we will go through the steps necessary to setup and install SAP BI 4.1 SP01 on a Red Hat Enterprise Linux 5.6 system. This will be a basic and default (full) installation of BI4.1 SP01 using the bundled Sybase SQL Anywhere database and Tomcat 7.0 Application server. This document assumes that you're installing from scratch and that no pre-existing BI products have been installed
Prerequisites:
General
Only 64-bit Operating systems are supported
Installation target must have adequate disk space ~20gb (will require much more to account for applying patches and SP's).
Temporary filesystem space ~2gb
Create a user account and group under which the BI4.1 SP01 software will run. This account does not require root privileges
Locale: Configure a supported UTF-8 locale by setting LC_ALL and LANG environment variables.
Example:
export LANG=en_US.utf8
export LC_ALL=en_US.utf8
ulimit settings must be set to unlimited by using the ulimit command or editing /etc/security/limits.conf manually.
read, write and execute permission to the installation target destination directory
You may get following error if you try to install with out installaing required library files.
ERROR:
./setup.sh
/pae/BOE140/SAP4.1-SP2/51047191/DATA_UNITS/BusinessObjectsServer_lnx/setupexe -launchedFromSH
/pae/BOE140/SAP4.1-SP2/51047191/DATA_UNITS/BusinessObjectsServer_lnx/setup.engine/setupengine.bin: error while loading shared libraries: /pae/BOE140/SAP4.1-SP2/51047191/DATA_UNITS/BusinessObjectsServer_lnx/setup.engine/libperlcwrapper.so: cannot restore segment prot after reloc: Permission denied
Finished, return code is 0
Resolution: run the following command as root to avoid the above error.
echo "`semanage fcontext -a -t textrel_shlib_t /pae/BOE140/SAP4.1-SP2/51047191/DATA_UNITS/BusinessObjectsServer_lnx/setup.engine/libperlcwrapper.so`"
echo "`chcon -f -t textrel_shlib_t /pae/BOE140/SAP4.1-SP2/51047191/DATA_UNITS/BusinessObjectsServer_lnx/setup.engine/libperlcwrapper.so`"
ERROR: When you try to install with the required library files following error will display..
Information: Missing patch: compat-libstdc++-33-3.2.3-61.x86_64
Missing patch:compat-libstdc++-33-3.2.3-61.i386.rpm
Resolution:
Before installing on Red Hat Linux, you must ensure all the required libraries are installed. Ensure you have root access, then use the Yum software installation tool to run the following commands:
yum install compat-libstdc++-33-3.2.3-61.x86_64.rpm
rpm -ivh compat-libstdc++-33-3.2.3-61.x86_64.rpm
yum install compat-libstdc++-33-3.2.3-61.i386.rpm
rpm -ivh compat-libstdc++-33-3.2.3-61.i386.rpm
Running Setup
To launch setup, navigate to the media for BI4.1 SP02 and execute ./setup.sh
Friday, December 6, 2013
Tuesday, August 6, 2013
Active Directory SSO with Vintela in XI 3.1
After
trying to think of of another useful topic, I realised that configuring Single
Sign On with Active Directory and Vintela in XI 3.1 is something that is rarely
covered, and I used to have quite a lot of trouble with it.
By
adapting a document on the SAP Support Portal, I now use a sure-fire method to
configure AD SSO with Tomcat, the default web application server that ships
with BusinessObjects Enterprise/Edge XI 3.1. It’s worked every time I’ve
used it.
Firstly,
let’s define our server names and IPs (you must obviously adjust these and the
commands below to reflect your server names and IPs – I have underlined
commands that need to be changed to help):
- Domain Name: POWI (FQDN: POWER.INTERNAL)
- Service Account: bo.service (password: admin)
- Domain Controller: vs-dev-ad-dc.POWER.INTERNAL (IP: 192.168.5.1)
- BO Server: vs-dev-ad-bo.POWER.INTERNAL (IP: 192.168.5.2)
- BusinessObjects AD Group: POWI\Business Objects
Step 1
Create
an Active Directory service account, bo.service (pass: admin). On the
BusinessObjects server, add the POWI/bo.service user to the Administrators
group. Also assign them the following rights in the Local Security Policy
snap-in:
• Act as part of Operating System
• Log on as a Batch Job
• Log on as a Service
• Replace a Process Level Token
• Act as part of Operating System
• Log on as a Batch Job
• Log on as a Service
• Replace a Process Level Token
Step 2
Run
the following command on the Active Directory server:
ktpass -out
BOSSO.keytab –princ BOSSO/bo.service.power.internal@POWER.INTERNAL
-mapuserbo.service@POWER.INTERNAL
-pass
admin
-kvno 255 -ptype KRB5_NT_PRINCIPAL -crypto RC4-HMAC-NT
The
output from the above command should be similar to:
Targeting
domain controller: vs-dev-ad-dc.POWER.INTERNAL
Using legacy password setting method
Successfully mapped BOSSO/bo.service.power.internal to bo.service.
