Installation Guide for 3.1.x

Similar documents
ROCK-POND REPORTING 2.1

SentryOne Quick Start 1

Sage X3 Intelligence Financial Reporting. Installation and Upgrade Guide

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Version Installation Guide. 1 Bocada Installation Guide

Print Audit 6. Print Audit 6 Documentation Apr :07. Version: Date:

MEDIASEAL Encryptor Client Manual

PxM Proof of Concept Configuration. June 2018 Version 3.1

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

VII. Corente Services SSL Client

x10data Application Platform v7.1 Installation Guide

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

CTC BIM Suites Installation and Configuration Guide

EMS FOR MICROSOFT OUTLOOK Installation Guide

Installation Guide. Sage Intelligence Reporting

Barracuda NextGen Report Creator

Contents. Limitations. Prerequisites. Configuration

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)

Getting Started With the Cisco PAM Desktop Software

Cisco TelePresence Management Suite Extension for Microsoft Exchange

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook

LT Auditor Installation Guide

docalpha Installation Guide

Virtual Postman Manual. Version

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support...

EventMaster PLUS! Version 4 Installation and Upgrade Guide. Workgroup Deployment Microsoft MSDE 2000

akkadian Global Directory 3.0 System Administration Guide

SkyPoint Installation & Licensing Guide

Installation Guide Worksoft Certify

Xton Access Manager GETTING STARTED GUIDE

Solution Composer. User's Guide

PerTrac Analytical Platform. SQL Version Setup Guide

Administrator s Guide

Print Audit 5 - Step by Step Walkthrough

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

has been retired This version of the software Sage 300 Construction and Real Estate ( formerly Sage Timberline Office)

EMS DESKTOP CLIENT Installation Guide

LABEL ARCHIVE Administrator s Guide

APPENDIX B: INSTALLATION AND SETUP

Contents 1. Table of Contents. Report Server (Home Page) Installation. Manage Reports DevExpress Inc.

KYOCERA Net Admin User Guide

DOWNLOAD PDF SQL SERVER 2012 STEP BY STEP

New in isupport v12.7

Covene Cohesion Server Installation Guide A Modular Platform for Pexip Infinity Management October 25, 2016 Version 3.3 Revision 1.

Installation Manual. Fleet Maintenance Software. Version 6.4

Sage Construction Central Setup Guide (Version 18.1)

Sage 300 Construction and Real Estate. MyAssistant Installation Guide Version 18.1

BACKUP APP V7 QUICK START GUIDE FOR SYNOLOGY NAS

Privileged Identity App Launcher and Session Recording

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Release Notes. NetBrain Integrated Edition 7.0

New World ERP-eSuite

Deployment Guide Installing WhatsUp Gold Distributed Edition to Central and Remote Sites

Working with Reports

Toolbar User Guide. Release 17.0

Deltek Vision 7.1. Installation and Configuration Guide for Performance Management. (Analysis Cubes and Performance Dashboards)

Customizing and Administering Project Server Access

Kernel Migrator. for SharePoint. Configuration Guide

Automation Anywhere Enterprise 10 LTS

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

Netwrix Auditor for Active Directory

AT&T Global Network Client for Mac User s Guide Version 2.0.0

TECHNICAL WHITE PAPER AUGUST 2017 REVIEWER S GUIDE FOR VIEW IN VMWARE HORIZON 7: INSTALLATION AND CONFIGURATION. VMware Horizon 7 version 7.

MITEL. Live Content Suite. Mitel Live Content Suite Installation and Administrator Guide Release 1.1

VMware AirWatch Database Migration Guide A sample procedure for migrating your AirWatch database

Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014

PaperClip32. Revision 2.0

Mozy. Administrator Guide

enicq 6 Installation Guide

ControlPoint. Advanced Installation Guide. September 07,

User Manual. Active Directory Change Tracker

Tzunami Deployer Oracle WebCenter Interaction Exporter Guide

Administrator for Enterprise Clients: User s Guide. Second Edition

Status Web Evaluator s Guide Software Pursuits, Inc.

INSTALLATION AND SET UP GUIDE

DIGIPASS Authentication for Check Point VPN-1

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3

User Guide. Version 8.0

FastStats Integration

PROXY Pro Deployment Tool v10.0. User Guide October 2017

MicroStrategy Academic Program

Upgrading Good Mobile Control and Good Messaging

INSTALLATION GUIDE Spring 2017

This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights.

EventMaster PLUS! Version 4 Installation and Upgrade Guide. Enterprise Deployment Microsoft SQL Server

Monarch Installation and Activation Guide. Version 15.x

RWT Network System Installation Guide

The following topics describe how to work with reports in the Firepower System:

INSTALLATION AND USER S GUIDE OfficeCalendar for Microsoft Outlook

RED IM Integration with Bomgar Privileged Access

PROMODAG REPORTS Getting started. On-Premises and Hybrid environments

User Guide. Version R94. English

Web Console Setup & User Guide. Version 7.1

NBC-IG Installation Guide. Version 7.2

KYOCERA Net Admin Installation Guide

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

INSTALLATION AND SET UP GUIDE

Connectware Manager Getting Started Guide

Attix5 Pro Storage Platform Console

Tzunami Deployer Oracle WebCenter Interaction Exporter Guide

Transcription:

