or Unspecified. The BusinessObjects Enterprise security model is designed such that, if a right is left not specified, the right is denied by default. Additionally, if contradictory settings result in a right being both granted and denied to a user or group, the right is denied by default. This denial based design helps ensure that users and groups do not automatically acquire rights that are not explicitly granted.
Locating the Rights tab Columns in the Rights tab Reading the Rights tab
For faster navigation, click on the title of the topic you are interested in.
61
Setting Rights Rights and the BusinessObjects Enterprise object security model
Column Name
Description Lists all principals who have been given rights to an object. Click Add/Remove to add or remove a user or group to this object. Shows whether the principal is a user or a group. Shows how each principals rights are determined. You can change the rights for a principal by selecting a predefined access level (or by selecting Advanced) from the list in the Access Level column and clicking Update. Displays the net effect of the rights selected in the Access Level column and the rights that each principal has inherited.
Net Access
62
Setting Rights Rights and the BusinessObjects Enterprise object security model
objects can greatly simplify rights administration. Table 4-2: BusinessObjects Enterprise top-level folders summarizes how to set security on the various top-level folders in the system.
Table 4-2: BusinessObjects Enterprise top-level folders
Description Set security from the Rights tab on the Settings page. By default, the Administrators group is granted the Full Control access level, and the Everyone group is granted the Schedule access level. If there are any access levels that are common for the entire system, you should set these at the global level. For example, if an Auditors group needs to be able to view all folders and objects, you can grant this level of access at the global level. For information on how to apply or modify global security settings, see Modifying default security levels on page 51. Note: The Content folder contains reports and non-report content types such as text and PDF files. Set security using the Rights button on the Groups page. Note: Rights set here also may affect users since users inherit rights from their parent groups (which inherit from this folder) unless inheritance is broken Set security using the Rights button on the Users page. Set security using the Rights button on the Profiles page. Set security using the Rights button on the Server Groups page. Note: Unless inheritance is broken, rights set here also affect any servers in server groups. Set security using the Rights button on the Servers page. Set security using the Rights button on the Categories page. Set security using the Rights button on the Inboxes page. Note: Each user has a top-level inbox under this folder on which you can also set rights. When a user account is created, each user is given Full Control access to his own inbox Set security using the Rights button on the Universe Connections page.
Groups
Universe Connections
63
Description Set security on the Rights tab of the Universes page. Note: By default, the Universe Designer Users default group gets Full Control access on this folder. Set security using the Rights button on the Calendars page. Set security using the Rights button on the Events page.
Calendars Events
Access levels
This section explains how you can simplify rights administration by taking advantage of access levels and inheritance. It includes information on the following topics:
For faster navigation, click the title of the topic you are interested in.
Description A principal cannot access the object. The CMS enforces this right for InfoView, the Publishing Wizard, and the CMC by ensuring that the object is not visible to the principal.
Rights involved
Not specified. That is, rights are neither explicitly granted nor explicitly denied. For more information, see Assigning No Access and Full Control access levels on page 66.
64
Description If set on the folder level, a principal can view the folder, objects within the folder, and each objects generated instances. If set at the object level, a principal can view the object, its history, and its generated instances.
Rights involved
Schedule
A principal can generate instances View Access Level rights, plus: by scheduling an object to run Schedule the document to run against a specified data source once or on a recurring basis. The Define server groups to process jobs Copy objects to another folder principal can view, delete, and pause the scheduling of instances Schedule to destinations that they own. They can also Print the reports data schedule to different formats and destinations, set parameters and Export the reports data database logon information, Edit objects that the user owns choose servers to process jobs, Delete instances that the user owns add contents to the folder, and copy the object or folder. Pause and resume document instances that the user owns A principal can refresh data on demand against a data source.
A principal has full administrative All available advanced rights, including: control of the object. It is the only Add objects to the folder access level which allows Edit objects principals who are not members of Modify rights users have to objects the Administrators group to add, Delete objects edit, and delete other principals content through the CMC. Delete instances
Assigning access levels to groups and users Assigning No Access and Full Control access levels
For faster navigation, click on the title of the topic you are interested in.
65
When you assign an access level to a group, each user in the group will have at least that level of access to the object. If the user is a member of multiple groups, then he or she inherits the combination of each groups rights. Thus, when a user is a member of multiple groups, he or she inherits the greatest possible rights. When you assign an access level directly to a principal, you ensure that the principal has only that level of access to the object. In other words, you prevent the principal from inheriting rights that he or she may have otherwise acquired by virtue of group membership.
For faster navigation, click the title of the topic you are interested in.
66
Locating the Advanced Rights page Columns in the Advanced Rights page
For faster navigation, click the title of the topic you are interested in.
67
Column Inherited
Description Shows how inherited rights affect a principals effective rights to an object. If an inherited right is labelled Not Specified, the system treats it as having been denied; however, if the right is later granted for a parent group or object, the principal will automatically inherit the right at this level.
Explicitly granted Shows which actions a principal can currently perform on an object. Explicitly denied Shows which actions a principal is not allowed to perform on an object. Regardless of future changes to the principals group membership, an explicitly denied right always prevents the principal from performing the associated action. Shows if inheritance is turned on or off. Names the rights available to an object.
68
BusinessObjects Enterprise objects. In addition to these base rights, each type of object provides an additional set of rights that apply only to that object type. For example, the Refresh the reports data right applies only to report objects. On the Advanced Rights pages, all of the available rights are displayed for every object on the system. These rights are grouped based on what type of object they apply to, including General, Report, Text, and Web Intelligence Document. In the example provided by Figure 4-2: Advanced rights, you can see that the General group is expanded to expose the available rights that fall under that category. Available rights are displayed for every object on the system for purposes of inheritance, so that you can set object security at the folder level (rather than repeating the same settings for every object in the folder). Although certain object-specific rights do not strictly apply to the folder object itself, these rights may apply to objects that inherit rights from the folder. In other words, the Refresh the reports data right is displayed for the folder object so that you can grant a user the right to refresh the data in all reports for which the user inherits rights from this folder.
Inheritance
This section discusses using inheritance to simplify rights administration. It includes information on:
The rationale for inheritance Group and folder inheritance concepts Breaking inheritance Enabling and disabling inheritance with access levels Inheritance with advanced rights
69
inherited rights from parent folders and subfolders. These users can inherit rights as the result of group membership; subgroups can inherit rights from parent groups; and both users and groups can inherit rights from parent folders. By default, users or groups who have rights to a folder will inherit the same rights for any object that are subsequently published to that folder. Consequently, the best strategy is to set the appropriate rights for users and groups at the folder level first; then publish objects to that folder.
Group inheritance
Group inheritance allows principals to inherit rights as the result of group membership. Group inheritance proves especially useful when you organize all of your users into groups that coincide with your organizations current security conventions. In Figure 4-3: Group inheritance example 1, you can see how group inheritance works. Red Group is a subgroup of Blue Group, so it inherits Blue Groups rights. In this case, it inherits right 1 as granted, and the rest of the rights as not specified. Every member of Red Group inherits these rights. In addition, any other rights that are set on the subgroup are inherited by its members. In this example, Green User is a member of Red Group, and thus inherits right 1 as granted, rights 2, 3, 4, and 6 as not specified, and Right 5 as denied.
Figure 4-3: Group inheritance example 1
When group inheritance is enabled for a user who belongs to more than one group, the rights of all parent groups are considered when the system checks credentials. The user is denied any right that is explicitly denied in any parent group, and the user is denied any right that remains completely not
70
specified; thus, the user is granted only those rights that are granted in one or more groups (explicitly or through access levels) and never explicitly denied. In Figure 4-4: Group inheritance example 2, Green User is a member of two unrelated groups. From Blue Group, he inherits rights 1 and 5 as granted and the rest as not specified; however, because Green User also belongs to Red Group, and Red Group has been explicitly denied right 5, Green Users inheritance to right 5 from Blue Group is overridden.
Figure 4-4: Group inheritance example 2
Folder inheritance
Folder inheritance allows principals to inherit any rights that they have been granted on an objects parent folder. Folder inheritance proves especially useful when you organize BusinessObjects Enterprise content into a folder hierarchy that reflects your organizations current security conventions. For example, suppose that you create a folder called Sales Reports, and you provide your Sales group with View On Demand access to this folder. By default, every user that has rights to the Sales Reports folder will inherit the same rights to the reports that you subsequently publish to this folder. Consequently, the Sales group will have View On Demand access to all of the reports, and you need set the object rights only once, at the folder level. In Figure 4-5: Folder inheritance example, rights have been set for Red Group on a folder. Rights 1 and 5 have been granted, while the rest have been left unspecified. With folder inheritance enabled, members of Red Group have rights on the object level identical to the rights of the group on the folder level. Rights 1 and 5 are inherited as granted, while the rest have been left unspecified.
71
Breaking inheritance
In some cases, you may not want rights to be inherited. For example, you might have granted a right on an object for a user but find that the user cannot access the object in the expected way. Thats because the same right might have been explicitly denied on a parent folder or group, resulting in the right being effectively denied for the user. This is true even if the right you set was explicitly granted. Two rules result in this inability to grant objects more permissible rights than their parents in cases where those rights have been explicitly denied:
Inherited rights are considered equal to explicit rights. When rights conflict, the denied status always takes priority.
Therefore, once a right has been explicitly denied, it can only be explicitly granted to a dependent object if the relevant group and folder inheritance is broken. When group inheritance is broken on an object, the user or subgroup for whom it is broken will not inherit rights from any group. When folder inheritance is broken on an object, the user or group for whom it is broken will not inherit rights from the parent object. If you need to disable or modify inheritance patterns for a particular folder or object within your folder hierarchy, you can do so with access levels or with advanced rights. Inheritance is broken on an object by setting the appropriate no inherit right on it.
72
Note: When inheritance is broken, it is broken for all rights; it is not possible to turn off inheritance for some rights but not for others. In Figure 4-6: Breaking inheritance, group and folder inheritance are initially in effect. Red User inherits rights 1 and 5 as granted, rights 2, 3, and 4 as unspecified, and right 6 as explicitly denied. These rights, set on the folder level for the group, mean that Red User, and every other member of the group, has these rights the folders objects, A and B. When inheritance is broken on the folder level, Red Users suite of rights to the objects in that folder is cleared until an administrator assigns new rights to him.
Figure 4-6: Breaking inheritance
73
74
The Net Access column now displays the effective rights that the user has to the object. Because you have disabled all inheritance, the Net Access entry equals the Access Level entry.
75
To take full advantage of inheritance patterns and Advanced rights settings, it is useful to understand not only the types of inheritance that are available, but also the ways in which a users effective rights are calculated by the CMS. For more information on the two types of inheritance, see Group and folder inheritance concepts on page 70.
Figure 4-7: Inheritance with Advanced Rights
76
the Manager user is both granted and denied the See object right to the folder. Because denied rights take precedence, the Manager user is effectively denied the ability to see the folder, so long as the user account inherits rights from its parent group (Sales). To remedy this situation, you could clear the Respect current security by inheriting rights from parent groups check box on the Advanced Rights page for the Manager user, or you could remove the Manager user from the Sales group.
Delegated administration overview Choosing between Modify the rights users have to objects options Owner rights
For faster navigation, click the title of the topic you are interested in.
Action for delegated administrator Create new users Create new groups
Rights required by the delegated administrator Add right on the top-level Users folder Add right on the top-level Group folder
77
Action for delegated administrator Delete any controlled groups, as well as individual users in those groups Delete only users that the delegated administrator creates Delete only users and groups that the delegated administrator creates
Owner Delete right on the top-level Users folder Owner Delete right on the top-level Group folder
Manipulate only users that the Owner Edit and Owner Securely Modify Right on the top-level User folder delegated administrator creates (including adding those users to those groups) Manipulate only groups that the Owner Edit and Owner Securely Modify delegated administrator Right on the top-level Group folder creates (including adding users to those groups) Modify passwords for users in their controlled groups Modify passwords only for principals the delegated administrator creates Edit Password right on relevant groups Owner Edit Password right on top-level user folder, or on relevant groups Note: Setting the Owner Edit Password right on a group takes effect on a user only when you add the user to the relevant group. Edit right on relevant groups
Modify user names, description, other attributes, and reassign users to different groups Modify user names, descriptions, other attributes, and reassign users to different groups, but only for users that the delegated administrator creates
Owner Edit right on top-level User folder, or on relevant groups Note: Setting the Owner Edit right on relevant groups takes effect on a user only when you add the user to the relevant group.
The following procedures, found elsewhere in this guide, detail how to grant rights for managing users, groups, servers, and server groups:
78
Granting access to users and groups on page 96 Controlling access to user inboxes on page 97
User access to servers and server groups on page 128 Controlling access to universes on page 134 Controlling access to universe connections on page 135
For faster navigation, click on the title of the topic you are interested in.
User A has 'Securely modify the rights the user have to objects' on object O. Each right that user A is changing for user B, is granted to A. User A has 'Securely modify rights users have to objects' on user B.
In addition, the delegated administrator will be restricted from modifying rights on those groups for other principals that he doesnt have restrictions on. This is useful, for example, if you want to have two delegated administrators for a group, but you dont want one to be able to deny access to the group for the
79
other one. The Securely Modify Rights right ensures this, since delegated administrators generally wont have the Securely Modify Rights right on each other.
Owner rights
Owner rights are rights that apply only to the owner of the object on which rights are being checked. In BusinessObjects Enterprise, an owner is a principal who has published an object; if that principal is ever deleted from the system, ownership reverts to the Administrator. Owner rights are useful in delegated administration. For example, you may want to create an folder or hierarchy of folders in which various users can create and view documents, but can only modify or delete their own documents. In addition, owner rights are useful for allowing users to manipulate instances of reports they create, but not others instances. In the case of the scheduling access level, this permits users to edit, delete, pause and reschedule only their own instances. Owner rights work similarly to their corresponding regular rights, but it is important to note that owner rights take precedence over regular rights in cases where both apply. For example, a principal denied the right to view an object as a result of group membership will be able to view the object if he has the owner view right for it. That is, the denial-based system of rights does not apply if the granted right is an owner right and the denied right is not.
80
View-on-demand rights
On-demand reporting gives users real-time access to live data, straight from the database server. Use live data to keep users up-to-date on constantly changing data, so they can access information thats accurate to the second. For instance, if the managers of a large distribution center need to keep track of inventory shipped on a continual basis, then live reporting is the way to give them the information they need. Before providing live data for all your reports, however, consider whether or not you want all of your users hitting the database server on a continual basis. If the data isnt rapidly or constantly changing, then all those requests to the database do little more than increase network traffic and consume server resources. In such cases, you may prefer to schedule reports on a recurrent basis so that users can always view recent data (report instances) without hitting the database server. For more information about optimizing the performance of reports that are viewed on demand, see the Designing Optimized Web Reports section in the Crystal Reports Users Guide (version 8.5 and later). Users require View On Demand access to refresh reports against the database.
View rights
To reduce the amount of network traffic and the number of hits on your database servers, you can schedule reports to be run at specified times. When the report has been run, users can view that report instance as needed, without triggering additional hits on the database. Report instances are useful for dealing with data that isnt continually updated. When users navigate through report instances, and drill down for details on columns or charts, they dont access the database server directly; instead, they access the saved data. Consequently, reports with saved data not only minimize data transfer over the network, but also lighten the database servers workload.
81
For example, if your sales database is updated once a day, you can run the report on a similar schedule. Sales representatives then always have access to current sales data, but they are not hitting the database every time they open a report. Users require only View access to display report instances.
82
chapter
Overview
This section describes the tasks related to account management for users and groups. It includes instructions that describe how to add, modify, and remove accounts within BusinessObjects Enterprise. This section covers the following topics:
Account management overview Available authentication types Managing Enterprise and general accounts Managing aliases
For faster navigation, click on the title of the topic you are interested in.
User management
In the Users area, you can specify everything required for a user to access BusinessObjects Enterprise. You can also view the two default user accounts summarized by Table 5-1: Default user accounts.
84
Account name Description Administrator This user belongs to the Administrators and Everyone groups. An administrator can perform all tasks in all BusinessObjects Enterprise applications (for example, the CMC, CCM, Publishing Wizard, and InfoView). This user belongs to the Everyone group. This account is enabled by default, and is not assigned a password by the system. If you assign it a password, the single sign-on to InfoView will be broken. See the BusinessObjects Enterprise Deployment and Configuration Guide for information on supporting Guestaccount users in multiple time zones.
Guest
Group management
In the Groups area, you can create groups that give a number of people access to the report or folder. This enables you to make changes in one place instead of modifying each user account individually. You can also view the several default group accounts summarized by Table 5-2: Default group accounts.
Table 5-2: Default group accounts
.
Account name Description Administrators Members of this group can perform all tasks in all of the BusinessObjects Enterprise applications (CMC, CCM, Publishing Wizard, and InfoView). By default, the Administrator group contains only the Administrator user. Each user is a member of the Everyone group. By default, the Everyone group allows members to access all the reports that are found in the Report Samples folder. When you install BusinessObjects Enterprise on Windows, BusinessObjects Enterprise creates a BusinessObjects NT Users group. This group is also added to Windows on the local machine and the user who installed BusinessObjects Enterprise is automatically added to this group. When NT authentication is enabled, BusinessObjects NT Users can use their NT accounts to log on to BusinessObjects Enterprise. By default, members of this group are able to view folders and reports.
Everyone
NT users
85
Account name Description Universe Users who belong to this group are granted access to the Designer users Universe Designer folder and the Connections folder. They can control who has access rights to the Designer application. You must add users to this group as needed. By default, no user belongs to this group.
Authentication Description type Enterprise Use the system default Enterprise Authentication if you prefer to create distinct accounts and groups for use with BusinessObjects Enterprise, or if you have not already set up a hierarchy of users and groups in a Windows NT user database, an LDAP directory server, or a Windows AD server. If you are working in a Windows NT environment, you can use existing NT user accounts and groups in BusinessObjects Enterprise. When you map NT accounts to BusinessObjects Enterprise, users are able to log on to BusinessObjects Enterprise applications with their NT user name and password. This can reduce the need to recreate individual user and group accounts within BusinessObjects Enterprise.
Windows NT
86
Managing User Accounts and Groups Managing Enterprise and general accounts
Authentication Description type LDAP If you set up an LDAP directory server, you can use existing LDAP user accounts and groups in BusinessObjects Enterprise. When you map LDAP accounts to BusinessObjects Enterprise, users are able to access BusinessObjects Enterprise applications with their LDAP user name and password. This eliminates the need to recreate individual user and group accounts within BusinessObjects Enterprise. If you are working in a Windows 2000 environment, you can use existing AD user accounts and groups in BusinessObjects Enterprise. When you map AD accounts to BusinessObjects Enterprise, users are able to log on to BusinessObjects Enterprise applications with their AD user name and password. This eliminates the need to recreate individual user and group accounts within BusinessObjects Enterprise.
Windows AD
Note: You can use Enterprise Authentication in conjunction with either NT, LDAP, or AD authentication, or with all of the three authentication plug-ins. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide.
Creating an Enterprise user account Creating a group Adding users to groups Modifying a user account Deleting a user account Changing password settings Modifying a group Viewing group members Deleting a group
87
Managing User Accounts and Groups Managing Enterprise and general accounts
For faster navigation, click on the title of the topic you are interested in. Note: In many cases, these procedures also apply to NT, LDAP, and AD account management. For specific information on NT, LDAP, and AD authentication, see the BusinessObjects Enterprise Deployment and Configuration Guide.
Choose Concurrent user if this user belongs to a license agreement that states the number of users allowed to be connected at one time. Choose Named user if this user belongs to a license agreement that associates a specific user with a license. Named user licenses are useful for people who require access to BusinessObjects Enterprise regardless of the number of other people who are currently connected.
7.
Click OK. The user is added to the system and is automatically added to the Everyone group. An inbox is automatically created for the user, as is an Enterprise alias. You can now add the user to a group or specify rights for the user.
88
Managing User Accounts and Groups Managing Enterprise and general accounts
Creating a group
Groups are collections of users who share the same account privileges; therefore, you may create groups that are based on department, role, or location. Groups enable you to change the rights for users in one place (a group) instead of modifying the rights for each user account individually. Also, you can assign object rights to a group or groups. For information on object rights, see Rights and the BusinessObjects Enterprise object security model on page 60. For information on granting users and groups administrative rights to other groups, see Granting access to users and groups on page 96. After creating a new group, you can add users, add subgroups, or specify group membership so that the new group is actually a subgroup. Because subgroups provide you with additional levels of organization, they are useful when you set object rights to control users access to your BusinessObjects Enterprise content. 1. 2. 3. 4. To create a new group Go to the Groups management area of the CMC. Click New Group. On the Properties tab, enter the group name and description. Click OK.
Adding subgroups
You can add an existing group as a subgroup to another group. A subgroup inherits the rights of the parent group. Note: Adding a subgroup is similar to specifying group membership. See Specifying group membership on page 90. 1. 2. 3. 4. 5. To add subgroups In the Groups management area of the CMC, click the link for the group. Click the Subgroups tab. Click Add/Remove Subgroups. Select the groups that should be members of this new group; then click the > arrow. Click OK.
89
Managing User Accounts and Groups Managing Enterprise and general accounts
In the Users management area of the CMC, you can add a user to one or more groups. In the Groups management area of the CMC, you can add one or more users to a group.
The following procedures describe how to add users to groups using both of these methods. 1. 2. 3. To add a user to one or more groups Go to the Users management area of the CMC. Under Account Name, click the link to the user whose properties you want to change. Click the Member of tab to specify the group or groups the user should belong to. Note: All BusinessObjects Enterprise users of the system are part of the Everyone group. 4. 5. Click the Member of button to view the available groups. In the Available groups area, select the group(s) that the new user should be a member of. Use SHIFT+click or CTRL+click to select multiple groups.
90
Managing User Accounts and Groups Managing Enterprise and general accounts
6. 7.
Click the > arrow to add the group(s); click the < arrow to remove the group(s). Click OK. The Member of tab appears and lists the groups in which the user is a member.
1. 2. 3. 4.
To add one or more users to a group In the Groups management area of the CMC, click the link for the group. Click the Users tab. Click Add Users. Select the users to add to the group; then click the > arrow. Tip: To select multiple users, use the SHIFT+click or CTRL+click combination. Tip: To search for a specific user, use the Look For field. Tip: If there are many users on your system, click the Previous and Next buttons to navigate through the list of users.
5.
Click OK. The Users tab appears. It lists all of the users who belong to this group.
91
Managing User Accounts and Groups Managing Enterprise and general accounts
92
Managing User Accounts and Groups Managing Enterprise and general accounts
4. 1. 2. 3.
Password never expires User must change password at next logon User cannot change password
Click Update. To change password settings Go to the Authentication management area of the CMC. Click the Enterprise tab. Select the check box for each password setting that you want to use, and provide a value if necessary. Table 5-4: Password settings identifies the minimum and maximum values for each of the settings you can configure.
4.
Click Update.
