In this section: |
During installation, you are prompted for the WebFOCUS Reporting Server Administrator user ID. This is assumed to be the currently logged on user, but you may change it using the WebFOCUS Reporting Server Console. WebFOCUS includes support for multiple administrator IDs and passwords, and provides a distinction between server and application administrators. For more information, see the Server Administration for UNIX, Windows, OpenVMS, IBM i, and z/OS manual.
The following sections describe administration tasks that can be performed in the WebFOCUS Administration Console (see WebFOCUS Administration Console) that affect how the WebFOCUS Client interacts with WebFOCUS Reporting Server(s).
You can use the Reporting Servers section of the WebFOCUS Administration Console to:
Default credentials for all WebFOCUS Reporting Servers are stored in the cgivars.wfs file. You can use the WebFOCUS Administration Console to change these credentials.
Choose the Reporting Server category under the Configuration menu to view or edit the following settings.
Default credentials for the WebFOCUS Reporting Server user ID. Only used when a user ID (IBIC_user) is not supplied.
Default credentials for the WebFOCUS Reporting Server password. Only used when a user password (IBIC_pass) is not supplied.
Default credentials for the WebFOCUS Reporting Server. Only used when a server (IBIC_server) is not supplied.
How to: |
Administrators can use the WebFOCUS Administration Console to add WebFOCUS Reporting Servers and HTTP Listeners to the WebFOCUS environment. Additionally, the console can be used to add WebFOCUS Client node profiles for each WebFOCUS Reporting Server. We recommend setting WebFOCUS Reporting Server security using the node profiles. The nodes are added to the ibi/WebFOCUS77/client/wfc/etc/odin.cfg file.
A node can enable access to one server or multiple servers. If it specifies multiple servers, it is called a cluster node. The WebFOCUS Administration Console lets you define a basic cluster node and specify the servers it can access.
Tip: You can configure more advanced cluster functionality using the Web Console of the server. For details, see Technical Memo 4641: Distributing Workload Across Clustered WebFOCUS Reporting Servers.
If you specify:
Default. Is the initial value for new nodes and represents the traditional behavior, where the odin.cfg file does not contain a SECURITY keyword. In this case, WebFOCUS makes an explicit connection to the Reporting Server with whatever user ID and password it has available for the request. A user ID may come from IBI_REPORT_USER on the console Client Settings, Reporting Server pane, from a WebFOCUS Client Node Profile, or from the user WF_COOKIE if a Reporting Server sign-on has taken place. How the server processes explicit connections depends on its security setting (OFF, PTH, OPSYS, LDAP, DBMS).
HTTP Basic. Configures WebFOCUS to extract the user ID and password from the Authorization header. These credentials are then used to make an explicit connection to the WebFOCUS Reporting Server. You should only select this option when your Web tier is performing Basic Authentication so that the user Base64 encoded ID and password will be available in the request header. For example:
Authorization Basic amx0XHdmdXNlcjp3ZnVzZXIx
To verify that the Authorization header is available to WebFOCUS, click the Diagnostics menu on the WebFOCUS Administrative Console and select HTTP Request Info.
Kerberos. Configures WebFOCUS to pass the Kerberos ticket for the user to the WebFOCUS Reporting Server. This option enables an end-to-end single sign-on solution from the desktop to WebFOCUS, from WebFOCUS to the Reporting Server, and from the Reporting Server to supported relational DBMS systems. When using this option, the WebFOCUS Reporting Server must run in security OPSYS mode. There are additional setup requirements for WebFOCUS and Microsoft Active Directory that are described in Technical Memo 4647: Configuring Single Sign-on to the WebFOCUS Reporting Server Using Kerberos.
SAP Ticket. Enables customers using WebFOCUS Open Portal Services in SAP Enterprise Portal to achieve single sign-on through WebFOCUS to a Reporting Server configured with the Data Adapter for SAP. WebFOCUS passes along the MYSAPSSO cookie of the user, created on SAP Enterprise Portal, to the Reporting Server which validates it using the SAP security API.
Service Account. Enables you to specify a user ID and password to be used for all connections to the Reporting Server, as shown in the following image.
The service account credentials are encrypted and stored in the SECURITY keyword of the odin.cfg file. When defined, the service account overrides any other credentials that may be presented to WebFOCUS for this Reporting Server node.
Trusted. Enables you to connect to the Reporting Server with only a user ID. This option is useful when no password is available for the user, and controls can be placed on the server to ensure that connections from unauthorized clients are rejected (for example, employing the server RESTRICT_TO_IP setting so that only a particular WebFOCUS client can connect to the server).
If the server runs in security OPSYS mode, the connecting user ID must be valid on the server operating system and the Reporting Server cannot run on Windows. In this scenario, the connecting user appears in the server edaprint.log file and is returned by the server GETUSER and CNCTUSR subroutines. The report agent runs in the security context of the connecting user, which makes it possible to use operating system permissions and the trusted option for DBMS adapters in order to restrict file and data access.
Trusted connections are also supported by servers running in security OFF, PTH, and LDAP modes provided that the server trust_ext setting is enabled.
In this configuration the connecting user appears in the server edaprint.log file and is returned by the server CNCTUSR subroutine. The server GETUSER subroutine will always return the user ID that started the server. When the server runs in LDAP mode the connecting user must be found in the LDAP directory before the connection is accepted.
If the server runs in the PTH or OFF security modes, then trusted connections will be accepted without authentication by Reporting Servers on any platform, including Windows. The server edaprint.log file and CNCTUSR subroutine will reflect the connecting user ID, and the server GETUSER subroutine shows the user ID that started the server.
