BusinessObjects OLAP Intelligence XI

Size: px
Start display at page:

Download "BusinessObjects OLAP Intelligence XI"

Transcription

1 Configuring Overview BusinessObjects OLAP Intelligence XI allows users to connect to and design custom applications against OLAP data sources. OLAP Intelligence XI and its web components use the Microsoft security system to regulate data access for each user when connecting to a Microsoft Analysis Services OLAP cube. This document discusses how the different OLAP Intelligence components work with the Microsoft security system to regulate data access, as well as how to configure these components for a specific security model and server environment. Contents INTRODUCTION... 3 MICROSOFT ANALYSIS SERVICES SECURITY...3 Security roles...3 Database roles... 3 Cube roles... 3 Authentication...4 Passing local user accounts... 4 Passing user accounts across domains... 4 MICROSOFT ANALYSIS SERVICES SECURITY AND THE OLAP INTELLIGENCE DESKTOP DESIGNER...5 Requirements...5 Adding a server connection...5 CONFIGURING MICROSOFT ANALYSIS SECURITY FOR THE BUSINESSOBJECTS ENTERPRISE ENVIRONMENT...6 VIEWING OLAP INTELLIGENCE REPORTS WITH THE ACTIVEX INTERACTIVE VIEWER... 7 Requirements...7 Benefits...8 Limitations...8 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 1

2 VIEWING OLAP INTELLIGENCE REPORTS USING THE DHTML INTERACTIVE VIEWER... 9 Setting data source logon option in the Central Management Console...10 Logon using Web Component Adapter credentials Passing credentials from a Java web application server Passing credentials from Internet Information Services Secondary logon for each application...13 Logon using specific credentials...15 CONFIGURING THE WEB COMPONENT ADAPTER FOR DELEGATION...15 Prerequisites...15 Enabling Kerberos security support on the Web Component Adapter...15 Configure Active Directory account settings...16 Web Component Adapter account Target user accounts Configuring DCOM components...17 Configuring DCOM for IIS on Windows Configuring DCOM for Internet Information Services 6 and Windows Verifying that WCA delegation is working...19 FINDING MORE INFORMATION...20 Supported platforms...20 Improving performance and scalability...20 Configuring web application servers /26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 2

3 Introduction This document is intended for users who design reports with BusinessObjects OLAP Intelligence XI, and distribute them with BusinessObjects Enterprise XI. This document discusses how the different OLAP Intelligence components work with the Microsoft security system to regulate data access, as well as how to configure these components for a specific security model and server environment. Microsoft Analysis Services security Security roles Microsoft Analysis Services allows an OLAP Intelligence administrator to restrict access to cubes, dimensions, members, or cells based on the logon credentials supplied by the client application. The OLAP administrator does this by creating security roles in the Analysis Services Manager. A security role defines a set of Microsoft Windows NT 4, Windows 2000, and Windows 2003 user accounts and groups that have the same access to SQL Server 2000 Analysis Services data. OLAP Intelligence supports two types of security roles: database and cube. Database roles Database roles are defined at the Analysis Services database level, and are maintained in the Database Role Manager. A database role can be assigned to multiple cubes and is used to limit access to specific cubes and their dimension members. Cube roles Cube roles are created at the cube level when a database role is assigned to a cube. They are maintained in the Cube Role Manager (Figure 1) and apply to a single cube. Defaults in a cube role are derived from the database role of the same name, but some of these defaults may be overridden in the cube role. A cube role contains additional options, such as cell security, that are not contained in a database role. IMPORTANT A security role must be defined for a cube in order for users to access it from a client application such as OLAP Intelligence. If no roles are defined for a cube, then only users who belong to the OLAP administrators group on the Analysis Services server will be able to access it. 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 3

4 Authentication Figure 1 Cube Role Manager To connect to an Analysis Services server on which role security is enabled, a user must first be successfully authenticated. Once the user s identity has been established, the Analysis Services server evaluates its security roles and then restricts or grants access to cube objects and data, accordingly. Security roles contain Windows NT 4, Windows 2000, or Windows 2003 user accounts and groups. Consider the following situations where the end user account fails to be authenticated by the Analysis Services server: Passing local user accounts Local user accounts may be created on any computer running a Windows NT 4, Windows 2000, Windows 2003, or Windows XP operating system. These accounts are recognized only on the computer on which they were created. If a client application attempts to pass the credentials of a local user account to an Analysis Services server running on a remote computer, the local user account will fail to authenticate. Passing user accounts across domains The ability to authenticate user accounts across domains depends on the Security Support Provider Interface (SSPI). According to Microsoft documentation, if the provider is NTLM (NT LAN Manager), access to an Analysis Services server requires an end user to be a member of the same domain as the user account with which the Analysis Services server is installed, or to be a member of a trusted domain. By default, OLAP Intelligence is configured to use the NTLM provider. IMPORTANT A user account that fails to authenticate on the Analysis Services server might still be granted access to cubes. On Windows 2000, if a security role that includes the Everyone group has been defined for an Analysis Services cube, then even unknown or anonymous users may access the cube data. On Windows 2003, however, anonymous connections are not permitted. 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 4

5 Microsoft Analysis Services security and the OLAP Intelligence Desktop Designer This section discusses using Microsoft Analysis Services security with the OLAP Intelligence Desktop Designer. Requirements Pivot Table Services Service Pack 3 must be installed locally on the client computer before you are able to create an OLAP Intelligence report that connects to a Microsoft Analysis Services cube. If Microsoft Analysis Services is running on a remote server, you must log on to the client computer, on which OLAP Intelligence is installed, using a domain account. This domain account must belong to a security role that has been defined and enabled for the target cube. Adding a server connection When setting up a new connection to the OLAP server in the Connection Properties dialog, use the values in Table 1. Field Server Type Caption Server Value Type the appropriate provider for the version of your Microsoft OLAP data source: Microsoft OLE DB Provider for OLAP Services (for Microsoft SQL Server 7 OLAP cubes) Microsoft OLE DB Provider for OLAP Services 8 (for Analysis Services 2000 (and earlier versions) OLAP cubes) Type a caption for the server connection as it appears in the Crystal OLAP Connection Browser. Type the computer name or IP address of the Analysis Services server. Table 1 Connection Properties NOTE Leave the user name and password boxes blank if you are connecting to Analysis Services cubes on a remote server. The user name and password values are only used if the OLAP Intelligence Desktop Designer and the Microsoft Analysis Services server are installed on the same computer. If the user name and password boxes are left blank, OLAP Intelligence passes the Windows credentials of the currently logged on user to the Analysis Services server for authentication. This is the account with which the application process has been started. In certain situations, the 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 5