Password setting Enforce mixed-case passwords Must contain at least N characters Cannot reuse the N most recent passwords Must wait N minutes to change password Disable account after N failed attempts to log on Reset failed logon count after N minutes Re-enable account after N minutes
Recommended Maximum N/A 64 characters 100 days 100 passwords 100 minutes 100 failed 100 minutes 100 minutes
93
Managing User Accounts and Groups Managing Enterprise and general accounts
To enable Trusted Authentication, you must configure both the server and the client. 1. 2. 3. 4. To configure the server to use Trusted Authentication Go to the Authentication management area of the CMC. Click the Enterprise tab. Enable Trusted Authentication. Create a shared secret for your users. Note: The shared secret is used by the client and the CMS to create a trusted authentication password. This password is used to establish trust. 5. Enter a time-out value for your trusted authentication requests. Note: The time-out value determines how long the CMS waits for the IEnterpriseSession.logon() call from the client application. 1. To configure the client to use Trusted Authentication Create a valid configuration file on the client machine. The following conditions apply for the configuration file:
2.
The name of the file must be TrustedPrincipal.conf. The file must be located at businessobjects_root/win32_x86/ plugins/auth/secEnterprise. The file must contain SharedSecret=secretPassword, where secretPassword is the trusted authentication password.
Use the session manager to create a trusted principal and log on to the CMS:
ISessionMgr sessionMgr = CrystalEnterprise.getSessionMgr(); ITrustedPrincipal trustedPrincipal = sessionMgr.createTrustedPrincipal("userName", "cmsName"); IEnterpriseSession enterpriseSession = sessionMgr.logon(trustedPrincipal);
Modifying a group
You can modify a group by making changes to any of the settings. Note: The users who belong to the group will be affected by the modification if they are logged on when you are making changes. 1. To modify a group In the Groups management area of the CMC, click the link for the group.
94
Managing User Accounts and Groups Managing Enterprise and general accounts
2. 3.
Under the Group Name column, click the link to the group whose configuration you want to change. Make the necessary changes in one of the six tabs:
4.
Depending on which tab you have selected, click OK or Update after you have made your changes.
Deleting a group
You can delete a group when that group is no longer required. You cannot delete the default groups Administrator and Everyone. Note: The users who belong to the deleted group will be affected by the change if they are logged on when the group is deleted. To delete a third-party authentication groups, such as the BusinessObjects NT Users group, use the Authentication management area in CMC. For instructions, see the BusinessObjects Enterprise Deployment and Configuration Guide. 1. 2. 3. To delete a group Go to the Groups management area of the CMC. Select the check box associated with the group you want to delete. Click Delete.
95
Managing User Accounts and Groups Managing Enterprise and general accounts
96
7. 8. 9.
Click OK. On the Rights tab, change the Access Level for each user or group, as required. To choose specific rights, choose Advanced.
Managing aliases
If a user has multiple accounts in BusinessObjects Enterprise, you can link the accounts using the assign alias feature. This is useful when a user has a third-party account that is mapped to Enterprise and an Enterprise account.
97
By assigning an alias to the user, the user can log on using either a third-party user name and password or an Enterprise user name and password. Thus, an alias enables a user to log on via more than one authentication type. You can also reassign an alias in BusinessObjects Enterprise. For example, after you map your third-party accounts to BusinessObjects Enterprise, you can use the Reassign Alias feature to reassign an alias to a different a user. In CMC, the alias information is displayed at the bottom of the properties page for a user. A user can have any combination of BusinessObjects Enterprise, LDAP, AD, or NT aliases. Managing aliases includes:
Creating a user and a third-party alias Creating an alias for an existing user Assigning an alias Reassigning an alias Deleting an alias Disabling an aliases
The authentication tool needs to have been enabled in CMC. The format of the account name must agree with the format required for the authentication type. The user account must exist in the third-party authentication tool, and it must belong to a group that is already mapped to BusinessObjects Enterprise. To create a user and add a third-party alias Go to the Users management area of the CMC. Click New User. The New User Properties page appears. Select the authentication type for the user, for example, Windows NT. The New User Properties page appears. Type in the third-party account name for the user, for example, bsmith.
1. 2. 3. 4.
98
5. 6.
Select the connection type for the user. Click OK. The user is added to BusinessObjects Enterprise and is assigned an alias for the authentication type you selected, for example, secWindowsNT:ENTERPRISE:bsmith. If required, you can add, assign, and reassign aliases to user.
The authentication tool needs to have been enabled in CMC. The format of the account name must agree with the format required for the authentication type. The user account must exist in the third-party authentication tool, and it must belong to a group that is mapped to BusinessObjects Enterprise. To create a new alias for a user Go to the Users management area of the CMC. Click the link for the user that you want to add an alias to. Click New Alias. The New Alias page appears. Select the authentication type for the user, for example, Windows NT. Type in the account name for the user. Click OK. An alias is created for the user. When you view the user in CMC, at least two aliases are shown, the one that was already assigned to the user and the one you just created.
1. 2. 3. 4. 5. 6.
Assigning an alias
When you assign an alias to a user, you move a third-party alias from another user to the user you are currently viewing. You cannot assign or reassign Enterprise aliases.
99
Note: If a user has only one alias and you assign that last alias to another user, the system will delete the user account, and the Favorites folder, personal categories, and inbox for that account. 1. 2. 3. 4. 5. To assign an alias from another user Go to the Users management area of the CMC. Click the link for the user you want to assign an alias to. Click Assign Alias. The Assign Alias page appears. Select the alias you want in the list of available aliases. Click the > arrow. Tip: To select multiple aliases, use the SHIFT+click or CTRL+click combination. Tip: To search for a specific alias, use the Look For field. 6. Click OK.
Reassigning an alias
When you reassign an alias, you move a third-party alias from the user that you are currently viewing to another user. You cannot assign or reassign Enterprise aliases. Note: If a user has only one alias and you reassign that alias to another user, the system will delete the user account, and the Favorites folder, personal categories, and inbox for that account. 1. 2. 3. 4. 5. To reassign an alias to another user Go to the Users management area of the CMC. Click the link for the user whose alias you want to reassign, for example, bsmith. Click the Reassign Alias button for the alias. The Reassign Alias page appears. In the list, click the name of the user that you want to assign the alias to, for example, jbrown. Click OK. The alias for bsmith has now been assigned to the user jbrown, and the Properties page for user jbrown is displayed. The user jbrown can now log on using the third-party user account and authentication method. The user bsmith can no longer use this alias.
100
Deleting an alias
When you delete an alias, the alias is removed from the system. If a user has only one alias and you delete that alias, the system automatically deletes the user account and the Favorites folder, personal categories, and inbox for that account. 1. 2. 3. To delete an alias Go to the Users management area of the CMC. Click the link for the user whose alias you want to delete. Click the Delete Alias button for the alias. The alias is deleted from the system. Note: Deleting a users alias does not necessarily prevent the user from being able to log on to BusinessObjects Enterprise again. If the user account still exists in the third-party system, and if the account belongs to a group that is mapped to BusinessObjects Enterprise, then BusinessObjects Enterprise will still allow the user to log on. Whether the system creates a new user or assigns the alias to an existing user, depends on which Update Options you have selected for the authentication tool in the Authentication management area of CMC.
Disabling an aliases
You can prevent a user from logging on to BusinessObjects Enterprise using a particular authentication method by disabling the users alias associated with that method. To prevent a user from accessing BusinessObjects Enterprise altogether, disable all aliases for that user. Note: Deleting a user from BusinessObjects Enterprise does not necessarily prevent the user from being able to log on to BusinessObjects Enterprise again. If the user account still exists in the third-party system, and if the account belongs to a group that is mapped to BusinessObjects Enterprise, then BusinessObjects Enterprise will still allow the user to log on. To ensure a user can no longer use one of his or her aliases to log on to BusinessObjects Enterprise, it is best to disable the alias. See also Deleting an alias on page 101. 1. 2. 3. To disable an alias Go to the Users management area of the CMC. Click the name of the user whose alias you want to disable. In the Alias area on the Properties page, clear the Enabled check box for the alias you want disable.
101
Repeat this step for each alias you want to disable. 4. Click Update. The user can no longer log on using the type of authentication that you just disabled.
102
Managing Licenses
chapter
Overview
This section shows you how to use the CMC to manage license information for your BusinessObjects Enterprise deployment. It includes information on:
For faster navigation, click on the title of the topic you are interested in.
Contact your Business Objects sales representative. Contact your regional office. For details, go to: http://www.businessobjects.com/company/contact_us/
104
105
106
Managing Applications
chapter
Overview
This section shows you how to use the Business Objects Applications area of the CMC to make changes to the appearance and functionality of web applications such as the CMC and InfoView, without doing any programming. This section also shows you how to control user and administrator access to applications by changing the rights associated with each one. It contains contextual information and procedures on:
Setting rights on applications Managing CMC settings Managing Crystal Reports Explorer settings Managing Designer settings Desktop Intelligence settings Managing Discussions settings Managing InfoView settings Managing Web Intelligence settings
For faster navigation, click on the title of the topic you are interested in.
108
9.
For each feature, choose Inherited, Explicitly Granted, or Explicitly Denied for the user or group. Note: For the Web Intelligence application, make sure you grant access to the Allows interactive HTML viewing option in order for users to be able use the Interactive view format and use the Query HTML panel. The user can select this view format and report panel option in the Web Intelligence Document Preferences tab in InfoView.
CMC Access URL Specifying the CMC Access URL allows other applications, such as Crystal Reports, to get this URL from the CMS in order to call pages in the CMC. Crystal Reports, for example, needs to call these pages in order to support the previewing of reports and to enable administration tasks to be performed from Crystal Reports.
1. 2. 3.
To manage settings for the CMC Go to the BusinessObjects Enterprise Applications management area of the CMC. Click the BusinessObjects Enterprise CMC link. The Properties page appears. In the Prompt for search if the return size exceeds field, type the maximum number of objects you want to be returned in searches and on the initial pages of the Objects, Folders, Groups, and Users management areas.
109
4. 5.
In the CMC Access URL field, type the URL for the CMC. Click Update.
Note: To modify the number of objects displayed on a page (rather than the total number of objects displayed), see Setting CMC preferences on page 48.
Setting user access to Business Views and report data sources. Controlling the Crystal Reports Explorer features that are available to each user. Providing users with standardized report templates by setting the Default Template folder. Configuring and managing data sources.
For more information about administering Crystal Reports Explorer, click Help in the bottom right corner of Crystal Reports Explorer.
110
Accessing the Discussions page Searching for discussion threads Sorting search results Deleting discussion threads Setting user rights
For faster navigation, click on the title of the topic you are interested in.
111
4.
From the second list, refine your search. If you search by Thread title or Author, the second field provides you with the following options.
is: Allows you to search for any discussion threads where the thread title, or the author name, exactly match the text that you type into the third field. Searches are not case sensitive. is not: Allows you to search for any discussion threads where the thread title, or the author name, do not exactly match the text that you type into the third field. contains: Allows you to search for any discussion threads that contain the search text string within any part of the thread title or the authors name. does not contain: Allows you to search for any discussion threads that do not contain the text string within any part of the thread title.
If you search by Creation date or Last modified date, there are the following options.
before: Allows you to search for any discussion threads that were created or modified before the search date.
112
5.
after: Allows you to search for any discussion threads that were created or modified after the search date. between: Allows you to search for any discussion threads that were created or modified between the two search dates.
Use the third field to further refine your search. If you selected a text-based search in the first two fields, type in the text string. If you selected a date-based search, enter the date or dates in the appropriate fields.
6.
Click Search to display all the records that match your search criteria.
2. 3. 4.
Thread title. Sort by the title of a thread. Creation date. Sort by the date the thread was created. Last modified date. Sort based on the date a thread was last modified. Author. Sort by the author of a specific thread.
In the second list, select whether you want the records to be displayed in ascending or descending order. In the third category, enter how many results you want to be displayed on each page. Click Search.
113
2.
change their preferences organize folders search filter object listings by object type view the Favorites folder
For example, if you have already created your users folders using a standard naming convention, you may want to deny your users the ability to organize their own folders. Note: By default, all users have access to these features. 1. 2. 3. To change display settings for InfoView Go to the BusinessObjects Enterprise Applications management area of the CMC. Click InfoView. On the Properties tab, select the options that you want.
Header and style: You can change the colors of the header and the logo displayed in the header. If you have a cascading style sheet for your intranet, you can specify it here to format InfoView with the same styles.
114
Display: Choose the functionality that your users can see. You can choose whether or not to display the Preferences button, the Type list, and the Filters tab. You can also choose a default navigation method for your users (folders or categories), and you can specify the maximum number of pages of objects to show at a time. Object Listing: Choose whether to display the original object or the latest instance of the object. Viewers: You can also configure settings that control which viewers are available to users. When users view a report using the Advanced DHTML viewer, the report is processed by the Report Application Server. If you are using the Java version of InfoView and want users to be able to use the Active X or Java viewers, you must enter the context path of the Web Component Adapter. Consult the BusinessObjects Enterprise Installation Guide for more information.
4.
Click Update.
115
116
Managing Servers
chapter
Overview
This section provides information on a range of server tasks that allow you to customize the behavior of BusinessObjects Enterprise. It also includes information on the server settings that you can alter to accommodate the needs of your organization. This section covers the following topics:
Server management overview Server status Server settings Server metrics Server groups User access to servers and server groups
Central Management Console (CMC) The CMC is used to change the status of a server, change server settings, access server metrics, or create server groups. Because the CMC is a web-based interface, you can configure your BusinessObjects Enterprise servers remotely over the Internet or through your corporate intranet.
Central Configuration Manager (CCM) The CCM is a program that allows you to view and to modify server settings while Business Objects servers are offline. For instance, you use the CCM to stop servers, to modify performance settings, and to change the default server port numbers. You can use the CCM to configure BusinessObjects Enterprise remotely over your corporate network. For more information about the CCM, see the BusinessObjects Enterprise Deployment and Configuration Guide.
The default values for BusinessObjects Enterprise server settings have been chosen to maximize the reliability, predictability, and consistency of operation of a typical BusinessObjects Enterprise installation. The default settings guarantee the highest degree of data accuracy and timeliness. For example, by default, data sharing between reports is disabled. When running reports on demand, disabling data sharing means that every user can always assume that they will receive the latest data. If you prefer to place more emphasis on
118
the efficiency, economy, and scalability of BusinessObjects Enterprise, you can tune server settings to set your own balance between system reliability and performance. For more information on scaling and tuning, see the BusinessObjects Enterprise Deployment and Configuration Guide. Related topics:
For an overview of the multi-tier architecture and the BusinessObjects Enterprise server components, see Chapter 2: BusinessObjects Enterprise Architecture. For information about creating groups of servers, see Server groups on page 125. With the BusinessObjects Enterprise Software Development Kit (SDK), you can now access and modify server metrics and settings from your own web applications. For more information, see the developer documentation available on your product CD.
Server status
The status of a server is its current state of operation: a server can be started, stopped, enabled, or disabled. To respond to BusinessObjects Enterprise requests, a server must be started and enabled.
Table 8-1: Server status
Icon
Server status Indicates the server is running. Indicates the server is disabled. When a server is disabled, it will complete jobs queued at the time the server was disabled, but will not respond to new jobs. Indicates the server is stopped. When a server is stopped, it will not complete jobs queued at the time the server was stopped, nor will it respond to new jobs.
This section shows how to modify the status of servers with the CMC and the CCM. It includes:
For faster navigation, click on the title of the topic you are interested in.
119
Description You must stop BusinessObjects Enterprise servers before you can modify certain properties and settings. If you have stopped a server to configure it, you need to start it to effect your changes and to have the server resume processing requests. Restarting a server is a shortcut to stopping a server completely and then starting it again. You can change certain settings without stopping the server; however, the changes typically do not take effect until your restart the server.
Restarting
For example, if you want to change the name of a CMS, then you must first stop the server. Once you have made your changes, you start the server again to effect your changes. Tip: When you stop (or restart) a server, you terminate the servers process, thereby stopping the server completely. If you want to prevent a server from receiving requests without actually stopping the server process, you can also enable and disable servers. We recommend that you disable Job Servers and Program Job Servers before stopping them so that they can finish processing any jobs they have in progress before stopping. For details, see Enabling and disabling servers on page 121. To start, stop, or restart servers with CMC Note: You cannot use CMC to stop the CMS. You must use the CCM instead. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide. 1. Go to the Servers management area of the CMC. A list of servers appears. The icon associated with each server identifies its status. For more information, see . 2. 3. Select the check box for the server whose status you want to change. Depending upon the action you need to perform, click Start, Stop, or Restart. You may be prompted for network credentials that allow you to start and stop services running on the remote machine.
120
4.
To start, stop, or restart a UNIX server with the CCM Use the ccm.sh script. For reference, see the BusinessObjects Enterprise Deployment and Configuration Guide.
121
Description Allows a server to receive and respond to requests. Prevents server from receiving and responding to new requests. You should disable a server before stopping it to ensure it has finished processing current requests.
Note: The CMS must be running in order for you to enable and/or disable other servers. 1. To enable and disable servers with CMC Go to the Servers management area of the CMC. The icon associated with each server identifies its status. See for more information. 2. 3. Select the check box for the server whose status you want to change. Depending upon the action you need to perform, click Enable or Disable.
Server settings
The default values for BusinessObjects Enterprise server settings have been chosen to maximize the reliability, predictability, and consistency of operation of a typical BusinessObjects Enterprise installation. If you prefer to place more emphasis on the efficiency, economy, and scalability of BusinessObjects Enterprise, you can tune server settings to set your own balance between system reliability and performance. For more information on scaling and tuning, see the BusinessObjects Enterprise Deployment and Configuration Guide.
Server metrics
The CMC allows you to view server metrics over the Web. These metrics include general information about each machine, along with details that are specific to the type of server. This section shows how to monitor the status of servers with the CMC. It includes:
For faster navigation, click on the title of the topic you are interested in.
122
Tip: For an example of how to use server metrics in your own web applications, see the View Server Summary sample on the BusinessObjects Enterprise Administration Launchpad.
123
Event Server The Metrics tab of the Event Server contains statistics on the files that the server is monitoring. This tab includes a table showing the file name and the last time the event occurred. Page Server The Metrics tab of the Page Server contains information on how the server is running. It lists the maximum number of simultaneous report jobs, the location of temporary files, the number of minutes before an idle connection is closed, the minutes before a report job is closed, the maximum number of database records shown when previewing or refreshing a report, the oldest processed data given to a client, whether a viewer refresh always hits the database, and the setting for the Report Job Database Connection. It also shows the number of current connections, the number of requests queued, the current number of processing threads running, the total number of requests served, and the total bytes transferred. Report Application Server The Metrics tab of the Report Application Server (RAS) shows the number of reports that are open, and the number of reports that have been opened. It also shows the number of open connections, along with the number of open connections that have been created. Job servers and Web Intelligence servers The Metrics tabs of these servers list the current number of jobs that are being processed, the total number of requests received, the total number of failed job creations, the processing mode, and the location of its temporary files. CMS The Metrics tab of the CMS lists only the general information about the machine it is running on. The Properties tab, however, shows a list of users who have active sessions on the system. Click any users link to view the associated account details. Connection Server The Metrics tab of the Connection Server shows the current settings, including HTTP and CORBA protocol settings, trace settings, connection pooling, and the timeout duration for inactive jobs. You can change these settings on the Properties tab. The Metrics tab also lists general information about the machine it is running on. Desktop Intelligence Cache and Job servers These servers, which process information only for Desktop Intelligence documents, provide the same metrics as standard cache and job servers.
124
Related topics:
For information about CMS clusters, see the BusinessObjects Enterprise Deployment and Configuration Guide.
Server groups
Server groups provide a way of organizing your BusinessObjects Enterprise servers to make them easier to manage. That is, when you manage a group of servers, you need only view a subset of all the servers on your system. More importantly, server groups are a powerful way of customizing BusinessObjects Enterprise to optimize your system for users in different locations, or for objects of different types. If you group your servers by region, you can easily set up default processing settings, recurrent schedules, and schedule destinations that are appropriate to users who work in a particular regional office. You can associate an object with a single server group, so the object is always processed by the same servers. And you can associate scheduled objects with a particular server group to ensure that scheduled objects are sent to the correct printers, file servers, and so on. Thus, server groups prove especially useful when maintaining systems that span multiple locations and multiple time zones. If you group your servers by type, you can configure objects to be processed by servers that have been optimized for those objects. For example, processing servers need to communicate frequently with the database containing data for published reports. Placing processing servers close to the
125
database server that they need to access improves system performance and minimizes network traffic. Therefore, if you had a number of reports that ran against a DB2 database, you might want to create a group of Page Servers that process reports only against the DB2 database server. If you then configured the appropriate reports to always use this Page Server group for viewing, you would optimize system performance for viewing these reports. After creating server groups, configure objects to use specific server groups for scheduling, or for viewing and modifying reports. For details, see Specifying default servers on page 159. You can change the status, obtain metrics, and configure your servers in the organize Server Groups areajust as you would in the organize Servers area. The only difference is that you see only the servers that you added to the server group. The rest of this section provides information on how to:
Creating a server group Working with server subgroups Modifying the group membership of a server
126
127
128
2. 3. 4.
Select the server or server group you want to grant access to. Click the Rights tab. Click Add/Remove to add users or groups that you want to give access to the selected server or server group. The Add/Remove page appears. In the Select Operation list, select Add/Remove Groups, Add Users, or Remove Users. Select the user or group you want to grant access to the specified server or server group. Tip: If you have many users on your system, select the Add Users operation; then use the Look for field to search for a particular account.
5. 6.
7. 8. 9.
Click OK. On the Rights tab, change the Access Level for each user or group, as required. To choose specific rights, choose Advanced.
View objects (or View document instances, as appropriate) Edit objects Refresh the reports data Export the reports data
User must also have permission to add objects to at least one folder before they can save new reports back to BusinessObjects Enterprise. To ensure that users retain the ability to perform additional reporting tasks (such as copying, scheduling, printing, and so on), its recommended that you first assign the appropriate access level and update your changes. Then, change the access level to Advanced, and add any of the required rights that are not already granted. For instance, if users already have View On Demand rights to a report object, you allow them to modify the report by changing the access level to Advanced and explicitly granting the additional Edit objects right.
129
When users view reports through the Advanced DHTML viewer and the RAS, the View access level is sufficient to display the report, but View On Demand is required to actually use the advanced search features. The extra Edit objects right is not required.
130
chapter
Overview
This section provides information on managing data sources and connections, including information on the following topics:
Data source connections Managing universes Managing universe connections Managing OLAP cubes OLAP Data source connection settings
For faster navigation, click on the title of the topic you are interested in.
Reduced complexity In typical organizations, most users outside of the IT department are not familiar with the names, IP addresses, and other details of the back-end database servers. When users need these details, they usually contact IT. With Information Analyzer, connections are defined once by an administrator and then saved to the BusinessObjects Enterprise repository. Users who need to create Information Analyzer workspaces can then choose from the list of saved connections instead of having to remember and provide any specific server details themselves.
Improved security Only administrators and users who have privileges to add objects to the BusinessObjects Enterprise repository need to know server details. Also, connection details such as server name, database, username, and password are stored in the repository, not in workspace files.
Improved manageability
132
Storing connection information in a shared connection object that is referenced in workspace files allows organizations to easily move workspaces between development and production environments. Instead of changing all the workspaces, you modify only the shared connection object to reference the production server instead of the development server. The updated connection information is automatically propagated to the workspaces that reference the shared connection object.
Managing universes
A universe is an abstraction of a data source that contains data in nontechnical terms. Users of Web Intelligence, Desktop Intelligence, and Crystal Reports can connect to a universe and through it run queries against a database. They can perform data analysis and create reports using the objects in a universe, without seeing, or having to know anything about, the underlying data structures in the database. Universes are created by using the Universe Designer. For complete information, see the Designers Guide.