CARETEND BI Installation Guide for 3.1.x TABLE OF CONTENTS DOCUMENT PURPOSE... 2 OVERVIEW... 2 PLATFORM COMPONENTS... 3 Rock-Pond BI Server... 3 CareTend BI Client Application... 3 ABOUT INSTANCES... 3 CONFIGURING ACTIVE DIRECTORY... 3 Security Group... 4 DNS Record... 4 INSTALLING ROCK-POND BI SERVER... 5 Step 1 Download the Installation File... 5 Step 2 Install Rock-Pond BI Server... 5 CONFIGURING ROCK-POND BI SERVER... 5 Step 1 Add an Instance and Select License... 5 Step 2 Configure Mail Settings... 6 Step 3 Configure Data Sources... 6 Step 4 Configure Security Settings... 8 Step 5 Install and Start the Rock-Pond BI Server... 9 Step 6 Windows Firewall Exception... 9 INSTALLING CARETEND BI CLIENT APPLICATION... 9 Step 1 Download the Installation File... 9 Step 2 Install CareTend BI... 9 LOGGING INTO THE CARETEND BI CLIENT APPLICATION...10 VALIDATION OF SUCCESSFUL INSTALLATION...10 USER SECURITY OVERVIEW...10 SECURITY MANAGER...11 CPR+ AND HOMECARE360 INSTALLATIONS... 11 Deactivating Users... 11 Synchronizing User Information... 11 CARETEND INSTALLATIONS... 12 Deactivating Users... 12 MWBI_InstallGuide.docx Page 1 of 25

Synchronizing User Information... 12 FASTRACK INSTALLATIONS... 12 Deactivating Users... 12 DEFINING SECURITY SETS... 12 Security Set Properties... 12 Content Sets... 14 Default Security Set... 15 Custom Security Sets... 15 ASSIGNING SECURITY SETS TO USERS... 16 APPENDIX A INSTALLATION CHECKLIST...16 APPENDIX B REQUIREMENTS...18 Hardware / Software Requirements... 18 Cloud Connectivity Requirements... 18 APPENDIX C ADVANCED CONFIGURATION OPTIONS...20 Rock-Pond BI Server TCP IP/Port Settings... 20 Rock-Pond BI Server Windows Service Account... 20 CareTend BI Manual Server Specification... 20 Restricting License Selection in Login Screen... 20 APPENDIX D CARETEND BI PLATFORM DIAGRAM...22 APPENDIX E MANUALLY UPGRADING THE PLATFORM...23 Rock-Pond BI Server... 23 CareTend BI Client Application... 23 APPENDIX F - SQL SERVER ANALYSIS SERVICES (SSAS)...24 SSAS INSTALLATION LOCATION... 24 SSAS INSTALLATION... 24 SSAS CONFIGURATION... 24 Firewall Configuration... 24 Analysis Services Configuration... 24 CONFIGURING CARETEND BI FOR SSAS... 25 DOCUMENT PURPOSE This document details the installation and configuration process for the Mediware Business Intelligence (CareTend BI) platform. A current version of this document is always available at the following link, and it is suggested you access it via the link each time you view it so you have the most recent information: https://apps.rock-pond.com/rpbi/docs/mwbi_installguide.pdf OVERVIEW CareTend BI brings extensive business intelligence to users in your organization such as reports, dashboards, and analytical data cubes. It is designed to be simple, secure, easy to install, and easy to maintain. An MWBI_InstallGuide.docx Page 2 of 25

installation checklist is provided in Appendix A that will ensure you are ready to proceed and allows you to document your setup if you must refer to it at a later time. PLATFORM COMPONENTS There are two components that make up the CareTend BI platform. The first component is the Rock-Pond BI Server and installs one time on an existing server of your choice. The second component is the CareTend BI client application, which may be installed directly onto user workstations or onto a centralized application server where it may be published using technologies like Citrix or Remote Desktop Services. ROCK-POND BI SERVER The Rock-Pond BI Server is the first component that should be installed in your environment. This component serves two key functions: Centralized configuration of the platform, such as where the platform connects to to retrieve data for business intelligence content, security related parameters, as well as other important settings that control how the platform behaves. Centralized processing of business intelligence content that has been configured by administrators and/or users to be generated and delivered automatically via the built-in scheduling feature. The Rock-Pond BI Server consists of an application which is used to configure the component as well as a standard Windows Service that starts after the product is configured. The requirements for the Rock-Pond BI Server component is provided in Appendix B. CARETEND BI CLIENT APPLICATION The CareTend BI client application is the second component that should be installed either onto user workstations or onto a centralized application server where it may be published using the solution of your choice. The client application is where the majority of product setup will occur and is also where business intelligence content is utilized by end users. The CareTend BI client communicates directly with the Rock-Pond BI Server to determine how it will operate and typically does not require specific workstation configuration to begin using. The requirements for the CareTend BI client component is provided in Appendix B. ABOUT INSTANCES The CareTend BI platform supports multiple instances to be configured. Most organizations will only have one instance installed into their Rock-Pond BI Server, but in some cases, multiple instances will be configured. For example, if you have a CareTend production system and a CareTend test system, and require CareTend BI to work against each of those systems, you will add an instance for each of them. Each instance has its own configuration and operates separate from any other instance that is configured. CONFIGURING ACTIVE DIRECTORY The CareTend BI platform integrates with your existing Active Directory domain to control user access to the product. This allows users to login to the product using their existing domain credentials if they have been MWBI_InstallGuide.docx Page 3 of 25

