You use the Configuration Tab to configure:
In this section: |
Reference: |
To open the TIBCO WebFOCUS Server Settings, click the Configuration tab and expand the Reporting Servers folder. You can:
The Server Node properties defined in the Basic pane are explained below.
The name cannot be the same as any other node name, and it cannot contain more than forty-eight (48) characters. When the client accesses this server, it will use this name.
Optional. The description of the node that appears in the Configuration pane. If this is omitted, the node name will be used.
The Host name or IP address of the Host Server.
The Port number for the TCP listener. The default port is 8120.
The Port number for the HTTP listener. This is typically one port after the TCP/IP port.
The default HTTP port is 8121.
The security options for the Server connection.
Note: You can verify that the authorization header is available by selecting HTTP Request Info in the Diagnostics tab.
The service account credentials are encrypted and stored in the SECURITY keyword of the odin.cfg file. When defined, the service account overrides any other credentials that may be presented for this Server node, and all users connect to the Server using the same credentials. This approach does not make it possible to identify which user is running a given request on the Server in Managed Reporting deployments, and therefore is not recommended for them.
To use this option, the Server Security Provider must also be configured to allow trusted connections, and controls should be placed on the Server to ensure that it rejects connections from unauthorized clients. For example, you should employ the Server RESTRICT_TO_IP setting or configure a network firewall so that only your specified clients can connect to the Server.
When you create a new Client Configuration, the Trusted option is selected, by default, and the Pass TIBCO WebFOCUS User ID and their Groups and Custom options appear below it. When you accept the default option, Pass TIBCO WebFOCUS User ID and their Groups, the Client passes the ID and group memberships assigned to the user to WebFOCUS Server. When you select the Custom option, the display refreshes to show the User ID and the User's Groups check boxes allowing you to customize the user information passed to the server. The options TIBCO WebFOCUS script variable and HTTP Header Field appear under both check boxes, as shown in the following image.
Under the User ID check box, the TIBCO WebFOCUS script variable option displays the IBIMR_user parameter, by default. Under the User's Groups check box, the TIBCO WebFOCUS script variable option displays the IBIMR_memberof parameter, by default. You can type over the default values in the TIBCO WebFOCUS script variable options, and type your own values in the HTTP Header Field options.
Note: When configuring the Client to make trusted connections to the Server, you must also enable the Server to accept trusted connections.
The Server Node properties from the Advanced pane are explained below.
Contains a description for the Server node. This description displays to end users.
Enables encrypted communication between the Client and the Server HTTP listener. The default value is off (check box cleared).
This option must be selected if the Server HTTP listener is configured to use SSL. If you are using a self-signed certificate to enable HTTPS communication with a Server, the certificate must be configured in the Java environment where the Client is installed. This enables HTTPS communication between the Server and the Administration Console.
Enables data encryption when transmitting data over the internet to ensure data privacy. The default value is off (check box cleared).
When selected, the Compression and Encryption options are hidden because TLS encrypts and compresses the data, by default.
Enables data compression. By default, data compression is disabled.
Sets data encryption ability and the symmetric cryptography method used.
Select one of the following options from the drop-down list:
CIPHER(x)(-MODE)
where:
Is AES128, AES192, AES256.
Is optional and defines an RSA key length of 1024 bits. When this is not specified, the RSA key is 512 bits.
Is optional and defines the use of Cipher Block Chaining (CBC) mode. When the mode is not specified, Electronic Code Book (ECB) is used.
For example, AES256x-CBC is the AES256 cipher with a 1024-bit RSA key in CBC mode. AES128 is the AES128 cipher with a 512-bit RSA key in ECB mode.
Specifies the number of seconds that the Client will hold the pending connection. Other possible values are 0 (no wait) and -1 (infinite wait). The default value is -1.
Specifies the time, in seconds, that the Client will wait before timeout. You can optionally specify different return times for the first row and other rows. A single number indicates that the return time is valid for any row. If two numbers are separated by a comma, the first number specifies the return time for the first row and the second number specifies the return time for the subsequent rows. The default value is -1, which indicates an infinite wait time.
For any security option, an administrator can specify one or more HTTP header names and/or cookie names as follows:
cookie_name1, cookie_name2
header_name1, header_name2
Note:
Is the host name or IP address of the server.
Optional. The description of the node that appears in the Configuration pane. If this is omitted, the node name will be used.
Is the Host name or IP address of the Cluster Manager on which a remote Cluster Manager (CLM) is listening. If more than one address is specified, one of the addresses will be randomly selected until a successful connection to the CLM happens. The number of IP addresses defined in this setting must be the same as the number of port numbers defined in Remote CLM Port. Separate multiple host names or IP addresses with a comma.
