Businessobjects 6.X To Xi Release 2 Migration Guide
Businessobjects 6.X To Xi Release 2 Migration Guide
x to XI Release 2
Migration Guide
Trademarks Business Objects, the Business Objects logo, Crystal Reports, and Crystal Enterprise are
trademarks or registered trademarks of Business Objects SA or its affiliated companies in the
United States and other countries. All other names mentioned herein may be trademarks of
their respective owners.
Part VI Appendices
Introduction
chapter
1 Introduction
About this guide
Migration essentials
chapter
2 Migration essentials
What this guide covers
BIAR files
The Import Wizard can also package BI content into Business Intelligence
Application Resource (BIAR) format for backup or change management once
you’ve already imported into the new environment.
For information on BIAR files, see the Import Wizard online help.
Migration methods
You can migrate to version XI R2 either in a very short time frame, or in a
series of incremental imports over a period of time. Whatever method you
use, you will need to keep both source and destination environments
deployed long enough to be able to compare and ensure that all BI content
has been migrated safely and reliably.
• The single pass method involves migrating to version XI R2 in a single
pass with the Import Wizard.
This method may be more suitable for smaller, less complex
deployments.
• The larger your deployment, the more likely you will want to migrate
gradually. The incremental method allows you to migrate application by
application, domain by domain, or even locale by locale, validating the
import’s success after each sweep with the Import Wizard; if there are
issues, you don’t have to begin the entire migration all over again.
For more information on migration strategies, see “Formulating your migration
strategy” on page 222.
ACLs
The security rules that existed in version 6.x (such as product access, objects
rights, and security commands) are enforced in XI R2 by the ACL (Access
Control List) mechanism. An ACL is set on an object to define what rights
users and groups have on that object, and is composed of a list of ACEs
(Access Control Entities), which specify the state of a single right for a single
user/group.
Right values
Rights can only have three values:
• Unspecified
• Denied
• Granted
The version 6.x security command value Hidden does not exist and is
mapped to the Denied value.
Migrated rights
If you migrate security along with users/groups and objects, migration is
designed to maintain the same level of security between the 6.x and the XI R2
CMS repository. Nonetheless, rights after import may be unexpected,
especially after any modification in the CMS, and if you import rights, you will
need to check them carefully in the destination environment.
Version 6.x Supervisor accessed both query databases and the repository
using database middleware. In XI R2, Supervisor is replaced by two different
tools:
• Designer, which allows you to manage connections and access
restrictions, or universe overrides. A restriction can consist of
connections, query limit controls, SQL options, object and row
restrictions, and/or table mappings.
• The Central Management Console (CMC), which allows you to manage
security on users, groups, folders, connections, universes and
documents.
For more detailed information on XI R2 rights and migration, see
“Understanding rights migration” on page 117.
Aggregation
Aggregation is very different in the new environment.
During aggregation, the more restrictive value of an instance is applied.
As a result:
• If you set a right to Denied for a group, even if you set it to Granted for
one of its members, the member won't have the right. The only way to get
around this restriction is to break inheritance in the CMC.
• If users belongs to several groups, and if for one group they inherit a
Denied value for a right, they will have a Denied value, even if they inherit
the Granted value for this right from other groups.
For more details, see “Rights aggregation” on page 71.
Specific groups
The following groups exist by default in XI R2:
• Everyone, which contains all users
• Administrators
Profile migration
User profiles, used in version 6.x to define product access, are no longer
used. In XI R2, they are replaced by ACLs for applications, folders, and
documents.
If you choose not to migrate security, profiles are not migrated, and therefore,
General Supervisors and all other types of administrators are no longer
Administrators, unless you manually grant them the necessary rights.
If you choose to migrate security:
• General Supervisors are added to the Everyone, Administrators, and
Report Conversion Tool Users groups. By default, they have most but not
all rights.
• Users whose profiles allow them to run Supervisor (Supervisor/
Supervisor-Designer/Versatile with Supervisor access):
• have the View access level for the groups to which they belong in
version 6.x
• have the Full-Control access level for the users and subgroups of the
groups to which they belong in version 6.x
• Users whose profiles allow them to run Designer (General Supervisor/
Designer/Supervisor-Designer/Versatile with Designer access), on the
other hand, are not added to the Universe Designer Users group.