133
If the Access Level is not already set to Advanced, click the list and select Advanced. If the Access Level is already set to Advanced, click the Advanced link in the Net Access column.
134
If the Access Level is not already set to Advanced, click the list and select Advanced. If the Access Level is already set to Advanced, click the Advanced link in the Net Access column.
1. 2. 3. 4.
To view or set who has access to a specific universe connection Go to the Connections management area of the CMC. Click the link for the connection. Click the Rights tab. In the Name column, locate the user or group whose rights you want to specify. If the user or group is not listed, click Add/Remove. Add the appropriate user or group and click OK. You are returned to the objects Rights tab.
5.
The next step depends upon the entry that already appears in the Access Level list for this user or group:
If the Access Level is not already set to Advanced, click the list and select Advanced. If the Access Level is already set to Advanced, click the Advanced link in the Net Access column.
135
Creating an OLAP cube connection Editing an OLAP cube connection Deleting an OLAP cube connection OLAP Data source connection settings
For faster navigation, click on the title of the topic you are interested in.
2. 3. 4. 5.
6.
Hyperion Essbase (7.0/7.1) / IBM DB2 OLAP (8.2) Enhanced Microsoft OLE DB Provider for Analysis Services 9.0 Microsoft OLE DB Provider for OLAP Services 8.0 SAP Business Information Warehouse (available only if the BusinessObjects Integration Kit for SAP has been installed) Local .CUB file HTTP cube Oracle OLAP
Enter the provider-specific logon information, such as server name and user credentials, and click Connect.
136
For details on provider-specific logon information, see OLAP Data source connection settings on page 138. 7. Enter your credentials and click OK. For Microsoft OLAP data sources, it is recommended that you leave the User and Password fields blank. For more information, see OLAP Data source connection settings on page 138. You can now choose from the cubes that you have been granted access to by the database administrator for this OLAP server. 8. 9. Select the OLAP cube that you want to connect to. Click Save to create the connection. The connection is now available for users to add to an Information Analyzer workspace.
2.
137
Managing Data Sources and Connections OLAP Data source connection settings
For details on provider-specific logon information, see OLAP Data source connection settings on page 138. 4. Click OK to save the new connection settings.
2.
Connection settings for Microsoft OLAP data sources. Connection settings for Essbase/DB2 OLAP data sources. Connection settings for Oracle OLAP data sources.
For faster navigation, click on the title of the topic you are interested in. For details on SAP BW data sources, see the documentation for the BusinessObjects Integration Kit for SAP.
138
Managing Data Sources and Connections OLAP Data source connection settings
Description The cube is held on an Analysis Services server. You must enter a Server Name but it is recommended that you leave the User Name and Password fields blank. When you leave those fields blank, Information Analyzer passes the Windows credentials of the current, logged-on user to the Analysis Services server for authentication. This is the account that the application process has been started with. In certain situations, the current user's Windows credentials may not be sufficient to access the Analysis Services cubes on the server. For more information, see Microsoft Analysis Services security in the BusinessObjects Information Analyzer Administrators Guide.
Local cube file The cube is stored as a CUB file on the local computer. (.CUB) Browse to the location of the CUB file. HTTP cube Sometimes referred to as an iCube, this type of cube is held on an Analysis Services server that is accessible through HTTP. Enter the URL, User Name, and Password in the boxes.
Authentication Set the type of authentication to use when users create new type workspaces or log on to existing workspaces. These options are available: use saved credentials
use Enterprise session credentials (SSO) Uses the credentials that you entered when you logged on to your BusinessObjects Enterprise InfoView session.
To establish a valid connection to an HTTP cube server you must specify the full URL, including the http or https prefix. Even if the URL is invalid, the new server appears in the list of available servers within the OLAP Connection Browser. For HTTP cubes, the server checks the authentication of the user who requests the connection. If the password or user name is wrong, then the server defines how an anonymous user is logged on. This is also the case when a password or user name is blank.
139
Managing Data Sources and Connections OLAP Data source connection settings
For more information, see Microsofts documentation for Analysis Services, which is available either as part of your Microsoft SQL Server Analysis Services installation, or on the MSDN Website at http://msdn.microsoft.com/ library/.
Setting
Description
Authentication Set the type of authentication to use when users create new type workspaces or log on to existing workspaces. These options are available: use saved credentials
use Enterprise session credentials (SSO) Uses the credentials that you entered when you logged on to your BusinessObjects Enterprise InfoView session.
140
Managing Data Sources and Connections OLAP Data source connection settings
Setting
Description
Authentication Set the type of authentication to use when users create new type workspaces or log on to existing workspaces. These options are available: use saved credentials
use Enterprise session credentials (SSO) Uses the credentials that you entered when you logged on to your BusinessObjects Enterprise InfoView session.
141
Managing Data Sources and Connections OLAP Data source connection settings
142
Managing Objects
chapter
10
Overview
This section describes the management of objects using the CMC. It includes general information that applies to all objects, and it includes specific information about managing reports, Web Intelligence documents, programs, and object packages. This section covers the following topics:
General object management Report object management Program object management Object package management
For faster navigation, click on the title of the topic you are interested in.
Setting object rights Setting access levels Copying, moving, or creating a shortcut for an object Deleting an object Searching for an object Sending an object or instance Changing properties of an object Assigning an object to categories
For faster navigation, click on the title of the topic you are interested in.
144
10
To add groups or users to an objects rights settings To change a group or users report rights To view or set advanced rights
For faster navigation, click on the title of the topic you are interested in. This section also provides a table which lists and describes the rights which can be set on the object level. For more information about rights, see Chapter 4: Setting Rights. 1. 2. 3. 4. 5. 6. 7. 1. 2. 3. To add groups or users to an objects rights settings In the Objects management area of the CMC, select an object by clicking its link. Click the Rights tab. The Rights page appears. On the Rights panel, click Add/Remove. Select an option in the Select Operation list. Select the group(s) or user(s) you would like to add or remove. Click the > arrow to add the group(s) or user(s); click the < arrow to remove the group(s) or user(s). Click OK. To change a group or users report rights In the Objects management area of the CMC, select an object by clicking its link. Click the Rights tab. The Rights page appears. Change the access level for a group or user by selecting a right from the appropriate list in the Access Level column; then click Update. If you select Advanced from the list, you grant or deny granular rights from the Advanced Rights page. 1. 2. 3. 4. To view or set advanced rights Go to the Objects or Folders management area of the CMC. Locate the object whose rights you want to modify. Click the link to the object, and then click its Rights tab. In the Name column, locate the user or group whose rights you want to specify. If the user or group is not listed, click Add/Remove. Add the appropriate user or group and click OK. You are returned to the objects Rights tab.
145
10
5.
The next step depends upon the entry that already appears in the Access Level list for this user or group:
Object rights
If the Access Level is not already set to Advanced, click the list and select Advanced. If the Access Level is already set to Advanced, click the Advanced link in the Net Access column.
The right to... General Add objects to the folder View objects Edit objects Modify the rights users have to objects
Description Allows users to add objects Allows users to view any object Allows users to edit any object Allows a users to modify any right, for any user on the object
Schedule the document to Allows users to schedule objects run Delete objects Define server groups to process jobs Delete instances Copy objects to another folder Schedule to destinations View document instances Pause and Resume document instances Securely modify rights users have to objects Reschedule instances Schedule on behalf of other users Allows users to delete any object Allows users to define/create server groups Allows users to delete any instances Allows users to copy objects if they can be copied (i.e. reports, text, application) Allows users to schedule objects to available destinations Allows users to view any instances Allows users to pause and resume (scheduling) any instances Allows users to grant or deny for other users on the object only those rights that they themselves have been granted Allows users to reschedule any instances Allows users to be able to schedule on behalf of other users - used for report bursting
146
10
The right to... View objects that the user owns Edit objects that the user owns Modify the rights users have to objects that the user owns Delete objects that the user owns Delete instances that the user owns View document instances that the user owns Pause and Resume document instances that the user owns Securely modify rights users have to objects that the user owns
Description Allows users to view only those objects they own Allows users to edit only those objects they own Allows users to modify the rights other users have on the objects they own Allows users to delete only those objects they own Allows users to delete only those instances they own Allows users to view only those document (i.e. report) instances they own Allows users to pause and resume (scheduling) only those report instances that they own Allows users to grant or deny for other users on the object only the rights that they themselves have been granted for objects they own
Reschedule instances that Allows users to reschedule only those report the user owns instances that they own Desktop Intelligence Refresh the reports data Refresh List of Values Use Lists of Values View SQL Export the reports data Allows users to refresh report data Allows users to refresh the list of values associated with a Desktop Intelligence report Allows users to use an associated list of values Allows users to see the SQL used to generate the Desktop Intelligence report content Allows users to export the Desktop Intelligence report with data
Download files associated Allows users to download the object template with the object document (.rep file, for example) Desktop Intelligence add in Download files associated Allows users to download the object template with the object document (.rep file, for example) Desktop Intelligence template
147
10
Description
Download files associated Allows users to download the object template with the object document (.rep file, for example) Report Print the reports data Refresh the reports data Export the reports data Allows users to print report content Allows users to refresh report content Allows users to export report content
Download files associated Allows users to download the object source with the report document (.rep file, for example) Text Allow discussion threads Web Intelligence document Refresh the reports data Edit Query Refresh List of Values Use Lists of Values View SQL Export the reports data Allows users to refresh the Web Intelligence report content Allows users to edit query used to generate the Web Intelligence report content Allows users to refresh list of values associated with a Web Intelligence report Allows users to use list of values associated with a Web Intelligence report Allows users to see the SQL used to generate the Web Intelligence report content Allows users to export the Web Intelligence report with data Allows discussion threads to be added to text object
Download files associated Allows users to download the object template with the object document (.wid file, for example)
148
10
If the user or group is not listed, click Add/Remove. Add the appropriate user or group and click OK. You are returned to the objects Rights tab. 5. In the Access Level column, select the access level (No Access, View, Schedule, View On Demand, or Full Control) that is appropriate for the user or group. Click Update.
6.
Copy to Copy to creates another copy of the object in a different location. The new copy of the object inherits all object rights from its new parent folder.
Move to Move to changes the location of the object from one folder to another. The object retains its original set of object rights. Create shortcut in Create shortcut in enables you to create an alternate access route for an object. The shortcut inherits object rights from its parent folder; however, the shortcut object rights do not override the rights of the original object. For example, if a user does not have rights to schedule a report, they are not able to schedule that report even through a shortcut that allows them full rights.
5.
149
10
To search for a specific folder or object package, use the Look For field.
Deleting an object
This procedure explains how to delete either a single object or multiple objects. You can also delete a folder (by selecting a folder and clicking Delete in the Folders management area), which deletes all of the objects and instances that are stored in that folder. As well, you have the option of deleting object instances, rather than the object itself. For more information, see Managing and viewing the history of instances on page 218. Note: When you delete an object, all of its existing instances and scheduled instances will be deleted. 1. 2. 3. 4. To delete an object Go to the Objects management area of the CMC. Select the check boxes associated with the object(s). Click Delete. Click OK.
150
10
You can send either a copy of an object or instance, or a shortcut to the object or instance. You can also select the destination, for example, FTP or Inbox. Not all types of objects can be sent to all destinations. For details about which types of objects can be sent to which destinations, see Table 10-2: Available destinations by object type. 1. 2. To send an object or an instance to a destination Go to the Objects management area of the CMC. Select the check boxes for the objects that you want to send. To send an instance of the object, click the link for the object. Click the History tab, and then select the check boxes for the instances you want to send. Select only instances with a status of Success or Failed. Instances with a status of Recurring or Pending are scheduled and do not contain any data yet. 3. 4. Click Send to. The Send to page appears. Deselect Clean up temporary objects created after objects have been sent if you want to keep temporary instances that are created when you send an object or instance. By default, this option is selected and the system deletes any temporary objects or instances after they have been sent. 5. Select the destination option you want:
Each selected objects scheduling destination Sends the objects or instances to the destination specified on the Destination pages for the objects. A new destination for all selected objects Allows you to specify a destination. If you select this option, you must specify additional parameters for the destination information. See Available destinations by object type on page 152 and Selecting a destination on page 207. If you want the destination to become the default destination for the object, select the Set this destination as the selected objects scheduling destination option. The system will update the destination information for the object when you click Send. Note: Send Web Intelligence documents to the Inbox destination only, or to an Email destination configured within BusinessObjects Enterprise.
151
10
6.
Click Send. The system sends the selected objects or instances to the specified destinations.
Object type Report Object Package Program Web Intelligence document Desktop Intelligence document OLAP Intelligence documents Excel file Word file PDF file Text file RTF file PowerPoint file Hyperlink
Email (SMTP) FTP Yes Yes Yes File Yes Yes Yes Link Yes Yes Yes Yes
Inbox File Yes Yes Yes Yes Yes Link Yes Yes Yes Yes Yes
152
10
153
10
fails, the object package instance in the History will appear as Failed. If you do not want the object package instance to fail if one of the objects fails, clear the Scheduled package fails upon individual component failure check box. 1. 2. 3. To change the properties of an object In the Objects management area of the CMC, select an object by clicking its link. On the Properties page, change any of the properties as required. Click Update. Note: Once you have clicked Update, you cannot click Reset to undo changes.
154
10
Note: To remove an object from a category, see Removing or deleting objects from a category on page 250.
What are report objects and instances? Setting report refresh options Setting report processing options Applying processing extensions to reports Working with hyperlinked reports Viewing the universes for a Web Intelligence document Rights set on Desktop and Web Intelligence documents
For faster navigation, click on the title of the topic you are interested in. Note: Most information in this section also applies to Web Intelligence document objects. Any exceptions have been identified.
155
10
Typically, report objects are designed such that you can create several instances with varying characteristics. For example, if you run a report object with parameters, you can schedule one instance that contains report data that is specific to one department and schedule another instance that contains information that is specific to another department, even though both instances originate from the same report object. For more information about scheduling, see Chapter 11: Scheduling Objects. Object instances At the specified time, the system runs the object and creates an object instance. The instance contains actual data from the database. It appears on the History page of the object and has a status of Success or Failed. Making changes to an object Any changes you make to an object (by making the changes and then clicking Update) affect the default settings for the object only. Those changes do not affect any existing scheduled instances or object instances. The next time you schedule the object, whether you use CMC or an application such as InfoView, the new default settings are displayed. You can then change these settings as needed for the scheduled instance you want to create. Note: BusinessObjects Enterprise supports reports created in versions 6 through XI of Crystal Reports. Once published to BusinessObjects Enterprise, reports are saved, processed, and displayed in version XI format.
156
10
If a prompt appears in both the source .rpt and the report object and you have selected the Prompt Values option, then BusinessObjects Enterprise updates the default value of the prompt in the report object. Any changes that you have made to the default value of the parameter in BusinessObjects Enterprise are overwritten. To preserve your changes to the values of report elements when you refresh a report, clear the appropriate report refresh option.
If you select Prompt Values, BusinessObjects Enterprise ensures that changes to either the default value of a prompt or to the current value of a prompt are updated in the report object when the report is refreshed. If you select Prompt Options, BusinessObjects Enterprise ensures that changes to the metadata describing a prompt is updated in the report object. For example, Can be null is a prompt option. If you select Use Object Repository when refreshing report, repository objects in the report object will be refreshed against the repository. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide. To set a report objects refresh options In the Objects management area of the CMC, select a report object by clicking its link. On the Properties page, click the Refresh Options link. Choose the report elements that you want to refresh from the source report file. Click Refresh Report.
1. 2. 3. 4.
Setting report viewing options Specifying default servers Changing database information Updating parameters Updating prompts for Web Intelligence document objects Using filters Setting printer and page layout options Processing extensions
157
10
For faster navigation, click on the title of the topic you are interested in.
If you specify which servers a report uses for viewing, you can use perserver settings to standardize data sharing settings for groups of reports, and centrally administer these settings. (See Specifying default servers on page 159.) Per-report settings permit you to specify that particular reports will not share data. They also allow you to tailor the data sharing interval for each report to meet the needs of that reports users. In addition, per-report settings enable you to decide on a report-by-report basis whether it is appropriate to allow users to access the database whenever they refresh reports.
Data sharing may not be ideal for all organizations, or for all reports. To get full value from data sharing, you must permit data to be reused for some period of time. This means that some users may see old data when they view a report on demand, or refresh a report instance that they are viewing. The default report viewing options for BusinessObjects Enterprise emphasize data freshness and integrity. By default, when you add a report to BusinessObjects Enterprise it is configured to use per-server settings for report sharing. The default server settings ensure that users always receive up-to-date information when they refresh a report, and guarantee that the oldest data given to any user is 0 minutes old. If you choose to enable perreport settings, the default settings allow data sharing, allow a viewer refresh to retrieve fresh data from the database, and ensure that the oldest data given to a client is 5 minutes old.
158
10
Tip: Disabling the sharing of report data between clients is not the same as setting the Oldest on-demand data given to a client to 0 minutes. Under high load, your system may receive more than one request for the same report instance at the same time. In this case, if the data sharing interval is set to 0 but the Share report data between clients option is enabled, BusinessObjects Enterprise shares data between the client requests. If it is important that data not be shared between different clients (for example, because the report uses a User Function Library (UFL) that is personalized for each user), disable data sharing for that report. For details on setting report viewing options on a per-server basis, see the BusinessObjects Enterprise Deployment and Configuration Guide. For more information on configuring BusinessObjects Enterprise to optimize report viewing in your system, see the planning chapter in the BusinessObjects Enterprise Installation Guide. Note: This feature does not apply to Web Intelligence document objects. 1. 2. 3. 4. To set report viewing options for a report In the Objects management area of the CMC, select a report by clicking its link. Click the Process tab. In the Data Refresh for Viewing area, click Use report specific viewing settings. Then select the options that you want to set for this report. Click Update.
Give preference to servers belonging to the selected group (and, if the servers from that group are not available, use any available server).
159
10
Select a server group from the list. This option will attempt to process the object on the servers that are found within your server group. If the specified servers are not available, then the object will be processed on the next available server.
Only use servers belonging to the selected group This option ensures that BusinessObjects Enterprise will use only the specified servers that are found within the selected server group. If all of the servers in the server group are unavailable, then the object will not be processed.
Depending on the type of object, BusinessObjects Enterprise uses the following servers:
Crystal reports run on the Report Job Server. Desktop Intelligence documents run on the Desktop Intelligence Report, Job and Cache Servers. Web Intelligence documents run on the Web Intelligence Report Server.
By selecting a particular server or server group, you can balance the load on your system by processing specific objects on specific job servers. You must first create server groups by using the Server Groups management area in the CMC, before you can select servers that belong to a selected group. Note:
If you choose the Use the first available server option, the Central Management Server (CMS) will check the job servers to see which one has the lowest load. The CMS does this by checking the percentage of the maximum load on each job server. If all of the job servers have the same load percentage, then the CMS will randomly pick a job server. You can also set the maximum number of jobs that a server will accept. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide. If you are scheduling a program object that requires access to files stored locally on a Program Job Server, but you have multiple Program Job Servers, you must specify which server to use to run the program. To specify default servers for processing an object In the Objects management area of the CMC, select an object by clicking its link. Click the Process tab. In the Default Servers To Use For Scheduling area, choose one of the server options.
1. 2. 3.
160
10
4.
If the object is a report object or a Web Intelligence document, choose one of the server options in the Default Servers To Use For Viewing and Modification area. If the object is a Desktop Intelligence document, choose one of the server options in the Default Servers to Use For Processing area and in the Default Servers to Use For Caching area.
5.
Click Update.
Prompt the user for database logon The system will prompt users for a password when they refresh a report.
161
10
Note: This option has no effect on a scheduled instance. Also, BusinessObjects Enterprise only prompts users when they first refresh a report; that is, if they refresh the report a second time, they will not be prompted. Use SSO context for database logon The system will use the users security context, that is, the users logon and password, to log on to the database. Note: For this option to work, you must have your system configured for end-to-end single sign-on, or for single sign-on to the database. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide. Use same database logon as when report is run The system will use the same database logon information as was used when the report was run on the job server.
6.
Click Update.
Updating parameters
Note: This feature does not apply to Desktop Intelligence and Web Intelligence document objects. Parameter fields (with preset values) enable users to view and to specify the data that they want to see. If a report contains parameters, you can set the default parameter value for each field or fields (which is used whenever a report instance is generated). Through a BusinessObjects Enterprise application such as InfoView, your users are either able to use the report with the preset default value(s) or choose another value or values. If you do not specify a default value, users will have to choose a value when they schedule the report. Note: The Parameters link is available only if the report object contains parameters. 1. 2. 3. To view parameter settings In the Objects management area of the CMC, select a report object by clicking its link. Click the Process tab, and then click the Parameters link. The Parameters page appears. Under the Value column, select the value associated with the parameter you want to change.
162
10
A page opens that allows you to change the parameter value. Depending on the parameter value type, you either type a value in the field or choose a value from a list. If there is a list, you can also click Edit to type a new value. 4. 5. Select the Clear the current parameter value(s) check box if you want to clear the current value that is set for the specified parameter. Select the Prompt the user for new value(s) when viewing check box if you want your users to be prompted when they view a report instance through a BusinessObjects Enterprise application such as InfoView. Click Update.
6.
Using filters
Note: This feature does not apply to Desktop Intelligence and Web Intelligence document objects. Alternatively, you can use profiles to personalize views of the data. For more information, see Chapter 14: Managing Profiles.
163
10
In the Filters page, you set the default selection formulas for the report. Selection formulas are similar to parameter fields in that they are used to filter results so that only the required information is displayed. Unlike parameters, end users will not be prompted for selection formula values when they view or refresh the report. When users schedule reports through a web-based client such as InfoView, they can choose to modify the selection formulas for the reports. By default, if any formulas are set in the CMC, they will be used by the web-based client. For more information on selection formulas, see the Crystal Reports Users Guide. In addition to changing selection formulas, if you have developed your own processing extensions, you can select the processing extensions that you want to apply to your report. For more information, see Applying processing extensions to reports on page 168. When you use filters in conjunction with processing extensions, a subset of the processed data is returned. Selection formulas and processing extensions act as filters for the report. 1. 2. 3. To use filters In the Objects management area of the CMC, select a report object by clicking its link. Click the Process tab, and then click the Filters link. The Filters page appears. Update or add new selection formulas.
Record Selection Formula Use the Record Selection Formula to create or edit a record selection formula or formulas that limit the records used when you or a user schedules a report.
Group Selection Formula Use the Group Selection Formulas to create or edit a group selection formula or formulas that limit the groups used when you or a user schedules a report.
4.
In the processing extensions area, select a processing extension you want from the Available Processing Extensions list, and move it to the Use these Processing Extensions list. Repeat this step until you have selected the processing extensions you want.
5.
Click Update.