Is the UDP number of the Port on which the Cluster Manger server is listening. The default port is 8200. If more than one port number is specified, the number of port numbers must be the same as the number of IP addresses defined in Remote CLM Host. Separate multiple host names or IP addresses with a comma.
The security options for the Server cluster.
Note: You can verify that the authorization header is available in by selecting HTTP Request Info in the Diagnostics tab.
The service account credentials are encrypted and stored in the SECURITY keyword of the odin.cfg file. When defined, the service account overrides any other credentials that may be presented for this Cluster Manager node, and all users connect to the Cluster Manager using the same credentials. This approach does not make it possible to identify which user is running a given request on the Cluster Manager in Managed Reporting deployments, and therefore is not recommended for them.
When you create a new Cluster Manager Configuration, the Trusted option is selected, by default, and the Pass TIBCO WebFOCUS User ID and their Groups, and Custom options appear below it.
When you accept the default option, Pass TIBCO WebFOCUS User ID and their Groups, the Client passes the ID and group memberships assigned to the user to the WebFOCUS Server. When you select the Custom option, additional settings appear and you can customize the user information sent from the Client to the WebFOCUS Server.
Note: When configuring the Client to make trusted connections to the Server, you must also enable the Cluster Manager to accept trusted connections.
Enables encrypted communication between the Client and the HTTP listener.
The default value is off.
This option must be selected if the Cluster Manager HTTP listener is configured to use SSL. If you are using a self-signed certificate to enable HTTPS communication with a Cluster Manager , the certificate must be configured in the Java environment where the WebFOCUS Client is installed. This enables HTTPS communication between the Cluster Manager and the Administration Console.
Enables data compression. By default, data compression is disabled.
Sets data encryption ability and the symmetric cryptography method used.
Select one of the following options from the drop-down list:
CIPHER(x)(-MODE)
where:
Is AES128, AES192, AES256.
Is optional and defines an RSA key length of 1024 bits. When this is not specified, the RSA key is 512 bits.
Is optional and defines the use of Cipher Block Chaining (CBC) mode. When the mode is not specified, Electronic Code Book (ECB) is used.
For example, AES256x-CBC is the AES256 cipher with a 1024-bit RSA key in CBC mode. AES128 is the AES128 cipher with a 512-bit RSA key in ECB mode.
Specifies the number of seconds that the Client will hold the pending connection. This is useful in a cluster deployment to avoid a lengthy delay of failover response. Other possible values are 0 (no wait) and -1 (infinite wait). The default value is -1.
Specifies the time, in seconds, that the Client will wait before timeout. You can optionally specify different return times for the first row and other rows. A single number indicates the return time is valid for any row. If two numbers are separated by a comma, the first number specifies the return time for the first row and the second number specifies the return time for the subsequent rows. The default value is -1, which indicates an infinite wait time.
For any security option, an administrator can specify one or more HTTP header names or cookie names as follows:
cookie_name1, cookie_name2
header_name1, header_name2
Note:
Server connection nodes contain all of the information necessary for the Client to connect with and make use of a Server. A Server connection node provides access to one server. A Cluster Manager node provides access to multiple servers. Changes you make to the configuration in this section are captured in the odin.cfg file, located in drive:\ibi\WebFOCUS82\client\wfc\etc on Windows, or located in install_directory/ibi/WebFOCUS82/client/wfc/etc on UNIX or Linux.
The names of all Reporting Server Connection nodes also appear in the Multiple Servers List. This list is located in two places on the Hub. It appears above the Application Directories tree of the Application Directories area and in the Server Administration section of the Management Center area menu.
When you add a Reporting Server Connection node, the name of that node appears on the list. When you delete a Reporting Server Connection node, the name of that node disappears from the list. If you change the name of an existing Reporting Server Connection node, the new name is added, but the name of the existing node remains in the list until you delete the node it represents from the Reporting Server Connections page.
You can make global configuration changes in the server environment by using the Server Console.
The existing Servers are shown.
If you are prompted to sign in, type the credentials of the Server Administrator.
The Server Console opens in a separate window.
For more information about the Server Console, see the Server Administration manual, or click Help.
The Client Configuration pane opens.
Note: The name cannot be the same as any other node name, and it cannot contain more than forty-eight (48) characters. When the client accesses this server, it will use this name.
Note: If you are using HTTP Basic authentication, you can verify the authorization header by selecting HTTP Request Info in the Diagnostics tab.
Note: See Configuring Kerberos for Single Sign On for additional setup requirements.
Trusted is the default. This is the recommended approach to connect to a Server.
For more information on using TIBCO WebFOCUS script variables and HTTP headers, see Manipulating WebFOCUSDB2 Web Query Variables. For more information on configuring trusted connections on the Server, see Configuring Trusted Connections.