In the XI R2 user/group model, when users are imported into multiple groups,
multiple instances of the user are not created. The user simply belongs to
multiple groups.
Note: For more detailed information about the implications of the Import
Wizard’s security migration options, see “Security migration options” on
page 166.
Software migration
The following table presents the different products and their equivalent in
XI R2 after migration.
Resource migration
Note: Resources exclusive to Crystal Enterprise and BusinessObjects XI are
not included in this table. For information on migrating from these two
environments, see the BusinessObjects Enterprise Installation Guide.
Database migration
Migrating to a different repository database
The databases supported as repository databases in version 6.x may not be
supported as CMS databases in version XI R2.
Nonetheless, the Import Wizard can import objects from any supported type
of source repository database seamlessly into any supported CMS repository
database.
Migration phases
Migration involves the following broad phases, reflected in the organization of
this guide:
• Understanding what migration entails
• Assessment and planning
• Importing to the destination environment
chapter
3 How XI R2 compares with version 6.x
Where you are now
Architecture
The overall architecture of the two server systems is organized in a similar
manner.
BusinessObjects 6.x
BusinessObjects 6.x is organized into five logical layers:
• The client tier contains products or features that run on the end-user’s
computer (either as a standalone application or in the web browser).
• The presentation layer contains the third-party web and application
servers, as well as the Business Objects components hosted on them
(server SDKs, portal pages, servlets, WIDispatcher, and HSAL).
• The application services layer provides the essential framework and
services to the processing layer, such as WISessionManager,
WILoginServer, and WIStorageManager.
• The processing layer contains report engines, as well as the additional
components that implement business logic (portal workflows, repository
access, scheduling, etc.).
• The database tier is made up of the databases containing the data used
in documents and reports.
BusinessObjects XI R2
BusinessObjects Enterprise XI R2 is organized into five tiers:
• The client tier contains client applications.
• The application tier includes the web and application servers, as well as
the Business Objects components hosted on them.
• The intelligence tier manages the XI R2 system, maintaining security
information, routing requests to the appropriate processing layer
services, managing audit information, and storing report instances for
rapid report viewing.
• The processing tier accesses the data and generates reports. This layer
contains fewer “servers,” or processes, than the BusinessObjects 6.x
processing layer. Transactional workflows are therefore simplified, with
each server processing requests for a specific type of object. In a
BusinessObjects 6.x context, this corresponds to a dedicated role such
as WIReportServer, which processes Web Intelligence 6.x reports only,
rather than a provider of shared services such as WIQT, which plays a
shared role in several types of processing workflows.
• The data tier is made up of the databases containing the data used in reports.
Basic terminology
The following table shows some of the main differences in terminology
between the two releases.
Security model
BusinessObjects 6.x applications use a very different security model than that
provided with BusinessObjects Enterprise XI R2, and as such, administrators
of BusinessObjects 6.x systems are encouraged to read “Understanding
rights migration” on page 117 with attention.
Authentication/authorization
Through BusinessObjects 6.5.1, authentication is defined for an entire cluster
and/or all desktop users. Implementing an authentication method is broken
down into selecting an authentication mode, then its source, which can be
Repository, External then Repository, or External. You can choose between
Microsoft AD or an LDAP user management system for external
authentication sources.
Administration
The administrative model applied to BusinessObjects Enterprise XI R2 is very
different from the BusinessObjects 6.x model.
• The Central Management Console (CMC)
The CMC allows you to perform user management tasks such as setting
up authentication and adding users and groups. It also allows you to
publish, organize, and set security levels for all of your BusinessObjects
Enterprise Enterprise content. Additionally, the CMC enables you to
manage servers and create server groups, whenever the Central
Management Server (CMS) is running.
• The Central Configuration Manager (CCM)
The CCM is a server-management tool that allows you to view and
configure each of your BusinessObjects Enterprise server components
while Business Objects servers are offline. This tool allows you to start,
stop, enable, and disable Business Objects servers, as well as view and
configure advanced server settings. On Windows, these settings include
default port numbers, CMS database and clustering details, SOCKS
server connections, and more. In addition, on Windows the CCM allows
you to add servers to, or remove servers from your BusinessObjects
Enterprise system.