6 current user s Windows credentials may not be sufficient to access the Analysis cubes on the server. Refer to the previous section about for more information. If you do not wish to pass the credentials of the currently logged on user, you have the option of changing the credentials that are passed. To change the credentials, complete these steps: 1. Create a shortcut to the file Olapi.exe. 2. Right-click the shortcut and click Properties. 3. Select the Run as a different user check box. When you start the OLAP Intelligence Desktop Designer, you are prompted to run the program as a different user. OLAP Intelligence then logs on to the Analysis Services server using these credentials. Configuring Microsoft Analysis Security for the BusinessObjects Enterprise environment In order to manage published OLAP Intelligence reports in the BusinessObjects Enterprise Administration Launchpad, you must install the Microsoft Analysis Services OLEDB Providers on the web application or IIS server. You can obtain these drivers by installing the Pivot Table Services package from the SQL Server 2000 Service Pack 3 for Analysis Services. The previous section describes the authentication process when you create a new report in the OLAP Intelligence Desktop Designer. After you publish the report to a BusinessObjects Enterprise system, you can specify how credentials are passed to the Microsoft Analysis Services server when a user makes a request to view it in a web browser. To specify how the credentials are passed, complete these steps: 1. In the Central Management Console (CMC), navigate to the published OLAP Intelligence report. 2. View its properties. 3. On the Data Source Logon tab, click one of the following three options: Logon using Web Component Adapter credentials Secondary logon for each application Logon using specific credentials 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 6

7 The option that you should select here depends on the following three factors: The viewer that your end users use to display published OLAP Intelligence reports in their browsers. The security roles that have been defined on the Analysis Services server. Whether the Web Application server and Microsoft Analysis Server reside on the same or separate computers. Viewing OLAP Intelligence reports with the ActiveX Interactive Viewer Figure 2 below illustrates the workflow of authenticating to the Microsoft Analysis Server from the ActiveX Interactive Viewer. Like the OLAP Intelligence Desktop Designer, the Viewer is based on thick-client architecture. The Viewer authenticates directly to the Analysis Services server by passing the Windows credentials of the user who is logged on to the client computer. Essentially, the requirements for the Viewer are the same as those for the Application Designer. Web Application server Web Component Adapter Microsoft Analysis Server ActiveX Viewer Plug-in Pivot Table Services Figure 2 - Authenticating to Analysis Server from the ActiveX Interactive Viewer Requirements Pivot Table Services must be installed locally on the client computer before an OLAP Intelligence report is viewed for the first time in the ActiveX Interactive Viewer. 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 7

8 The end user must be logged on to the ActiveX Interactive Viewer computer with a domain account. The domain account must also belong to a security role that has been defined and enabled for the target cube. On the Data Source Logon tab for the OLAP Intelligence report, the Logon using Web Component Adapter credentials check box must be selected. If another option is enabled, authentication will fail when the report is viewed in the ActiveX Interactive Viewer. Benefits The OLAP Intelligence ActiveX Interactive Viewer is ideal for a security model that restricts access to data on the Analysis Server based on the identity of the requesting user. Another benefit is that the authentication process is invisible to the user. As long as the user is logged on to the client computer with a Windows account that has the necessary permissions to access the cube, the user will not be prompted to supply additional logon information when viewing a report. Limitations The OLAP Intelligence ActiveX Interactive Viewer cannot be used to authenticate directly to the Analysis Services server if any of the following conditions apply: End users log on to their client computers with a local computer user account or a domain account that is not trusted by the Analysis Services server. End users view OLAP Intelligence reports on computers that are not registered on the intranet. The client computer must be able to resolve the IP address of the Analysis Services server in order to authenticate. End users authenticate to the Analysis Services server by passing the credentials of a different Windows account (not the credentials that they used to log on to the client computer). If any of these limitations apply, the DHTML interactive viewer can be used instead to view published OLAP Intelligence reports. IMPORTANT If any of these limitations apply, but you still want to use the ActiveX Interactive Viewer to view OLAP Intelligence reports, a possible workaround is to connect to the Analysis Server using HTTP authentication. Consult Microsoft documentation for details on how to set up HTTP authentication in Internet Information Services. 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 8

9 Viewing OLAP Intelligence Reports using the DHTML Interactive Viewer Figure 3 illustrates the workflow for authenticating a user on the Analysis Services server when a report is viewed in the OLAP Intelligence DHTML Interactive viewer. Because the DHTML Interactive viewer is a thin client, the work of connecting to and retrieving data from the Analysis Services server is performed by the Web Component Adapter (WCA) application on the web application server. The Microsoft connectivity components, Pivot Table Services, must be installed on the web application server computer. Web Component Adapter Pivot Table Services Web Application server (Java or IIS) DHTML Viewer in Web Browser Analysis Server Figure 3 - Authenticating to the Analysis Server from the DHTML Viewer The web server communicates directly with the application server that hosts the BusinessObjects Enterprise SDK. The WCA runs within the application server and provides all services that are not directly supported by the BusinessObjects Enterprise SDK. The web server passes requests directly to the application server, which then forwards the requests to the WCA. The WCA has two primary roles: To process ASP.NET (.aspx) and Java Server Pages (.jsp) files. To support Business Objects applications such as the Central Management Console (CMC), Crystal report viewers, and the OLAP Intelligence DHTML Interactive Viewer. NOTE In Crystal Enterprise 10, the communication between the web server and the application server is handled by the Web Connector and Web Component Server (WCS). In BusinessObjects Enterprise XI, the web server communicates directly with the application server. The WCA handles the WCS functionality on the Windows and UNIX platforms. 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 9

10 Setting data source logon option in the Central Management Console When viewing OLAP Intelligence reports in the ActiveX Interactive Viewer, only the Logon using Web Component Adapter Credentials option on the Data Source Logon tab (Figure 4) is applicable. If you are using the DHTML Interactive Viewer, you can set this option to one of three properties that are described in the following sections. Figure 4 Data Source Logon Tab Logon using Web Component Adapter credentials The Logon using Web Component Adapter Credentials option is selected by default when you publish an OLAP Intelligence report to a BusinessObjects Enterprise system. It is appropriate only when all users require generic access to the cube data. Since users who request to view OLAP Intelligence reports are always authenticated with the same WCA account credentials, they will all have access to the same data. The WCA application is loaded by the web server application process that hosts it. See Table 2 for a matrix of the main supported web application servers and their corresponding process names: Web Application Server Internet Information Services 5 Internet Information Services 6 Apache Tomcat 5 Process Name Aspnet_wp.exe W3wp.exe Tomcat5.exe Table 2 Web Application Server Process Names 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 10

11 The web application server process always runs under a specific Windows account. When a user makes a request to view a report with the DHTML Interactive Viewer, the WCA launches an out-of-process component. This component loads the data connectivity layer and then attempts to connect to the Analysis Services server by passing its process identity for authentication. Using an out-of-process server component has the following advantages: Increased flexibility in terms of the identity used (IIS only). Added security because an additional process hop makes it more difficult for an attacker to access the data on the Analysis Services server. Increased scalability to handle a large number of users. After a certain number of requests, the WCA launches another instance of the component to handle new incoming requests. By default, the out-of-process component is run using the same identity as the web application server. The Windows account under which the out-of-process component runs must belong to a security role on the Analysis Server or else authentication will fail. Web application server processes typically run under local computer accounts such as Local System, Network Service (Windows 2003), or ASPNET (Windows 2000). These local accounts work well if the web application server and the Analysis Services server are running on the same computer. If the web application server and Analysis Services server are running on different computers, however, the out-of-process component must pass the credentials of a Windows domain account. Computer accounts local to the web application server are not recognized on the remote Analysis Services server. Passing credentials from a Java web application server If you use a Java web application server that has been started as a Windows service, you can change the account that it starts with to a domain account from the Microsoft Management Console. Consult the vendor documentation of the specific web application server product that you are running for more information. Figure 5 illustrates how Windows credentials are presented to the Analysis Services server when the WCA is loaded by a Java application server, specifically Apache Tomcat. The WCA launches an out-of-process CORBA component called olapworker.exe that runs under the same identity as the Tomcat service. 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 11