164
10
Specifying a printer
Note: This feature does not apply to Web Intelligence document objects. You can choose to print a report (each time it runs) using the Job Servers default printer or a different printer. By selecting the Printer destination, BusinessObjects Enterprise prints your report after it is processed. Note: The Job Server must run under an account that has sufficient privileges to access the printer you specify. See the BusinessObjects Enterprise Deployment and Configuration Guide for information on changing the server user account. 1. 2. 3. To assign a printer In the Objects management area of the CMC, select a report object by clicking its link. On the Process tab, click the Print Setup link. The Print Setup page appears. Select Print in Crystal Reports format using the selected printer when scheduling if you want report instances to be sent directly to a printer. The report instances are automatically sent to the printer in Crystal Reports format. This does not interfere with the format selected when scheduling the report. 4. 5. Leave Default printer selected if you want to print to the Job Servers default printer, otherwise, select Specify a printer. Enter a printers path and name, select the number of copies, and choose the print page range. If your job server is using Windows, in the Specify a printer field, type:
\\printserver\printername
165
10
Where printserver is the name of your printer server, and printername is the name of your printer. If your job server is running on UNIX, in the Specify a printer field, type the print command that you normally use. For instance, type:
lp -d printername
Note: Ensure that the printer you are using (on UNIX) is shown and not hidden. 6. Click Update.
Report file default Choose this option if you want the page layout to conform to the settings that were chosen for the report in Crystal Reports.
166
10
Specified printer settings Choose this option if you want the page layout to conform to the settings of a specified printer. You can choose the Job Servers default printer or another printer. For information about specifying another printer, see Specifying a printer on page 165. When you choose this option, you can print scheduled report instances only to the printer you specify in the Specified printer settings area. In other words, you cannot set your report to display with one printers setting and then print to a different printer.
Custom settings Choose this option if you want to customize all page layout settings. You can choose page orientation, page size, measurement units (inches or millimeters), page width, and page height.
4.
Click Update.
Processing extensions
BusinessObjects Enterprise offers you the ability to further secure your reporting environment through the use of customized processing extensions. A processing extension is a dynamically loaded library of code that applies business logic to particular BusinessObjects Enterprise view or schedule requests before they are processed by the system. Note: On Windows systems, dynamically loaded libraries are referred to as dynamic-link libraries (.dll file extension). On UNIX systems, dynamically loaded libraries are often referred to as shared libraries (.so file extension). You must include the file extension when you name your processing extensions. Through its support for processing extensions, the BusinessObjects Enterprise administration SDK essentially exposes a handle that allows developers to intercept the request. Developers can then append selection formulas to the request before the report is processed. A typical example is a report-processing extension that enforces row-level security. This type of security restricts data access by row within one or more database tables. The developer writes a dynamically loaded library that intercepts view or schedule requests for a report (before the requests are processed by the Job Server, Page Server, or Report Application Server). The developers code first determines the user who owns the processing job; then it looks up the users data-access privileges in a third-party system. The code then generates and appends a record selection formula to the report in
167
10
order to limit the data returned from the database. In this case, the processing extension serves as a way to incorporate customized row-level security into the BusinessObjects Enterprise environment. Tip: In BusinessObjects Enterprise XI, you can also set and enforce rowlevel security through the use of Business Views. For more information, see the Business Views Administrator's Guide. The CMC provides methods for registering your processing extensions with BusinessObjects Enterprise and for applying processing extensions to particular object. For details, see Applying processing extensions to reports on page 168. By enabling processing extensions, you configure the appropriate BusinessObjects Enterprise server components to dynamically load your processing extensions at runtime. Included in the SDK is a fully documented API that developers can use to write processing extensions. For more information, see the developer documentation available on your product CD. In the current release, processing extensions can be applied only to Crystal report (.rpt) objects.
168
10
directory. Tip: It is possible to share a processing extension file. For details, see Sharing processing extensions between multiple servers on page 171. Depending upon the functionality that you have written into the extension, copy the library onto the following machines:
If your processing extension intercepts schedule requests only, copy your library onto each machine that is running as a Job Server. If your processing extension intercepts view requests only, copy your library onto each machine that is running as a Page Server or RAS. If your processing extension intercepts schedule and view requests, copy your library onto each machine that is running as a Job Server, Page Server, or RAS.
Note: If the processing extension is required only for schedule/view requests made to a particular Server Group, you need only copy the library onto each processing server in the group. 1. 2. 3. 4. To register a processing extension with the system Go to the Objects management area of the CMC. Click Object Settings. The Object Settings page appears. In the Name field, type a display name for your processing extension. In the Location field, type the file name of your processing extension along with any additional path information:
If you copied your processing extension into the default directory on each of the appropriate machines, just type the file name (but not the file extension).
169
10
If you copied your processing extension to a subfolder below the default directory, type the location as: subfolder/filename
Note: Although the actual file name must include the .dll or .so extension (as appropriate to the servers operating system), you must not include the file extension in the Location field. 5. 6. Use the Description field to add information about your processing extension. Click Add. You can now select this processing extension to apply its logic to particular objects. For details, see Selecting a processing extension for a report on page 170. Tip: To delete a processing extension, select its check box and click Delete. (Make sure that no recurring jobs are based on this processing extension because any future jobs based on this processing extension will fail.)
170
10
On Windows, use the CCM to stop the server. Then open the servers Properties to modify the command line. Start the server again when you have finished. On UNIX, run ccm.sh to stop the Job Server/Page Server. Then edit ccm.config to modify the servers command line. Start the server again when you have finished.
171
10
client, server-side viewers) included in BusinessObjects Enterprise XI. By linking directly from one object to another, the required data context is passed automatically so that you navigate to the object and data that is relevant. Initially, when you add hyperlinks between reports in Crystal Reports, you create a link from one file directly to another. However, when you publish linked report files simultaneously to the same object package, the links are modified to point to managed report objects. (Each link is changed, so that it references the appropriate destination report by Enterprise ID, rather than by file path.) Also, the modified links become relative inside the object package. When you schedule the object package, BusinessObjects Enterprise processes its reports, and again modifies hyperlinks within each report instance: hyperlinks between report objects in an object package are converted to hyperlinks between report instances in a specific instance of the object package. For more information on object packages, see Scheduling objects using object packages on page 198. To view hyperlinked reports, you must publish both the home and destination reports to the same BusinessObjects Enterprise system. (A home report is one that contains a hyperlink to another report: the destination report.) Note: For information about how to create hyperlinks between report objects, see the Crystal Reports Online Help.
Crystal Reports automatically determines what type of linkrelative or absoluteto establish between the reports. In BusinessObjects Enterprise, relative links are those between reports in the same object package, and absolute links are links to specific report objects or instances.
172
10
173
10
click the Preferences button in the upper-right corner of the CMC, and select the appropriate viewer from the Viewer list. For information on how to change your preferred viewer, see the BusinessObjects Enterprise Users Guide. Parameter information is not carried over between the home and destination reports. That is, when you view a destination report by clicking a hyperlink in a home report, you are prompted to enter any parameters that the destination report requires.
Security considerations
To view hyperlinked reports through BusinessObjects Enterprise, you must have the appropriate rights both in BusinessObjects Enterprise and at the database level. In BusinessObjects Enterprise, to view a destination report through a hyperlink in a home report, you must have View rights to the destination report. When the hyperlink points to a report object, you must have View On Demand rights to be able to refresh the data against the data source. For information about setting the levels of access to objects, see Access levels on page 64. Database logon information is carried over between hyperlinked reports. If the credentials you specified to view the home report are not valid for the destination report, you are prompted for a valid set of database logon credentials for the destination report.
The Universes page appears, listing the universes that are used by the document.
174
10
Description
Log on to Desktop Intelligence Allows users to view Desktop Intelligence and view this object in the documents when they log in to the CMC CMC Edit this object Allows users to edit the properties of the Desktop Intelligence document
Modify the rights users have to Allows users to modify any right, for any this object user on the Desktop Intelligence object Securely modify rights users have to objects Allows users to grant or deny for other users only those rights that they themselves have been granted on the Desktop Intelligence document Allows users to create new Desktop Intelligence documents (.rep) Allows users to create Desktop Intelligence templates Allows users to use existing Desktop Intelligence templates for creating new documents Allows users to save Desktop Intelligence document Allows users to save Desktop Intelligence documents that are available to all users Allows users to interact with Desktop Intelligence document Allows users to interact with Desktop Intelligence report Allows users to refresh Desktop Intelligence document Allows users to print document
Desktop Intelligence Create Desktop Intelligence Documents Create Templates Use Templates
Save Desktop Intelligence Documents Save documents for all users Desktop Intelligence Document Interaction Desktop Intelligence Report Interaction Refresh Desktop Intelligence Document Print Documents
175
10
The right to: Copy to Clipboard Euro Converter Edit Euro Converter Rate Drill Through Edit Scope of Analysis Work in Drill Mode Work in Slice-and-Dice Mode Edit VBA Code Run VBA Code Install Add-Ins Manage All Corporate Categories Manage My Corporate Categories Refresh Document List and Categories
Description Allows users to copy selected information to clipboard Allows users to access the Euro Converter Allows users to edit the exchange rate in the Euro Converter Allows users to drill through on Desktop Intelligence documents Allows users to edit the scope of analysis Allows users to interact and work while in drill mode Allows users to interact and work while in slice and dice mode Allows users to edit VBA code associated with a Desktop Intelligence document Allows users to run VBA code Allows users to install Desktop Intelligence add-ins Allows users to manage all corporate categories Allows users to manage their own corporate categories Allows users to refresh document list and categories
Send Documents to Repository Allows users to send Desktop Intelligence documents to repository - Input FRS Send Documents to Mail Retrieve Documents Allows users to send Desktop Intelligence documents to inbox Allows users to retrieve Desktop Intelligence documents from the managed system Allows users to create new and edit existing connection objects Allows users to edit data provider information Allows users to edit free-hand SQL if freehand SQL has been granted
Create and Edit Connections Data Provider Manipulation Edit Free-Hand SQL
176
10
The right to: Use Free-Hand SQL Edit Personal Data Files
Description Allows users access to free-hand SQL Allows users to edit any personal data files if use of personal data files has been granted Allows users to use personal data files Allows users to edit any stored procedures if use of stored procedures has been granted Allows users to use stored procedures Directs Desktop Intelligence document always to regenerate the associated SQL Allows users to edit the SQL used in the query Allows users to use commands other than SELECT in the query SQL Allows users to view the associated SQL Allows users to edit Desktop Intelligence document queries if granted use of queries Allows users to use queries with Desktop Intelligence documents Allows users to edit the list of values associated if granted access to use list of values Allows users to use list of values when processing Desktop Intelligence documents Allows users to refresh the list of values if granted access to use list of values Allows users to use user-defined objects
Use Stored Procedures Always Regenerate SQL Edit Query SQL Use other SQL requests than Select View SQL Edit Queries Use Queries Edit List of Values
Description
Log on to Web Intelligence and Allows users to view Web Intelligence view this object in the CMC documents when they log in to the CMC
177
10
Description Allows users to edit the properties of the Web Intelligence document
Modify the rights users have to Allows users to modify any right, for any this object user on the Web Intelligence object Securely modify rights users have to objects Allows users to grant or deny for other users only those rights that they themselves have been granted on the Web Intelligence document Allows interactive viewing if there is a license present that permits this functionality Allows use of Web Intelligence HTML Report Panel Allows use of Web Intelligence Java Report Panel Extends the reports scope of analysis Allows drill through in the report Allows a users to create a new Web Intelligence document Allows use of and show the formula toolbar in Java Report Panel Enables the toolbar and associated menu items for formatting when in interactive mode Enables the toolbar and associated menu items for formula when in interactive mode Enables the contextual (right-click) menu when in interactive mode Enables the display of document structure and filters in the left pane when in interactive mode Enables list of available objects, tables and filters in the left pane when in interactive mode Allows users to edit the report SQL in the Java Report Panel
Web Intelligence Enable interactive HTML viewing (if license permits) Enable Query - HTML Enable Java Report Panel Extend scope of analysis Enable drill mode Create document Java Report Panel: Enable formula toolbar Interactive: Formatting Enable toolbar and menus Interactive: Formula - Enable toolbar and variable creation Interactive: General - Enable right click menu Interactive: Left pane - Enable document structure and filters Interactive: Left pane - Enable available objects, tables and charts Java Report Panel: Edit SQL
178
10
The right to: Merge dimensions for synchronization Enable HTML Report Panel Interactive: General - Edit 'My Preferences' Interactive: Left pane - Enable document summary Interactive: Left pane - Enable data summary
Description Enables the merging of dimensions to allow for synchronization of dimensions Enables the HTML Report Panel Allows users to access and edit their preferences - My Preferences, when in interactive mode Displays the document summary in the left pane when in interactive mode Enables the document data summary in the left pane when in interactive mode
Interactive: Reporting - Create Allows users to create and/or edit the report and edit report filter filter when in interactive mode Interactive: Reporting - Create Allows users to create and/or edit report sort and edit sort when in interactive mode Interactive: Reporting - Create Allows users to create and/or edit break and edit break points when in interactive mode Interactive: Reporting - Create Allows users to create and/or edit and edit predefined calculation predefined calculations when in interactive mode Interactive: Reporting - Apply and remove existing alerters Interactive: Reporting - Insert report, table, chart and cell Allows users to create and/or edit existing report alerters when in interactive mode Allows users to insert reports, tables charts and/or cells into a report when in interactive mode
Interactive: General - Ability to Allows users to hide and/or show toolbars hide / show toolbars when in interactive mode
What are program objects and instances? Setting program processing options
For faster navigation, click on the title of the topic you are interested in.
179
10
Program types
Three types of applications can be published to BusinessObjects Enterprise as program objects: Executable Executable programs are binary files, batch files, or shell scripts. They generally have file extensions such as: .com, .exe, .bat, .sh. You can publish any executable program that can be run from the command line on the machine that runs the Program Job Server. Java You can publish any Java program to BusinessObjects Enterprise as a Java program object. For Java program objects to have access to Java SDK objects, your class must implement the IProgramBase interface from the BusinessObjects Enterprise Java SDK (com.businessobjects.sdk.plugin.desktop.program.IProgramBase). For details, see the BusinessObjects Enterprise Java SDK Guide. Script Script program objects are JScript and VBScript scripts. They are run on Windows using an embedded COM object and canonce published reference the BusinessObjects Enterprise SDK objects. For details, see the BusinessObjects Enterprise COM SDK Guide. Note: Script program objects are not supported on UNIX.
180
10
Note: As the administrator, you can choose to enable or disable any of the types of program objects. For details, see Authentication and program objects on page 186. Once you have published a program object to BusinessObjects Enterprise, you can configure it in the Objects management area of the CMC. For each type of program object (Executable, Java, or Script) you can choose to specify command-line arguments and a working directory. For executable and Java programs, there are additional ways, both required and optional, to configure the program objects and provide them with access to other files. Tip: Program objects allow you to write, publish, and schedule scripts or Java programs that run against BusinessObjects Enterprise, and perform maintenance tasks, such as deleting instances from the history. Furthermore, you can design these scripts and Java programs to access BusinessObjects Enterprise session information. This ensures that the scheduled program objects retain the security rights or restrictions of the user who scheduled the job. (Your scripts or java programs require access to the BusinessObjects Enterprise SDK. For details, see the BusinessObjects Enterprise COM SDK Guide or the BusinessObjects Enterprise Java SDK Guide.)
Specifying command-line arguments Setting a working directory for a program object Configuring executable programs Configuring Java programs Authentication and program objects
For faster navigation, click on the title of the topic you are interested in.
181
10
2. 3.
Click the Process tab, then click the Parameters link. The Parameters page appears. In the Arguments field, type the command-line arguments for your program, using the same format you would use at the command line itself. For example, if your program has a loops option, to set the loops value to 100, you might type -loops 100
4.
Click Update.
182
10
1. 2. 3. 4.
To modify the default working directory for the Program Job Server Go to the Servers management area of the CMC. Click the link for Program Job Server. The Properties page appears. In the Temp Directory field, type the full path to the directory you want to set as the working directory for the Program Job Server. Click Update.
Configure the object to have access to external or auxiliary files. See Providing Java programs with access to other files on page 185. Customize environment variables for the shell in which BusinessObjects Enterprise runs the program. See Specifying environment variables on page 184.
If a required file is on the same machine as the Program Job Server, you can specify the full path to the file. Alternatively, if the file is not located on the Program Job Server, you can upload the file to the File Repository Server, which will pass the files to the Program Job Server as necessary. To specify paths to required files In the Objects management area of the CMC, select the executable program object by clicking its link. Click the Process tab, then click the Parameters link. The Parameters page appears. In the External Dependencies field, type the full path to the required file and click Add. Repeat step 3 for each file required. Click Update.
1. 2. 3. 4. 5.
Tip: To edit or remove external dependencies that you have specified, select the file path (in the list of external dependencies on the Parameters page) and click the appropriate button, either Edit or Remove.
183
10
1. 2. 3. 4. 5.
To upload required files In the Objects management area of the CMC, select the executable program object by clicking its link. Click the Process tab, then click the Auxiliary Files link. The Auxiliary Files page appears. Click Browse to navigate to the required file, then click Add File. Repeat step 3 for each required file. Click Update.
Tip: To remove auxiliary files that you have specified, select the file(s) (in the list of external dependencies on the Parameters page) and click Remove File(s).
Note: BusinessObjects Enterprise sets your environment variables using the syntax that is appropriate for your operating system. However, on UNIX you must follow convention, and use the appropriate case. For example, all name values on UNIX must be typed in upper-case. 4. Click Update. Tip: To edit or remove environment variables that you have specified, select the variable (in the list of environment variables on the Parameters page), and click the appropriate button, either Edit or Remove.
184
10
185
10
You must separate multiple paths with the classpath separator that is appropriate to your operating system: a semi-colon for Windows, a colon for UNIX. 4. Click Update.
186
10
1. 2. 3. 4.
To specify a user account for a program object In the Objects management area of the CMC, click the link for the program object. Click the Process tab, then click the Logon link. The Logon page appears. In the User Name and Password fields, type the credentials for the user account under which the program should run. Click Update.
The settings for the Java Policy are universal for all Program Job Servers running on the same machine. By default, the Java Policy File is installed to the Java SDK directory in the BusinessObjects Enterprise install root directory. For example, a typical location on Windows is: C:\Program Files\Business
Objects\BusinessObjects Enterprise 11.5\conf\crystal-program.policy
What are object packages, components, and instances? Creating an object package
187
10
Adding objects to an object package Configuring object packages and their objects Authentication and object packages
For faster navigation, click on the title of the topic you are interested in.
188
10
3. 4. 5.
In the Title field, type the name of the object package you want to create. In the Description field, type a description of the object package. This field is optional. Ensure the correct folder name appears in the Destination field. Note: You cannot place object packages in the top level folder or inside other object packages. Tip: To expand a folder, select it and click Show Subfolders.
6.
Click Submit. Note: When the object package has been added to the system, the CMC displays the Properties page. You can now modify the properties, contents, scheduling information, destination, user rights, object settings, and notification for the object package.
189
10
5. 6.
Specify the file name or, or click browse to navigate to the object you want to publish. Set the appropriate properties.
7.
For reports, set whether to generate a thumbnail for the report, and whether to use the Object Repository when refreshing the report. For programs, set the program type: Executable, Java, or Script.
Click OK.
General object management on page 144 Report object management on page 155 Program object management on page 179 Object package management on page 187
Configuration tabs and links Properties tab Refresh Options Links History tab
190
10
Configuration tabs and links Process tab Database Parameters Filters Print Setup Schedule tab Notification Alert Notification Format Destination Schedule For Categories tab Corporate Personal Rights tab
Configure for an object package Scheduling server ----yes ---yes yes n/a yes yes yes
Configure for individual objects in a package View & Modify server yes yes yes yes -yes yes yes --n/a yes yes --
191
10
192
Scheduling Objects
chapter
11
Overview
This section provides information on scheduling objects. It provides detailed instructions for scheduling objects individually and in batches, and scheduling with events. It also describes distributing objects, specifying schedule notifications, and managing instances. This section covers the following topics:
Scheduling overview Setting the scheduling options Managing instances Using Calendars Managing events
For faster navigation, click on the title of the topic you are interested in.
Scheduling overview
Scheduling is a process which allows you to run an object automatically at specified times. When you schedule an object, you choose the recurrence pattern that you want and specify additional parameters to control exactly when and how often the object will be run. At the time you schedule an object, the system creates a scheduled instance. Although a scheduled instance appears on the History page of a respective object (with a status of Recurring or Pending), it contains solely object and schedule informationit does not contain any data. When the system runs the object, it creates an output instance for the object (for example, a report or program instance). A report instance contains actual data from the database. A program instance is a text file that contains the standard output and standard error produced when the program object was run. Output instances also appear on the History page of an object and have a status of Success or Failed. For end users to schedule and run objects, they must use a web-based client such as InfoView or a custom web application. InfoView is designed primarily to schedule objects and view reports, whereas CMC enables you to manage and administer objects in addition to scheduling objects and viewing reports.
194
11
Which run options and parameters are available depends on the recurrence pattern you selected. In many cases the same parameters appear, such as start and end dates. The names of the recurrence patterns, options, and fields are generally self explanatory, but for a complete description, see:
Recurrence patterns on page 196 Run options and parameters on page 196
195
11
Recurrence patterns
When scheduling an object, you can choose from the recurrence patterns summarized by Table 11-1: Recurrence patterns.
Table 11-1: Recurrence patterns
Description
The object will be run only when a user requests it to be run.
The object will be run only once. It can be run now or in the future, or when a specified event has occurred. The object will be run every hour. You specify at what time it will start, as well as a start and end date. The object will be run every day. It can be run once or several times a day. You can specify at what time it will run, as well as a start and end date. The object will be run every week. It can be run once a week or several times a week. You can specify on which days and at what time it will run, as well as and a start and end date. The object will be run every month or every several months. You can specify on which days of the month and at what time it will run, as well as a start and end date. The object will be run on the dates specified in a calendar that has previously been created. For more information see Using Calendars on page 221.
Weekly
Monthly
Calendar
Description This list always appears, but the options vary depending on which recurrence pattern you select. For example, if you select Daily, you can select to run the object Once each day or Every X day(s). If you select Monthly, you can select to run the object On the Nth day of the month or On the first Monday of the month. To see all the Run options for a recurrence pattern, refer to the software.
196
11
Run option
Description
X and N variables Applies to certain Daily and Monthly recurrence patterns only. When you select a Run option that contains these variables, the system displays their default values. You can then changes these values as needed. For example, if you select the Daily recurrence pattern and the Every X hour(s), N minute(s) Run option, you could specify to run the report every 4 (X) hours and 30 (N) minutes. If you dont change the X or N value, the system will run the report every hour. Applies to most, but not all recurrence patterns and Run options. The default is the current date and time. The system will run the object according to the schedule that you specified, as soon as it can, after the Start Date has passed. For example, if you specify a start date that is three months into the future, the system wont run the object until the start date has passed, even if all the other criteria are met. After that, the system will run the report at the specified time. End Date Applies to most, but not all, recurrence patterns and Run options. The default is the current time and a date in the distant future, to ensure an object will be run indefinitely. Specify a different End Date if required. Once the End Date has passed, the system no longer runs the object. Applies to all Run options that include with events. Select an event and click the Add button to move it to the Events to wait for box. You can select one or several events. The system will run the object only when those events have been successfully completed. See also Scheduling an object with events on page 200. Applies to all Run options that include with events. Select an event and click the Add button to move it to the Events to trigger on completion box. You can select one or several events. A successful run of the object will trigger the events that you specified. This list of events contains schedule events only. You cannot trigger file or custom events. See also Scheduling an object with events on page 200, and Managing events overview on page 229. Always applies. The number of times the system attempts to process an object if the first attempt is not successful. By default, the number is zero.
Start Date
Available Events
197
11
Description Always applies. The period, in seconds, that the system will wait before it attempts to process the object again if the first attempt is unsuccessful.