The CCM comes in two forms. In a Windows environment, the CCM
allows you to manage local and remote servers through its Graphical
User Interface (GUI) or from a command line. In a UNIX environment, the
CCM shell script (ccm.sh) allows you to manage servers from a command
line.
At first, the CCM takes into account only the servers running locally. You
can then connect to servers on a remote machine.
This section covers administrative tasks concerning the repository, users and
groups, universes, server and cluster management, and auditing. For more
information, see the BusinessObjects Enterprise XI Release 2 Administrator’s
Guide.
SDK
In BusinessObjects 6.x
chapter
4 Understanding user and group migration
Where you are now
By default, a single, root group is created, with the “company name” specified
during the Supervisor installation.
Supervisor offers several standard profiles for the various types of users of
Business Objects products. The user profile determines by default what
products a user can use:
• General Supervisor (all products)
The General Supervisor is at the root level. Assigned all rights, this user
can administer all groups, as well as their users and sub-groups.
• Supervisor (all products)
• Designer (all products but Supervisor and Supervisor over the Web)
• Supervisor-Designer (all products)
• User (all products but Designer, Supervisor, and Supervisor over the
Web)
• Versatile (configurable)
Administrators with the proper rights can customize these profiles.
A user can have a different profile in each group.
In version XI R2
In XI R2, users and groups are created and managed using the CMC.
Group structure is a directed acyclic graph (DAG); that is, each group can
have more than one parent. The DAG does not need to be connected; that is,
there may be groups without any relation to other groups.
A user can belong to more than one group, but only one user is actually
created in the CMS. Instances of a user do not exist.
By default, four groups are created at CMS installation:
• Everyone, which contains all users
• Administrators
• Universe Designers Users
• Report conversion tool Users
All imported 6.x users become part of the Everyone group.
The following users exist by default:
• Administrator
• Guest
Profiles in the version 6.x sense do not exist in XI R2.
Username case-sensitivity
Version XI R2 is not case-sensitive to usernames, whereas depending on the
repository database, version 6.x can be. This means, for example, that if a
version 6.x repository contains a user called jsmith and another called
JSmith, and you try to import both users, one of the users may not be
migrated.
Password restrictions
In the XI R2 environment, you can use the following CMC options to restrict
password format:
• Enforce mixed-case passwords
This option ensures that passwords contain at least two of the following
character classes: upper-case letters, lower-case letters, numbers, or
punctuation.
• Must contain at least N characters
By enforcing a minimum complexity for passwords, you decrease a
malicious user’s chances of simply guessing a valid user’s password.
In addition, passwords must be at least six characters long.
The first time you import a user from a version 6.x repository, passwords of
any type are accepted. Once users are entered into the CMS, however, their
passwords become subject to the password policy defined in the CMC.
Before updating a user with subsequent incremental imports, then, make sure
that the users in the source repository have all have passwords supported in
the destination CMS. If they don’t, they will not be re-imported.
In version 6.x, you use security commands in Supervisor to restrict user and
group access to functionalities in Business Objects products.You cannot
restrict access at the object level. For example, if you grant a group the right
to refresh, but not create documents, the restriction will apply regardless of
the documents being used.
Because ACLs are used, the imposition of restrictions in XI R2 is much more
granular. You can apply user, group, and role-level security at the object level,
to documents, categories, folders, universes, and connections.
This means, for example, that you can allow a group to refresh document A,
but not refresh document B.
User/group inheritance
The main challenge during migration is the difference in inheritance rules
between version 6.x and XI R2.
• In 6.x, rights inheritance is propagated through groups only. When a right
is set on a group it applies to all subgroups, unless it is overridden for a
specific subgroup or user. For example, because Tom and Lea belong to
the Marketing group, they inherit all the rights established for the
Marketing group.
Rights set lower down in the group tree take priority -- rights on a user
take priority over those on the user’s parent, and so on.
• In XI R2, rights are inherited both through groups and through folders.
In this environment, for example, Michael and Lea would still inherit all
Marketing group rights. In addition, however, if the rights set for the Sales
Results folder allowed Michael to access that folder, if no subfolder or
document rights contradicted that right, Michael would automatically have
access to all the documents in that folder.