12 Web Server Java Web Application Process (Tomcat5.exe) Running as domain user MyServAccount Web Component Adapter Remote Computer Microsoft Analysis Services Launches out of process CORBA component CORBA Component (olapworker.exe) Presents credentials for domain user MyServAccount Figure 5 - Passing credentials to the Analysis Server when the WCA is loaded by Apache Tomcat Server Passing credentials from Internet Information Services Figure 6 illustrates how credentials are passed to the Analysis Services server when the WCA has been deployed on an Internet Information Services server. The WCA launches an out-of-process DCOM component called olapsessions.exe. By default, the DCOM component runs under the same identity as the ASP.NET application process (w3wp.exe). IIS Web Server ASP.NET Application Process (w3wp.exe) Web Component Adapter Running as domain user MyServAccount Remote Computer Microsoft Analysis Services Launches out of process DCOM component DCOM Component (olapsessions.exe Presents credentials for domain user MyServAccount Figure 6 - Passing credentials to the Analysis Server when the WCA is loaded by IIS 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 12

13 There are several ways to modify the account with which the DCOM component olapsessions.exe is launched. The simplest approach is to modify the account that runs the ASP.NET application process (w3wp.exe). The DCOM component, olapsessions.exe, automatically launches under the same identity as the application process that calls it. There are several ways to modify the identity of the ASP.NET application process: Configure a new application pool in IIS 6 to run under a specific account and then add the InfoView application to the application pool. Impersonate a specific identity by setting user name and password attributes for the <identity> element in the web.config file. This file is located in the root directory of the InfoView application. Consult Microsoft documentation for more information about changing the ASP.NET application process account. Changing the identity of the application process could reduce the security of your web application, as in the case where the application must be set to run under a domain account in order to access a network resource. A more secure and flexible approach is to configure the launching identity of the DCOM component directly. You can configure the DCOM component olapsessions.exe to run under an account that is different from the web application server process that launches it. This allows you to isolate privileged access for a network resource to only the DCOM component that needs to use it. For more information on how to configure the identity of the DCOM component directly, refer to the section Configuring DCOM components. Secondary logon for each application The Secondary Logon for each Application option for each application should be enabled if you have a more complex role security model that restricts access to cube data based on the identity of the user making the request. For example, an OLAP Intelligence administrator has defined different security roles for sales managers in Region 1 and Region 2 and wishes to restrict their read access to only the data that applies to their region. The data that is presented in the OLAP Intelligence report will change depending on the identity of the user who makes the request. When the credentials of the requesting user are passed to the Analysis Services server for authentication, the server determines which user s security roles and subsequently returns the corresponding data. 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 13

14 When the Secondary Logon for each Application option for an OLAP Intelligence report is enabled, whenever a user makes a request to view a report in the DHTML Interactive Viewer, a logon screen appears. Instead of passing its own process credentials, the WCA sends the credentials supplied by the user (through the Secondary Logon dialog box) to the Analysis Server for authentication (Figure 7). Web Server Web Application server Process Running as domain user MyServAccount Web Component Adapter Secondary Logon Dialog User enters own account credentials MyUserAccount Remote Computer Microsoft Analysis Services Launches out-ofprocess component that runs under MyServAccount Out-of-process serviced component Impersonates domain user MyUserAccount Figure7 - Passing secondary logon credentials to a remote Analysis Services server. The WCA passes the credentials through a process known as impersonation. Impersonation is the ability of a thread to execute in a different security context from the context of the process that owns the thread. In this case, the user account MyServAccount impersonates the user MyUserAccount. Various levels of impersonation are supported by Microsoft operating systems. The following two are relevant when configuring OLAP Intelligence reports to use secondary logon: The Impersonate level is sufficient for secondary logon to work when the WCA and the Analysis Services server are running on the same computer. No additional configuration is required aside from enabling the Secondary Logon for each Application option. The Delegate level is required if the Analysis Services server runs on a remote server, as shown in Figure 5, because the WCA must be able to impersonate at this level to successfully pass secondary logon credentials. Enabling secondary logon for an OLAP Intelligence report in a distributed server environment requires additional configuration, 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 14

15 specifically enabling Kerberos for the WCA. For the detailed steps, refer to the section Configuring the Web Component Adapter for delegation. Logon using specific credentials The technical requirements for enabling the option Logon Using Specific Credentials are identical to those for enabling the option Secondary logon for Each Application. When this option is enabled, instead of prompting the end user to provide credentials, the WCA passes the credentials that have been stored for the report on the Data Source Logon tab. This option is suitable when you need to restrict access to cube data for different groups of users at the report level. You may, for example, have a report that shows total sales. Sales managers from each region normally do not have access to all data in the Sales Reporting cube. By setting this report to log on with the credentials of a super user that does have this access, regional sales managers are able to view this report that shows total sales for all regions. As with secondary logon, the WCA has to impersonate the specific user account that has been stored for the report on the Data Source Logon tab. To use this option in a distributed environment, where the WCA and Analysis Server are running on separate computers, proceed to the next section. Configuring the Web Component Adapter for delegation Prerequisites The following are the prerequisites for configuring the WCA for delegation: The computers hosting the WCA and Analysis Server must be running Windows 2000 or later in an Active Directory domain. The Analysis Services server must be configured to use Kerberos authentication. To use Kerberos authentication, you must install Analysis Services Service Pack 3 (SP3) or later on the Analysis Services server computer. Search for knowledge base article number on the Microsoft support site for additional information. Enabling Kerberos security support on the Web Component Adapter By default, the WCA uses NTLM as the authentication method to connect to the Analysis Services server. NTLM, however, does not support delegate level impersonation. To configure the WCA to use Kerberos for the authentication method, you must manually add a registry value as follows: 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 15

16 1. On the computer where the WCA is installed, start the Registry Editor and create the following registry subkey: HKLM\Software\Business Objects\Suite 11.0\OLAP Intelligence\OCCA(o)\SOFA\ODBO\MSOLAP 2. Add a registry entry to the MSOLAP subkey called SecurityPackage. The SecurityPackage entry can contain one of the text string values in Table 3. Value NTLM Kerberos Negotiate Description Use the NTLM security protocol. This is the default and is used when the registry subkey is not present. Use the Kerberos security protocol. Kerberos if supported, otherwise NTLM. Table 3 - Values for SecurityPackage Registry Entry 3. Set the value of the SecurityPackage registry entry to Kerberos. Configure Active Directory account settings Use the Active Directory Users and Computers management console to configure permissions for the relevant accounts. Web Component Adapter account The WCA runs under the identity of the web application server process. This is the user account that impersonates other user accounts. The policy for this user account must be enabled with Account is trusted for delegation. You can modify user account policies in the Active Directory Users and Computers snap-in for the Microsoft Management Console. The web application server does not necessarily have to run under a domain user account. If the web application server process runs under the Local System account, then enable the Trust computer for delegation option. This option provides the Local System account on the computer where the web application server is installed the ability to perform impersonation at the delegate level. Target user accounts The target user accounts are the user accounts that are passed to the WCA for impersonation. For the Enable Secondary logon for each Application option, the target account is entered by the requesting user at run time on the Secondary Logon window. For the Logon using specific credentials option, the target account is hard-coded by the administrator on the Data Source Logon tab in the Central Management Console. Target user account policies must not have the Active Directory Account is sensitive and cannot be delegated option enabled. 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 16