granted the appropriate access by system administrators. For the CareTend BI platform to integrate with Active Directory, the following will be required: A new Active Directory security group for which users will be added. This controls whether a user may login to the product regardless of supplying valid domain credentials. A new Active Directory DNS entry which will direct the CareTend BI client application to the location of the Rock-Pond BI Server. SECURITY GROUP Create a new security group in your Active Directory domain which will be used to control which users have access to login to the CareTend BI product. You may name the security group however you would like, but if you are configuring multiple instance in the Rock-Pond BI Server, you should name the security group so that it may be identified as specific to the instance it belongs. DNS RECORD For the CareTend BI client application to automatically find the location of the Rock-Pond BI Server, and to prevent client level configuration from being required, you must specify a new DNS record that maps a hostname on your domain to the IP address of the server where the Rock-Pond BI Server is located. In the DNS control panel, add a new host (A) record, and name it BISERVER. Associate this new host record with the corresponding server s IP address. MWBI_InstallGuide.docx Page 4 of 25

INSTALLING ROCK-POND BI SERVER The following steps should be completed to properly install the Rock-Pond BI Server: STEP 1 DOWNLOAD THE INSTALLATION FILE The current version of Rock-Pond BI Server 3.1.x may be downloaded at https://apps.rockpond.com/rpbi/install/rpbis_3.1.exe. Download this to the server which you plan on housing this component. STEP 2 INSTALL ROCK-POND BI SERVER Execute the RPBIS_3.1.exe installation file to install it onto the server. You may choose to install to a location other than the default if you desire. During the installation, you may be prompted to install additional components which are required by the platform, such as SAP s Crystal Reports runtimes and Microsoft s Visual C++ runtimes. You will only be prompted to install these additional components if the installer determines that they are not already present or if the installer determines that the existing versions of these components require updating. After the installation is complete, you may launch Rock-Pond BI Server via the icon on the desktop if you chose to have the desktop shortcut installed. CONFIGURING ROCK-POND BI SERVER The Rock-Pond BI Server s main screen allows you to add, edit, and delete instances as well as control the Windows Service. STEP 1 ADD AN INSTANCE AND SELECT LICENSE Click the Add Instance button in the Rock-Pond BI Server s toolbar. This will display the configuration dialog where you will supply the configuration for this instance. You will have been provided a license file that is to be loaded on the first tab of this screen labeled License. The license file will have a.lic extension. Click Select License to load the license file that was provided to you. Once selected, the license will be validated and your company name will be shown along with the system which the license is assigned. MWBI_InstallGuide.docx Page 5 of 25

STEP 2 CONFIGURE MAIL SETTINGS CareTend BI features a powerful scheduling platform that allows administrators and/or users to configure business intelligence content to be generated and delivered automatically. This feature provides support for the delivery of automatically generated content via E-mail. To utilize this delivery option, you must supply valid SMTP server settings that will be used. Many different types of SMTP settings are supported and will be based on the implementation of your organization s E-mail solution. If you would like to disable E-mail functionality within CareTend BI, you may check the box labeled Disable SMTP Functionality, otherwise specify your SMTP settings and click Validate. Your SMTP settings will be tested by sending a test E-mail to the E-mail address listed in the Admin E-mail Address field. STEP 3 CONFIGURE DATA SOURCES For CareTend BI to connect to your system database(s) to display business intelligence content, you must specify the location of your system s Microsoft SQL Server database. In some situations, you may be asked to specify settings for more than one data source, such as systems which require a connection to an application database as well as a reporting database. The CareTend BI platform supports utilizing Integrated Authentication when connecting to the database, however, it is recommended that you create new SQL Server credentials that have the appropriate access and specify them on this screen as it is typically simpler to configure. Configuring SQL Server Security for BI MWBI_InstallGuide.docx Page 6 of 25

In many cases, administrators will utilize a SQL Server user account that has full permissions to the source database. In this case, there are not any additional security related settings that you are required to configure. CareTend BI stores small amounts of company settings related data and data model objects for which content is driven by in a schema named rpbi in your source system database. The rpbi schema allows all objects that CareTend BI creates, manages, and utilizes to remain in a segregated part of your database structure, allowing for the option to configure a SQL Server user account with fine grained security permissions. Under normal circumstances, CareTend BI automatically creates the rpbi schema and manages all the database objects within the rpbi schema. You may decide you would like to create a SQL Server user account for CareTend BI that has stricter security associated with it. CareTend BI requires that the SQL Server user account has a minimum of the following permissions: 1. Read-only access to all tables within the source system database. 2. Full access to all objects within the rpbi schema. This includes reading and writing, executing stored procedures and functions, selecting from views, as well as the creation, renaming, and deletion of objects. If the SQL Server user account you create does not have access to create a new schema within your source system database, you will need to manually create the rpbi schema before starting the Rock-Pond BI Server. Once you have entered your data source settings, click Validation. Your connections will be tested. If there are any issues with the settings, the validation will fail and you will need to adjust the settings accordingly. Note Regarding Integrated Authentication: If you choose to utilize integrated authentication, then you must ensure two requirements are met: 1. All users who will utilize CareTend BI must have the appropriate SQL Server permissions granted to their domain credentials. 2. The Rock-Pond BI Server Windows Service must be configured to use a service account that has been granted the appropriate SQL Server permissions otherwise it will not start. MWBI_InstallGuide.docx Page 7 of 25