In 6.x In XI R2
If the user has a right denied in one If a user has a Boolean right denied
group and granted in the other, the in one group and granted in the
user may or may not have the right other, then the user has the right
granted. denied.
Aggregation rules for conflicting If the user has a boolean right
rights are different for the different unspecified in one group and granted
types of rights. in the other, then the user has the
right granted.
The value Unspecified defaults to Unspecified Boolean rights are
either Granted or Denied depending always considered denied.
on the type of right.
Inherited rights are equal to explicit rights, and when rights conflict, Denied
always takes priority, regardless of the source of the conflicting rights.
Because of this model, and because Denied takes priority over Granted, you
cannot give child users or groups more rights than their parents without
breaking inheritance. You can change a right from unspecified (effectively
denied) to Granted, but not from Denied to Granted.
Tip: Denied is a very powerful value. During aggregation, it wins over any
other values. As a result, Business Objects recommends you prefer
unspecified: by default this means Denied, but it can be overridden by
Granted.
Overriding inheritance
Overriding inheritance therefore works very differently in the two
environments:
• In version 6.x, you can simply grant a user a particular right if that right is
denied to the group it belongs to. The rights placed on the user take
precedence over the parent group’s rights.
• Given the same situation in XI R2, you will have to turn off inheritance
altogether, and this will prevent the user from inheriting any rights from
parent groups of inheritance for all the rights for a user or group on an
object. You cannot turn off inheritance for some rights but not others.
Groups
Groups are migrated as groups in the CMS. The Import Wizard migrates the
same hierarchy as in the 6.x repository. For example, if in 6.x a group called
MyCompany contains the groups Group1 and Group2, the same hierarchy is
created in the CMS database in XI R2.
After import, you can take advantage of the more sophisticated XI R2 security
framework to refine this hierarchy: for example, a group can belong to several
groups.
User profiles
In version 6.x, user profiles define the applications user can use in the
Business Objects system. In XI R2, user profiles no longer exist. Application
rights are set through ACLs and rights on the corresponding applications and
documents. During migration, user profiles are imported and reset as
appropriate rights on the application.
For more information on how rights are set during migration, see
“Understanding rights migration” on page 117.
Most version 6.x user profiles map to default groups in the new system. For
example, General Supervisors become members of the Administrators group.
Supervisors, on the other hand, are not mapped to the Administrators group,
but instead simply granted the appropriate rights on all imported objects.
Users with the User/Versatile profile are added to an object level security
group based on their object security levels.
Merge Update
The comparison between source and As with other objects, the Import
destination users/groups is Wizard updates everything if the
performed using objects’ CUIDs CUID is the same; if the CUID does
(cluster unique identifiers). not exist in the destination repository,
The user/group in the destination it creates a new user.
repository is unchanged, except that If the commit fails due to a duplicate
the Import Wizard merges the name, however, the user will not be
hierarchy, or ownership, for the user/ imported. The Import Wizard never
group. makes copies of users and groups.
For example:
Import 1:
Source: Group1 with userA
Destination: Group1 with userA
In the source repository, userA is
now moved into Group2.
Import 2:
Source: Group1 with userA
Destination: Group1 with userA,
Group2 with userA
Delegated Administration
In version 6.x, a supervisor can only modify the rights for the users located in
his/her group or subgroup. In particular, this applies to universe access
restrictions (also known as universe overloads) defined in Supervisor.
With XI R2, universe access restrictions are defined in Designer.
LDAP migration
Platform requirements
In version 6.x you can use Microsoft Active Directory and a Java application
server for LDAP configurations. The application server can also be on UNIX
or Windows. With XI R2, Active Directory is only supported with Microsoft IIS
web/application server.
User/group mapping
In version 6.x, the users you create in the repository depend on the type of
LDAP mapping you choose:
• If you choose user-to-user mapping, then you must create a user in the
repository for each LDAP user you want to allow to login.
• If you choose group-to-group mapping, you need only create a group for
each LDAP group of users that you want to allow to login.
In XI R2, you map in the group(s) from LDAP that you want to allow access to
the system. When you map in a group, a group is created in the repository
with an LDAP alias (the alias contains the DN of the LDAP group that was
mapped so it can be associated with the correct LDAP group).
When you map in any third-party group, you can do either of the following:
• Create users in the repository for each user in the LDAP group.