Note: When configuring the Client to make trusted connections to the Server, you must also enable the Server to accept trusted connections.
For more information about the Advanced settings, see Server Node Properties.
A node for the new WebFOCUS Server connection appears in the tree under the Server Connections folder. The name of the new WebFOCUS Reporting Server connection also appears in the Multiple Servers List. This list is located in two places on the Hub. It appears above the Application Directories tree of the Application Directories area and in the Server Administration section of the Management Center area menu.
The connection properties appear in the Client Configuration pane.
This procedure assumes that you have already successfully installed and configured the WFServlet implementation.
Note: The JCE must be installed in the JVM directory that your application is using. For more information, see the JCE documentation.
The Client Configuration pane appears.
Note: When using any of the AES encryption ciphers, the client randomly generates a new RSA key pair (public and private keys of the specified length) and sends the public key to the server. Upon receipt of the public key, the server generates a random secret key. The length of the secret key depends on the chosen cipher strength. The secret key is encrypted with the public RSA key and sent back to the client, which decrypts it with its private RSA key. After the exchange, the client and the server both share the same secret key, and use it to encrypt and decrypt all communication between them.
Selecting a default Server node in the Configuration tab sets the node as the IBI_REPORT_SERVER value in the webfocus.cfg file. However, if a site profile, universal profile, or request URL specifies a different default Server node, that value will override this selection. Profiles and request URLs use the IBIC_server setting for that purpose.
A green check mark appears on the server icon indicating the default node.
If you receive a Server Error message, the server connection failed.
If a page opens, displaying the results of your test, the server connection was successful.
Whenever a network, operating system, relational database system, or Application Server disruption temporarily disconnects the Client from the Repository, the Client automatically reconnects to the Repository as soon as the disruption is resolved. There is no need to stop and restart the Application Server to re-establish the connection between the Client and the Repository.
If you are able to remain signed in to a session during the disruption, you will automatically reconnect to the Repository as soon as the connection is restored. If the disruption forces you to sign out, you will automatically reconnect to the Repository when you sign in again. After the connection is restored, you can resume your work from the point at which you were interrupted.
Records of the events that disrupt and restore the connection between the Client and the Repository are captured in the System log.
You can configure Alternate Server nodes for use with the Managed Reporting Deferred Receipt feature.
Deferred Receipt requests can be processed by using the immediate Server (immediate server) or by using an alternate deferred receipt server (Deferred Server) dedicated to running only deferred requests. The resources for the Deferred Server are managed independently from the immediate server. The Deferred Server must have the same access to applications, data sources, and Master Files, and run in the same environment (for example, UNIX), as the immediate server.
Note: If you use the Server for z/OS, additional configuration is required to use deferred requests. You must set up an alternate server or service to handle deferred requests and then configure the WebFOCUS Client to send requests to that server by setting up a deferred server mapping. For more information, see the Installation and Configuration for Windows manual for your platform.
The Alternate Server Mapping pane opens.
The connection properties appear in the Client Configuration pane.
Note: Changes to the main server value automatically clear the value assigned to the alternate server. Therefore, if you change the value in the main server setting, you must also select an alternate server.
Using the Administration Console, add a node for the deferred server the same way as adding a non-deferred node. Next, perform the following steps to map the Deferred Server to an immediate Server node:
The Alternate Server Mapping page opens, allowing you to edit the altdnode.wfs file.
Note: You can map multiple immediate servers to the same deferred server by repeating these steps.
Clustering allows you to automatically send requests to the best available server for processing.
The Cluster Manager (CLM) enables you to define clusters of Servers that can be brought up and down as needed. In addition, the Cluster Manager enables you to configure cluster properties, including response time and dispatch method. It then monitors cluster performance and provides statistics, such as the average response time for requests, the number of connection failures and errors, and how many requests were sent per minute.
For more information, see Server Node Properties.
This procedure details the steps you take to create a cluster of servers in a node using the Cluster Manager.
The Cluster Manager Configuration pane opens.
The default Remote CLM Port is 8120.
Note: The Node Name provided in the Administration Console for Cluster Manager configurations must match the Cluster name of the Cluster Manager Server.
Note:
Note: You must configure the security provider on the Server to accept trusted connections.
For more information on using TIBCO WebFOCUS script variables and HTTP headers, see Manipulating WebFOCUSDB2 Web Query Variables. For more information on configuring trusted connections on the Server, see Configuring Trusted Connections.
The node properties appear in the Cluster Manager Configuration pane.
Previous implementations of Server clustering are still supported through the Legacy Cluster Configuration screen.
The Legacy Cluster Configuration pane opens.