STEP 4 CONFIGURE SECURITY SETTINGS Security Groups You must specify the Active Directory security group which was added in the Configuring Active Directory section. This group controls which users will be able to login to this instance. The security group specified here must match exactly to the group that was setup in Active Directory. If you wish to bypass the security group check, you may check the Disable Security Groups box. Users will still require a valid login to utilize the product. Client Updates The CareTend BI platform features an internal updating function that prompts users to upgrade their client in the event a new one becomes available. This eases administration of the product by not requiring administrators to manually update numerous workstations. It is highly recommended that client updates be enabled unless there is a specific reason to disable them. In some cases, it may be desired to disable this functionality, such as situations where the CareTend BI client application will be published to users via an application server using Citrix or Remote Desktop Services. Users in these environments typically do not have the required permissions to perform application updates, thus it is recommended to disable them. Refer to the Upgrading the CareTend BI Platform section for more information about how automatic updates function and how to apply updates manually. Administrative User In some cases, when the CareTend BI platform is integrating with a Mediware system that is not integrated with Active Directory, such as CPR+ and HomeCare360, you may need to specify a manual mapping to determine who will initially be the administrator of the CareTend BI platform. This is required when the administrator s Windows domain username does not match a corresponding username in the target system. For example, if you re an administrator of the CareTend BI platform and are installing it for the first time, and your username is mjones but your CPR+ or HomeCare360 username is jonesm, you ll need to specify the mapping in this section by entered mjones into the Windows Username field and jonesm into the System Username field. This will create a link between the mjones windows user and the jonesm system user. MWBI_InstallGuide.docx Page 8 of 25

STEP 5 INSTALL AND START THE ROCK-POND BI SERVER You will need to install and start the Windows Service that will run in the background. To do this, click Install Rock-Pond BI Server which will install the service onto the server. The corresponding service will appear in the standard Windows Services control panel as Rock-Pond BI Server. After the service is installed, click Start Rock-Pond BI Server which will start the Windows service. If there are any problems starting the Windows service, refer to the Windows Event Log which will contain more detailed information regarding the failure. The entries in the Windows Event Log will be labeled Rock- Pond BI Server. If the Windows service started successfully, the main screen will indicate that the server is running. You may now close the Rock-Pond BI Server screen and archive the license file that you selected during step 1. There is no need to keep the license file in the same location that it was in during the instance configuration. STEP 6 WINDOWS FIREWALL EXCEPTION The CareTend BI client application communicates with the Rock-Pond BI Server via TCP port 8434. The server that the Rock-Pond BI Server is installed on will need to allow access to this port from local network computers if the Windows firewall is enabled. If a third-party firewall is in place, it will need to be adjusted to allow this communication. INSTALLING CARETEND BI CLIENT APPLICATION The following steps should be completed to properly install the CareTend BI client application: STEP 1 DOWNLOAD THE INSTALLATION FILE The current version of CareTend BI 3.1.x may be downloaded at https://apps.rockpond.com/rpbi/install/mwbi_3.1.exe. Download this to the workstation or application server that will be utilizing the client. STEP 2 INSTALL CARETEND BI Execute the MWBI_3.1.exe installation file to install it onto the workstation or application server. You may choose to install to a location other than the default if you desire. During the installation, you may be prompted to install additional components which are required by the platform, such as SAP s Crystal Reports runtimes and Microsoft s Visual C++ runtimes. You will only be MWBI_InstallGuide.docx Page 9 of 25

prompted to install these additional components if the installer determines that they are not already present or if the installer determines that the existing versions of these components require updating. After the installation is complete, you may launch CareTend BI via the icon on the desktop if you chose to have the desktop shortcut installed. LOGGING INTO THE CARETEND BI CLIENT APPLICATION Once the CareTend BI client application is installed and the Rock-Pond BI Server is started, users may login. Launch the CareTend BI client application via the icon on the desktop. If the current user is logged into a domain account, the login screen will automatically detect it. A domain may also be specified manually be prefacing the username with the domain in the format of DOMAIN\username. If multiple instances are configured in the Rock-Pond BI Server, they will be enumerated in the Instance drop down. If only one instance is present, it will be auto selected. After a successful login occurs, the username, domain, and last selected instance will be remembered for convenience. VALIDATION OF SUCCESSFUL INSTALLATION A successful installation is established when logging into the CareTend BI client application for the first time and being presented with the main screen (content explorer). At this time, a record will be logged to Rock- Pond s cloud indicating the user, date, and time of the client login. That timestamp will be used to determine when the successful installation occurred. USER SECURITY OVERVIEW The CareTend BI platform provides administrators with the capability to define security parameters that control what functions users have access to within the application as well as what business intelligence content they are able to utilize. CareTend BI is integrated with Mediware s CareTend, CPR+, and HomeCare360 systems at the user level which inherit user security settings such as site and company assignments so that users only have access to information for which they are assigned. MWBI_InstallGuide.docx Page 10 of 25