• Instead of explicitly creating the users, choose to create a user in the
repository for any LDAP user who successfully logs into the
BusinessObjects Enterprise system. These users are full users, who can
be associated with other, non-LDAP groups and have specific rights sets.
This option is useful if you want to map in a very large group, but you
know only a few of the users will ever bother to access Enterprise. Any
created users are added to the appropriate third-party group in
BusinessObjects Enterprise.
After your groups are mapped, you can assign rights to the groups or make
the group a member of other BusinessObjects Enterprise groups (you can
also do this for any users that have been created).
The Import wizard maps static LDAP groups. Dynamic groups are mapped
automatically if you use Enterprise authentication in the new environment.
If mapping cannot be established, groups are imported as non-LDAP
BusinessObjects Enterprise groups.
Importing
Use the Import Wizard to import your content, making sure you check the
LDAP Authentication option in the Import Groups Option page.
The Import Wizard adds an LDAP alias to every imported group that it can
find in the configured LDAP system, by matching the name of the group to the
name of a group in the LDAP system.
It also updates the LDAP plug-in after the users and groups have been
imported. This adds an LDAP alias to every user that belongs (in the LDAP
system) to one of the groups with an LDAP alias.
Note: If you choose to import user’s personal content, only users that
actually exist (i.e. have user objects) in the repository will have their personal
content imported to XI R2.
After import
1. After import, go through the users and groups in the XI R2 system to
make sure that the Import Wizard made correct assumptions about the
users and groups that were intended to be LDAP users and groups. You
should then delete/re-assign/add LDAP aliases as necessary.
You can optionally map additional LDAP groups at this point. You can, for
example, create dynamic groups if required.
Understanding object
migration
chapter
5 Understanding object migration
Where you are now
Flow of resources
The Import Wizard can import objects only if they are located in:
• the repository (users, groups in the security domain, documents in the
document domains, universes in the universe domains)
• personal and inbox folders
The picture below shows the flow of resources from the source environment
(5.1 in this case) to the destination environment during import.
Files in the FRS are controlled by the platform, not the client. Objects
controlled by the system (InfoObjects) may contain both metadata
(properties, relationships, and so on) and files. The metadata is stored in the
CMS database, and the files are stored in the FRS.
During import, all objects in the source repository are copied to a temporary
folder on the machine running the Import Wizard. The default location of the
folder is defined by the $IMPORTWIZARDTMP system variable. If this variable
is not defined, then it is $TMP\ImportWiz_Temp, where TMP is a Windows
system variable.
If these variables are not defined, then it is $TEMP\ImportWiz_Temp, where
TEMP is a Windows system variable.
If all these variables are not defined, then it is the default temporary folder
created by Windows (normally C:\Document and Settings\%USERNAME%,
followed by \ImportWiz_Temp).
You can modify the $IMPORTWIZARDTMP system variable in the Windows
Control Panel (System > Advanced > Environment Variables > New System
Variable).
Corporate documents
Version 6.x corporate storage is mapped to the Public Folders folder in the XI
R2 CMS repository. Corporate documents are saved in this folder after the
import.
Each domain is migrated as a folder in the Public folder of the CMS
repository.
Note: If your 6.x repository was a distributed one, all the domains are
imported into a single place.
Inbox documents
In version 6.x, Inbox documents are stored in the repository until all recipients
have read them. When this occurs, the documents are removed from the
repository.
When a document has been read by a given user, it is copied to the user’s
Inbox folder ($STORAGEDIR\mail\<username>).
The Import Wizard will import both read and unread Inbox documents to XI
R2. Therefore, you will have to specify the location of the mail folder.
The documents are migrated to XI R2 users’ Inbox folders in the CMS.
Documents inherit the rights of the 6.x Inbox folder.
If the Inbox contains duplicate documents, they are also migrated to the FRS,
which manages all document instances that have been scheduled or
published to the repository.
To import 6.x Inbox documents that reside on a UNIX machine, you need to
map a drive from the Windows server running the Import Wizard to the
directories on the UNIX machine containing the documents.
Personal documents
Version 6.x personal documents (stored in
$STORAGEDIR\users\<username>) are imported to the user’s Favorites
folder in the destination CMS.