In this section: |
Client variables are not passed to the Server, so they cannot be included directly in any of the Server profiles (edasprof.prf, user profiles, and group profiles). However, you can make use of Client variables by specifying procedures in the site profile or universal profile. The site profile and the universal profile run after the Server profile processing, but before the report request. The site profile executes from the Client and the universal profile executes code from both the Client and the ReportCaster Distribution Server.
The site profile and the universal profile can also be added directly to webfocus.cfg or site.wfs.
How to: |
A site profile is sent to the Server by the Client and is executed on the Server immediately after all Server profiles. It can override settings in the Server profiles and can take advantage of the variable values set by the other profiles. This makes the amper variables exported by the Client with the (pass) syntax available for use on the Server.
For more information on using amper variables, see Manipulating WebFOCUSDB2 Web Query Variables. For more information on Server profiles, see WebFOCUS Reporting Server Profiles.
Customers can use a site profile to:
Note: The site profile is only processed when procedures are run by the Client. Use the universal profile to include commands to be processed when procedures are run by the ReportCaster Distribution Server.
The following diagram illustrates site profile processing. The numbers associated with the files refer to the order in which the files are processed.
The Site Profile (IBI_SITE_PROFILE) field uses the following syntax:
_site_profile=command
where:
Is any valid Server syntax.
Once you have completed these steps, the profile procedure or procedures run automatically. There is no need to restart the Server.
How to: |
A universal profile is sent to the Server by both the Client and the ReportCaster Distribution Server and is executed on the Server. It runs immediately following all Server profiles.
Unlike the site profile, the universal profile is included during the execution of procedures by ReportCaster. Therefore, it should not include any logic or constructs that will execute only on the Client. For example, HTTP header variables should not be included, because they are available to the Client but not to the ReportCaster Distribution Server.
The Universal Profile (IBI_UNIVERSAL_PROFILE) parameter uses the following syntax:
IBI_UNIVERSAL_PROFILE=command
where:
Is any valid Server syntax. The universal profile is executed by both the Client and the ReportCaster Distribution Server. This differs from the Site Profile, which is only executed by a Client request.
Once you have completed these steps, the profile procedure (or procedures) run automatically. There is no need to restart the Server.
The Distribution Directories folder contains a configuration of distribution directory nodes that supports scheduled report distributions from ReportCaster. Distribution directory nodes specify those folders within the IBFS FILE subsystem that capture output from scheduled report distributions, and can be mapped to existing file system directories that are accessible to the ReportCaster Distribution Server, as shown in the following image.
When using the Repository method, the ReportCaster Distribution Server delivers scheduled report output to these IBFS FILE subsystem folders and their associated network locations or FTP server locations. The output is then available for use by other tools or applications that can retrieve it from the designated network or FTP server location.
Because they are folders within the IBFS FILE subsystem, distribution directory nodes are subject to the same security configuration as any other IBFS resource. Administrators can therefore use distribution directory nodes to limit the availability of the IBFS files that support scheduled report distributions to a selected set of authorized groups and users.
The Network Location page opens when you open a new or existing distribution directory node. This page contains the following fields:
The Name field identifies the name of a distribution directory node within the IBFS FILE subsystem. The value you assign to this field must be unique. You receive an error if you attempt to create more than one distribution directory node with the same name.
The value you assign to the Name field appears on the folder that represents the distribution directory node in the Resources tree. When the Resources tree on the Legacy home page is displayed in Full View mode, folders for distribution directory nodes appear under the FILE subsystem folder, as shown in the following image.
The value you assign to the Name field also appears on folders that represent distribution directory nodes in the Browse for Folder dialog box that opens from the Distribution dialog box of the ReportCaster Basic Scheduling Tool and Advanced Scheduling Tool, as shown in the following image. Administrators and authorized users can see these folders when they configure a Report Distribution schedule that uses the Repository method.
The Type field allows administrators to select the type of distribution method and external connection to be supported by a new distribution directory. There are two options:
Path. When this option is selected, the new IBFS distribution directory node will be connected to a directory that is accessible to the Distribution Server. The Path field remains on display in the Network Location page and contains the path to that directory.
FTP Server. When this option is selected, the new IBFS distribution directory node will be connected to an FTP server identified by a predefined FTP setting configuration maintained in ReportCaster. The Path field is replaced by the Server field with its list of predefined FTP Setting configurations.
Distribution directory nodes can only support a single connection type. Therefore, this field is visible only when creating new distribution directory nodes. It is not visible in distribution directory nodes that have already been created.
In addition, because the option to assign a distribution directory node to an FTP server is possible only when predefined FTP Connection setting configurations are available, this field, and the two options it contains, appears only when at least one predefined FTP Setting configuration, in addition to the (Default Setting) configuration, is available in ReportCaster. For more information about FTP Setting configurations, see the ReportCaster technical content.