SECURITY MANAGER User security is configured within the Security Manager of the CareTend BI client application, which is available in the settings menu. Only CareTend BI administrative users have access to this area. Launching the Security Manager for the first time may take up to a minute while users from the system are imported into the CareTend BI platform. Once loaded, a list of all users from the target system will be displayed. NOTE: Not all systems are integrated at the user level, such as Fastrack. In this case, only users who have logged into CareTend BI will be displayed in the security manager. TIP: The Security Manager and the screens within it provide for flexible management of users by allowing you to search, filter, and group by the columns in the grid. For instance, you may drag the Security Set column to the area above the grid to organize users into groups based on the security set they belong to. You may also use the quick search area above the grid to quickly find users using a search string, or filter columns directly in the column header. CPR+ AND HOMECARE360 INSTALLATIONS If you are using CareTend BI with Mediware s CPR+ or HomeCare360 systems, you may need to associate the users of the product with their corresponding user in the system. This mapping between the Windows username and the system username is required if they do not match. For examples, if the Windows username is mjones and that user s corresponding system username is jonesm, then a mapping must be established before the user will be able to login to CareTend BI. DEACTIVATING USERS Users may be deactivated either by removing them from the corresponding BI Active Directory group, or be deactivating the user from within CPR+ or HomeCare 360. SYNCHRONIZING USER INFORMATION When using CPR+ or HomeCare 360 BI, you will be prompted to synchronize users upon visiting the Security Manager. This function updates CareTend BI with all relevant information from your core system, such as name, E-mail address, and user status. It s recommended that this synchronization be performed regularly, but MWBI_InstallGuide.docx Page 11 of 25

is not required to be performed each time you load the security manager. You may also synchronize users via the button in the Security Manager s toolbar. CARETEND INSTALLATIONS Before users will be able to login to CareTend BI, they must be setup as an active user in CareTend. DEACTIVATING USERS Users may be deactivated either by removing them from the corresponding BI Active Directory group, or be deactivating the user from within CareTend. SYNCHRONIZING USER INFORMATION When using CareTend, you will be prompted to synchronize users upon visiting the Security Manager. This function updates CareTend BI with all relevant information from your core system, such as name, E-mail address, and user status. It s recommended that this synchronization be performed regularly, but is not required to be performed each time you load the security manager. You may also synchronize users via the button in the Security Manager s toolbar. FASTRACK INSTALLATIONS Fastrack does not integration directly with CareTend BI. All logins to CareTend BI when used with Fastrack are based on the users Active Directory credentials. DEACTIVATING USERS Users may be deactivated either by removing them from the corresponding BI Active Directory group or by deactivating them from within the Security Manager by setting their status via the button in the toolbar. DEFINING SECURITY SETS Security sets allow administrators to define what areas of the CareTend BI applications users are permitted to access as well as what business intelligence they are able to use. Each user is assigned to a single security set. When a new user logs into CareTend BI for the first time, they are assigned to the default security set. SECURITY SET PROPERTIES Security sets are broken into several sections which allow for fine grained privileges to be defined for various areas of the CareTend BI application: Administrative Access The Administrative User (Full System Access) checkbox defines whether or not users associated with this security set will be administrators of CareTend BI. This will provide full access to all areas of CareTend BI, including the Security Manager. This option should only be enabled for users who are delegated administrative responsibility and understand the security implementation of the platform. Administrative users have the ability to see other users configuration, such as their jobs, tasks, and history. Enable Company Settings The Enable Company Settings checkbox defines whether or not users associated with this security set will be allowed to access the Company Settings area that is available in the client application s settings menu. MWBI_InstallGuide.docx Page 12 of 25

Jobs and Tasks This section defines whether users have access to Jobs, Tasks, or both. Definitions Tasks Jobs Tasks allow users to define saved instances of business intelligence content that can easily be recalled at a later time. Tasks may optionally be setup to deliver to predefined destinations, such as E-mail recipients, SFTP and FTP servers, or network shares. Jobs allow users to group one or more tasks together and schedule them to generate and deliver automatically. If Jobs or Tasks is enabled in the security set, you will need to define the E-mail Policy that applies to the user. This controls what E-mail recipients the user is able to have business intelligence content delivered to. There are four policies to choose from: 1. Open E-mail Access This allows users to setup tasks that may deliver via E-mail to any E-mail recipient(s) of their choosing. 2. Allow E-mail to Specific Recipients This allows administrators to setup E-mail list that contain predefined E-mail recipients that users can select from when configuring a task to deliver via E-mail. When this option is selected, the E-mail tab allows for the addition of new E-mail lists as well as the association of E-mail lists with the security set. 3. Allow E-mail to Specific Domains This allows administrators to setup E-mail lists that contain predefined domain names for which users can configure a task to deliver to via E-mail. For instance, if the user should only be able to E-mail business intelligence content to recipients within the company.com domain name, the company.com domain name would be added to the domain list in the E-mail tab. 4. Allow E-mail to Self Only This allows administrators to restrict users to only the ability to configure tasks that can be E-mailed to the current user. This prevents the user from configuring a task to deliver business intelligence content to anyone but themselves. Tasks may also be configured by users to allow business intelligence content to be delivered to SFTP, FTP, and File / Network locations. These destinations will only be available if they are setup in the CareTend BI platform and associated with the security set. You can add or associate destinations on the SFTP, FTP, and File / Network tabs within the security set. TIP: Destinations may also be centrally managed by accessing the Configure Delivery Destinations option in the main settings menu under Jobs and Tasks Configuration. Destinations that are added in this area may then be selected when configuring security sets. Content The content section of the security set allows administrators to control whether or not users who belong to the security set are able to access the Content Deployment area of the CareTend BI platform as well as control what business intelligence content they are able to use. Cube Layout Sharing should be enabled for those users who will be responsible for creating cube layouts and sharing them with one or more users, or the entire company. MWBI_InstallGuide.docx Page 13 of 25