Scheduling objects
1. 2. 3. To schedule an object In the Objects management area of the CMC, select an object by clicking its link. Click the Schedule tab. The Schedule page appears, showing the default settings for the object. Select the recurrence pattern you want. For example, select Weekly. For a list and descriptions of the recurrence patterns, see Recurrence patterns on page 196. 4. Specify the Run option and parameters that you want. For example, select Every week on and then specify Monday, Wednesday, and Friday. For a list and descriptions of the Run options and parameters, see Run options and parameters on page 196. 5. 6. Set any of the other schedule options and parameters as required. For details, see Setting the scheduling options on page 202. Click Schedule. The system will create a scheduled instance and run it according to the schedule information you specified. You can view the scheduled instance on the History page for the object. For more information, see Managing and viewing the history of instances on page 218. Note: To save the schedule settings as the new default setting for the object, click Update. The new settings on the Schedule tab for the object are saved.
198
11
report and program objects, and Web Intelligence documents. Using object packages simplifies authentication. In terms of reports and Web Intelligence document, it allows users to view synchronized data across instances. This procedure describes how to use the CMC to schedule objects by using object packages. First you publish an object package. Then, you copy existing objects into the object package. Finally, you schedule the object package as you would any object. Alternatively, you can publish objects directly to an object package, and then you can schedule that object packages as you would any object. For details on publishing directly to an object package, and on configuring object packages, see Object package management on page 187. Note: You must configure the processing information of each of the components of an object package individually. For example, if you want a report object in an object package to print when scheduled, you must configure it through the Print Setup link available on the report objects Process tab. For more information, see Configuring object packages and their objects on page 190. Note: For information about publishing hyperlinked report objects, see Working with hyperlinked reports on page 171. 1. 2. To schedule objects using object packages Go to the Objects management area of the CMC. If the object package already exist, skip this step. Otherwise: a. b. c. d. e. f. 3. 4. 5. Click New Object, and then click the Object Package tab. Type the package name and a description. Select a destination for the object package. If you want, assign the object package to a category. Click Submit. Go to the Objects management area of the CMC again.
See also Publishing with the CMC on page 265. Select the check boxes associated with each object you want to place in the object package. Click Copy/Move/Shortcut. The Copy/Move/Create Shortcut page appears. Select Copy to. Note: Existing objects cannot be moved into an object packages; they must be copied to the object package.
199
11
6.
Select the object package you created as the Destination for the objects, and then click OK. Tip: Object packages are indicated by [square brackets]. Tip: To expand a folder, select it and click Show Subfolders. Tip: To search for a specific folder or object package, use the Look For field.
7.
200
11
Note: To schedule an object with events, first ensure that you have created the event. See Managing events on page 228. 1. 2. 3. To schedule an object to run based on events In the Objects management area of the CMC, select an object by clicking its link. Click the Schedule tab. Select the recurrence pattern you want. For example, select Weekly. For a list and descriptions of the recurrence patterns, see Recurrence patterns on page 196. 4. 5. In the Run list, select a run option that contains the words, with events. Select and complete the schedule parameters for your object (scheduling option, Start Date, End Date, and so on). For a list and descriptions of the Run options and parameters, see Run options and parameters on page 196. 6. In the Available Events area, select from the list of events, and click Add. For example, the report object above is set to wait for a Custom-based event to occur before the report is processed. 7. To update the default scheduling information, click Update. If you dont click Update, any changes you made to the scheduling information are not saved. 8. 1. 2. 3. Click the Schedule button to schedule the object. To schedule an object to trigger an event In the Objects management area of the CMC, select an object by clicking its link. Click the Schedule tab. From the list on the left of the page, select a recurrence pattern: Once, Daily, Weekly, Monthly, or by Calendar. For a list and descriptions of the recurrence patterns, see Recurrence patterns on page 196. 4. 5. 6. In the Run list, select a run option that contains the words, with events. Select and complete the schedule parameters for your object (scheduling option, Start Date, End Date, and so on). In the Available Schedule Events area, select from the list of events and click Add. For example, the report object above is set to trigger a Schedule-based event only if the report is successfully processed.
201
11
Note: You can only select schedule-based events in this list. 7. To update the default scheduling information, click Update. If you dont click Update, any changes you made to the scheduling information are not saved. 8. Click the Schedule button to schedule the object.
Scheduling objects Setting notification for an objects success or failure Specifying alert notification Selecting a destination Choosing a format Scheduling an object for a user or group Selecting cache options for Web Intelligence documents
For faster navigation, click on the title of the topic you are interested in.
202
11
Report objects, Desktop Intelligence document objects, and Web Intelligence document objects A report instance or document object instance runs successfully if it doesnt encounter any errors while processing the object or accessing the database. An instance may fail if the user does not provide the correct parameters or logon information.
Program objects For program objects, the program must run in order to succeed. If the program does not run, the instance is considered a failure. If the program runs, but does not perform the tasks it is supposed to, it is still considered a successful instance because the program object ran. BusinessObjects Enterprise does not monitor problems with the program objects code.
Object packages An object package may fail if one of its components fails. To change this setting, click the object packages Properties tab and clear the Scheduled package fails upon individual component failure option. You can also set scheduling options for individual objects within an object package. Note: You cannot set audit or email notification for object packages, but you can set any type of notification for the individual objects in the object package. You can also schedule object packages with events on the Schedule tab. For more information about events, see Schedule-based events on page 231.
About notification
You can set notification at the object level. You can select unique notification options for each object, sending different types of notification for different conditions. For object packages, you can set only event notification, which will trigger an event based on success or failure of the object package. To monitor object successes and failures from a more general perspective, use the auditing functionality within BusinessObjects Enterprise. If notification fails, then the object instance fails. For example, if an email notification sends a message to an invalid email address, then the notification fails and the object instance is recorded as a failure in the objects history. You can choose to notify using:
203
11
Audit notification To use audit notification, you must configure the auditing database and enable auditing for the servers. If you use auditing to monitor your BusinessObjects Enterprise system, you can use audit notification. For more information about configuring the auditing database and enabling auditing, see the BusinessObjects Enterprise Auditors Guide. When you select audit notification, information about the scheduled object is written to the auditing database. You can choose to have a notification sent to the auditing database when the job runs successfully, when it fails to run, or both. Note: For the job servers you can also set audit notification on the Auditing tab.
Email notification You can send an email as a notification of an object instances success or failure. You can choose the sender and recipients of the email message. You can send an email when the instance fails and when it succeeds. For example, you could send your administrator an email if the report fails, but when the report succeeds you can automatically send a notification to everyone who needs the report to let them know it is now available. Note: To enable email notification, you must have the Email SMTP destination enabled and configured on the job servers. For more information, see BusinessObjects Enterprise Deployment and Configuration Guide.
Note: Notification of a scheduled objects success or failure is not the same as alert notification. Alert notification must be built into the design of the report. For example, alert notification can send an email to you whenever a specific value in the report exceeds $1,000,000. In this case, the notification has nothing to do with the contents of the report its just about whether or not the report object instance has failed or succeeded. 1. 2. 3. To set notification for an instances success or failure Select an object in the Objects management area of the CMC. Click the Schedule tab, then click the Notification link. Click the notification type (or types) you want to use. Note: If the notification type is already being used, it will be labelled Enabled. If not, it will be labelled Not in use. 4. Choose specific settings for the notification and click Update.
204
11
To send a record to the auditing database when the job succeeds, select A job has been run successfully. To send a record when the job fails, select A job has failed to run.
Choose whether you want to send a notification when the job fails or when it succeeds. To specify the contents and recipients of the email notification, select Set the vales to be used here and provide the From and To email addresses, the email subject line, and the message. Note: Separate multiple addresses or distribution lists by using semicolons.
Note: By default, the notification is sent to the servers default email destination. For details on how to change the default email settings, see the BusinessObjects Enterprise Deployment and Configuration Guide.
205
11
Note: To enable alert notification, you must have the Email SMTP destination enabled and configured on the job servers. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide. 1. 2. 3. 4. To set alert notification In the Objects management area of the CMC, select a report object by clicking its link. Click the Schedule tab, and then click the Alert Notification link. The Alert Notification page appears. Select the Enable alert notification check box if you want to send an alert notification. Select either Use the Job Servers defaults or Set the values to be used at schedule time here. If you select the first option, BusinessObjects Enterprise will deliver the alert notification using the Job Servers default settings. You can change these settings in the Servers management area. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide. If you select the second option, you can specify the email settings in the software. 5. Type the URL for the viewer in which you want the email recipient to view the report. Alternatively, you can select the default viewer by clicking Use default. The viewer URL appears in the hyperlink that is sent in the alert notification email. You can set the default URL by clicking Object Settings on the main page of the objects management area of the CMC. For more information, see the developer documentation available on your product CD. Note: You must use World Wide Web Consortium (W3C) URL encoding when typing the viewer URL. For example, replace spaces in the path with %20. For more information, see http://www.w3.org/ 6. Type the maximum number of alert records to be included in the alert notification. The hyperlink in the alert notification displays a report page that contains the records that triggered the alert. Use this field to limit the number of records displayed. Tip: The Alert Name and Status fields are set in Crystal Reports. 7. Click Update.
206
11
Selecting a destination
Using BusinessObjects Enterprise, you can configure an object or instance for output to a destination other than the default Output File Repository Server (FRS). When the system runs an object, it always stores the output instance on the Output FRS. Being able to choose an additional destination gives you the flexibility to deliver instances across your enterprise system or to destinations outside your enterprise system. For example, you can set an object to have its output automatically delivered by email to other users. Note: You can also configure object instances to be printed after they have been run. See Setting printer and page layout options on page 165. When you specify a destination other than Default, BusinessObjects Enterprise generates a unique name for the output file or files. To generate a file name, you can use a combination of ID, name or title of the object, owner information, or the date and time information. The following destinations are available:
Default destination support Unmanaged Disk destination support FTP support Email (SMTP) support Inbox support
Note: You can change the destination setting for an object or instance either in the CMC or in InfoView. When you specify the destination settings through the CMC, these settings are also reflected in the default scheduling settings for InfoView. For most objects you can specify any of the available destinations. However, for object packages and Web Intelligence documents you cannot do this, because the recipients must have access to the BusinessObjects Enterprise system to be able to open these types of objects. For example, you cannot specify Unmanaged Disk as a destination for a Web Intelligence document. The following table summarizes which destinations you can configure for which types of objects.
207
11
Object type Report Object Package Program Web Intelligence document Desktop Intelligence document
Unm. DIsk No No -
208
11
Note: The location must be a local or mapped directory on the processing server. For servers using Windows, the location can also be a Universal Naming Convention (UNC) path. Note: The processing server must have sufficient rights to the specified location. 1. 2. 3. 4. To set your destination to unmanaged disk In the Objects management area of the CMC, select an object by clicking its link. Click the Schedule tab, then click the Destination link. The Destination page appears. Select Unmanaged Disk from the Destination list. If you want, select the Clean up instance after scheduling option. When that option is selected, the system automatically deletes the report or program instance from the Output File Repository Server to keep the number of instances on the server to a minimum. 5. Select either Use the Job Servers defaults or Set the values to be used at schedule time here. Note: You can change the default Job Server settings in the Servers management area of the CMC. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide.
Table 11-5: File name properties for scheduled objects summarizes the file name properties and user information you can set to be used at schedule time Note: You can specify a user name and password only for servers using Windows.
6.
.
Click Update.
File name property Destination directory Default File Name (randomly generated)
Description Type a local location, mapped location, or a UNC path. Select this option if you want BusinessObjects Enterprise to generate a random file name.
209
11
Description Select this option if you want to specify a file nameyou can also add a variable to the file name. To add a variable, choose a placeholder for a variable property from the list and click Add. When the instance is run, the variable will be replaced with the specified information from the instance. For example, if you add the variable Owner, when you schedule an object, its file name will include the object owners name. Specify a user who has permission to write files to the destination directory. Type the password for the user.
FTP support
When scheduling objects, you can configure the objects for output to a File Transfer Protocol (FTP) server. To connect to the FTP server, you must specify a user who has the necessary rights to upload files to the server. If you specify an FTP destination, the system will save an output instance to both the Output File Repository Server and the specified destination. If the object is a Web Intelligence document or an object package, you cannot specify FTP as a destination. However, for an object package you can configure the individual objects in the object package for output to FTP. Note: To use a destination, you must have the destination enabled and configured on the job servers. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide. 1. 2. 3. 4. To set an FTP server as the destination In the Objects management area of the CMC, select an object by clicking its link. Click the Schedule tab, then click the Destination link. The Destination tab appears. Select FTP from the Destination list. If you want, select the Clean up instance after scheduling option. When that option is selected, the system automatically deletes the report or program instance from the Output File Repository Server to keep the number of instances on the server to a minimum. 5. Select either Use the Job Servers defaults or Set the values to be used at schedule time here.
210
11
If you select the first option, BusinessObjects Enterprise will schedule an object using the Job Servers default settings. You can change these settings in the Servers management area. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide. If you select the second option, you can set the FTP and file name properties:
Host Enter the FTP host information. Port Enter the FTP port number (the default is 21). FTP User Name Specify a user who has the necessary rights to upload an object to the FTP server. FTP Password Enter the users password. Account Enter the FTP account information, if required. Account is part of the standard FTP protocol, but it is rarely implemented. Provide the appropriate account only if your FTP server requires it.
Destination Directory Enter the FTP directory that you want the object to be saved to. Default File Name (randomly generated) Select this option if you want BusinessObjects Enterprise to generate a random file name. Specified File Name Select this option if you want to enter a file nameyou can also add a variable to the file name. To add a variable, choose a placeholder for a variable property from the list and click Add.
6.
Click Update.
211
11
When you select the Email (SMTP) destination, the system will save the instance to the Output File Repository Server as well as email it to the specified destinations. BusinessObjects Enterprise supports Multipurpose Internet Mail Extensions (MIME) encoding. Note: To use a destination, you must have the destination enabled and configured on the job servers. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide. Note: If the object is a Web Intelligence document, you cannot specify Email (SMTP) as a destination. 1. 2. 3. 4. To send an object by email In the Objects management area of the CMC, select an object by clicking its link. Click the Schedule tab, then click the Destination link. The Destination page appears. Select Email (SMTP) from the Destination list. If you want, select the Clean up instance after scheduling option. When that option is selected, the system automatically deletes the report or program instance from the Output File Repository Server to keep the number of instances on the server to a minimum. 5. Select either Use the Job Servers defaults or Set the values to be used at schedule time here. If you select the first option, BusinessObjects Enterprise will schedule an object using the Job Servers default settings. You can change these settings in the Servers management area. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide. If you select the second option, you can specify the email settings and the file name properties 6.
:
Click Update.
Field From To
Instruction Type a return address Type an address to which you want the object to be sent. If you want to send the object to multiple addresses, use semicolons to separate them.
212
11
Field Cc
Instruction Type an address to which you want to send a copy of the object. If you want to send the object to multiple addresses, use semicolons to separate them. Complete the Subject field. Select Title, ID, Owner, or DateTime, and click Add, to create a placeholder in the subject for the property that you selected. Type a short message, if required. Clear this check box if you do not want a copy of the instance attached to the email. Select this option if you want BusinessObjects Enterprise to generate a random file name. Select this option if you want to enter a file nameyou can also add a variable to the file name. To add a variable, choose a placeholder for a variable property from the list and click Add.
Subject Add placeholder for a variable property Message Attach object instance to email message Default File Name (randomly generated) Specified File Name
Inbox support
When scheduling objects, you can configure objects for output to the inboxes of users. In this case, the system will save the instance to both the Output File Repository Server and the inboxes you specified. Instead of sending the actual file to the inboxes, you can choose to send a shortcut. Note: To use a destination, you must have the destination enabled and configured on the job servers. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide. 1. 2. 3. 4. To send an object to inboxes In the Objects management area of the CMC, select an object by clicking its link. Click the Schedule tab, then click the Destination link. The Destination tab appears. Select Inbox from the Destination list. If you want, select the Clean up instance after scheduling option. When that option is selected, the system automatically deletes the report or program instance from the Output File Repository Server to keep the number of instances on the server to a minimum.
213
11
5.
Use the Job Servers defaults BusinessObjects Enterprise will schedule the object with the job servers default settings. For more information, see the BusinessObjects Enterprise Deployment and Configuration Guide. Set the values to be used at schedule time here BusinessObjects Enterprise will schedule the object with the parameters you specify.
6.
If you selected Set the values to be used at schedule time here, set the parameters for that option, otherwise skip this step: Send Document as
Shortcut: The system will send a shortcut to the instance, rather than send a copy of the instance itself. Copy: The system will send a copy of the instance.
Send List Click Add/Remove, and specify the groups to receive the instance. Tip: Select Add Users to add users to the list. Tip: Select Remove Users to remove users from the list. 7. 8. Click OK. Click Update.
Choosing a format
You can select the format that the document or report instance will be saved in when it is generated. This format will be saved to the destination you have selected. For more information on destinations, see Selecting a destination on page 207. You can select from the formats summarized in Table 11-7: Instance formats.
214
11
Format
Notes
For Excel, Paginated Text, Tab-separated Values, and Character-separated Values, you specify certain formatting properties for the report. For example, if you select Characterseparated Values, you can enter characters for the separator and delimiter; you can also select the two check boxes: Same number formats as in report and Same date formats as in report. If you choose to print the report when it is scheduled (by checking the Print in Crystal Reports format using the selected printer when scheduling check box on the Print Setup page), the report instance is automatically sent to the printer in Crystal Reports format. This does not conflict with the format you select when scheduling the report. The difference between Excel and Excel (Data only) is that Excel attempts to preserve the look and feel of your original report, while Excel (Data only) saves only the data, with each cell representing a field. The Tab-separated Values format places a tab character between values; the Characterseparated Values format places a specified character between values. Each of these two formats produce data lists. In contrast, the Tab-separated Text format attempts to preserve the formatting of the report.
Desktop Intelligence
Crystal Reports
Crystal Reports Microsoft Excel Microsoft Excel (Data Only) Microsoft Word (RTF) Rich Text Editable Rich Text Plain Text Paginated Text Tab-separated Text Tab-separated Values Character-separated Values 1. 2. 3.
To select a format for the report In the Objects management area of the CMC, select a report object by clicking its link. On the Schedule tab, click the Format link. The Format page appears. Select a format from the Format list.
215
11
4. 5.
Complete any fields that appear below the list and select (where appropriate) the check boxes that appear. Click Update.
Crystal reports that are based on Business Views Web Intelligence documents that use Universes
Using the Schedule For feature you can schedule an object and specify for which users you want the system to run the object. The system will run the object and generate multiple instances of the report or document. Each instance will contain data that is relevant to the individual user only.
216
11
For example, you can schedule a sales report and on the Schedule For page you can specify the users names for all your sales representatives. At the specified time, the system runs the report object and generates the individual report instances. Each instance would contain sales information for the individual sales representative only. 1. 2. 3. To change the Schedule For settings for an object In the Objects management area of the CMC, select a report object by clicking its link. On the Schedule tab, click the Schedule For link. The Schedule For page appears. Select who you want to schedule the object for.
4. 5.
Schedule only for myself Schedule for specified users and user groups
If you selected Schedule for specified users and user groups, click Add/Remove. Select one or more users or groups and add them to the Groups to be added to the scheduling list by using the arrow buttons. Tip: Select Add Users to add users to the list. Tip: Select Remove Users to remove users from the list.
6.
Click Update.
Managing instances
To view or manage instances, go to the History page for the object. That page lists the scheduled instances and the output instances for an object:
Scheduled instances will have a status of Recurring or Pending. The system has not yet run these instances, and the instances do not contain any data yet. Output instances, that is, actual report or program instances, will have a status of Success or Failed, which indicate whether they were run successfully:
A report instance contains actual report data. A program instance stores the programs standard out and standard error in a text output file.
From the History page, you can also choose to delete, run, pause, and refresh instances. See Managing and viewing the history of instances on page 218.
217
11
To manage storage space, it is good practice to limit the number of possible instances for an object, or to provide a time limit for the instances. See Setting instance limits for an object on page 220.
Viewing an instance Pausing or resuming an instance Deleting an instance To manage instances In the Objects management area of the CMC, select an object by clicking its link. Click the History tab. The History tab appears. Select an instance or instances by selecting the appropriate check boxes. To select all instances, click the check box in the column heading.
For faster navigation, click on the title of the topic you are interested in. 1. 2. 3.
218
11
Note: To refresh the list, click Refresh. In this case you dont need to select an instance first. 4. Click either Run Now, Pause, Resume, Send to, or Delete. If you click Run Now, the system schedules the object to be run immediately. The scheduled job will have a status of Pending. For information about the Send to button, see Sending an object or instance on page 150.
Viewing an instance
1. 2. 3. To view an instance Select a object in the Objects management area of the CMC. Click the History tab. The History page appears. In the Instance Time column, click the instance you want to view. You can also use the Instance Manager tool to view a list of instances by status or by user. Access the Instance Manager by clicking its link in the Administrative Tools area of the BusinessObjects Enterprise Administration Launchpad.
219
11
Deleting an instance
You can delete instances from an object as needed. You can delete both scheduled instances, which have a status of recurring or pending, and report or program instances, which have a status of success of failed. 1. 2. 3. To delete an instance Go to the History page for an object. Select the check box for the instance or instances you want to delete. Click Delete.
Delete excess instances when there are more than N instances of an object To limit the number of instances per object, select this check box. Then, type the maximum number of instances that you want to remain on the system. (The default value is 100.)
220
11
Delete excess instances for the following users/groups To limit the number of instances for users or groups, click Add/ Remove in this area. Select from the available users and groups and click OK. Then, type the maximum number of instances in the Instance Limit column. (The default value is 100.)
Delete instances after N days for the following users/groups To limit the number of days that instances are saved for users or groups, click Add/Remove in this area. Select from the available users and groups and click OK. Then, type the maximum age of instances in the Maximum Days column. (The default value is 100.)
4.
Click Update.
Using Calendars
This section describes how to create calendars and how you can use them when scheduling objects. This section covers the following topics:
Calendars overview Creating calendars Adding dates to a calendar Deleting calendars Specifying calendar rights
For faster navigation, click on the title of the topic you are interested in.
Calendars overview
Calendars make it easy for you to schedule complex recurring jobs efficiently. A calendar is a customized list of run dates for scheduled jobs. When users schedule objects, they can use a calendar to run the job on a predefined set of dates. By providing calendars for your users, you can create more complex processing schedules than you can with the standard scheduling options. Calendars are particularly useful when you want to run a recurring job on an irregular schedule, or if you want to provide users with sets of regular scheduling dates to choose from. Calendars also allow you to create more complex processing schedules, combining unique scheduling dates with recurring ones.
221
11
For example, if you want a report object to run every business day except for your countrys statutory holidays, you can create a calendar with the holidays marked as non-run days, on which the report object cannot be run. BusinessObjects Enterprise will run the job every day you have specified as a run day in your calendar. You can set up as many calendars as you want in BusinessObjects Enterprise. Calendars you create appear in the Calendar selection list available when you choose to schedule an object using a calendar. When you apply the calendar to a job, BusinessObjects Enterprise runs the job on the run dates as scheduled. You can apply calendars to any object that can be scheduled, including report objects, program objects, and object packages.