The Path field identifies the path to the network location that corresponds to a distribution directory node in the IBFS system, as shown in the following image. Because this location is the file system target of the scheduled report output, the Distribution Server must be able to write files to the location defined by this path. Within this limitation, the path can identify any location that supports your requirements.
The format of a path assigned to this value must conform to the requirements of the operating system used by the Distribution Server or to the requirements of the Universal Naming Convention (UNC). For example, you could use one of the following paths to identify a file system directory named ReportOutput\Report01, that is located on a server named Server01, which, in a Microsoft Windows-based network, is mapped to the drive letter W:\.
If a path uses a format that is accessible to the Application Server as well, full details of the results of the file distribution are available for review from the Application Server.
If a path points to a directory on a machine that does not host the Application and Distribution Servers, both the Application Server, typically Tomcat, and the Distribution Server must be running under a user ID that has permission to access the directory. The Application Server must at least have Read permission to the targeted directory. The Distribution Server must have Read/Write permission to the targeted directory. The configuration of these permissions takes place within the external network, and is beyond the scope of this document.
Note that you must define the path to the file system location before you can create a distribution directory node for it. If the path in a distribution directory node does not point to an existing network location, the distribution directory is invalid and cannot support a scheduled report distribution.
The FTP Server field identifies the predefined FTP Setting configuration to which a distribution directory node is mapped in the IBFS system, as shown in the following image.
The list of servers in this field is limited to the set of predefined FTP server configurations available in the ReportCaster Console Configuration tab. The list excludes the default FTP Server configuration defined within ReportCaster because it is not a true IBFS node. It also excludes any user-defined FTP configurations attached to FTP Distribution schedules. In order to include the configurations defined in either of these locations, administrators must create a duplicate pre-defined FTP Setting configuration within ReportCaster.
The details of an FTP Server configuration identify the name of the FTP server to which the connection is made, the authorized User ID and Password for that FTP server, and the security protocol it uses. For more information about the FTP Settings configuration, see the ReportCaster technical content.
When creating a new distribution directory node, this setting appears only after you click the Server option in the Type setting.
When working with an existing distribution directory node, this setting appears only if the distribution directory node was configured to support an FTP Server connection when it was created.
Just as the ability to distribute scheduled report output using the Repository method is typically limited to administrators, and to those users in the Developers and Advanced Users groups who are authorized to create, edit, and distribute content within their assigned workspaces, the ability to access distribution directory nodes that support scheduled report distributions to the FILE subsystem should be limited to administrators, and to the users who are authorized to distribute the scheduled report output they contain. Using the tools of the workspace-based security model, administrators can ensure that distribution directories are available only to these authorized users.
In order to make distribution directories fully accessible to authorized users, administrators must do the following:
These requirements call for the assignment of the existing List Role to the FILE folder in the IBFS system, and the creation of two new roles: a role that grants access to the file system distribution method, referred to as the Distribution to File System role, and a second role that grants access to the privileges required to create or overwrite scheduled report content in a distribution directory, referred to as the Distribution Directory Access role.
A rule that makes the List role available to all users in the EVERYONE group is assigned to the FILE folder, by default. This rule must be assigned to the FILE folder in order to make Distribution Directory nodes, which exist within the IBFS FILE subsystem available to authorized groups and users.
The Distribution to File System role is designed to grant users the Distribute to File System (opDistributeFileSystem) privilege when working with a workspace. This role can include additional privileges, if required, or administrators can add this privilege to an existing role that contains other privileges. However, by creating a dedicated role limited to file system distribution access, administrators can achieve the most effective control over this role and its use.
The Distribution Directory Access role is designed to grant users the additional access needed to work with individual distribution directory nodes. It consists of the Access Resource (opList) privilege that enables users to see the distribution directory node and its contents, the Create Items (opCreateItem) privilege that enables users who own reporting schedules to create files containing scheduled report output in the distribution directory node, and the Edit Items (opWrite) privilege that enables users who own reporting schedules to overwrite files containing scheduled report output in the distribution directory if the previous version of that file did not use a unique filename that includes a timestamp. The Create Items and Edit Items privileges are required because the Distribution Server that produces the scheduled report output signs into WebFOCUS with the ID of the user that owns the reporting schedule in order to transfer scheduled report output to the distribution directory node.
As with the File System Distribution role, this role can include additional privileges, if required, or administrators can add these privileges to an existing role that contains other privileges. However, by creating a dedicated role limited to the ability to create and view content in a distribution directory node, administrators can achieve the most effective control over this role and its use.
Administrators must also create distribution directory nodes for those workspaces that generate scheduled report output. If all members are permitted to see or generate scheduled report output from a workspace, a single distribution directory node can accommodate all output from that workspace. However, if access to sensitive or confidential report output from a workspace must be restricted to a smaller group, additional distribution directories that are limited to these smaller groups may be required.