You may permit users of CareTend BI to modify company help and company tags for your organization. When enabled, users may create company level tabs in the Content Help module as well as define company level tags in the Content Explorer. Checking the Allow editing of Company Help and Tags will enable this functionality. Security sets can be configured to allow users who are assigned to them access to either all business intelligence content or to specific content sets. Content sets allow administrators to select specific business intelligence areas and specific content which the users is permitted to use. If Enable All Content is not enabled in the security set, users will not be able to use any business intelligence content until a content set is created and assigned to the security set. Deployment Content Deployment should be enabled for those users who write their own business intelligence content and will be publishing it to the organization for other users to use. For a normal user, this is likely not something that will need to be enabled. You may permit users of CareTend BI to modify standard help and standard tags for content that is deployed by your organization within the Content Deployment module. Users with this permission may edit standard help, standard tags, and the description of the content item. Checking the Allow Editing of Standard Content Help and Tags will enable this functionality. FocusBoards Enabling the FocusBoard manager allows users to manage FocusBoards and the slideshows that are assigned to them. Enabling this turns on the FocusBoard Manager option in Mediware s main settings menu. For more information about FocusBoards, contact Rock-Pond Solutions. CONTENT SETS Content sets may be created and configured by clicking the Content Sets button in the Security Manager s toolbar or by clicking the Setup button in the security set next to the Content Set drop down menu. This will display the list of content sets that are currently setup and available to assign to security sets. The following sample screen shows the various ways to configure a content set: MWBI_InstallGuide.docx Page 14 of 25

Once a content set has been added, you may assign it to a security set in the drop down. Users who belong to that security set will only have visibility and access to the content that was assigned in the content set. DEFAULT SECURITY SET The default security set is applied to users when they first login to CareTend BI unless they have already been assigned to a custom security set. The default security set is designed to allow administrators to define strict permissions within the software until they have the opportunity to further define what permissions a user should be assigned. The default security set may be configured by clicking the Default Security Set button in the Security Manager s toolbar. CUSTOM SECURITY SETS You may configure custom security sets that allow for different users to have access to different areas of CareTend BI. For example, you may have a security setup for administrators which provides full access to the CareTend BI platform, another security set that provides access to only financial reporting for reimbursement staff, and another content set that allows users to build and publish content via the Content Deployment module. MWBI_InstallGuide.docx Page 15 of 25

ASSIGNING SECURITY SETS TO USERS Assigning security sets to users is easy. Select one or more user in the grid by holding down the control key, and choose the Assign Security Set menu option in the Security Manager s toolbar. Select the security set which you would like to assign to the selected users. This security set will take immediate affect for the users. IMPORTANT NOTE: When implementing the CareTend BI platform for the first time, the default security set is set to permit full access to the product. This is done so that the administrator who is installing and configuring the platform has initial access to complete the initial setup of the product. A new administrative security set should be created and assigned to the administrative user performing the initial setup of the platform and the default security set should be adjusted to remove administrative access. APPENDIX A INSTALLATION CHECKLIST The following checklist may be used to prepare for the installation of the CareTend BI platform as well as document your configuration along the way. Ensure you have completely reviewed this installation document prior to proceeding. Step Installation Step Date Completed By Notes 1 2 3 Complete review of this installation document Confirm receipt of the Rock-Pond BI Server license file Select server for which you will install the Rock-Pond BI Server MWBI_InstallGuide.docx Page 16 of 25

4 5 6 7 8 9 10 11 12 13 Determine CareTend BI client application deployment model (Citrix, Remote Desktop Services, Direct Workstation, etc.) Confirm that the target systems meet the minimum hardware, software, and network requirements Determine which users will require access to the CareTend BI platform Configure Active Directory as described in this installation document adding the users who require access to the platform to the newly created security group Obtain SQL Server connection and authentication information for the target system database Obtain SMTP connection information if enabling support for E-mail delivery of business intelligence content Download, install, configure, and start the Rock-Pond BI Server ensuring the Windows firewall has had the proper exception created Download and install the CareTend BI client application and provide access to the required users Confirm user access to the CareTend BI client application and its business intelligence content Complete initial setup of the CareTend BI platform by configuring user security MWBI_InstallGuide.docx Page 17 of 25