17 Configuring DCOM components You only need to configure DCOM components if you are running your application in the ASP.NET framework with IIS. In an ASP.NET environment, the WCA launches a DCOM component out-of-process. As described in the section Passing credentials from Internet Information Services, the WCA, running inside the ASP.NET worker process, launches an out-of-process DCOM component called olapsessions.exe. This component must be configured to launch under an account that has been trusted for delegation in order to use secondary logon. Configuring DCOM for IIS on Windows 2000 Windows contains a tool that allows you to configure installed DCOM components. The following steps describe how to configure IIS 5 and Windows 2000 to launch the DCOM component process, olapsessions.exe, under a specific account: 1. On the Start menu, click Run. 2. Type dcomcnfg.exe in the Run box and then click OK. The Distributed COM Configuration Properties dialog box appears. NOTE If a dialog box appears with the following text, click Yes for the Ringleader Manager Component to be added to the list of configurable DCOM components: The CLSID {E8049D01-EEC4-40AF-AADC-2F191BC5E927}, item C:\Program Files\Business Objects\OLAP Intelligence 11\DHTML Components\olapsessions.exe and title Ringleader Manager has the named value AppId, but is not recorded under \\HKEY_CLASSES_ROOT\AppId. Do you wish to record it? 3. On the Applications tab, click Ringleader Manager, and then click the Properties button. The Ringleader Manager Properties dialog box appears. 4. On the Security tab, click Use Custom Access Permissions, and then click the Edit button. The Registry Key Permissions dialog box appears. 5. Click Add. The Add users and Groups dialog box appears. 6. Type the account name under which the ASP.NET worker process runs for your application. On Windows 2000, the worker process launches by default with a local account called ASPNET. If you have modified your application to start with a different account, specify that account instead. 7. Ensure that Allow Access appears in the Type of Access list and then click OK. 8. Click OK on the Registry Key Permissions dialog box. 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 17

18 9. Click Use custom launch permissions on the Ring Leader Properties window and then click the Edit button. 10. Repeat steps 5 to On the Identity tab, click This user, and then type the user name and password of the account that was marked Account is trusted for delegation in the Active Directory Users and Computers management console. 12. Click the OK button. Configuring DCOM for Internet Information Services 6 and Windows 2003 These steps demonstrate how to configure IIS 6 and Windows 2003 to launch the DCOM component process, olapsessions.exe, under a specific account: 1. On the Start menu, click Run, type dcomcnfg.exe in the Run box, and then click OK. 2. Expand Component Services > Computers > My Computer > DCOM Config. 3. Right-click OlapSessions and click Properties. 4. On the Security tab, click Customize in the Access Permissions area, and then click the Edit button. The Access Permission dialog box appears. 5. Click Add and type the name of the account that the ASP.NET worker process runs under for your application. On Windows 2003, the worker process launches by default with a local account called Network Service. If you have modified your application to start with a different account, specify that account instead. 6. Ensure that the Access Permission box is selected under the Allow column and then click OK. 7. Click OK to return to the OlapSesssions Properties dialog box. 8. In the Launch Permissions area, click Customize, click the Edit button, and then repeat steps 5 to Go to Component Services > Computers > My Computer > DCOM Config > Ringleader Manager. 10. Right-click Ringleader Manager and click Properties. 11. For the launch and access permissions, add the account under which the ASP.NET worker process runs. 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 18

19 12. On the Identity tab, click This user and enter the username and password of the account that has been marked Account is trusted for delegation in the Active Directory Users and Computers management console. Click on the OK button. 13. On the Identity tab, click This user, and then type the user name and password of the account that was marked Account is trusted for delegation in the Active Directory Users and Computers management console. 14. Click the OK button. Verifying that WCA delegation is working You can now verify whether the Secondary Logon or Logon Using Specific Credentials options are working as expected. The WCA should be passing the credentials of the account specified in the Secondary Logon dialog box or the Data Source logon tab rather than passing the credentials of the web application server process. As illustrated in Figure 5, the WCA passes the credentials for MyUserAccount to the Analysis Services server. You can also verify that the correct account is being passed by the WCA by turning on logging for the Microsoft Analysis Services server, as follows: 1. Start the registry editor on the computer where Microsoft Analysis Services is running. 2. Navigate to the following registry subkey: HKLM\Software\Microsoft\OLAP Server\CurrentVersion 3. Change the value of the AuditEvents registry entry from 13 to 15 (decimal). 4. Restart the Analysis Services server. After modifying this registry value, all authentication attempts are logged to the Event Viewer. 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 19

20 Finding more information Supported platforms For more information on BusinessObjects Enterprise XI supported platforms, refer to the document boe_xi_supported_platforms.pdf. Improving performance and scalability For more information on how to improve the performance and scalability of your BusinessObjects OLAP Intelligence XI installation, refer to the document bo_olap_xi_improving_performance_scalability.pdf. Configuring web application servers For more information on how to configure web application servers to work in conjunction with BusinessObjects OLAP Intelligence XI, refer to the document bo_olapi_xi_configuring_web_application_servers.pdf For more information and resources, refer to the product documentation and visit the support area of the web site at No part of the computer software or this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from Business Objects. The information in this document is subject to change without notice. Business Objects does not warrant that this document is error free. This software and documentation is commercial computer software under Federal Acquisition regulations, and is provided only under the Restricted Rights of the Federal Acquisition Regulations applicable to commercial computer software provided at private expense. The use, duplication, or disclosure by the U.S. Government is subject to restrictions set forth in subdivision (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at The Business Objects product and technology are protected by US patent numbers 5,555,403; 6,247,008; 6,578,027; 6,490,593; and 6,289,352. The Business Objects logo, the Business Objects tagline, BusinessObjects, BusinessObjects Broadcast Agent, BusinessQuery, Crystal Analysis, Crystal Analysis Holos, Crystal Applications, Crystal Enterprise, Crystal Info, Crystal Reports, Rapid Mart, and WebIntelligence are trademarks or registered trademarks of Business Objects SA in the United States and/or other countries. Various product and service names referenced herein may be trademarks of Business Objects SA. All other company, product, or brand names mentioned herein, may be the trademarks of their respective owners. Specifications subject to change without notice. Not responsible for errors or omissions. Copyright 2005 Business Objects SA. All rights reserved. 8/26/2005 1:17:00 PM Copyright 2005 Business Objects. All rights reserved. Page 20

BusinessObjects OLAP Intelligence XI

BusinessObjects OLAP Intelligence XI Improving Performance and Scalability Overview This document discusses how to fine-tune your BusinessObjects OLAP Intelligence XI installation for greater performance and scalability. Contents INTRODUCTION...