The following lines in a report request are useful to determine connection behavior.
-SET &CONNECT_USER = CNCTUSR('A30'); -SET &AGENT_USER = GETUSER('A30'); -TYPE Connect User is: &CONNECT_USER -TYPE Report Agent runs as: &AGENT_USER
When you select Trusted, the WebFOCUS script variable and Web server HTTP variable settings are displayed, as shown in the following image.
Select the option that will be used to retrieve the connected user.
Note: Trusted connections are not supported by servers running in security DBMS mode.
You can also specify the following optional parameters:
Note: HTTP Cookie and Header names must not contain commas or colons, since these are reserved delimiters.
REMOTE_USER is not a valid value in the HEADER input box, since it is a special type of HTTP header variable and its contents will not be sent to theWebFOCUS Reporting Server. Instead, specify the WF_REMOTE_USER variable.
If you are using a self-signed certificate to enable HTTPS communication with a WebFOCUS Reporting Server, the certificate must be configured in the Java environment in which the WebFOCUS Client is installed. This enables HTTPS communication between the Reporting Server and the following WebFOCUS Client tools:
For more information on configuring WebFOCUS to trust a self-signed certificate, see Registering a Self-Signed Certificate With the JVM. If the certificate was created by a trusted certificate authority, no further steps are required.
Select one of the following options from the drop-down list:
where:
CIPHER is AES128, AES192, AES256.
x is optional and defines an RSA key length of 1024 bits.
MODE is optional and is either Electronic Code Book (ECB) or Cipher Block Chaining (CBC).
For example, AES256x-CBC is the AES cipher, with 1024-bit RSA keys, and CBC mode. If the RSA or mode is not specified, then the default values are used. The RSA default value is 512 bits. The mode default value is ECB.
Note:
For more information about configuring encryption, see How to Configure Encrypted Communication to a WebFOCUS Reporting Server.
Because you specified Client in Step 4, proceed to Step 8 (and skip Step 7, which is used when Cluster is specified).
You can add multiple CLM hosts and ports by clicking Add. A check box is added next to each new host and port combination. To remove a host and port, select the associated check box and click Remove.
Note: The node name provided in the WebFOCUS Administration Console for CLM configurations must match the Cluster name of the Cluster Manager Server.
Tip: More advanced cluster functionality can be configured using the Reporting Server Web Console. For details, see Technical Memo 4665: Distributing Workload Across Clustered WebFOCUS Reporting Servers.
You can select the Set as Default Server Node check box to specify that the node is the default WebFOCUS Reporting Server. The node will be written as the IBI_REPORT_SERVER parameter value in the cgivars.wfs file. Note that even if you check Set as Default Server Node, this can be overridden if an IBIC_server is set in site.wfs or a node profile.
If the site.wfs file or request URL contains an IBIC_server setting, it will override the IBI_REPORT_SERVER parameter. In this case, the WebFOCUS Administration Console indicates that the IBI_REPORT_SERVER is the default node, even though it is no longer the default.
You can also click Save As to save these settings for another specified node that will be added to the ibi\WebFOCUS\client\wfc\etc\odin.cfg file.
Note: You can select the Sort alphabetically check box to sort a list of multiple servers.
This procedure assumes that you have already successfully installed and configured the WFServlet implementation of WebFOCUS.
Note: The JCE must be installed in the JVM directory that your application is using. For more information, see the JCE documentation.
The Remote Services - Modify Settings window appears.
The Remote Services - Modify Settings - EDASERVE window appears.
Note: When using any of the AES encryption ciphers, the client randomly generates a new RSA key pair (public and private keys of the specified length) and sends the public key to the server. Upon receipt of the public key, the server generates a random secret key. The length of the secret key depends on the chosen cipher strength. The secret key is encrypted with the public RSA key and sent back to the client, which decrypts it with its private RSA key. After the exchange, the client and the server both share the same secret key, and use it to encrypt and decrypt all communications between them.
Note: For additional encryption, you can add 3DES WebFOCUS cookie encryption, as outlined in WebFOCUS Encryption.
How to: |
You can configure Alternate Server nodes for use with Managed Reporting Deferred Receipt feature.
For more information about Deferred Receipt, see the WebFOCUS Managed Reporting Administrator's Manual.
Deferred Receipt requests can be processed by using the immediate WebFOCUS Reporting Server (immediate Server) or by using an Alternate Deferred Receipt Server (Deferred Server) dedicated to running only deferred requests. The resources for the Deferred Server are managed independently from the immediate Server. The Deferred Server must have the same access to applications, data sources, and Master Files, and run in the same environment (for example, UNIX), as the immediate Server.
Note: If you use the WebFOCUS Reporting Server for MVS, configuration steps are required to use deferred requests. You must set up an alternate server or service to handle deferred requests and then configure the WebFOCUS Client to send requests to that server by setting up a deferred server mapping. For more information, see the WebFOCUS and ReportCaster Installation and Configuration manual for your platform.
Using the WebFOCUS Administration Console, add a node for the Deferred Server the same way as adding a non-deferred node (see How to Add a Remote Server to the WebFOCUS Environment). Next, perform the following steps to map the Deferred Server to an immediate Server node:
A page appears for editing the Deferred Server Mappings file (altdnode.wfs).
Note: You can map multiple immediate Servers to the same Deferred Server by repeating these steps.
WebFOCUS |