Documents inherit the rights of this folder. The document owner and the
Business Objects Administrator have access to these documents. Personal or
Corporate categories that referred to these documents in 6.x continue to refer
to them in XI R2.
To import 6.x personal documents that reside on a UNIX machine, you need
to map a drive from the Windows server running the Import Wizard to the
directories on the UNIX machine containing the documents.
Broadcast Agent
A Broadcast Agent job can be migrated from BusinessObjects Enterprise 6.x
to XI R2 only if the job is supported in XI R2. If a job contains non-supported
elements or features, you must drop the feature or recreate it in the 5.x/6.x
system so that it is consistent with the XI R2 platform. You can also recreate
non-migrated jobs in XI R2 using the CMC’s scheduling features.
In XI R2, the first action for scheduled documents is always a refresh.
Therefore, a job can be imported from 6.x only if its first action is a refresh.
A job cannot be imported if it has any of the following:
• multiple outputs
• conditional processing
• custom macros
You can, however, have embedded VBA macros (those that include calls
to the platform, such as Login or Logout, will need to be updated).
• report bursting (“refresh with the profile of each recipient”)
• saved in XML, RTF, HTML, or TXT format
File Watcher
Deletes that you set in File Watcher may not function in XI R2.
In Broadcast Agent 6.x, in the Task Properties dialog box/Scheduling tab, you
can set the File Watcher feature. If you select one of the delete options:
• Delete the file each time the task starts
• Delete the file only if the task succeeded
• Delete the file after execution of the task
then after the job is imported to XI R2 by the Import Wizard, the File Watcher
details are transferred to the Event Server, but the deletes may not occur.
Associated universes
When you import scheduled documents from 6.x, you must also import the
universes used by these documents.
The universes are not selected automatically during the import. This means
that if you are not importing all your universes, you must manually select the
ones you need for Broadcast Agent jobs.
Make sure universes and connections are correctly set once imported.
Corporate
If the document is not already imported in the domain or is not imported at the
same time to the CMS, then the job is not migrated. Verification is performed
by comparing the CUIDs.
Otherwise, the Import Wizard creates an instance of this document using the
schedule parameters of the original job.
• No ACL is set at this instance level. The instance inherits the ACL set at
the document level.
• If the document has been scheduled several times in Corporate, then the
same number of instances are created
Inbox
If the sender of the original schedule already exists in the CMS or if the
sender is migrated at the same time, then:
• The Import Wizard imports the scheduled document into the Favorites
folder of this user in the CMS. A folder named Scheduled migrated
documents/<BCA Name> is created under Favorites.
• The document is renamed to <doc_name>_<docID>.<ext>
• An instance is created for the document using the schedule parameters
of the original job
• No ACL is set at this instance level. The instance inherits the ACL set at
the folder level.
• The recipients (user or group) of the schedules are the recipients of the
original schedule, if they already exist in the CMS or if they are migrated
at the same time (name is verified).
If the sender of the original schedule does not exist in the CMS, then:
• The Import Wizard imports the scheduled document into Public Folders/
Scheduled migrated documents/<BCA name>. The document is renamed to
<doc_name>_<docID>.<ext>
• An instance is created for this document using the schedule parameters
of the original job
• No ACL is set at this instance level. The instance inherits the ACL set at
the folder level
• The recipients (user or group) of the schedules are the recipients of the
original schedule, if they already exist in the CMS or if they are migrated
at the same time (name is verified).
Update mode
The document ID is checked in the CMS. If it exists, the old document is
updated with the properties of the newly migrated document. The instances
are also replaced by the newly migrated schedules.
The schedules and the instances are identified by the ID received in the
Scheduled Jobs table of the repository.
Connections
When you import version 6.x universes, the associated connections are
imported automatically. They are converted into connection objects.
BOUSER/BOPASS
In version 6.x, users could use @Variable('BOUSER') and
@Variable('BOPASS') in the connection information for the universe. The
variables were replaced at runtime with the user’s enterprise username and
password, and used to log on to the database.
For security reasons, however, XI R2 does not permit the retrieval of users’
passwords. Therefore, universe connections that previously used the
BOUSER and BOPASS variables associated with the BusinessObjects user
name and password must now use database credentials (DBUSER and
DBPASS). Those database credentials can be populated by the Import
Wizard and later edited in the CMC, on the Properties tab for each user
account.