Creating calendars
In the CMC, go to the Calendars management area to create new calendars and to modify existing calendars. To create a calendar, you need to provide a name and description. When the calendar is created, you can add run dates to it using the Dates tab. Tip: It is good practice to create a calendar for users to use as a template for creating new calendars. They can copy this template calendar and modify it as necessary. For example, you can create a default Weekdays calendar that includes all days as run dates except weekends and company holidays. 1. 2. 3. 4. To create a calendar Go to the Calendars management area of the CMC. Click New Calendar. On the Properties tab, type a name and description for the new calendar. Click OK. The new calendar is added to the system, and its Properties tab is refreshed. You can now use the Dates tab to add run dates to this calendar. For details, see Adding dates to a calendar on page 222.
222
11
1. 2. 3. 4.
To add dates to a calendar Go to the Calendars management area of the CMC. Click the link for the calendar you want to change. Click the Dates tab. In the Select a calendar displaying format list, choose from one of the five calendar format options. For descriptions of the calendar format options see:
5.
Click the days of the month that you want to include as run days for the calendar. To remove a run day, click the day again. Tip: For the Monthly and Generic Monthly, by Day of Week formats, you can select multiple dates at once by clicking the row or column headings.
6.
To add the new dates to the calendar, click Update. If you added dates using a generic format, the Yearly format will automatically appear, displaying the new dates. Note: When you change an existing calendar, BusinessObjects Enterprise checks all currently scheduled instances in your system. Objects that use the edited calendar are automatically updated to run on the revised date schedule.
Description Yearly displays the calendars run dates for the year. To change the year displayed, you can click the Previous Year and Next Year buttons. To add a date from the Yearly format, click a month to open it in Monthly format, where you can add run dates to specific days. Quarterly displays the calendars run dates for the current calendar quarter. You can change the displayed quarter using the Previous Quarter and Next Quarter buttons. To add a date from the Quarterly format, click a month to open it in Monthly format, where you can add run dates to specific days.
Quarterly
223
11
Description Monthly displays the calendars run dates for the current month. You can change the displayed month using the Previous Month and Next Month buttons. Generic Monthly, by Day of Week allows you to add general recurring dates based on the day of the week. The dates are applied to the months specified between the Start and End Dates. Week 1 starts on the Sunday of the week of the Start Date you specify. Note that this format does not display the currently selected dates from the calendar; it only allows you to add new dates and update the schedule. Generic Monthly, by Day of Month allows you to add general recurring dates based on the day of the month. The dates are applied to the months specified between the Start and End Dates. This format allows you to add new dates and update the schedule; it does not display currently selected dates from the calendar.
Specific dates
To add a specific date to a calendar, use the Yearly, Quarterly, and Monthly formats to add dates to the calendars. The Yearly format displays the run schedule for the entire year. The Quarterly format displays the run dates for the current quarter. You can also view the Monthly format for the calendar, which displays the run dates for the current month. In all three formats, you can change the displayed time range by clicking the previous and next buttons. You can add specific dates in the Monthly calendar format. To add dates for the Yearly and Quarterly calendar formats, click a month to open it in the Monthly format, where you can select specific days as run dates.
224
11
For example, if your company ships products according to an irregular schedule that cannot be defined using the daily or weekly settings, you can create a list of these dates in a Shipping dates calendar. The Shipping department can now check the inventory after each shipment by scheduling a report that uses the calendar to run at the end of each shipping day.
Recurring dates
To create a recurring pattern of monthly run dates, use the generic Monthly formats. You can add the generic dates based on the day of the week or the day of the month. To view existing run dates, you must use the Yearly, Quarterly, or Monthly format; the generic formats are used to add dates to the calendar. Although you can set a recurring schedule using the standard scheduling options, calendars allow you to specify several different recurring run patterns at once. You can also run instances on dates that do not follow the pattern by adding individual days to a calendar. For example, to schedule a report object to run on the first four days of every month, and on the second and fourth Friday of every month, first create a new calendar object and name it. Then, use the Generic Monthly, by Day of Month format to add the first four days of the month to this calendar. When you update the calendar, the Yearly format appears with the new run dates.
225
11
To add every second and fourth Friday to the calendar, use the Generic Monthly, by Day of Week format.
226
11
Deleting calendars
When you delete a calendar, any objects that are scheduled according to the deleted calendar will be run one more time by the system. After that, the system wont be able to schedule the objects again, because the calendar no longer exists. To ensure the objects continue to be run, change the scheduling information for the objects either by selecting a different calendar or a different recurrence pattern. For more information, see Scheduling objects on page 198. 1. 2. 3. To delete a calendar Go to the Calendars management area of the CMC. Select the check box associated with the calendar you want to delete. Tip: Select multiple check boxes to delete several calendars. Click Delete, and click OK to confirm.
227
11
Managing events
This section provides information on creating and managing events. It describes file-based events, custom events, and schedule-based events. This section covers the following topics:
Managing events
228
11
For faster navigation, click on the title of the topic you are interested in.
File events When you define a file-based event, you specify a filename that the Event Server should monitor for a particular file. When the file appears, the Event Server triggers the event. For instance, you might want to make some reports dependent upon the regular file output of other programs or scripts. For details, see File-based events on page 230.
Schedule events When you define a schedule-based event, you select an object whose existing recurrence schedule will serve as the trigger for your event. In this way, schedule-based events allow you to set up contingencies or conditions between scheduled objects. For instance, you might want certain large reports to run sequentially, or you might want a particular sales summary report to run only when a detailed sales report runs successfully. For details, see Schedule-based events on page 231.
Custom events When you create a custom event, you create a shortcut for triggering an event manually. Basically, your custom event occurs only when you or another administrator clicks the corresponding Trigger this event button in the CMC. For details, see Custom events on page 232.
229
11
When working with events, keep in mind that an objects recurrence schedule still determines how frequently the object runs. For instance, a daily report that is dependent upon a file-based event will run, at most, once a day (so long as the file that you specify appears every day). In addition, the event must occur within the time frame established when you actually schedule the event-based report. Note: For information on scheduling an event-based object in the Objects management area of the CMC, see Scheduling an object with events on page 200.
File-based events
File-based events wait for a particular file (the trigger) to appear before the event occurs. Before scheduling an object that waits for a file-based event to occur, you must first create the file-based event in the Events management area of the Central Management System (CMC). Then, you can schedule the object and select this event. For more information on scheduling an object with events, see Scheduling an object with events on page 200. File-based events are monitored by the Event Server. When the file that you specify appears, the Event Server triggers the event. The CMS then releases any schedule requests that are dependent on the event. For instance, suppose that you want your daily reports to run after your database analysis program has finished and written its automatic log file. To do this, you specify the log file in your file-based event, and then schedule your daily reports with this event as a dependency. When the log file appears, the event is triggered and the reports are processed. Note: If the file already exists prior to the creation of the event, the event is not triggered. In this case, the event is triggered only when the file is removed and then recreated. If you want an event to be triggered multiple times, you must remove and recreate the file each time. 1. 2. 3. 4. 5. 6. To create a file-based event Go to the Events management area of the CMC. Click New Event. The New Event page appears. In the Type list, select File. Type a name for the event in the Event Name field. Complete the Description field. In the Server list, select the Event Server that will monitor the specified file.
230
11
7.
Type a filename in the Filename field. Note: Type the absolute path to the file that the Event Server should look for (for example, C:\folder\filename, or /home/folder/filename). The drive and directory that you specify must be visible to the Event Server. Ideally, the directory should be on a local drive.
8.
Click OK.
Schedule-based events
Schedule-based events are dependent upon scheduled objects. That is, a schedule-based event is triggered when a particular object has been processed. When you create this type of event, it can be based on the success or failure of a scheduled object, or it can be based simply on the completion of the job. Most importantly, you must associate your schedule-based event with at least two scheduled objects. The first object serves as the trigger for the event: when the object is processed, the event occurs. The second object is dependent upon the event: when the event occurs, this second object runs. For more information on scheduling objects with events, see Scheduling an object with events on page 200. For instance, suppose that you want report objects R1 and R2 to run after program object P1 runs. To do this, you create a schedule-based event in the Events management area. You specify the Success option for the event, which means that the event is triggered only when program P1 runs successfully. Then, you schedule reports R1 and R2 with events, and select your new schedule-based event as the dependency. Schedule program P1 with events, and set program P1 to trigger the schedule-based event upon successful completion. Now, when program P1 runs successfully, the schedule-based event is triggered, and reports R1 and R2 are subsequently processed. 1. 2. 3. 4. 5. 6. To create a schedule-based event Go to the Events management area of the CMC. Click New Event. The New Event page appears. In the Type list, select Schedule. Type a name for the event in the Event Name field. Complete the Description field. In the Event based on area, select from three options summarized by Table 11-9: Event status.
231
11
7.
.
Click OK.
Description The event is triggered only upon successful completion of a specified object. The event is triggered only upon non-successful completion of a specified object. The event is triggered only upon non-successful completion of a specified object.
Custom events
A custom event occurs only when you explicitly click its Trigger this event button. As with all other events, an object based on a custom event runs only when the event is triggered within the time frame established by the objects schedule parameters. Custom events are useful because they allow you to set up a shortcut that, when clicked, triggers any dependent schedule requests. Tip: When developing your own web applications, you can trigger Custom events from within your own code, as required. For more information, see the developer documentation available on your product CD. For instance, you may have a scenario where you want to schedule a number of reports, but you want to run them after you have updated information in your database. To do this, create a new custom event, and schedule the reports with that event. When you update the data in the database and you need to run the reports, return to the event in the CMC and trigger it manually. BusinessObjects Enterprise then runs the reports. For more information on event-based scheduling, see Scheduling an object with events on page 200. Note: You can trigger a custom event multiple times. For example, you might schedule two sets of event-based program objects to run dailyone set runs in the morning, and one set runs in the afternoon. When you first trigger the related custom event in the morning, one set of programs is run; when you trigger the event again in the afternoon, the remaining set of programs is run. If you neglect to trigger the event in the morning and trigger it only in the afternoon, both sets of programs run at that time. 1. 2. To create a custom event Go to the Events management area of the CMC. Click New Event.
232
11
3. 4. 5. 6.
In the Type list, select Custom. Type a name for the event in the Event Name field. Complete the Description field. Click OK. Note: Before you trigger this custom event, schedule an object that is dependent upon this event.
1. 2. 3.
To trigger a custom event Go to the Events management area of the CMC. In the Event Name column, select a custom event by clicking its link. Click Trigger this event. A message appears: This event has been triggered.
233
11
7. 8. 9.
If you have many users on your system, select the Add Users operation; then use the Look For field to search for a particular account. Click OK. Change the Access Level for each user or group, as required. Tip: To choose specific rights, select Advanced in the Access Level column, and click Advanced in the Net Access column. For complete details on the predefined access levels and advanced rights, see Chapter 4: Setting Rights.
234
Organizing Objects
chapter
12
Overview
This section describes basic administration tasks for organizing your files. It shows how to add folders and categories, and how to change settings, such as object rights and limits for new folders and categories, and make some common changes to the systems default security settings. This section covers the following topics:
For faster navigation, click on the title of the topic you are interested in.
About folders
Folders are objects used to organize documents. You can use folders to separate content into logical groups. Because you can set security at the folder level, you can use folders as a tool for controlling access to information. Its good practice to set up folders that represent a structure that already exists in your organization, such as departments, regions, or even your database table structure. Then use categories to set up an alternate system of organization. Then use cat Each object in BusinessObjects Enterprise must reside in a folder. By default, new objects that you add to a folder inherit the object rights that are specified for the folder.
About categories
Categories provide an alternative way of organizing objects, and therefore an alternative way for users to navigate to them. For example, you could organize your content into departmental folders, and then use categories to
236
12
create an alternate filing system that divides content according to different roles in your organization, such as managers or VPs. This organizational model allows you set security on groups of documents based on department or job role. There are two types of categories: corporate and personal. Corporate categories are created and administrated by administers with the appropriate rights, and are only visible to groups and users who have the rights to view them; personal categories are created by individual users, and are only visible to themselves. While all objects must reside in folders, category assignment is optional; therefore, it is important to note that:
While you can assign rights to a category as an object (that is, grant groups and users rights to it), the objects within the category cannot inherit rights set on the category itself. An object in a category retains its affiliation with the folder it resides in. An object can reside in multiple categories.
Creating and deleting folders Copying and moving folders Adding a new object to a folder Specifying folder rights Setting limits for folders, users, and groups Managing user folders
For faster navigation, click on the title of the topic you are interested in.
237
12
Tip: When you publish local directories and subdirectories of reports with the Publishing Wizard, you can duplicate your local directory structure on the BusinessObjects Enterprise system. This method provides you with an efficient way of creating multiple folders and subfolders at the same time. For details, see Publishing overview on page 254. This section includes procedures which show how:
For faster navigation, click on the title of the topic you are interested in.
238
12
6.
Click OK. The new folder is added to the system, and its Properties tab is refreshed. You can now use the Objects, Subfolders, Limits, and Rights tabs to add objects and to change settings for this folder.
Deleting folders
When you delete a folder, all subfolders, reports, and other objects contained within it are removed entirely from the system. 1. 2. To delete folders Go to the Folders management area of the CMC. Select the check box associated with the folder you want to delete. If the folder you want to delete is not at the top level, locate its parent folder. Then make your selection on the parent folders Subfolders tab. Tip: Select multiple check boxes to delete several folders from their parent folder. 3. Click Delete, and click OK to confirm.
When you copy a folder, the newly created folder does not retain the object rights of the original. Instead, the copy inherits the object rights that are set on its new parent folder. For instance, if you copy a private Sales folder into a Public folder, the contents of the new Sales folder will be accessible to all users who have rights to the Public folder. When you move a folder, all of the folders object rights are retained. For instance, if you move a private Sales folder into a publicly accessible folder, the Sales folder will remain inaccessible to most users. To copy or move a folder Go to the Folders management area of the CMC. Select the check box associated with the folder that you want to copy or move. If the folder you want to copy or move is not at the top level, locate its parent folder. Then make your selection on the parent folders Subfolders tab.
1. 2.
239
12
Tip: Select multiple check boxes to copy or move several folders from their parent folder to a different folder. 3. 4. Click Copy/Move. Select the action to perform:
5.
Copy to: Makes a copy of the folder. Move to: Moves the folder.
Select the Destination folder from the list. Tip: If there are many folders on your system, use the Look for field to search, or click Previous, Next, and Show Subfolders to browse the folder hierarchy.
6.
Click OK. The folder you selected is copied or moved, as requested, to the new destination.
240
12
3. 4. 5.
On the left side of the New Object page, click the type of object you want to add. On the right side of the New Objects page, browse to select an existing object. If you are adding an object package or a publication, you need to provide a title and description for the new object instead of selecting an existing one. Ensure that the correct folder name appears in the Destination field. Tip: If there are many folders on your system, use the Look for field to search, or click Previous, Next, and Show Subfolders to browse the folder hierarchy.
6.
7.
If necessary, provide information for other properties. Some objects, such as program objects and report objects, require you to provide additional information for the required fields. For example, if you are adding a report, you can choose to display a thumbnail preview of the report in BusinessObjects Enterprise. Tip: To display thumbnails for a report, open the report in Crystal Reports and click Summary Info on the File menu. Select the Save preview picture check box and click OK. Preview the first page of the report and save your changes. If the report references objects in your BusinessObjects Enterprise Repository, select the Use Object Repository when refreshing report check box to update these objects now. For details about setting up the BusinessObjects Enterprise Repository, see the BusinessObjects Enterprise Deployment and Configuration Guide.
8.
241
12
2.
Click Add/Remove to select the users or groups for whom you want to grant or deny rights to the folder. The Add/Remove page appears. In the Select Operation list, select Add/Remove Groups, Add Users, or Remove Users. The page is refreshed and displays options that depend upon whether you are working with users or with groups. The example above shows the options that are available when you are working with groups.
3.
4.
Select the user or group whose rights you want to specify and click the arrows to specify whether the user or group has explicit rights to the folder. Tip: If you have many users on your system, select the Add Users operation; then use the Look for field to search for a particular account.
5. 6.
Click OK. You are returned to the Rights tab. Change the Access Level for each user or group, as required. Note: For complete details on the predefined access levels and advanced rights, see Setting object rights on page 144.
7.
Click Update.
Folder rights
Table 12-1: Rights set on the folder level
The right to... General Add objects to the folder View objects Edit objects
Description Allows users to add folders Allows users to view folders Allows users to edit folder properties
Modify the rights users have to Allows users to modify any right, for any objects user on the folder(s) Schedule the document to run Delete objects Define server groups to process jobs Delete instances Allows users to schedule documents in the folder Allows users to delete folders Allows users to define server groups Allows users to delete historical instances
242
12
Description Allows users to copy objects from another folder into a chosen folder they have access to Allows users to schedule to external destinations (for example, disk, printer) Allows users to retrieve and view historical instances
Pause and Resume document Allows users to pause and/or resume a instances scheduled object. Securely modify rights users have to objects Reschedule instances Schedule on behalf of other users View objects that the user owns Allows users to grant or deny for other users only the rights that they themselves have been granted on the folder object Allows users to reschedule instances that have already run Allows users to schedule on behalf of other users - used for report bursting Allows users to view folders they own
Edit objects that the user owns Allows users to edit folders they own Modify the rights users have to Allows users to modify the rights other objects that the user owns users have on the objects they own Delete objects that the user owns Delete instances that the user owns View document instances that the user owns Allows users to delete objects they own Allows users to delete any historical instances they own Allows users to view historical instances they own
Pause and Resume document Allows users to pause and/or resume a instances that the user owns scheduled object they own Securely modify rights users have to objects that the user owns. Allows users to grant or deny rights on the folder object. Applies only to the rights that they themselves have been granted on the folder object.
Reschedule instances that the Allows users to reschedule instances that user owns have already run that they own Desktop Intelligence
243
12
The right to... Refresh the reports data Refresh List of Values
Description Allows users to refresh Desktop Intelligence report content Allows users to refresh the list of values associated with a Desktop Intelligence document Allows users to use list of values associated with a Desktop Intelligence document Allows users to see the SQL used to generate the Desktop Intelligence document content Allows users to export the Desktop Intelligence document with data
Download files associated with Allows users to download the template the object document (.rep, for example) Desktop Intelligence add in Download files associated with Allows users to download the object the object template document Desktop Intelligence template Download files associated with Allows users to download the object the object template document Report Print the reports data Refresh the reports data Export the reports data Allows users to print report content Allows users to refresh report content Allows users to export report content
Download files associated with Allows users to download the object source the report document (.rpt, for example) Text Allow discussion threads Web Intelligence document Refresh the reports data Edit Query Allows users to refresh the Web Intelligence report content Allows users to edit the query used to generate the Web Intelligence report content Allows discussion threads to be added to text object(s)
244
12
The right to... Refresh List of Values Use Lists of Values View SQL
Description Allows users to refresh the list of values associated with a Web Intelligence report Allows users to use the list of values associated with a Web Intelligence report Allows users to see the SQL used to generate the Web Intelligence report content Allows users to export the Web Intelligence report with data
Download files associated with Allows users to download the object the object template document (.wid file, for example)
5.
6.
245
12
1. 2.
To limit instances at the folder level Once youve created the new folder, click its Limits tab. Modify the available settings according to the types of instance limits that you want to implement, and click Update after each change. The available settings are:
Delete excess instances when there are more than N instances of an object To limit the number of instances per object, select this check box. Then type the maximum number of instances that you want to remain on the system. (The default value is 100.)
Delete excess instances for the following users/groups To limit the number of instances per user or group, click Add/Remove in this area. Select from the available users and groups and click OK. Then type the maximum number of instances in the Instance Limit column. (The default value is 100.)
Delete instances after N days for the following users/groups To limit the age of instances per user or group, click Add/Remove in this area. Select from the available users and groups and click OK. Then type the maximum age of instances in the Maximum Days column. (The default value is 100.)
246
12
A list of subfolders appears. Each subfolder corresponds to a user account on the system. Unless you have View access (or greater) to a subfolder, it will not appear in the list.
Administrative (or corporate) categories are created by the administrator, or other users who have been granted access to these categories. If you have the appropriate rights, you can create administrative categories. Personal categories can be created by each user to organize their own personal documents. Creating and deleting categories Moving categories Adding an object to a new category Removing or deleting objects from a category Specifying category rights Managing personal categories
For faster navigation, click on the title of the topic you are interested in.
To create a new category To create a new subcategory at any level To delete categories
For faster navigation, click on the title of the procedure you are interested in.
247
12
3. 4.
On the Properties tab, type the name and description of the new category. Click Update. The new category is added to the system, and its Properties tab is refreshed. You can now use the Objects, Subcategories, and Rights tabs to add objects and to change settings for this category.
Deleting categories
When you delete a category, all subcategories within it are remove entirely from the system. Unlike folder deletion, the reports and other objects contained within the category are not deleted from the system. 1. 2. To delete categories Go to the Categories management area of the CMC. Select the check box associated with the category you want to delete. If the category you want to delete is not at the top level, locate its parent category. Then make your selection on the parent categorys Subcategories tab. Tip: Select multiple check boxes to delete several categories from their parent category.
248
12
3.
Moving categories
When you move a category, any object assigned to the category maintains its association with it. All of the categorys object rights are retained. For example, you may have a South American Sales category that is accessible only by sales people in that region. You also have a World Sales category that contains worldwide sales reports needed by all sales people. For more intuitive organization, you want to move the region categories into the World Sales category. When you move the South American Sales category into the World Sales category, it retains its rights settings and associated objects, even though it has become a subcategory of the World Sales category. 1. 2. To move a category Go to the Categories management area of the CMC. Select the check box associated with the category that you want move. If the category you want to move is not at the top level, locate its parent category. Then make your selection on the parent categorys Subcategories tab. Tip: Select multiple check boxes to copy or move several categories from their parent category to a different category. 3. 4. Click Move. The Move page appears. Select the Destination category from the list. Tip: If there are many categories on your system, use the Look for field to search, or click Previous, Next, and Show Subcategories to browse the category hierarchy. 5. Click OK. The category you selected is moved to the new destination.
249
12
2.
Click Remove to remove the object from the category only. In this case, the object continues to exist in the system. Click Delete to remove the object from the category and at the same time delete it from the system.
250
12
4.
Select the user or group whose rights you want to specify and click the arrows to specify whether the user or group has explicit rights to the category. Tip: If you have many users on your system, select the Add Users operation; then use the Look for field to search for a particular account.
5. 6.
Click OK. You are returned to the Rights tab. For each added user or group, select the access level you want from the Access Level list. Note: For complete details on the predefined access levels and advanced rights, see Chapter 4: Setting Rights.
7.
Click Update.
Category rights
Table 12-2: Rights that can be set on a category level
The right to... Add objects to the folder View objects Edit objects
Description Allows users to add categories Allows users to view any category Allows users to edit any category
Modify the rights users have to Allows users to modify any right, for any objects user on the category object Delete objects Copy objects to another folder Securely modify rights users have to objects View objects that the user owns Allows users to delete any category Allows users to copy objects to other folders Allows users to grant or deny for other users only those rights they themselves have been granted on the category Allows users to view only the categories they own
Edit objects that the user owns Allows users to edit only the categories they own Modify the rights users have to Allows users to modify any right for any objects that the user owns user, only on the category objects they own
251
12
The right to... Delete objects that the user owns Securely modify rights users have to objects that the user owns
Description Allows users to delete only the categories they own Allows users to grant or deny for other users on the category object only those rights that they themselves have been granted for categories they own
252
chapter
13
Overview
This section focuses on the publishing process. It introduces the Publishing Wizard and tells you how you can use it to add reports and other objects to InfoView. It also describes alternative ways to add objects to the BusinessObjects Enterprise environment. This section covers the following topics:
Publishing overview Publishing Wizard procedures Publishing with the CMC Saving objects directly to the CMS
For faster navigation, click on the title of the topic you are interested in.