APPENDIX B REQUIREMENTS The Rock-Pond BI Server and CareTend BI client are desktop applications that utilize Microsoft s.net framework. They are intended to be installed on current 64-bit versions of Microsoft Windows and Microsoft Windows Server operating systems. There are many variables that exists shape the requirements of the CareTend BI platform. As a result, certain requirements are not straightforward and depend heavily on your implementation of the platform into your environment as well as your organizations size and the number of users who will utilize the product. Some factors to consider when planning resource requirements and determining expected performance of the CareTend BI platform are: Average disk size of the target system s Microsoft SQL Server database(s) Number of concurrent users and the type of business intelligence content they will regularly use Implementation model of the application, such as deployment via Citrix, Remote Desktop Services, or direct user workstation installations. Multi-user environments will require additional system resources when compared to direct workstation installations Specifications of the target systems Microsoft SQL Server and the resources that are dedicated to its operation Maintenance status of the target systems Microsoft SQL Server database, such as optimized indexes and properly maintained transaction logs. All of the factors listed above greatly determine what your system and network requirements will be. HARDWARE / SOFTWARE REQUIREMENTS The following table shows the hardware and software minimum requirements for the Rock-Pond BI Server and CareTend BI client application, however, your specific implementation s requirements will vary: Component Disk Memory CPU Operating System Microsoft.NET Rock-Pond BI Server 1 GB 4 GB x64 CareTend BI 1 GB 2 GB X64 Windows Server 2003 R2, 2008 R2, 2012 R2 Windows 7, 8, 8.1, 10 Windows Server 2003 R2, 2008 R2, 2012 R2 Windows 7, 8, 8.1, 10 4.6.1 4.6.1 CLOUD CONNECTIVITY REQUIREMENTS The CareTend BI platform is a cloud driven application which enables it to deliver dynamic business intelligence solutions to its users. The following describes the types of communication that take place between the CareTend BI platform and the cloud: Business intelligence content templates are maintained in the cloud and obtained by the CareTend BI platform on demand. This enables users to always have access to current versions of their content as well as have access to newly available content as it becomes available. MWBI_InstallGuide.docx Page 18 of 25

Customer licensing, configuration, and usage logging are maintained in the cloud which provides a safe, secure, flexible, and dynamic method in which the CareTend BI platform obtains it s configuration and becomes tailored to your organizations requirements. Platform updates are delivered from the cloud as they become available. Administrators at your organization have control to approve updates before they happen to the application components. End user resources and documentation are maintained in the cloud so that current valuable resources are always available to the users of the product. User preferences are maintained in the cloud which enable users to access their personalized CareTend BI application regardless of which computer they login to. There are always a lot of justified concerns that organizations have when they implement platforms that utilize the Internet. The following describes the types of communication that DOES NOT take place between the CareTend BI platform and the cloud: System data (CPR+, HomeCare360, Fastrack, and CareTend) is NEVER transferred over the Internet to the cloud and the cloud NEVER accesses your system data. The cloud has no access to your internal network or to your system data. Information about your company is NEVER transferred over the Internet to the cloud. Product usage information, such as the business intelligence content being utilized by your organizations users is stored in the cloud but does NOT contain any information contained within that content. The following table shows the Internet requirements for the Rock-Pond BI Server and CareTend BI client application: Component Type Port Destinations Protocol Rock-Pond BI Server TCP (Outbound) 22 CareTend BI TCP (Outbound) 22 rpbi1.rpsol.net (74.206.97.87) rpbi2.rpsol.net (74.206.97.88) rpbi1.rpsol.net (74.206.97.87) rpbi2.rpsol.net (74.206.97.88) SSH 2.0 / RSA 2048bit Encryption SSH 2.0 / RSA 2048bit Encryption MWBI_InstallGuide.docx Page 19 of 25

APPENDIX C ADVANCED CONFIGURATION OPTIONS The following are advanced configuration options that may be utilized if required: ROCK-POND BI SERVER TCP IP/PORT SETTINGS By default, the Rock-Pond BI Server binds to port 8434 on all IP addresses that exist on the system for which it is installed. If your situation requires the need to override this, you may specify a specific IP address and port to bind to: 1. In the Rock-Pond BI Server Program Files Folder, which defaults to C:\Program Files\Rock-Pond Solutions\Rock-Pond BI Server, create an empty file named server.bi. 2. Open the server.bi file in notepad and enter an IP address and port in the format of IP:PORT. For example, entering 172.16.5.10:9000 in the server.bi file will cause the Rock-Pond BI Server to bind to port 9000 on 172.16.5.10. 3. Ensure the Windows firewall is configured with the appropriate exception for this custom binding. ROCK-POND BI SERVER WINDOWS SERVICE ACCOUNT In some cases, it may be necessary to change the service account for which the Rock-Pond BI Server s Windows service runs under from Local System Account to a custom service account. Scenarios where this is important include: 1. Utilizing Windows Authentication for your data connections. When doing so, the service must be running under an account that has the appropriate SQL Server permissions to the database. 2. Installing Rock-Pond BI Server in a non-standard place, such as somewhere else than C:\ or C:\Program Files. The service must be running under an account that can fully manipulate files within the program files directory. CARETEND BI MANUAL SERVER SPECIFICATION By default, the CareTend BI client application searches for the DNS hostname BISERVER to locate the IP address of the Rock-Pond BI Server and will default to using port 8434 when connecting to it. This may be overridden by manually specifying the IP and port: 1. In the CareTend BI Program Files Folder, which defaults to C:\Program Files\Mediware Information Systems\CareTend BI, create an empty file named server.bi. 2. Open the server.bi file in notepad and enter an IP address and port in the format of IP:PORT. For example, entering 172.16.5.10:9000 in the server.bi file will cause the CareTend BI to connect to the Rock-Pond BI Server at 172.16.5.19 using port 9000. RESTRICTING LICENSE SELECTION IN LOGIN SCREEN In the event that you have configured multiple instances in the Rock-Pond BI server and wish to only display specific instances in the drop down menu of the login screen, you may supply arguments at the command line or in the shortcut to limit the selection. This is useful if you have multiple instances that contain configurations for separate companies that only specific users would login to. MWBI_InstallGuide.docx Page 20 of 25

