SAP Businessobjects Data Services Administrator's Guide

SAP Businessobjects Data Services Administrator's Guide

Administrator's Guide ■ SAP BusinessObjects Data Services 4.1 Support Package 1 (14.1.1.0) 2012-11-22 Copyright © 2012 SAP AG. All rights reserved.SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP BusinessObjects Explorer, StreamWork, SAP HANA and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries.Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects Software Ltd. Business Objects is an SAP company.Sybase and Adaptive Server, iAnywhere, Sybase 365, SQL Anywhere, and other Sybase products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Sybase, Inc. Sybase is an SAP company. Crossgate, m@gic EDDY, B2B 360°, B2B 360° Services are registered trademarks of Crossgate AG in Germany and other countries. Crossgate is an SAP company. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary.These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. 2012-11-22 Contents Chapter 1 Getting Started........................................................................................................................9 1.1 Overview of SAP BusinessObjects Data Services...................................................................9 1.1.1 SAP BusinessObjects Data Services and the SAP BusinessObjects solution portfolio............9 1.1.2 Software benefits.....................................................................................................................9 1.1.3 Associated software..............................................................................................................11 1.1.4 Interfaces...............................................................................................................................12 1.2 Naming Conventions..............................................................................................................12 Chapter 2 Data Services Architecture...................................................................................................15 2.1 Architecture overview............................................................................................................15 2.2 Standard components............................................................................................................16 2.2.1 Designer................................................................................................................................16 2.2.2 Repository.............................................................................................................................17 2.2.3 Job Server.............................................................................................................................18 2.2.4 Access Server.......................................................................................................................18 2.2.5 Management Console............................................................................................................19 2.2.6 SNMP Agent.........................................................................................................................21 2.2.7 Adapter SDK.........................................................................................................................21 2.3 Management tools.................................................................................................................22 2.3.1 License Manager....................................................................................................................22 2.3.2 Repository Manager...............................................................................................................22 2.3.3 Server Manager.....................................................................................................................22 2.4 Operating system platforms...................................................................................................23 2.5 Distributed architecture..........................................................................................................23 2.5.1 Host names and port numbers...............................................................................................24 2.5.2 DSN-less and TNS-less connections.....................................................................................25 2.6 SAP integration......................................................................................................................26 Chapter 3 Security.................................................................................................................................29 3.1 Securing administrative functions...........................................................................................29 3.2 Message client library............................................................................................................29 3.3 Temporary cache files............................................................................................................30 3 2012-11-22 Contents 3.3.1 To encrypt certain temporary cache files................................................................................30 3.4 Configuring SSL for Data Services components....................................................................31 3.4.1 To copy certificates in a distributed installation.......................................................................32 3.4.2 To enable or disable SSL on communication paths.................................................................33 3.4.3 To use custom certificates.....................................................................................................35 3.4.4 To generate keys and sign certificates...................................................................................35 3.5 Configuring SSL for the CMS connection..............................................................................36 3.6 Configuring SSL for Metadata Browsing and View Data Services..........................................37 3.6.1 To configure SSL for Metadata Browsing and View Data Services .......................................38 3.6.2 To create a keystore file and certificates using the Data Services tool...................................39 3.7 Password encryption..............................................................................................................39 3.7.1 Encryption key storage locations............................................................................................39 3.7.2 Encrypting passwords manually..............................................................................................40 3.8 Password protection for a Data Services repository...............................................................41 3.8.1 To set Data Services repository permissions in the CMC .....................................................41 Chapter 4 User and rights management................................................................................................43 4.1 User management..................................................................................................................43 4.2 Group management...............................................................................................................43 4.2.1 Detailed rights........................................................................................................................44 Chapter 5 Repository management.......................................................................................................49 5.1 To register a repository in the CMC.......................................................................................49 5.2 Managing security settings for repositories in the CMC ........................................................50 5.2.1 To view rights for a user or group on a repository..................................................................51 5.2.2 To assign users and groups to an access control list for a repository.....................................51 Chapter 6 Server management..............................................................................................................53 6.1 Setting UNIX environment variables.......................................................................................53 6.1.1 Configuring additional database connectivity..........................................................................54 6.2 Starting services automatically...............................................................................................55

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    172 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us