More information

Report Viewer Comparison

Report Viewer Comparison Report Viewer Comparison Overview Contents BusinessObjects Enterprise and Crystal Reports Server allow viewing and exporting of reports over the web using two types of viewers: zeroclient and thin client

More information

Webi Auto Documentation

Webi Auto Documentation Webi Documentation Made Easy Overview Contents This document contains a detailed description of how to make use of the Report Engine SDK to help make the documentation process more efficient. OVERVIEW...2

More information

Crystal Reports XI Release 2

Crystal Reports XI Release 2 Overview Contents This technical document describes how to use integrated and SQL authentication in applications that use the Crystal Reports.NET SDK. Specifically, seven scenarios are discussed that involve

More information

BusinessObjects Metadata Management XI 3.0 for Windows

BusinessObjects Metadata Management XI 3.0 for Windows BusinessObjects Metadata Management XI 3.0 for Windows Supported Platforms Overview Contents This document lists specific platforms and configurations for BusinessObjects Metadata Management XI 3.0 for

More information

Crystal Reports XI Release 2

Crystal Reports XI Release 2 Overview Contents This document discusses how to deploy the Crystal Reports XI Release 2 Java Reporting Component in web and desktop (thick-client) environments. INTRODUCTION... 2 Background...2 COMMON

More information

Crystal Enterprise. Overview. Contents. Configuring the Crystal Enterprise SDK for Firewalls

Crystal Enterprise. Overview. Contents. Configuring the Crystal Enterprise SDK for Firewalls Overview Contents This technical brief discusses the effects of a firewall in a Crystal Enterprise SDK environment, as well as how to configure the Enterprise servers and SDK to work with a firewall. INTRODUCTION...

More information

BusinessObjects Enterprise XI Release 2

BusinessObjects Enterprise XI Release 2 Configuring Kerberos End-to-End Single Sign-On using IIS Overview Contents This document provides information and instructions for setting up Kerberos end-to-end Single Sign-On (SSO) using IIS to the database

More information

BusinessObjects Data Integrator XI Release 2 for Sun SOLARIS SPARC

BusinessObjects Data Integrator XI Release 2 for Sun SOLARIS SPARC BusinessObjects Data Integrator XI Release 2 for Sun SOLARIS SPARC Supported Platforms Overview Contents This document lists specific platforms and configurations for the BusinessObjects Data Integrator

More information

Crystal Enterprise. Overview. Contents. Web Server Overview - Internet Information System (IIS)

Crystal Enterprise. Overview. Contents. Web Server Overview - Internet Information System (IIS) Overview Contents This document provides an overview to web server technology particularly Microsoft s Internet Information Server (IIS) and its relationship with. Although this article has been written

More information

Crystal Reports 10. Overview. Contents. Supported and Tested Platforms. This document lists the supported and tested platforms for Crystal Reports 10.

Crystal Reports 10. Overview. Contents. Supported and Tested Platforms. This document lists the supported and tested platforms for Crystal Reports 10. Overview Contents This document lists the supported and tested platforms for Crystal Reports 10. INTRODUCTION... 2 MINIMUM HARDWARE REQUIREMENTS FOR CRYSTAL REPORTS 10...2 Windows...2 SUPPORTED PLATFORMS

More information

Crystal Reports. Overview. Contents. Charting on Print-Time Formulas

Crystal Reports. Overview. Contents. Charting on Print-Time Formulas Crystal Reports Charting on Print-Time Formulas Overview Contents In Crystal Reports, you cannot create a chart off a print-time, or WhilePrintingRecords formula. However, in Crystal Reports 9 and above

More information

SAP BusinessObjects Integration Option for Microsoft SharePoint Getting Started Guide

SAP BusinessObjects Integration Option for Microsoft SharePoint Getting Started Guide SAP BusinessObjects Integration Option for Microsoft SharePoint Getting Started Guide SAP BusinessObjects XI3.1 Service Pack 4 Copyright 2011 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet,

More information

Microsoft Active Directory Plug-in User s Guide Release

Microsoft Active Directory Plug-in User s Guide Release [1]Oracle Enterprise Manager Microsoft Active Directory Plug-in User s Guide Release 13.1.0.1.0 E66401-01 December 2015 Oracle Enterprise Manager Microsoft Active Directory Plug-in User's Guide, Release

More information

Crystal Reports 10 and.net

Crystal Reports 10 and.net Overview Contents This document discusses the options for deploying Visual Studio.NET applications built using Crystal Reports 10 for Visual Studio.NET. Both merge modules and interactive install packages

More information

AccuRoute Web Client v2.0 installation and configuration guide

AccuRoute Web Client v2.0 installation and configuration guide AccuRoute Web Client v2.0 installation and configuration guide July 22, 2009 Omtool, Ltd. 6 Riverside Drive Andover, MA 01810 Phone: +1/1 978 327 5700 Toll-free in the US: +1/1 800 886 7845 Fax: +1/1 978

More information

Sage 300. Sage CRM 2018 Integration Guide. October 2017

Sage 300. Sage CRM 2018 Integration Guide. October 2017 Sage 300 Sage CRM 2018 Integration Guide October 2017 This is a publication of Sage Software, Inc. 2017 The Sage Group plc or its licensors. All rights reserved. Sage, Sage logos, and Sage product and

More information

Administrator for Enterprise Clients: User s Guide. Second Edition

Administrator for Enterprise Clients: User s Guide. Second Edition Administrator for Enterprise Clients: User s Guide Second Edition The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2002. Administrator for Enterprise Clients: User s

More information

Report Designer Component 10

Report Designer Component 10 10 Creating an RDC Deployment Package Using Wise Installer Overview Contents An application designed using the Report Designer Component (RDC) requires that multiple DLLs are present on the client computer

More information

DataFlux Web Studio 2.5. Installation and Configuration Guide

DataFlux Web Studio 2.5. Installation and Configuration Guide DataFlux Web Studio 2.5 Installation and Configuration Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. DataFlux Web Studio 2.5: Installation and Configuration

More information

Sage ERP Accpac 6.0A. SageCRM 7.0 I Integration Guide

Sage ERP Accpac 6.0A. SageCRM 7.0 I Integration Guide Sage ERP Accpac 6.0A SageCRM 7.0 I Integration Guide 2010 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and all Sage ERP Accpac product and service names mentioned herein are registered

More information

Oracle Enterprise Single Sign-on Provisioning Gateway

Oracle Enterprise Single Sign-on Provisioning Gateway Oracle Enterprise Single Sign-on Provisioning Gateway Installation and Setup Guide Release 10.1.4.0.3 E10330-01 June 2007 Oracle Enterprise Single Sign-on Provisioning Gateway Installation and Setup Guide,

More information

BusinessObjects LifeCycle Manager User's Guide

BusinessObjects LifeCycle Manager User's Guide BusinessObjects LifeCycle Manager User's Guide BusinessObjects Enterprise XI 3.1 Service Pack2 windows Copyright 2009 SAP BusinessObjects. All rights reserved. SAP BusinessObjects and its logos, BusinessObjects,

More information

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902 Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Oracle Enterprise Manager

Oracle Enterprise Manager Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft BizTalk Server Release 12.1.0.1.0 E28546-04 February 2014 This document provides a brief description about the Microsoft

More information

Enterprise Product Integration. Configuration and Troubleshooting Guide

Enterprise Product Integration. Configuration and Troubleshooting Guide Enterprise Product Integration Configuration and Troubleshooting Guide Legal Information Book Name: Enterprise Product Integration Configuration and Troubleshooting Guide Part Number: EPI-0200-IGCG Product

More information

SCCM Plug-in User Guide. Version 3.0

SCCM Plug-in User Guide. Version 3.0 SCCM Plug-in User Guide Version 3.0 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave

More information

Using SAP NetWeaver Business Intelligence in the universe design tool SAP BusinessObjects Business Intelligence platform 4.1

Using SAP NetWeaver Business Intelligence in the universe design tool SAP BusinessObjects Business Intelligence platform 4.1 Using SAP NetWeaver Business Intelligence in the universe design tool SAP BusinessObjects Business Intelligence platform 4.1 Copyright 2013 SAP AG or an SAP affiliate company. All rights reserved. No part

More information

Crystal Enterprise. Overview. Contents. Upgrading CE8.5 to CE10 Microsoft Windows

Crystal Enterprise. Overview. Contents. Upgrading CE8.5 to CE10 Microsoft Windows Crystal Enterprise Upgrading CE8.5 to CE10 Microsoft Windows Overview This document is intended to assist you upgrade from a Crystal Enterprise (CE) 8.5 system to a CE 10 system. NOTE: The scenario outlined

More information

SAP BusinessObjects Enterprise Upgrade Guide

SAP BusinessObjects Enterprise Upgrade Guide SAP BusinessObjects Enterprise Upgrade Guide SAP BusinessObjects Enterprise XI 3.1 Service Pack 3 Copyright 2010 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business

More information

Microsoft Internet Information Services (IIS) Plug-in User s Guide Release

Microsoft Internet Information Services (IIS) Plug-in User s Guide Release [1]Oracle Enterprise Manager Microsoft Internet Information Services (IIS) Plug-in User s Guide Release 13.1.0.1.0 E66400-01 December 2015 Oracle Enterprise Manager Microsoft Internet Information Services

More information

SAS Profitability Management 1.3. Installation Instructions

SAS Profitability Management 1.3. Installation Instructions SAS Profitability Management 1.3 Installation Instructions Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., SAS Profitability Management 1.3 Installation

More information

Oracle Cloud Getting Started with Remote Data Connector for Oracle Analytics Cloud

Oracle Cloud Getting Started with Remote Data Connector for Oracle Analytics Cloud Oracle Cloud Getting Started with Remote Data Connector for Oracle Analytics Cloud E67875-06 May 2018 Oracle Cloud Getting Started with Remote Data Connector for Oracle Analytics Cloud, E67875-06 Copyright

More information

Alchemex. Web Reporting. Learning Services Alchemex Web Module

Alchemex. Web Reporting. Learning Services Alchemex Web Module Alchemex Web Reporting 1 Table of Contents About The Web Module... 1 Web Module Benefits and Features... 3 Product Features... 3 Product Benefits... 3 Customer Benefits... 3 How It Works... 4 Users Guide...

More information

Crystal Enterprise. Overview. Contents. Installation FAQ: Crystal Enterprise 9 & 10

Crystal Enterprise. Overview. Contents. Installation FAQ: Crystal Enterprise 9 & 10 : Crystal Enterprise 9 & 10 Overview Contents This document has been compiled in an effort to assist you both in determining installation requirements for your Crystal Enterprise (CE) installation as well

More information

MegaTrack. Quick Start Guide

MegaTrack. Quick Start Guide MegaTrack Quick Start Guide MegaTrack Quick Start Guide This document will help you quickly install and test the MegaTrack software. For additional information regarding the operation and configuration

More information

Installation Instructions for SAS Activity-Based Management 6.2

Installation Instructions for SAS Activity-Based Management 6.2 Installation Instructions for SAS Activity-Based Management 6.2 Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Installation Instructions for SAS

More information

Pre-Installation Checklist v5.0

Pre-Installation Checklist v5.0 Pre-Installation Checklist v5.0 November 2010 Table of Contents Introduction 3 Network infrastructure 4 ShareScan Manager PC 5 Devices 7 ecopy Connectors 8 Network Communication 13 Document Management

More information

NTP Software File Auditor for Hitachi

NTP Software File Auditor for Hitachi NTP Software File Auditor for Hitachi Installation Guide Version 3.3 This guide details the method for the installation and initial configuration of NTP Software File Auditor for NAS, Hitachi Edition,

More information

SAS Enterprise Guide 4.3

SAS Enterprise Guide 4.3 Administering SAS Enterprise Guide 4.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2010. Administering SAS Enterprise Guide 4.3. Cary, NC: SAS

More information

SPNEGO SINGLE SIGN-ON USING SECURE LOGIN SERVER X.509 CLIENT CERTIFICATES

SPNEGO SINGLE SIGN-ON USING SECURE LOGIN SERVER X.509 CLIENT CERTIFICATES SPNEGO SINGLE SIGN-ON USING SECURE LOGIN SERVER X.509 CLIENT CERTIFICATES TABLE OF CONTENTS SCENARIO... 2 IMPLEMENTATION STEPS... 2 PREREQUISITES... 3 1. CONFIGURE ADMINISTRATOR FOR THE SECURE LOGIN ADMINISTRATION

More information

How does it look like?

How does it look like? EasyAdmin Windows Authentication KB4031b 1 The OpenLM EasyAdmin administrative web interface incorporates a role-based security access scheme, facilitating different levels of access to different role

More information

Two-Machine Deployment of SAS Office Analytics 7.4

Two-Machine Deployment of SAS Office Analytics 7.4 Two-Machine Deployment of SAS Office Analytics 7.4 SAS Documentation January 8, 2018 The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2017. Two-Machine Deployment of

More information

Oracle Hospitality Simphony Post-Installation or Upgrade Guide. Release 18.2

Oracle Hospitality Simphony Post-Installation or Upgrade Guide. Release 18.2 Oracle Hospitality Simphony Post-Installation or Upgrade Guide Release 18.2 F12086-01 December 2018 Oracle Hospitality Simphony Post-Installation or Upgrade Guide, Release 18.2 F12086-01 Copyright Oracle

More information

BusinessObjects Enterprise XI Administrator Workshop

BusinessObjects Enterprise XI Administrator Workshop BusinessObjects Enterprise XI Administrator Workshop Vision Harvest, Inc. 1-888-236-8087 sales@visionharvest.com Published November 1, 2005 i ALL RIGHTS RESERVED This course covers BusinessObjects Enterprise

More information

DefendX Software Control-Audit for Hitachi Installation Guide

DefendX Software Control-Audit for Hitachi Installation Guide DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi

More information

Oracle Enterprise Single Sign-on Logon Manager How-To: Configuring ESSO-LM Event Logging with Microsoft SQL Server 2005 Release

Oracle Enterprise Single Sign-on Logon Manager How-To: Configuring ESSO-LM Event Logging with Microsoft SQL Server 2005 Release Oracle Enterprise Single Sign-on Logon Manager How-To: Configuring ESSO-LM Event Logging with Microsoft SQL Server 2005 Release 11.1.1.5.0 21012-01 March 2011 Oracle Enterprise Single Sign-on Logon Manager

More information

SAS Contextual Analysis 13.2: Administrator s Guide

SAS Contextual Analysis 13.2: Administrator s Guide SAS Contextual Analysis 13.2: Administrator s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS Contextual Analysis 13.2: Administrator's

More information

Version Installation Guide. 1 Bocada Installation Guide

Version Installation Guide. 1 Bocada Installation Guide Version 19.4 Installation Guide 1 Bocada Installation Guide Copyright 2019 Bocada LLC. All Rights Reserved. Bocada and BackupReport are registered trademarks of Bocada LLC. Vision, Prism, vpconnect, and