In order to complete the configuration required to make distribution directories available to authorized users, administrators must create rules for the workspaces and distribution directories that support scheduled report output distribution to the IBFS File subsystem. They must create a Distribution to File System rule for each workspace that generates scheduled report output for delivery to the File System in order to allow group members in that workspace to access the File System folder and workspace directory subfolders when they create a schedule. They must also create a Distribution Directory Access rule for each distribution directory node that contains scheduled report output in order to allow group members from the workspace that generated the scheduled report output to access that distribution directory and create scheduled report output in it.
We recommend that administrators configure distribution directory notes in the following task sequence:
Tasks one and two are not included in the topics that follow. They require an assessment that can only be made by each administrator based on the requirements of their organization. The remaining tasks are described in detail in the topics that follow.
This role is designed to grant the privilege to distribute scheduled report output from a workspace to the IBFS File subsystem. We recommend that this role be limited to a single privilege and be identified by that privilege as described in this procedure. However, this role can include additional privileges if required, or the Distribute to File System (opDistributeFileSystem) privilege can be assigned to an existing role.
The Distribution to the File System role appears in the Roles list.
This role is designed to grant the privilege to access distribution directory nodes and create and overwrite scheduled report output in them. We recommend that this role be limited to the Access Resource, Create Item, and Edit Item privileges and be identified as a distribution directory access role as described in this procedure. However, this role can include additional privileges if required, or these privileges can be assigned to an existing role.
The Distribution Directory Access role appears in the Roles list.
A Distribution to File System rule grants access to the IBFS File subsystem to those groups assigned to a workspace that uses ReportCaster to distribute scheduled report output. Before you begin, make sure that all users who need access to the File subsystem are assigned to those groups to which this rule is assigned.
When creating a node for a distribution directory, you must type a path to an existing network location. You cannot create a new network path merely by typing it in this field and saving the distribution directory node. If the path does not point to an existing network location, the distribution directory node is invalid and cannot support a scheduled report distribution.
For Windows:
drive:\path
For UNIX or Linux:
/path
For the Universal Naming Convention:
\\server\path
where:
Is the name of the server that hosts the directory to which scheduled reports for the node identified in the Name field are to be directed.
Is the name of the network path to the directory to which scheduled reports for the node identified in the Name field are to be directed.
For example:
The Network Location page closes, and a node for the new distribution directory appears under the Distribution Directories folder.
You can use the Edit command to change the values in an existing distribution directory node, or to create a new node modeled on an existing node.
If you save an existing distribution directory node without changing the name, you overwrite the existing node with the revised version. However, if you save an existing distribution directory node with a new name, you automatically create a new node, and leave the existing node with the old name intact. You do not overwrite the existing node.
If you need to replace an existing node with a new node, you must delete the existing node after creating the new node. For more information, see How to Delete a Distribution Directory Node.
Note: The Type field is available only when you create a new distribution directory node. Therefore, you cannot change the type assigned to an existing Distribution Directory node.
For Windows:
drive:\path
For UNIX or Linux:
/path
For the Universal Naming Convention:
\\server\path
where:
Is the name of the server that hosts the directory to which scheduled reports for the node identified in the Name field are to be directed.
Is the name of the network path to the directory to which scheduled reports for the node identified in the Name field are to be directed.
For example:
or
If you changed the Name, click Save As.
The Network Location page closes.
If you did not change the name, the updated node appears under the Distribution Directories folder.
If you changed the name, the new and the existing node appear under the Distribution Directories folder. You must assign the Distribution to File System and the Distribution Directory Access rule to the new distribution directory node to make it available to the groups that will use it for scheduled report distributions.
If you need to delete the existing node, see How to Delete a Distribution Directory Node.
The deleted node no longer appears under the Distribution Directories folder.
Application Settings determine the configuration and behavior of the WebFOCUS web application.
For more information about configuration files, see TIBCO WebFOCUS Client Configuration Files. For more information about individual Application Settings, see Application Settings.
The settings appear in the main configuration pane.
Client sessions that remain idle risk exposing sensitive information and system resources to unauthorized use. In order to minimize the time that a client session remains idle, two settings, located on the BI Portals page of the Administration Console Configuration tab, limit the length of an idle session to 120 minutes, by default.
The Session Timeout (minutes) (IBI_SESSION_TIMEOUT) setting limits session idle time for users who signed in with a valid User ID. Similarly, the Public Session Timeout (minutes) (IBI_PUBLIC_SESSION_TIMEOUT) setting limits session idle time for public users who signed in with an Anonymous User ID.
As a best practice, we recommend that administrators replace the default values in both of these settings with shortest time that accommodates their security needs and supports typical resource usage for the two different user types.