Publishing overview
Publishing is the process of adding objects to the BusinessObjects Enterprise environment and making them available to authorized users. There are several types of objects that you can publish to BusinessObjects Enterprise:
reports (from Crystal Reports and OLAP Intelligence) documents (from Desktop Intelligence) programs Microsoft Excel/Word/PowerPoint files Adobe Acrobat PDFs text files rich text format files hyperlinks object packages (which consist of report and/or program objects)
You can publish objects to BusinessObjects Enterprise in three ways: with the Publishing Wizard, through the CMC, and by saving objects directly to the CMS. Note: You can also create and add new objects directly to BusinessObjects Enterprise from within InfoView.
254
13
Publishing options
During the publishing process, you specify how often an object is run. You can choose to set a recurring schedule, or you can choose to let users set the schedule themselves. For example, for Crystal reports, you can specify whether the data in the report is automatically refreshed according to a set schedule or if the data is refreshed only when users manually refresh the report. Each publishing option has several features:
Specifying the data that users see This option is recommended for objects that are accessed by a large number of people and/or do not require separate database logon credentials. When you publish an object, users can access the same instance of the object and reduce the number of times that the system is prompted for information.
Allowing users to update the data in the report This option is recommended for objects that require separate database logon credentials. It is also recommended when you publish smaller objects that have frequent data changes and/or make use of parameters and record selection formulas. When you publish an object, users are able to determine the frequency in which the object is updated. However, users who access the object at the same time increase the load on the system by increasing the number of times that it is prompted for information.
Note:
BusinessObjects Enterprise supports reports that are created in versions 6 through XI of Crystal Reports. However, once a report is published to BusinessObjects Enterprise, it is saved, processed, and displayed in version XI format.
You can publish OLAP Intelligence reports to BusinessObjects Enterprise; however, you cannot set them to run on a recurring schedule.
255
13
Use the Publishing Wizard if you have access to the application and you want to publish multiple objects or an entire directory of objects to BusinessObjects Enterprise. Once an object is published, it appears in the folder that you specified in InfoView (or your customized web desktop) and in the Objects management area of the CMC (CMC). This section provides procedures which explain how:
To log on to BusinessObjects Enterprise via the Publishing Wizard To choose objects for publication To create and select a folder in the CMS To move objects between folders To duplicate the folder structure To add objects to a category To change scheduling options To refresh repository fields To publish with saved data To select a program type To specify program credentials To change Publishing Wizard default values To change object properties To enter database logon information To set parameters To set the schedule output format To add extra files for programs To specify command line arguments To finalize the objects to be added To publish an object with the CMC
For faster navigation, click the title of the procedure you are interested in.
256
13
The Welcome to the Publishing Wizard dialog box appears. 2. 3. 4. 5. 6. Click Next. The Log On to BusinessObjects Enterprise dialog box appears. In the System field, type the name of the CMS where you want to publish objects. In the User Name and Password fields, type your BusinessObjects Enterprise logon credentials. From the Authentication list, select the appropriate authentication type. Click Next. The Select Files dialog box appears. 1. 2. To choose objects for publication In the Select Files dialog box, click Add Files or Add Folders. Select the file/folder that you want to publish. Tip:
3. 4. 5.
Ensure that the appropriate file type is listed in the Files of Type field; by default this value is set to Report (*.rpt). If you are publishing a folder, you can also publish its subfolders by selecting the Include Subfolders option.
Repeat steps 1 and 2 for each of the files/folders that you want to publish. Click Next. If the Specify Object Type dialog box appears, choose a file type for each unrecognized object, and then click Next. The Specify Location dialog box appears.
To add a new folder to the CMS, select a folder and then click New Folder.
257
13
To add a new object package to the CMS, select a folder, and then click New Object Package. To delete a folder or an object package, select the object, and click Delete. Note: From the wizard, you can delete only new folders and object packages. (New folders are green; existing folders are yellow.)
If you are publishing multiple objects, and you want to place them in separate directories, see Duplicating the folder structure on page 258. 2. Click Next. The Confirm Location dialog box appears.
To place all of the objects in a single folder, select Put the files in the same location.
258
13
To recreate all of the folders and subfolders on the CMS as they appear on your hard drive, select Duplicate the folder hierarchy. Choose the topmost folder that you want to include in the folder hierarchy.
2.
259
13
Run once only Selecting the Run once only option provides two more sets of options:
This option runs the object once when you finish publishing it. The object is not run again until you reschedule it. at the specified date and time This option runs the object once at a date and time you specify. The object is not run again until you reschedule it. Let users update the object This option does not schedule the object. Instead, it leaves the task of scheduling up to the user. Run on a recurring schedule Once you have selected this option, click the Set Recurrence button to set the scheduling options. The Pick a recurrence schedule dialog box appears. The options in this dialog box allow you to choose when and how often the object runs. Select the appropriate options and click OK. 3. Click Next after you have set the schedule for each object you are publishing.
260
13
2.
Click Next.
Binary/Batch Binary/batch programs are executables, such as binary files, batch files, or shell scripts. They generally have file extensions such as .com, .exe, .bat, or .sh. You can publish any executable program that can be run from the command line on the machine where the Program Job Server is running.
3.
Java You can publish any Java program to BusinessObjects Enterprise as a Java program object. They typically have a .jar file extension. Script Script program objects are JScript and VBScript scripts.
After you specify the type of program that you are adding, click Next.
261
13
Alternatively, you can go through the remaining screens in the Publishing Wizard and make changes. 1. 2. Select Review or modify properties. Click Next. The Review Object Properties dialog box appears.
262
13
Tip: The Generate thumbnail image check box is available only if the object is a .rpt file and was saved appropriately. (To be able to display thumbnails for a report, open the report in Crystal Reports and, on the File menu, click Summary Info. Select the Save preview picture option, and click OK. Preview the first page of the report and save your changes.) 4. Click Next. The Specify Database Credentials dialog box appears if it is needed.
Setting parameters
Some objects contain parameters for data selection. Before these objects can be scheduled, you must set the parameters to determine the objects default prompts. 1. To set parameters In the Set Report Parameters dialog box, select the object that includes the prompts that you want to change. The objects prompts and default values appear in a list on the right-hand side of the screen. 2. Click Edit Prompt to change the value of a prompt. Depending on the type of parameter that you have chosen, different dialog boxes appear. 3. 4. If you want to set the prompts to contain a null value (where possible), then click Set Prompts to NULL. Click Next after you have finished editing the prompts for each object.
263
13
264
13
265
13
When the object is published to BusinessObjects Enterprise, the CMC displays the Properties screen. If necessary, you can modify properties such as title, description, database logon information, scheduling information, user rights, and so on for the object.
Table 13-1: Object properties in the CMC
Property File name Title Description Generate thumbnail for the report
Notes Type the full path to the object, or click Browse to perform a search. Type the name of the object. Type a description for the object. If you are publishing a Crystal report, select this option if you want users to see a thumbnail preview of the report in BusinessObjects Enterprise. Note: To be able to display thumbnails for a report, open the report in Crystal Reports and, on the File menu, click Summary Info. Select the Save preview picture option, and click OK. Preview the first page of the report and save your changes. Select this option if you want to refresh the repository fields of a Crystal report against the repository every time the report runs. Select from Executable, Java, or Script. Note: Select Java for Java programs, Script for JScript and VBScript programs, and Executable for all other program objects.
URL
Type the URL of the page to which you want a hyperlink object to link.
266
13
Desktop Intelligence documents can be published directly to the CMS using the File>Export to Repository command in the Desktop Intelligence Designer.
267
13
268
Managing Profiles
chapter
14
Overview
This section describes how to use profiles to personalize Desktop Intelligence documents for your users. It includes general information about profiles, and provides instructions for creating profiles and assigning users and groups to them. The section also provides information about how BusinessObjects Enterprise reconciles conflicts between profiles. Note: This section does not include instructions for assigning profiles to Desktop Intelligence documents.
What are profiles? on page 270 Creating profiles on page 271 Personalizing data with profile targets on page 271 Personalizing data for users and groups on page 272 Resolving conflicts between profiles on page 273 Specifying profile rights on page 274
270
14
Profiles do not control users access to data. Profiles are used to refine a documents content, or filter it. When you use profiles to display a subset of the data to a user, it is not the same as restricting the user from seeing that data. If users have the appropriate rights, they can still see the complete data for the document by viewing the instance in the InfoView. Profiles filter the view of the data; they do not change or secure the data being queried from the data source. For information about controlling user access, see Chapter 4: Setting Rights.
Creating profiles
You create profiles in the Central Management Console. 1. 2. 3. 4. 5. To create a profile Go to the Profiles management area of the CMC. Click New Profile. The New Profile page appears. Type a name for the profile in the Profile Name field. Complete the Description field. Click OK. You can now use the profile to perform the following tasks:
Use profile targets to personalize the data on the universe and class level. For more information, see Personalizing data with profile targets on page 271. Use profile values to personalize the data on the user and group level. For more information, see Personalizing data for users and groups on page 272. Set rights on profiles. For more information, see Specifying profile rights on page 274.
271
14
In the Central Management Console, you can choose profile targets for a profile from the Profiles management area. You can then choose the appropriate universe and specify the class and object that you want to use to provide a personal view of the document. Profile targets are especially useful when you want to personalize the data for all users. Profile targets specify a subset of the data on the object level. If you want to personalize content for each individual, you need to specify values for each user or group on the Profile Values tab. For more information, see Personalizing data for users and groups on page 272. Note: You can also assign profile targets in the Publishing. For more information, see the BusinessObjects Publishing Guide. 1. 2. 3. 4. To specify a profile target for the profile Go to the Profiles management area of the CMC, and click the profile you want. Click the Profile Targets tab. Click New. Choose the universe that you want the profile to be associated with. Tip: If there are many folders on your system, you can use the dropdown list and the Show Subfolders button to browse the folder hierarchy. 5. To display only data from a specific object value, provide its class name in the Class Name text box. Note: The field is case-sensitive. 6. 7. In the Object Name text box, type the value that you want. Note: The value is case-sensitive. Click OK.
272
14
Note: If you assign profile values to both users and groups, note that inheritance works the same way for profiles as it does for security settings. For more information, see the Setting object rights on page 144. 1. 2. 3. 4. 5. 6. To specify a profile value for a user or group Go to the Profiles management area of the CMC. Click the profile that you want to assign to a user or group. Click the Profile Values tab. Click New Value. The New Profile Value page appears. Select the users or groups that you want. In the Profile Value text box, provide the value that you want to assign to the selected users. Note: The value must be specified as a valid Business Objects formula that can be applied to an object within a report. For example, =Mexico or InList(North,South). 7. Click OK. The user or group and the associated values appear in the Profile Value list.
Tree Walk - BusinessObjects Enterprise determines the different possible views of a publication that could be delivered and produces a unique view for each case. Determining these possible views is called
273
14
walking the tree, a metaphor for following the many possible branches of the data. In the example, Tony would receive one publication personalized to show countries with sales offices, and another publication that displays North American data.
Walk and Merge - With this setting, BusinessObjects Enterprise again determines the different possible branches of the data, but this time the non-conflicting profiles are merged into other branches of the tree. This type of profile resolution is designed for role-based security.
You can set the Profile Resolution settings when you define your publications. After you assign a profile to a document, you can set Advanced Options that choose between a Tree Walk and a Walk and Merge. For more information, see the BusinessObjects Enterprise Publishing guide.
274
14
6.
Select the user/group whose rights you want to specify and click the arrows to specify whether the user/group does or does not have access to the profile. Click OK. On the Rights tab, change the Access Level for each user or group, as required. To choose specific rights, choose Advanced. Note: For complete details on the predefined access levels and advanced rights, see Chapter 4: Setting Rights.
7. 8. 9.
275
14
276
appendix
The Dashboard Manager domain stores the metrics, rules, and calendars used by Dashboard Manager. The Performance Manager domain stores the goals and target values used by Performance Manager. The Set Analysis domain stores the sets for the segmentation engine used by Set Analysis.
For more information about the performance management repository tables, see the Performance Management Setup and Administration online help. To access the online help from performance management, go the performance management Setup page and click Help on the Services bar. Note: In previous Performance Management versions, the performance management repository was called the Application Foundation repository or the AF Repo. In Application Foundation 6.x versions and earlier, the equivalent to the CMS was the BusinessObjects repository.
278
metrics dimensions
For information on creating and saving dashboards and analytics, see the Dashboard Manager online help. To set security rights for an analytic, you need to publish the analytic as a corporate document, and then secure that corporate document. For information on setting security for corporate documents, seeChapter 4: Setting Rights.
279
1. 2.
To set security rights for corporate tiered dashboards Log into the CMC as Administrator. Go to the Objects management area of the CMC. The names of dashboards are listed in the Object Title column. Dashboards are preceded by the Performance Management icon.
3.
Click the name of the dashboard you want to secure. Note: To set rights for a dashboards menu or submenu, navigate to the appropriate menu and click it.
4.
Click the Rights tab. The rights for users and groups regarding the selected dashboard are displayed in the Access Level column.
5.
To modify the rights for a specific user or group, click the drop-down arrow next to the security level currently displayed in the row for that user or group, and then select the appropriate security level. Note: The ability to assign the right to Schedule the selected dashboard is only available if that user or group also has the right to schedule jobs.
6.
To save the new security setting, click Refresh. The new security rights are saved to the CMS. Note: The new security rights are applied the next time the selected users log into InfoView.
280
General access to performance management and the ability to modify and secure info objects Analysis the features available for Individual Profiler
6. 7.
App Foundation access to menus to create metrics, lists, rules, sets, analytics and dashboards Configuration ability to create and modify metrics and analytics, and to define data sets and analytics for Predictive Analysis and Statistical Process Control Rules the types of rules and alerts Services Bar controls the options on the Services bar
Specify the security rights you want. If you want a user or group to inherit rights from its parent, select the <user or user group name> will inherit rights from the parent groups check box. Click Apply. The new security rights are saved to the CMS. Note: The new security rights are applied the next time the selected users log into InfoView.
8.
integer that corresponds to the maximum size of the ci_context_output.packed_result. For example, you could insert the values (0, 1, packed_result size, 20000) into ci_param (param_id, param_type, item_name, item_value). Note: If one of these values does not appear in the ci_param table, create it. 2. 3. Restart the performance management servers. Refresh the models.
281
282
appendix
Customizing the appearance of Web Intelligence documents Customizing the appearance of Web Intelligence documents
fonts and font sizes for tables, cells, chart axes, and so on background colors (wallpaper) lines and borders for cells and tables color palettes
The new settings take effect only for reports created after the defaultconfig.xml file is modified and saved. Earlier reports are not affected by the new settings. In the defaultconfig.xml file, settings are grouped by key value. (See List of key values on page 288.) To modify a setting, open the defaultconfig.xml file in a text editor and modify the parameter you want. Back up the original file before you start. For an example of how to modify the defaultconfig.xml file, see Example: Modifying the default font in table cells on page 289. Note:
You cannot use defaultconfig.xml to customize the appearance of the HTML Report panel. The defaultconfig.xml is also used by the REBean Editing SDK. For more information, see the developer documentation.
284
Customizing the appearance of Web Intelligence documents Customizing the appearance of Web Intelligence documents
285
Customizing the appearance of Web Intelligence documents Customizing the appearance of Web Intelligence documents
By modifying a few settingsstable header and body cell fonts, alternative row settings, chart axes values, label fonts, and section cell bordersdefault Web Intelligence tables and charts can look like this:
286
Customizing the appearance of Web Intelligence documents Customizing the appearance of Web Intelligence documents
3.
Extract defaultconfig.xml from the desktop.war file. For the Java Report Panel, extract
webiApplet\AppletConfig\defaultconfig.xml
Tip: On Windows, you can use a tool such as WinZip to extract and replace files in a .war file. 4. 5. Make a backup of the defaultconfig.xml file. Open defaultconfig.xml, and make your changes. See List of key values on page 288 for information on the values you can change, and Example: Modifying the default font in table cells on page 289 for an example. 6. 7. 8. Save and close defaultconfig.xml. Reinsert defaultconfig.xml into desktop.war. Ensure that you insert the file into the correct directory within the .war file. Restart your web application server and redeploy desktop.war. See the BusinessObjects Enterprise Installation Guide for details.
287
Customizing the appearance of Web Intelligence documents Customizing the appearance of Web Intelligence documents
288
Customizing the appearance of Web Intelligence documents Customizing the appearance of Web Intelligence documents
Interface element Object name cells in a crosstable Footer cells in a table General settings for forms Header cells in a table Header cells in a form General settings for tables Custom fonts
5.
To change the overall default font for all non-specified languages, enter the new font name after FONT FACE=. Note: You must modify the default font values separately for each language you want to change.
6.
289
Customizing the appearance of Web Intelligence documents Customizing the appearance of Web Intelligence documents
7.
290
appendix
292
2. 3.
Click the tab for the authentication type you are using (Windows NT, for example). Under Propagate Logon to Data Source Credentials, select the Enable and update users Data Source Credentials at logon time check box. You can now enable credential synchronization for users.
293
Using BOUSER
The BOUSER variable was used in previous versions of BusinessObjects Enterprise to allow administrators to assign an account name to a user. If you are using the BOUSER variable in existing objects, it is not automatically migrated to the DBUSER variable. The BOUSER variable is still supported, but it is important to note that it does not automatically synchronize at logon time.
294
33
Trusted Authentication
appendix
Configuring the server for Trusted Authentication on page 296 Configuring trusted authentication for the client on page 296
Note: Before you are able to use Trusted Authentication, you must have either created Enterprise users or mapped the third-party users you will be using to sign on to BusinessObjects Enterprise. To enable Trusted Authentication, you must configure both the server, through the CMC, and the client, in the web.xml file.
296
<DeployedLocation>businessobjects\enterprise115\desktopl aunch\WEB-INF
Note: If you are using the version of Tomcat installed with BusinessObjects Enterprise, replace <DeployedLocation> with C:\Program Files\Business Objects\Tomcat\webapps\.If you are using any other supported web application server, consult the documentation for your web application server to determine the appropriate path to substitute. 2. 3. Find this string in the file:
<param-name>cms.default</param-name>
Enter the CMS name and port number in the cms.default <paramvalue> field. Use the format servername:portnumber Find this string in the file: <param-name>sso.enabled</param-name> Change the <param-value> for sso.enabled from false to true.
<param-value>true</param-value>
4. 5. 6. 7.
8. 9.
Specify the method you want to use to retrieve the user name. Enter the <param-value> from the table that corresponds with the user retrieval method you want to use.
User retrieval method HTTP header URL query string cookie web session user principal
HttpServletRequest.getRemoteUser() REMOTE_USER
297
Note: Before you use these user retrieval name methods, you must have already implemented the appropriate method according to the J2EE standard so that your customized InfoView can retrieve the user names from your setup. See http://java.sun.com/j2ee/1.4/docs/api/javax/servlet/ http/HttpServletRequest.html for further information. 10. If you selected HTTP header, URL query string, cookie or web session, find this string:
<param-name>trusted.auth.user.param</param-name>
Note: This step is not required if your retrieval method is USER_PRINCIPAL or REMOTE_USER. 11. Enter the variable name to use to retrieve the user name in the <paramvalue> for trusted.auth.user.param.
If you are using the HTTP header as your method of retrieving the user name, enter the name for the HTTP header variable. If you are using a URL query string name as your method of retrieving the user name, enter the name for the URL query string. If you are using a cookie as your method of retrieving the user name, enter the name for the cookie. If you are using a web session variable as your method of retrieving the user name, enter the name for the web session variable.
Note: This step is not required if your retrieval method is USER_PRINCIPAL or REMOTE_USER. 12. Decide how you want to retrieve the shared secret.
To retrieve the shared secret from a file. a. Create a file called TrustedPrincipal.conf. This is the default location of this directory.
C:\Program Files\Business Objects\BusinessObjects Enterprise 11.5\win32_x86
c.
Enter the following text in the file, where secretPassword is the trusted authentication password.
SharedSecret=secretPassword
To retrieve the shared secret from a session variable. a. Find this string in the web.xml file:
<param-name>trusted.auth.shared.secret</paramname>
298
b. Enter the session variable name from which to retrieve the shared secret in the </param-value> for
trusted.auth.shared.secret.
13. Save and close the file. 14. Restart your web application server.
299
300
appendix
Documentation
You can find answers to your questions on how to install, configure, deploy, and use Business Objects products from the documentation.
302
303
304
Address Business Objects Consulting Services http://www.businessobjects.com/ services/consulting/ Business Objects Education Services http://www.businessobjects.com/ services/training
Content Information on how Business Objects can help maximize your business intelligence investment. Information on Business Objects training options and modules.
305
306
Glossary
appendix
Glossary
access level
A predefined group of rights which allow you to set common security levels quickly. Using the predefined access levels whenever possible can greatly reduce the complexity of your object security model. Note: In developer documentation, access levels are referred to as roles.
advanced right
A tool which allows administrators more granular control when setting rights in the CMC.
alias
A placeholder that allows administrators to link a users multiple BusinessObjects Enterprise accounts. This is useful when a user has a thirdparty account that is mapped to Enterprise and an Enterprise account. By assigning an alias to the user, the user can log on using either a third-party user name and password or an Enterprise user name and password. Thus, an alias enables a user to log on via more than one authentication type.
Application foundation
See Performance management.
Auditing
A BusinessObjects Enterprise component that enables administrators to monitor, analyze, and optimize their BI system. A set of pre-defined reports are available. In addition, a BusinessObjects Universe is provided for administrators to create their own custom reports and analysis.
authentication
The process of verifying the identity of a user who attempts to access the system. Authentication types include Enterprise, Windows AD, Windows NT and LDAP authentication. Note that third-party user accounts and groups must be mapped to BusinessObjects Enterprise before you can use the latter three types of authentication.
authorization
The process of verifying that the user has been granted sufficient rights to perform the requested action upon the specified object.
302
Glossary
available right
BusinessObjects Enterprise administrators setting rights in the CMC will be presented with rights options depending on the object they are setting rights on. For example, you can grant users the right to schedule a report, but you cannot grant users the right to schedule another user (because users cannot be scheduled).
base right
A right that applies to all objects in the system. For example, the View objects right is a base right: it applies equally well to folders, to reports, and to other BusinessObjects Enterprise objects.
BusinessObjects
See Desktop Intelligence.
BusinessObjects Enterprise
A business intelligence (BI) platform that powers the management and secure deployment of specialized end-user tools for reporting, query and analysis, and performance management on a scalable, and open services-oriented architecture.
Cache server
A server responsible for handling all report viewing requests. The Cache Server checks whether or not it can fulfill the request with a cached report page. If the Cache Server finds a cached page that displays exactly the required data, with data that has been refreshed from the database within the interval that you have specified as the default, the Cache Server returns that cached report page.
calendar
A customized list of run dates for scheduled jobs. When users schedule objects, they can use a calendar to run the job on a predefined set of dates. Calendars are particularly useful when users want to run a recurring job on an irregular schedule, or if administrators want to provide users with sets of regular scheduling dates to choose from.
category
An alternative to folders as a way of organizing objects. There are two types of categories: corporate and personal. Corporate categories are created and administrated by administrators with the appropriate rights, and are visible
303
Glossary
only to groups and users who have the rights to view them; personal categories are created by individual users, and are only visible to the users who created them.
connection
See universe connection.