Key created.
Output keytab to BOSSO.keytab:
Keytab version: 0x502
keysize 81 BOSSO/bo.service.power.internal@POWER.INTERNAL ptype 1
(KRB5_NT_PRINCIPAL) vno 255 etype 0x17 (RC4-HMAC) keylength 16
(0x209c6174da490caeb422f3fa5a7ae634)
Step 3
Run
the following command on the Active Directory server:
setspn -l
bo.service
The
output should be similar to:
Registered
ServicePrincipalNames for CN=bo.service,CN=Users,DC=POWER,DC=INTERNAL:
BOSSO/bo.service.power.internal
Step 4
Go
to properties of the ‘bo.service’ user in Active Directory and
under the Delegation tab, set ”Trust this user for delegation to any service
(Kerberos only)’ to on.
Step 5
Move
the BOSSO.keytab file that was created on the Active Directory server (refer
Step 2) to c:\winnt\ of the BusinessObjects server.
Step 6
Generate
the requisite SPN’s by running the following commands on the Active Directory
server:
setspn -a
HTTP/vs-dev-ad-bo
bo.service
setspn -a HTTP/vs-dev-ad-bo.power.internal
bo.service
setspn -a HTTP/192.168.5.2
bo.service
The
output from the above commands should be similar to:
HTTP/vs-dev-ad-bo
Updated object
Registering ServicePrincipalNames for
CN=bo.service,CN=Users,DC=POWER,DC=INTERNAL
HTTP/vs-dev-ad-bo.power.internal
Updated object
Registering ServicePrincipalNames for
CN=bo.service,CN=Users,DC=POWER,DC=INTERNAL
HTTP/192.168.5.2
Updated object
Step 7
Run
the following command on the Active Directory server to view all of the created
SPNs:
setspn -l
bo.service
The
output should be similar to:
Registered
ServicePrincipalNames for CN=bo.service,CN=Users,DC=POWER,DC=INTERNAL:
HTTP/192.168.5.2
HTTP/vs-dev-ad-bo.power.internal
HTTP/vs-dev-ad-bo
BOSSO/bo.service.power.internal
Step 8
Within
the BusinessObjects Central Management Console, within the Windows AD
Authentication area, do the following:
- Enable Windows AD
- Set the AD Administration Name: POWI\bo.service
- Set the Default AD Domain: POWER.INTERNAL
- Add AD Group: POWI\Business Objects
- Set ‘Use Kerberos Authentication’
- Set the Service Principal Name: BOSSO/bo.service.power.internal
- Set ‘Enable SSO for Selected Authentication Mode’
Step 9
Modify
the SIA service on the BusinessObjects server to run as thePOWI\bo.service domain user.
Step 10
You
should now be able to get SSO onto locally installed tools (ie Designer, Webi
Rich Client) by starting the application, selecting the authentication method
to be Windows AD, and without inputting a username and password, clicking
OK. You should be logged in as your AD user.