To warn users that their idle sessions are about to expire, the Enable Auto Sign-out (IBI_AUTO_SIGNOFF) setting and the Idle Timeout message duration (minutes) (IBI_AUTO_SIGNOFF_MESSAGE_DURATION) setting also appear on the BI Portals page. When the Enable Auto Sign-out check box is selected, a message stating that the current session will expire due to inactivity opens after a session has been idle for the number of minutes specified by the relevant Session Timeout (minutes) setting.
The message remains open and visible for the number of minutes specified in the Idle Timeout message duration (minutes) setting, which is two minutes, by default. If the message opens from the Home Page or the Security Center, it includes a countdown of the remaining time before sign-out. If the message opens from a portal, the countdown does not appear.
To continue their session, users can click OK. This action closes the message box and restores the session. A new session timeout countdown starts as soon as the restored session goes idle.
If users do not click OK before the scheduled timeout, the message box closes, and the session comes to an end.
For users assigned to a zone that uses form-based authentication or another authentication method that requires them to present credentials before opening a new session, the window displaying the Home Page refreshes and displays the Sign in page automatically after the session ends.
For users assigned to a zone that uses a Single Sign On pre-authentication method, the window displaying the Home Page refreshes and displays the sign-out page specified in the Custom logout target URL setting opens instead.
Typically, this is the default sign-out page that does not link users to the sign-in page. However, this setting can also contain the URL of the sign-out page established by a pre-authentication provider, which ends the Single Sign On product session for that provider.
If the Security Center is open, the window displaying it will also refresh and display the Sign in page. Any other windows, such as the Administration Console, that were open at the time of the session timeout remain open and unchanged. However, you will receive an Unexpected Behavior error message the first time you attempt to use them after the timeout. When you click OK to clear this message, the window automatically refreshes and displays the Sign in page. As a best practice, we recommend that you close all but one window before signing in to WebFOCUS for a new session.
When users sign in again, or restart their session with authentication from their third-party authentication provider, the default page or portal defined in the Redirect /ibi_apps to setting opens, enabling them to return to tasks that may have been interrupted by the session timeout.
How to: |
The Custom Settings page allows you to customize your product installation by typing customized values for standard settings.
When you save updates to settings that you type into the Customized Setting text box, they are transferred to the site.wfs file, located at drive:\ibi\WebFOCUS82\client\wfc\etc. When you use this page to assign new values to settings, they override the default values assigned to them. These overrides are carried over as you upgrade to new versions.
After you save a custom setting, the text continues to display on this page. You can use comments to identify specific updates and additional information about them.
For an example of applying custom settings, see Managed Reporting Internal Variables.
Only an administrator can configure settings on the Custom Settings page.
Use the format required by the application or operating system that will execute the command.
To help track changes to custom settings, use comments to identify and separate individual changes.
Note: Even when you select this check box, settings continue to appear in an unencrypted format in the Custom Settings text box.
How to: |
You can use the Administration Console to configure National Language Support and enable the Dynamic Language Switch.
Separate message files exist for every national language supported by the product. If you want to customize the set of characters used in your report output, you must select the code page for every language you use.
The list adjusts to display the available code pages for the selected operating system.
Note: The language selected for the Client usually corresponds to the language selected for the Server from the Server Console.
If the language chosen from the Server Console does not appear in the drop-down list in the Administration Console, click User Defined Code Page and type the number of the user-defined code page.
Use this option, for example, when the server adds support for a new code page that is not yet reflected in the client software.
In the following sample configuration window, the administrator specified the User Defined Code Page 437.
Unicode (UTF-8) is available for the Windows, UNIX, or AS/400 operating systems.
Note: Because of a Java encoding limitation for ISO8859-1, characters 0x80 through 0x9F are not supported with the Application Server configured for code page 137. As a result, French users wanting to display the following characters correctly should configure the Application Server to use Cp1252.
The following code page settings are available:
Note: Only those code page settings marked with an asterisk are fully supported in the current release.
How to: |
You can customize the languages that are made available on Sign in pages by activating the Dynamic Language Switch.
The Dynamic Language Switch page opens with a list of the languages made available by the code page selection in the National Language Support page. By default, the Enable Dynamic Language check box is cleared and all of the language check boxes are deactivated.
The Dynamic Language Switch page also shows the Client Code Page setting specified in How to Configure National Language Support.
Note: To remove languages from the Select Languages list on the Sign in pages, clear the check boxes next to the languages you want to remove.
In this section: |
How to: |
Redirection settings specify the way in which the Client handles output files by file extension. You can review these settings though the Redirection Settings page of the Administration Console Configuration tab. Each entry in the page identifies an output file format by its TIBCO WebFOCUS Extension, Content Type, File Format, Server Extension, Client Extension, and IBFS File Format, as shown in the following image.