Crystal Reports
A reporting tool that helps developers and IT professionals create feature-rich reports and integrate them into web and Windows applications. For more information, see the Crystal Reports Users Guide.
304
Glossary
Designer
A tool used to build universes.
Desktop Intelligence
A web-enabled integrated query, reporting, and analysis solution that allows users to access data in their corporate databases directly from their desktops. Desktop Intelligence makes it easy to access this data, because users work with it in the business terms that are familiar to them; they dont require knowledge of technical database terms like those used in SQL. This product was previously known as BusinessObjects in release 5.x/ 6.x.
destination
A place where scheduled objects are sent. Destinations include user inboxes, email, and FTP.
discussions
A feature which enables users to create notes for reports, hyperlinks, programs, and other objects in InfoView. BusinessObjects Enterprise users who have the appropriate rights can view the notes or add their own comments to a discussion thread, which is a series of related notes in a hierarchical format. Users can create a discussion thread or add notes to a discussion thread for any object to which they have access.
effective rights
A calculation performed by the CMS that takes into account the effect of the rights set on an object. The result is displayed on the Rights page in the CMC.
305
Glossary
Encyclopedia
A user panel inside BusinessObjects Enterprise for creating business intelligence (BI) reference guides. Accessible from your BI portal, Encyclopedia helps users locate and interpret your corporate information for more confident and accurate decision making.
event
A preset trigger for scheduling and processing objects. Event-based scheduling provides you with additional control over scheduling objects: you can set up events so that reports are proccessed only after a specified event occurs. Working with events consists of two steps: creating an event and scheduling an object with events. That is, once you create an event, you can select it as a dependency when you schedule an object . The scheduled job is then processed only when the event occurs. You can schedule an object with a file event, a custom event, and/or a schedule event.
Event Server
A server which manages file-based events. When you set up a file-based event within BusinessObjects Enterprise, the Event Server monitors the directory that you specified. When the appropriate file appears in the monitored directory, the Event Server triggers your file-based event: that is, the Event Server notifies the CMS that the file-based event has occurred. The CMS then starts any jobs that are dependent upon your file-based event.
Everyone
A group created by default in BusinessObjects Enterprise. All users are members of the Everyone group.
306
Glossary
group
A collection of users who share the same account privileges. Groups enable you to make changes to user rights in one place (the group) instead of modifying each user account individually. Groups are created by default (as in the case of the Administrators and Everyone groups), and custom-created by administrators according to organizational needs.
inbox
A destination for a scheduled report. When scheduling a report, you can specify that you want the system to store the report instances in the inbox of one or more users. You can also send existing report objects or instances to a users inbox by using the Send to feature.
Information Analyzer
A web-based OLAP analysis tool that users access through InfoView. Information Analyzer workspaces display OLAP data in crosstabs and charts. A user creates a workspace, populates it with crosstab and chart objects, connects those objects to OLAP data sources, and then defines queries to explore the data. For more information see the BusinessObjects Information Analyzer Users Guide.
InfoView
A web-based interface that end users access to view, schedule, and keep track of published reports. InfoView consolidates the presentation of a company's BI information and allows it to be accessed in a way that is secure, focused, and personalized to users inside and outside an organization.
inheritance
The method by which rights set on groups or folders are passed to subgroups, subfolders, individual users, and files in BusinessObjects Enterprise.
instance
A copy or version of an object that contains data that has been retrieved from one or more databases. Each instance contains data that is current at the time the report, query, or program is processed. In BusinessObjects Enterprise, you publish objects to the system, and then schedule those objects to generate instances on a recurring basis.
Java viewer
A client-side viewer which is downloaded and installed in the users browser.
307
Glossary
Job Server
Any server which processes scheduled actions on objects at the request of the CMS. Job servers can be configured to process either report objects or program objects when you add the servers to BusinessObjects Enterprise
object
A generic term for items represented in the Repository. BusinessObjects Enterprise supports many types of objects including reports, Web Intelligence documents, programs, Microsoft Excel files, Microsoft Word files, Microsoft PowerPoint files, Adobe Acrobat PDFs, rich text format files, text files, hyperlinks, and object packages.
object package
A type of object which functions as a folder for other objects, and allows you to schedule the contents simultaneously. Object packages can be composed of any combination of report and program objects that are published to the BusinessObjects Enterprise system. (Third-party objects, such as Excel, Word, Acrobat, Text, Rich Text, PowerPoint, and Hyperlink objects, cannot be added to object packages.)
OLAP Intelligence
A tool for creating reports based on multidimensional data. For more information, see the OLAP Intelligence Users Guide. Also see Information Analyzer.
Page Server
A server which responds to on-demand page requests from the Cache Server to generate Encapsulated Page Format (EPF) pages. The Page Server then returns the EPF pages to the Cache Server. The EPF pages contain formatting information that defines the layout of the report. The data for the report is saved with the report or retrieved on demand from the database.
308
Glossary
Performance management
A suite of products which help users track and analyze key business metrics via management dashboards, scorecards, and alerting. These products allow goals to be set around metrics and assigned to owners; they also support group decision-making and analysis via integrated collaboration and workflow capabilities. Performance management includes the following products:
Dashboard Manager Performance Manager Set Analysis Predictive Analysis Process Analysis
Performance management was previously known as Application Foundation. Process Analysis was previously known as SPC.
profile
A tool for personalizing the content that users see when Desktop Intelligence documents are published. With profiles, users can schedule a publication (based on a Desktop Intelligence document) once, and deliver many different personalized versions of the document to your users (known as single-pass report bursting in earlier versions of BusinessObjects).
program object
An executable, script, or Java program that users can schedule to run regularly or based on an event. Program object features allow administrators to automate a wide range of administrative tasks, making BusinessObjects Enterprise a self-managing environment. Additionally, administrators can use program objects to trigger external processes, thus integrating BusinessObjects Enterprise into a broader workflow.
309
Glossary
Publishing
A feature that allows users to schedule and distribute Desktop Intelligence documents, or specific sections of documents, through InfoView. Documents are then distributed to users either via the web or email. Publishing includes the ability for users or administrators to subscribe to and receive publications on a pre-defined timetable.
publishing
The process of adding objects to BusinessObjects Enterprise and making them available to authorized users.
Publishing Wizard
An application which allows you to publish objects to BusinessObjects Enterprise quickly. It also allows you to specify a number of options on each object that you publish. Although this application runs only on Windows, you can use it to publish reports to BusinessObjects Enterprise servers that are running on Windows or on UNIX.
right
The base unit for controlling user access to files, users, applications, servers, and other features in BusinessObjects Enterprise. When granted, each right provides a user or group with permission to perform a particular action.
role
See access level.
scheduling
The process through which a user determines when an object will run on the system.
310
Glossary
universe
An abstraction of a data source that presents data to users in non-technical terms. Web Intelligence, Desktop Intelligence, and Crystal Reports users can connect to a universe and run queries against a database. They can perform data analysis and create reports using the objects in a universe, without seeing, or having to know anything about, the underlying data structures in the database. Universes are created using the Designer. For complete information, see the Designers Guide.
universe connection
A named set of parameters that defines how a BusinessObjects application accesses data in a database. A connection links Web Intelligence to your middleware. You must have a connection to access data. You must select or create a connection when you create a universe. For complete information, see the Designers Guide.
Web Intelligence
A web-based query and analysis tool that enables users to track, understand, and manage corporate data using a simple browser as their interface, while maintaining tight security over data access. Web Intelligence provides business users an easy-to-use interface for building and analyzing reports on corporate data over secured intranets and extranets. For more information, see the Web Intelligence Users Guide.
311
Glossary
312
Index
A
access granting 96 to applications 108 to universe connections 135 to universes 134 access levels administration 77 advanced 66 assigning to groups and users 66 calendars 228 categories 250 description 64 enabling and disabling inheritance 74 events 233 folders 241 InfoView 108 profiles 274 RAS 129 server groups 128 servers 128 setting 245 specifying on categories 250 specifying on folders 241 when copying/moving folders 239 when moving categories 249 access rights to Query HTML panel 58, 115 accounts, managing 84, 87 active sessions, viewing 124 administration categories 250 delegating 77 events 233 folders 241 profiles 274 rights 77 servers and server groups 128 tools 46 Administrator account, setting password 50 advanced rights denied by default 76 precedence 76 priorities affecting inheritance 76 setting 66 viewing 66 alerts, setting notification 205 aliases assigning to a user 99 creating for existing user 99 for new user 98 deleting 101 disabling 101 managing 97 reassigning for a user 100 analytics, setting security 279 application servers 25 application tier 24 applications 22 CCM 23 CMC 23 Import Wizard 24 InfoView 22 managing 52 Publishing Wizard 23 areas, management 48 assigning an alias 99 auditing, notification 203 authentication object packages 191 program objects 186 security plug-ins 43 Trusted Authentication 93, 296 types 86 available rights 68
319
Index
B
base rights 68 BOUSER 292, 294 Business Objects consulting services 304, 305 support services 303 training services 304 Business Objects applications CMC 52 Crystal Reports Explorer 53 Designer 54 Desktop Intelligence 54 Discussions 54 managing 52 BusinessObjects applications CCM 23 CMC 23 CMS 27 Import Wizard 24 InfoView 22 Publishing Wizard 23 BusinessObjects Enterprise applications 52 object security model 60 rights description 60 reading Rights tab 62 Rights tab columns 62 security settings 50 BusinessObjects Enterprise SDK Java SDK 25 .NET SDK 25 BusinessObjects Enterprise servers 27, 30 Cache Server 30 description 20 Event Server 29 File Repository Servers 29 Job Server 32 Page Server 34 Program Job Server 32 Report Application Server 34
C
cache format, Web Intelligence documents 216
Cache Server 30 for viewing reports 159 metrics 123 viewing with 38 calendars adding dates to 222 adding specific dates 224 creating 222 deleting 227 format options 223 recurring dates 225 specifying rights 228 categories access to 250 adding a report 249 assigning objects to 154 creating 247 deleting 248 description 236 moving 249 removing/deleting objects 250 rights 250, 251 specifying rights 250 working with 247 CCM 23 enabling and disabling servers 121 starting, stopping, and restarting servers 120 Central Configuration Manager. See CCM Central Control Manager. See CMC Central Management Console. See CMC Central Management Server. See CMS characters, setting CMC preferences 48 ci_param table 281 client side viewers 35 client tier 22 clusters, viewing details 125 CMC 23 access to 108 enabling and disabling servers 121 logging on 47 manage settings 52 management areas 48 navigating 48 setting preferences 48 starting, stopping, and restarting servers 120
320
Index
CMS 27, 43 and security 43, 43 and security plug-ins 43 base rights and available rights 68 database 27 enabling and disabling other servers 121 metrics 124, 125 stopping 121 command line arguments, specifying 181, 264 components, security management 42 configuring executable programs 183 object packages 190 configuring trusted authentication 297 Connection Server, metrics 124 connection settings Essbase or DB2 OLAP data sources 140 Microsoft OLAP data sources 138 OLAP Data sources 138 Oracle OLAP data sources 141 connections. See universe connections consultants, Business Objects 304 copying/moving folders 239 creating categories 247 folders 237 server groups 126 server subgroups 127 subcategory 248 subfolders 238 credentials synchronizing 292 Crystal Reports Cache Server. See Cache Server Crystal Reports Explorer, settings 53 Crystal Reports Page Server. See Page Server Crystal reports, job server for scheduling 160 custom events 229, 232 customer support 303 customizing, object rights 66
D
dashboards, setting security 279 data live 81 saved 81
Data source connections 132 data tier 35 databases, changing settings 161 DBPASS 292 DBUSER 292 default settings, modifying security 51 defaultconfig.xml about 284 customizing elements 288 finding correct version to change 286 modifying for Java Report Panel 287 modifying for .NET InfoView 287 delegated administration. See administration deleting aliases 101 categories 248 folders 237 subfolders 239 universe connections 134 universes 133 denied rights 76 Designer, settings 54 Desktop Intelligence 33 documents, rights settings 175 metrics 124 settings 54 Destination Job Server, metrics 124 destinations available, by object type 152 default settings 208 email 211 format 214 FTP 210 inbox 213 sending to 150 unmanaged disk 208 directories, publishing 255 disabling aliases 101 Guest account 51 inheritance 74 servers 121 discussion threads cancelling search 55, 112 deleting 57
321
Index
searching 55, 112 sorting search results 56, 113 Discussions access rights to objects 57, 114 accessing 55, 111 DLL. See dynamic-link libraries documentation feedback on 303 on product CD 302 on the web 302 roadmap 302 dynamic-link libraries, processing extensions 167
E
education. See training email destination 211 notification 203 enabling inheritance 74 servers 121 environment variables, specifying for program objects 184 ePortfolio. See InfoView errors, troubleshooting 281 Event Server 29, 124 events access to 233 custom 232 file-based 230 managing 229 notification 203 schedule-based 231 scheduling 200 executable programs, configuring 183 extensions, processing 167
folders access levels, setting 245 access to 241 adding a report 240 copying/moving 239 creating 237 default user folders 246, 252 deleting 237 Favorites folder 246 inheritance 70 object rights. See object rights. rights 241, 242 setting instance limits 245 specifying rights 241 FTP destination 210
G
granted rights 76 group inheritance 70 grouping servers 125 groups creating 89 deleting 95 membership, specifying 90 modifying 94 object rights advanced rights 66 breaking inheritance 72 inheritance 70 of servers 125 setting instance limits on folders 245 setting rights 96 viewing members 95 Guest accounts disabling 51, 96
F
Favorites folders 246 feedback, on documentation 303 file events 229, 230 File Repository Servers 29 File Repository Servers, metrics 123 filters, using 163
H
hyperlinks between reports 171 viewing 173
I
iCubes 139 Import Wizard 24
322
Index
inbox destinations 213 inboxes, controlling access 97 index, setting CMC preferences 48 information flow, between servers 36 information resources 302 InfoView 22 accessing 47 categories 252 controlling access to 108 folders 246 Java version 57, 114 managing 57, 114 inheritance base rights and available rights 68 enabling and disabling 74 priorities affecting 76 Input File Repository Server 29 Input File Repository Server, metrics 123 instances deleting 220 managing 217, 218 notification 203 object 156 object packages 188 pausing 219 program objects 180 report objects 155 resuming 219 scheduled 155 sending 150 setting limits at the folder level 245 viewing 219 intelligence tier 27
K
Kerberos single sign-on 42
L
license keys adding 104 viewing account activity 105 licensing, accessing information 104 limits, setting at the folder level 245 List of Values Job Server description 33 metrics 124 live data 81 log on, to the CMC 47 logon credentials synchronizing 292
M
management areas, defined 48 managing, Business Objects applications 52 mapped users, managing aliases 97 menu styles, setting CMC preferences 48 menus, security for dashboards 279 metrics viewing 122 viewing account activity 105 metrics, model-based 281 my password, setting CMC preferences 48
J
Java InfoView, customizing appearance of Web Intelligence documents 287 Java platform 26 Java programs authentication 187 configuring 185 providing access to other files 185 setting parameters 185 Java SDK 26 Job Servers 32, 32
N
navigation between reports 171 .NET InfoView, customizing appearance of Web Intelligence documents 287 notification notifications alerts 205 audit 203 email 203 event 203 for a scheduled object 202
323
Index
O
object instances 156 object packages adding objects to 189 authentication 191 configuring 190 creating 188, 257 instances 188 managing 187 moving 258 publishing objects to 265 scheduling 198 object rights adding users 144 advanced rights 66, 144 advanced setting 66 base and available 68 breaking inheritance 72 changing user rights 144 inheritance 70, 74 See also advanced rights setting 144 specifying for a category 250 specifying for a folder 241, 242 when copying/moving folders 239 when moving categories 249 objects adding to an object package 189 Advanced Rights page 66 categories, assigning to 154 copying 149 creating a shortcut 149 deleting 150 enabling and disabling inheritance 74 failure notification 202 filters, specifying 163 format 214 making changes to 156 managing 144 moving 149 properties, changing 153
publishing multiple 255 options 255 with CMC 265 rights. See object rights saving to CMS 266 scheduling, recurrence pattern 196 searching for 150 See also object rights See also scheduling sending 150 setting access levels 148 success notification 202 objects per page, setting maximum 48 OLAP cube creating a connection 136 deleting a connection 138 editing a connection 137 Online Customer Support 303 options, publishing 255 Output File Repository Server 29 Output File Repository Server, metrics 123
P
packed_result size 281 page index, setting CMC preferences 48 page layout, specifying 166 Page Server 34 for viewing and modifying 159 metrics 124 viewing with 38 pages, setting CMC preferences 48 parameters for Java programs 185 passwords changing 92 setting for Administrator account 50 for current CMC user 48 Performance Management Applications general 278 troubleshooting 281 personal categories 252 platforms Java 26 Windows .NET 26
324
Index
plug-ins, security 43 Predictive Analysis, troubleshooting 281 preferences, setting in the CMC 48 printers, specifying 165 printing setting printer options 165 setting the default printer 165 specifying page layout 166 specifying printer 165 processing extensions registering 169 selecting 170 sharing 171 processing tier 30 profiles access to 274 and security 270 conflicts 273 creating 271 program credentials specifying 262 Program Job Server, metrics 124 program objects accessing other files 264 authentication 186 batch 261 binary 261 command line arguments 264 configuring 183 enabling, disabling 186 environment variables, specifying 184 Java configuring 185 providing access to other files 185 setting parameters 185 managing 179 processing options, setting 181 providing file access to executable programs 183 script 261 working directory, specifying 182 programs. See program objects publishing folders 236 object packages 265 options 255
with CMC 265 with Publishing Wizard 255, 255 Publishing Wizard adding folders 257 objects 257 creating category on CMS 259 folder on CMS 257 database logon 263 duplicating folder structure 258 modifying default values 262 object properties 262 moving reports between folders 258 repository refresh 260 scheduling objects 259 selecting category on CMS 259 folder on CMS 257 setting parameters 263
Q
Query HTML panel, access rights 58, 115
R
RAS. See Report Application Server reassigning an alias 100 recurrence patterns, object scheduling 196 refreshing, reports 156 Report Application Server 34, 40 for viewing and modifying 159 required object rights 129 report instances history 218 managing 155, 218 setting limits 220 viewing 219 report objects database settings, specifying 161 destination 207 hyperlinks, viewing 173, 173 managing 155 page layout, specifying 166
325
Index
parameters, specifying 162 publishing and hyperlinking 172 publishing with existing hyperlinks 173 rights for creating/modifying 129 scheduling with events 200 setting instance limits 220 specifying Job Servers for 159 specifying servers. See servers report thumbnails, adding with reports 240, 249 Report Viewers 35 report_view_advanced.aspx 38 report_view_dhtml.aspx 38 reports adding to a category individually 249 adding to a folder individually 240 hyperlinking 171 process options 157 refresh options 156 scheduling 36 See also report objects viewing 37 viewing options 158 repository performance management 278 resources 302 restarting servers 120 rights administration 77 available 68 base 68 calendars 228 categories 250 CMC 108 events 233 folders 241 InfoView 108 profiles 274 Report Application Server 129 server groups 128 servers 128 specifying for a category 250 specifying for a folder 241 view vs. view-on-demand 81 rights administration, access levels 64 root folders, modifying security 51
row-level security, processing extensions 167 run options, object scheduling 196
S
saved data 81 schedule events 229, 231 scheduled instance 155 scheduling an object 202 events 200 information flow 36 notification 202 object packages 198 objects for group 216 for user 216 in batches 198 recurrence patterns 196 run options 196 Schedule page 195 setting for an object 202 specifying server for 159 script programs 180 searching discussion threads 55, 112 for objects 150 security components 42 dashboard menus 279 for analytics 279 for dashboards 279 initial settings 50 modifying default levels 51 plug-ins 43 processing extensions 167 security plug-ins 43 sending instances 150 object shortcuts 150 to destinations 150 server groups access to 128 creating 126 subgroups 127 servers 20, 27, 30
326
Index
access to 128 application tier 24 configuration 118 default 159 default settings 118 disabling, enabling 121 for viewing and modifying reports 159 grouping 125 information flow 36, 36 intelligence tier 27 management 118 managing 117 metrics, viewing 123 modifying group membership 128 processing tier 30 restarting, starting, stopping 120 settings 118 status changing 119 symbols 119 sessions, viewing active 124 settings access levels 245 advanced object rights 66 CMC 52 Crystal Reports Explorer 53 database 161 Designer 54 Desktop Intelligence 54 InfoView 57, 114 initial security levels 50 instance limits on folders 245 program processing options 181 report refresh 156 viewing account activity 105 shared libraries, as processing extensions 167 single sign-on alternatives 292 anonymous account 51 disabling Guest account 51 single-pass report bursting 270 starting, servers 120 stopping CMS 121 servers 120
styles, setting CMC preferences 48 subcategory, creating 248 subfolders creating 238 deleting 239 subgroups of servers 125 subgroups, adding 89 support customer 303 locations 303 technical 303 web site 303 synchronization logon credentials 292 system metrics, viewing 125
T
technical support 303 third-party security plug-ins 43 thumbnails, adding with reports 240, 249 tiers 20 application 24 client 22 data 35 intelligence 27 processing 30 time zones, setting CMC preferences 48 tools, administration 46 top-level creating new categories 247 creating new folders 238 modifying folder security 51 training, on Business Objects products 304 tree walk 273 troubleshooting errors 281 Performance Management Applications 281 Predictive Analysis 281 trusted authenitcation configuring in web.xml 297 Trusted Authentication 93, 296
U
universe connections
327
Index
deleting 134 managing 134 universes access to 134 managing 133 viewing, deleting 133 UNIX application server 25 installation 26 WCA 26 unmanaged Disk destination 208 user accounts creating 88 deleting 92 managing 84, 87 modifying 91 user aliases assigning to 99 creating for existing user 99 for new user 98 deleting 101 disabling 101 reassigning 100 user folders 246 user rights 57, 114 users setting rights 96 viewing active sessions 124
system metrics 125 with the Cache Server 38 with the Page Server 38 viewrpt.aspx 38
W
walk and merge 273 WCA 25 and logon tokens 42 and security 42 description 25 web customer support 303 getting documentation via 302 useful addresses 304 Web application environments 26 Web Component Adapter. See WCA web desktop. See InfoView Web Intelligence application rights 58, 115 Query HTML access rights 58, 115 Web Intelligence documents changing default appearance 284 customizing for Java InfoView 287 customizing for .NET InfoView 287 finding correct defaultconfig.xml 286 list of customizable elements 288 rights settings 177 selecting cache options 216 server for scheduling 160 updating prompts 163 viewing universes 174 Web Intelligence Job Server, metrics 124 Web Intelligence Report Server, metrics 124 web servers 27 web sites support 303 training 304 Windows .NET platform 26
V
viewers and InfoView 37 client-side 35 setting CMC preferences 48 zero client 35 viewing active users 124 BusinessObjects Enterprise architecture 37 CMS cluster details 125 current account activity 105 current metrics 122 information flow 37 licensing information 104 server metrics 123
Z
zero client viewers 35
328