More information

2 Post Installation Security Configurations

2 Post Installation Security Configurations Oracle Argus Safety Minimum Security Configuration Guide Release 8.1.1 E90744-01 September 2017 This guide describes essential security management options for the following application: Oracle Argus Safety

More information

Administering SAS Enterprise Guide 4.2

Administering SAS Enterprise Guide 4.2 Administering SAS Enterprise Guide 4.2 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. Administering SAS Enterprise Guide 4.2. Cary, NC: SAS

More information

Installation Manual. Fleet Maintenance Software. Version 6.4

Installation Manual. Fleet Maintenance Software. Version 6.4 Fleet Maintenance Software Installation Manual Version 6.4 6 Terri Lane, Suite 700 Burlington, NJ 08016 (609) 747-8800 Fax (609) 747-8801 Dossier@dossiersystemsinc.com www.dossiersystemsinc.com Copyright

More information

Configuring Remote Access using the RDS Gateway

Configuring Remote Access using the RDS Gateway Configuring Remote Access using the RDS Gateway Author: AC, SNE Contents Introduction... 3 Pre-requisites... 3 Supported Operating Systems... 3 Installing the I.T. Services Certificate Authority Root Certificate...

More information

ecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist

ecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist ecopy ShareScan v4.2 for ecopy ScanStation Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication

More information

BusinessObjects Polestar Error Message Guide

BusinessObjects Polestar Error Message Guide BusinessObjects Polestar Error Message Guide BusinessObjects Polestar XI 3.1 windows Copyright 2008 Business Objects, an SAP company. All rights reserved. Business Objects owns the following U.S. patents,

More information

Installation on Windows Server 2008

Installation on Windows Server 2008 USER GUIDE MADCAP PULSE 4 Installation on Windows Server 2008 Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Oracle Hospitality Simphony Cloud Services Post-Installation or Upgrade Guide Release 2.10 E July 2018

Oracle Hospitality Simphony Cloud Services Post-Installation or Upgrade Guide Release 2.10 E July 2018 Oracle Hospitality Simphony Cloud Services Post-Installation or Upgrade Guide Release 2.10 E89810-04 July 2018 Copyright 2010, 2018, Oracle and/or its affiliates. All rights reserved. This software and

More information

Business Insights Dashboard

Business Insights Dashboard Business Insights Dashboard Sage 500 ERP 2000-2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks

More information

Microsoft Dynamics AX 4.0

Microsoft Dynamics AX 4.0 Microsoft Dynamics AX 4.0 Install and Configure a Microsoft Dynamics AX Enterprise Portal Server White Paper Date: June 27, 2006 http://go.microsoft.com/fwlink/?linkid=69531&clcid=0x409 Table of Contents

More information

Veritas Desktop and Laptop Option 9.2

Veritas Desktop and Laptop Option 9.2 1. Veritas Desktop and Laptop Option 9.2 Quick Reference Guide for DLO Installation and Configuration 24-Jan-2018 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.

More information

FuegoBPM TM Enterprise Process Orchestration Engine Configuration Instructions for a JVM Engine

FuegoBPM TM Enterprise Process Orchestration Engine Configuration Instructions for a JVM Engine FuegoBPM TM Enterprise Process Orchestration Engine Configuration Instructions for a JVM Engine FUEGOBPM System Administration Training PART NO. FEPOECv5.5 Date January 1, 2005 Copyright Fuego, Inc. 2004.

More information

Oracle Enterprise Manager

Oracle Enterprise Manager Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Active Directory Release 10 (2.1.2.1.0) E14542-01 April 2009 Microsoft Active Directory, which is included with Microsoft

More information

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book] Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

Live Data Connection to SAP Universes

Live Data Connection to SAP Universes Live Data Connection to SAP Universes You can create a Live Data Connection to SAP Universe using the SAP BusinessObjects Enterprise (BOE) Live Data Connector component deployed on your application server.

More information

NTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp

NTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp NTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp Installation Guide This guide provides a short introduction to the installation and initial configuration of NTP Software

More information

Microsoft.NET Framework Plug-in User s Guide Release

Microsoft.NET Framework Plug-in User s Guide Release [1]Oracle Enterprise Manager Microsoft.NET Framework Plug-in User s Guide Release 13.1.0.1.0 E66402-01 December 2015 Oracle Enterprise Manager Microsoft.NET Framework Plug-in User's Guide, Release 13.1.0.1.0

More information

HP QuickTest Professional

HP QuickTest Professional HP QuickTest Professional Software Version: 10.00 Installation Guide Manufacturing Part Number: T6513-90038 Document Release Date: January 2009 Software Release Date: January 2009 Legal Notices Warranty

More information

HYPERION SYSTEM 9 BI+ GETTING STARTED GUIDE APPLICATION BUILDER J2EE RELEASE 9.2

HYPERION SYSTEM 9 BI+ GETTING STARTED GUIDE APPLICATION BUILDER J2EE RELEASE 9.2 HYPERION SYSTEM 9 BI+ APPLICATION BUILDER J2EE RELEASE 9.2 GETTING STARTED GUIDE Copyright 1998-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion H logo, and Hyperion s product

More information

BusinessObjects Enterprise XI

BusinessObjects Enterprise XI Overview Contents This document contains information on LDAP authentication and how to configure with this type of authentication. INTRODUCTION... 2 What Is LDAP?...2 LDAP platforms supported by...3 LDAP

More information

Building reports using the Web Intelligence HTML Report Panel

Building reports using the Web Intelligence HTML Report Panel Building reports using the Web Intelligence HTML Report Panel Building reports using the Web Intelligence HTML Report Panel Copyright 2008 Business Objects. All rights reserved. Business Objects owns the

More information

SAS Cost and Profitability Management 8.3. Installation, Migration, and Configuration Guide

SAS Cost and Profitability Management 8.3. Installation, Migration, and Configuration Guide SAS Cost and Profitability Management 8.3 Installation, Migration, and Configuration Guide Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., SAS Cost

More information

Configuring Integrated Windows Authentication for IBM WebSphere with SAS 9.2 Web Applications

Configuring Integrated Windows Authentication for IBM WebSphere with SAS 9.2 Web Applications Configuring Integrated Windows Authentication for IBM WebSphere with SAS 9.2 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring

More information

Supervisor Insight. Installation Guide.