Note: This image displays the lower half of the page to show file extensions with varying values in the Redirect and Save Report fields.
The mime.wfs file, located in the directory drive:\ibi\WebFOCUS82\client\wfc\etc, contains information about available format types. When you open the Redirection Settings page, you display redirection settings stored in the mime.wfs file, and when you save changes, you store them in the mime.wfs file.
Before making any changes to the redirection settings, you must assess the impact they will have on the applications and user experience within your organization. If you require further assistance, consult Customer Support Services.
Notes:
On the Redirection Settings page, values in the Redirect and Save Report settings determine whether the output from a request is stored in a temp folder file during processing, and whether a name is to be assigned to that file automatically. The combination of values assigned to these two settings determines the way in which output from requests is to be displayed and saved.
The Redirect setting allows you to specify if the output from a request should be saved to a file in the temp folder located under the client directory.
The Save Report setting allows you to specify if report files should be assigned names automatically when they are created.
Note: The name value of an item appears on the Properties panel in the Name field.
To specify an output file name within a report request, use the PCHOLD AS filename option.
Within a report request, the syntax for the PCHOLD option is:
ON TABLE PCHOLD [AS filename] [FORMAT fmt]
where:
Specifies a name for the PCHOLD file.
Specifies the format of the PCHOLD file. For example, XLSX.
Note: If the PCHOLD AS name specified in the report request contains eight or fewer characters, it is returned to the browser in uppercase. If it contains nine or more characters, it is returned to the browser in the case specified.
For information on creating reports with the PCHOLD command, see the Creating Reports with TIBCO WebFOCUS Language guide.
Some applications, such as Microsoft Excel®, require a unique name for every file opened. In order to accommodate this requirement, when you assign a value of yes to the Save Report setting, you can add amper variables to the report request to obtain the date and time the report is created by the Server, specify a file name with the date and time appended, and assign that file name to the report file, as shown in the following example:
-SET &TIME = STRIP(8,&TOD,'.',A8); -SET &FNAME = OUTPUT_ | &YYMD | _ | &TIME; TABLE FILE CAR BY CAR ON TABLE PCHOLD AS &FNAME FORMAT XLSX END XSLX
Before making any changes to the Redirection Settings, you must assess the impact they will have on the applications and user experience within your organization. You may need to consult with the administrators of other large scale applications or network administrators within your organization that would be affected by your changes. If you require further assistance, consult Customer Support Services.
In order to use the Save Report functionality for GRAPH requests that specify a PNG, SVG, GIF, JPEG, or JPG format in the procedure, you must take the following steps:
Set Save Report to yes for the .htm extension.
Running a server-side GRAPH request creates an HTM file that contains a link to the actual graph output, which is stored as a temporary image file with a .jpeg, .jpg, .gif, .svg, or .png extension.
InfoAssist Properties allow you to set the system-wide defaults that apply to all InfoAssist users. To update these settings, select the Configuration tab, and then select InfoAssist Properties. For more information about specific InfoAssist Properties see InfoAssist Properties.
WebFOCUS Designer Properties allow you to set the system-wide defaults that apply to all users of WebFOCUS Designer. To update these settings, select the Configuration tab, and then select Designer Properties. For more information about specific WebFOCUS Designer Properties, see TIBCO WebFOCUS Designer Properties.
The Role Update Utility lists the differences between the privileges currently assigned to Repository Roles and their corresponding Package Roles. Repository Roles are defined in the repository, and are used by resource templates. Package Roles are maintained in a separate file, and define the standard set of privileges assigned to roles within a release.
When you upgrade to a new release, or change the privileges assigned to Repository Roles by updating them in the Security Center, this utility identifies all variances between the privileges assigned to the Repository Roles used by resource templates and the standard set of privileges defined by the Package Role.
For each Repository Role whose set of assigned privileges varies from its corresponding Package Role, the utility gives you the option to disregard the variance, add the missing privileges to the Repository Role, or replace the Repository Role entirely with the standard set of privileges defined in the Package Role. Replacing a Repository Role with a Package Role is the only way to remove any additional privileges that appear in a Repository Role but not in the corresponding Package Role. The utility also enables you to make these changes globally to all Repository Roles whose set of assigned privileges vary from the set of privileges assigned to the Package Roles.
After an upgrade or installation of a new release, the utility enables you to identify all variances between the existing Repository Roles and the new Package Roles and incorporate the new privileges into the Repository Roles or maintain them without updates.
If there are no upgrades or changes, a role entry displays the message, No privilege differences between package and repository. If this is the case with your display, you can disregard this feature until you upgrade or change a Repository Role.
For more information on how to update a role after a typical installation, see the WebFOCUS and ReportCaster Installation and Configuration technical content.