The -l (lowercase L) switch may be supplied at the command line followed by one or more license keys separated by commas. This switch may be passed to the bi_client.exe at the command line, in a batch file, or in a published application definition in Citrix or Remote Desktop Servers. For example: Launch CareTend BI and limit instance selection to license 12345 bi_client.exe -l 12345 Launch CareTend BI and limit instance selection to license 12345 and 99999 bi_client.exe -l 12345,99999 MWBI_InstallGuide.docx Page 21 of 25

APPENDIX D CARETEND BI PLATFORM DIAGRAM The following diagram depicts a typical installation of the CareTend BI platform and its components. Your specific implementation of the platform may vary depending on your environment. MWBI_InstallGuide.docx Page 22 of 25

APPENDIX E MANUALLY UPGRADING THE PLATFORM The CareTend BI platform implements automatic updates that keep the Rock-Pond BI Server and the CareTend BI client application up-to-date as new releases become available. In some cases, such as multi-user environments where the client is published via Citrix or Remote Desktop Services and client updates are disabled in the Rock-Pond BI Server, manual updates may need to be applied. Manually updating simply requires that the new versions of the Rock-Pond BI Server and CareTend BI installation files are downloaded and run. Detailed upgrade instructions will be provided with the release notes for the version you are upgrading to. The instructions in this section detail a typical upgrade, but the release notes may require additional steps to be taken. Always refer to the release notes before applying upgrades. ROCK-POND BI SERVER Prior to running the new installation file, ensure that you have stopped the Rock-Pond BI Server s Windows service and closed the application. After executing the new installation, launch the Rock-Pond BI Server, confirm that the version is the expected version, and start the Windows service. CARETEND BI CLIENT APPLICATION Ensure all that all instance of the CareTend BI client application are closed. Once confirmed, execute the new installation, launch CareTend BI, and confirm that the version is the expected version. MWBI_InstallGuide.docx Page 23 of 25

APPENDIX F - SQL SERVER ANALYSIS SERVICES (SSAS) The CareTend BI platform supports the utilization of Microsoft s SQL Server Analysis Service component as a data source for its content. SSAS facilitates 3 dimensional OLAP cubes that can be used to quickly and efficiently analyze large amounts of data from within CareTend BI. To utilize this feature, you will need to contact Rock-Pond Solutions to coordinate the configuration. In addition, to utilize this feature, you must provision a SSAS server if you do not already have one. The Analysis Services component is an included feature in the Microsoft SQL Server platform, and you may already have an SSAS server running. CareTend BI is compatible with SQL Server Analysis Servers 2008 and greater. SSAS INSTALLATION LOCATION SSAS may stand on its own, separate from the SQL Server instance that is already installed at your company. SSAS requires network layer connectivity to the SQL Server database that it will be processing data for, in this case, your Mediware core system database. SSAS INSTALLATION SSAS may be installed using the standard SQL Server installation media. The installation program allows for the selection of Analysis Services. This should be run on the system for which SSAS will operated and house data. SSAS CONFIGURATION There are two main configuration items that must be addressed after SSAS is configured: FIREWALL CONFIGURATION If using a firewall, such as the built-in Windows Firewall, a rule must be added to allow inbound connections to the SSAS server. SSAS operates on TCP port 2383 by default. Allowing a connection to TCP port 2383 from your network on the system housing the SSAS server will permit CareTend BI to connect to it to retrieve data for content. ANALYSIS SERVICES CONFIGURATION In the SQL Server Configuration Manager, you must ensure that SQL Server Analysis Services is set to run automatically and is currently running. Next, you should use SQL Server Management Studio to connect to the analysis services instance. During the installation, it will have allowed you to specific the users that are administrative users. This step should be performed by that user: MWBI_InstallGuide.docx Page 24 of 25

Once connected, you must right-click the server root node in the tree in the object explorer, choose Properties, and under the Security section, assign a server administrator. The user defined here will be used when configuring CareTend BI for the SSAS connection. You may prefer to setup a brand-new user specific to this, or use an existing AD user. CONFIGURING CARETEND BI FOR SSAS Once SSAS is provisioned, Rock-Pond will assign the SSAS connection to your account. Once that is done, the Rock-Pond BI Server can be used to define the connection to the new SSAS server. MWBI_InstallGuide.docx Page 25 of 25