Step 11
Create
a file called c:\winnt\bsclogin.conf on the BusinsesObjects server, and put in
it the following text:
com.businessobjects.security.jgss.initiate
{
com.sun.security.auth.module.Krb5LoginModule required debug=true;
};
Step 12
Create
a file called c:\winnt\krb5.ini on the BusinessObjects server, and put in it
the following text:
[libdefaults]
default_realm =
POWER.INTERNAL
dns_lookup_kdc = true
dns_lookup_realm = true
udp_preference_limit = 1
[realms]
POWER.INTERNAL
=
{
kdc =
VS-DEV-AD-DC.POWER.INTERNAL
default_domain =
POWER.INTERNAL
}
Step 13
To
test that the krb5.ini file was created successfully, undertake the following:
- Navigate to \Program Files\Business Objects\javasdk\bin on the command line
- Execute ‘kinit bo.service‘, then input your password
- A ticket should be created
Step 14
On
the BusinessObjects server, open up the Tomcat Configuration application, then
go to the Java Options input, and add the following lines (restart Tomcat
once done):
-Djava.security.auth.login.config=C:\winnt\bscLogin.conf
-Djava.security.krb5.conf=C:\winnt\Krb5.ini
Step 15
Modify
the \Program Files\Business
Objects\Tomcat55\webapps\InfoViewApp\WEB-INF\web.xml file and allow users to
see authentication options by changing the authentication.visible tag to true.
Step 16
Modify
the \Program Files\Business Objects\Tomcat55\conf\server.xml file, by
change the following line to increase the MaxHttpHeaderSize element to
‘16384′:
Step 17
Modify
the \Program Files\Business Objects\Tomcat55\webapps\InfoViewApp\WEB-INF\web.xml
file as follows:
- Change authentication.default to ’secWinAD’
- Change siteminder.enabled to ‘false’
- Change vintela.enabled to ‘true’
- Remove comment tags (<!–, –>) from around the authFilter filter element
- Change idm.realm to ‘POWER.INTERNAL’
- Change idm.princ to ‘BOSSO/bo.service.power.internal‘
- Remove comment tags (<!–, –>) from around the authFilter filter-mapping element
Step 18
On
the BusinessObjects server, open up the Tomcat Configuration application, then
go to the Java Options input, and add the following lines:
-Dcom.wedgetail.idm.sso.password=admin
(password for bo.service user)
-Djcsi.kerberos.maxpacketsize=0
-Djcsi.kerberos.debug=true
Step 19
Remove
the following from the Java Options input in the Tomcat Configuration (if
they exist):
• Debug =true in the bsclogin.conf (set by default)
• -Dbobj.logging.log4j.config=verbose.properties (may have been added to Java Options)
• -Dcrystal.enterprise.trace.configuration=verbose (may have been added to Java Options)
• -Djcsi.kerberos.debug=true (may have been added to Java Options)
• Dcom.wedgetail.idm.sso.password=admin (only remove if you have a valid keytab configured)
• Switch Tomcat 5.5 back to run as the local system (if running under service account for verbose tracing)
• Debug =true in the bsclogin.conf (set by default)
• -Dbobj.logging.log4j.config=verbose.properties (may have been added to Java Options)
• -Dcrystal.enterprise.trace.configuration=verbose (may have been added to Java Options)
• -Djcsi.kerberos.debug=true (may have been added to Java Options)
• Dcom.wedgetail.idm.sso.password=admin (only remove if you have a valid keytab configured)
• Switch Tomcat 5.5 back to run as the local system (if running under service account for verbose tracing)
Step 20
Encrypt
your service account password by coping the BOSSO.keytab (created during Step
2) to the c:\winnt directory on the BusinessObjects server, then specify the
following in the \Program Files\Business Objects\Tomcat55\webapps\InfoViewApp\WEB-INF\web.xml
(after the idm.princ setting):
idm.keytab
c:\winnt\BOSSO.keytab
Step 21
Remove
the wedgetail.password option from the Tomcat Configuration Java Options. At
this point your Vintela SSO should work with InfoView.
Subscribe to:
Posts (Atom)
Sonarqube Upgrade from 9.4.4 to 9.9.4 LTS
Issue: 1) Java hasbeen upgraded from 11 to Open JDK 17. And Sonarqube is upgraded from 9.4 to 9.9.4. 2) After the upgrade sonarqube servic...
.png)
-
Disaster Recovery for SAP Business Objects 4.1/SAP Crystal Enterprise 2013 Prerequisites: 1. File Store Input and Output folders 2. Back...
-
• The default report job server children for Windows have been changed in BusinessObjects Enterprise XI from OUTPROC to MIXEDPROC. This caus...
-
Error "Object info","2","CI_APPOBJECTS"," ","MetaData.DataConnection", Setting the propert...