Supervisor Insight. Installation Guide. Supervisor Insight Installation Guide www.monitorbm.com Supervisor Insight Installation Guide Copyright 2014 Monitor Business Machines Ltd The software contains proprietary information of Monitor Business

More information

Sage Installation and System Administrator s Guide. March 2019

Sage Installation and System Administrator s Guide. March 2019 Sage 100 2019 Installation and System Administrator s Guide March 2019 2019 The Sage Group plc or its licensors. All rights reserved. Sage, Sage logos, and Sage product and service names mentioned herein

More information

Using ifix EGD I/O Driver and OPC Server v7.20 with Microsoft Windows XP Service Pack 2 WHITE PAPER

Using ifix EGD I/O Driver and OPC Server v7.20 with Microsoft Windows XP Service Pack 2 WHITE PAPER Using ifix EGD I/O Driver and OPC Server v7.20 with Microsoft Windows XP Service Pack 2 WHITE PAPER Last Modified: September 16, 2004 Table of Contents Introduction... 1 Network Protection... 1 Windows

More information

Oracle Information Rights Management Oracle IRM Windows Authentication Extension Guide 10gR3 August 2008

Oracle Information Rights Management Oracle IRM Windows Authentication Extension Guide 10gR3 August 2008 10gR3 August 2008 ,, 10gR3 Copyright 2007, 2008, Oracle. All rights reserved. Primary Author: Martin Abrahams Contributing Author: Martin Wykes The Programs (which include both the software and documentation)

More information

SAS Integration Technologies Server Administrator s Guide

SAS Integration Technologies Server Administrator s Guide SAS 9.1.2 Integration Technologies Server Administrator s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS 9.1.2 Integration Technologies: Server Administrator

More information

Oracle Hospitality Simphony Venue Management Installation Guide Release 3.10 E March 2018

Oracle Hospitality Simphony Venue Management Installation Guide Release 3.10 E March 2018 Oracle Hospitality Simphony Venue Management Installation Guide Release 3.10 E89837-02 March 2018 Copyright 2002, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

Oracle Cloud. Oracle Cloud Adapters Postinstallation Configuration Guide E

Oracle Cloud. Oracle Cloud Adapters Postinstallation Configuration Guide E Oracle Cloud Oracle Cloud Adapters Postinstallation Configuration Guide 12.1.3 E65437-05 October 2016 Oracle Cloud Oracle Cloud Adapters Postinstallation Configuration Guide, 12.1.3 E65437-05 Copyright

More information

Oracle Hospitality Inventory Management Security Guide Release 9.1 E

Oracle Hospitality Inventory Management Security Guide Release 9.1 E Oracle Hospitality Inventory Management Security Guide Release 9.1 E97550-01 June 2018 Copyright 2001, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are

More information

SAS Contextual Analysis 14.3: Administrator s Guide

SAS Contextual Analysis 14.3: Administrator s Guide SAS Contextual Analysis 14.3: Administrator s Guide SAS Documentation August 25, 2017 The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2017. SAS Contextual Analysis

More information

4 BSM FOUNDATION BOOTCAMP

4 BSM FOUNDATION BOOTCAMP Lab 4 BSM FOUNDATION BOOTCAMP BMC Analytics Using and Installing BMC Analytics Table of Contents Part I: Part II: Simple Report Creation Converting table to chart; switching the dimension. Part III: How

More information

Workspace Administrator Help File

Workspace Administrator Help File Workspace Administrator Help File Table of Contents HotDocs Workspace Help File... 1 Getting Started with Workspace... 3 What is HotDocs Workspace?... 3 Getting Started with Workspace... 3 To access Workspace...

More information

Configuring OPC and DCOM for OPC server and client applications from SAE Automation, s.r.o.

Configuring OPC and DCOM for OPC server and client applications from SAE Automation, s.r.o. Configuring OPC and DCOM SAE Automation, s.r.o. Nová Dubnica Solid And Effective partner at development of your products and industry automation Configuring OPC and DCOM for OPC server and client applications

More information

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free: EventTracker Enterprise Install Guide 8815 Centre Park Drive Publication Date: Aug 03, 2010 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users install

More information

Business Objects Exam SABE201 BusinessObjects(TM) Enterprise Certified Professional XI - Level One Version: 5.0 [ Total Questions: 160 ]

Business Objects Exam SABE201 BusinessObjects(TM) Enterprise Certified Professional XI - Level One Version: 5.0 [ Total Questions: 160 ] s@lm@n Business Objects Exam SABE201 BusinessObjects(TM) Enterprise Certified Professional XI - Level One Version: 5.0 [ Total Questions: 160 ] Topic 0, D D Question No : 1 - (Topic 0) Which two actions

More information

Mercury WinRunner. Installation Guide Version 9.2. Document Release Date: February 26, 2007

Mercury WinRunner. Installation Guide Version 9.2. Document Release Date: February 26, 2007 Mercury WinRunner Installation Guide Version 9.2 Document Release Date: February 26, 2007 Mercury WinRunner Installation Guide, Version 9.2 This document, and the accompanying software and other documentation,

More information

NeuralStar Installation Guide

NeuralStar Installation Guide NeuralStar Installation Guide Version 9.8 Release 3 May 2012 1st Edition Preface Software License Agreement Software is defined as the Kratos Technology & Training Solutions, Inc. computer programs with

More information

Oracle WebCenter Forms Recognition

Oracle WebCenter Forms Recognition Oracle WebCenter Forms Recognition Product Migration Guide 11g Release 1 (11.1.1.8.0) E50191-01 November 2013 Product Migration Guide Contents WebCenter Forms Recognition 11g Release 1 (11.1.1.8.0) Copyright

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 USER GUIDE MADCAP PULSE 4 Installation Guide for Pulse on Windows Server 2012 Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Using Oracle Eloqua Cloud Adapter Release 12.2.1.1.0 E73562-01 June 2016 Oracle Fusion Middleware Using Oracle Eloqua Cloud Adapter, Release 12.2.1.1.0 E73562-01 Copyright 2015,

More information

Oracle Enterprise Manager. Description. Versions Supported

Oracle Enterprise Manager. Description. Versions Supported Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft.NET Framework Release 2 (2.0.2.1.0) and Release 9 (2.0.2.2.0) B28043-03 December 2008 This document provides a brief

More information

Perceptive Connect. Installation and Setup Guide. Beta version: Compatible with ImageNow, versions 6.6.x and 6.7.x

Perceptive Connect. Installation and Setup Guide. Beta version: Compatible with ImageNow, versions 6.6.x and 6.7.x Perceptive Connect Installation and Setup Guide Beta version: 0.12.1 Compatible with ImageNow, versions 6.6.x and 6.7.x Written by: Product Documentation, R&D Date: November 2013 2013 Perceptive Software.

More information

Kyubit Business Intelligence Installation and administration Kyubit, All rights reserved.

Kyubit Business Intelligence Installation and administration Kyubit, All rights reserved. Kyubit Business Intelligence Installation and administration Kyubit Business Intelligence Installation and administration 2017 Kyubit, All rights reserved www.kyubit.com Contents 1. Installation and configuration...

More information

Laserfiche Rio 10.3: Deployment Guide. White Paper

Laserfiche Rio 10.3: Deployment Guide. White Paper Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6

More information

Oracle Cloud. Using Oracle Eloqua Adapter Release E

Oracle Cloud. Using Oracle Eloqua Adapter Release E Oracle Cloud Using Oracle Eloqua Adapter Release 12.1.3 E65434-01 August 2015 Oracle Cloud Using Oracle Eloqua Adapter, Release 12.1.3 E65434-01 Copyright 2015, Oracle and/or its affiliates. All rights

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

UC for Enterprise (UCE) NEC Centralized Authentication Service (NEC CAS)

UC for Enterprise (UCE) NEC Centralized Authentication Service (NEC CAS) UC for Enterprise (UCE) NEC Centralized Authentication Service (NEC CAS) Installation Guide NEC NEC Corporation October 2010 NDA-30362, Revision 15 Liability Disclaimer NEC Corporation reserves the right

More information

SAS. Information Map Studio 3.1: Creating Your First Information Map

SAS. Information Map Studio 3.1: Creating Your First Information Map SAS Information Map Studio 3.1: Creating Your First Information Map The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2006. SAS Information Map Studio 3.1: Creating Your

More information