When migrating, Import Wizard automatically:
• replaces BOUSER and BOPASS with DBUSER and DBPASS in
universes
• proposes automatically populating these variables for users to migrate
You can, however, re-synchronize if users change their passwords.
Synchronizing enterprise and database credentials
There are three ways to synchronize enterprise and database credentials in
the XI R2 system. You can:
• choose the Import Wizard option that batch imports user names and
passwords from version 6.x to auto-populate database credentials in XI
R2.
• run a batch upload of a user’s file.
User names and passwords are loaded from a file, stored and used as
database credentials.
• create a custom application using Enterprise SDK to set DBUSER and
DBPASS information.
Access restrictions
In a 6.x system, access restrictions (that is, object restrictions, table mapping,
and row restrictions) are defined with the Supervisor application and
associated with users and groups. A user who belongs to multiple groups is
said to have multiple user instances (one instance per group).
Note: Universe overloads in version 6.x are called access restrictions in XI
R2. They are managed in Designer.
The Import Wizard enables you to import all access restrictions that are
associated with the imported universes for any of the selected users and
groups being imported. If no principal users or groups are selected for import,
no access restrictions are imported and none are created.
The imported access restrictions are converted into objects. They remain
connected to the universes to which they were connected in the source
environment. The Import Wizard may create additional access restrictions in
the destination environment in order to preserve the restrictions for all
imported users.
Connections for access restrictions are not migrated automatically. You must
manually migrate these connections.
Access restrictions are migrated using both object names and object IDs to
identify universe components.
Documents
Importing documents presents a good opportunity to optimize your document
management. For more information, see “What objects should you migrate?”
on page 239.
BusinessObjects documents
When you import a 6.x BusinessObjects (.rep) document to XI R2, the
following occur:
• universe ID pointer is updated so that it references a universe in the
CMS.
• an InfoObject is created in the CMS for this document and for the saving
of this document
• properties are updated and displayed in the CMC
BusinessObjects template (.ret) documents do not contain cubes or a
connection to a universe. Therefore, all that occurs is:
• the locale of the document is updated
• an InfoObject is created in the CMS
To convert 6.x .rep documents to .wid format, you can use the Report
Conversion Tool, delivered with the XI R2 suite. See the Report Conversion
Tool Guide for more information.
Alternatively, you can use the Report Conversion Tool to convert .rep
documents to .wqy (Web Intelligence 2.x) format. Then, the Import Wizard
converts them from .wqy to .wid.
Note: .wid documents for which there is no universe (so-called orphan
documents) can be imported into XI R2.
Limitations
Keep in mind the following limitations when you import BusinessObjects
documents:
• XI R2 can read BusinessObjects 6.x .rep documents, but after you save
these documents in XI R2, they can’t be read by a 6.x version of the
software.
• BusinessObjects 6.x cannot open XI R2 Desktop Intelligence documents.
• OLAP data providers are not supported in XI R2.
BusinessObjects 6.x documents based on an OLAP data provider are
view-only in XI R2.
• There is no document password protection, on the server side, in XI R2.
• XI R2 Desktop Intelligence cannot access a version 6.x repository.
BusinessObjects SDK
The platform-related portion of the BusinessObjects SDK has evolved, which
means that code developed for 5.1/6.x will require updates for platform
interactions (authentication, send document, receive document).
Send to Users and Send to Broadcast Agent Server are not available in XI
R2. Instead, you need to use the Platform COM SDK.
The server-side report engine is not multi-document. This means that add-ins
will not be loaded on the server. For example, for a document based on a
custom data provider (DPVBAInterface) implemented in an add-in, refresh will
fail.
Calculator changes
XI R2 uses a different report engine than BusinessObjects 6.x. Therefore,
there are differences in the way the calculator is handled.
Because of this, there may be issues with BusinessObjects documents after
they are imported to XI R2.
See “Checking for calculation updates” on page 301 for more information.
Third-party documents
BusinessObjects Enterprise 6.x supports third-party (also known as
“agnostic”) documents. The Import Wizard imports these documents into XI
R2 if the format is supported. Formats supported in XI R2 include Adobe
Acrobat PDF; Microsoft Power Point, Word, RTF, and Excel; and *.txt
documents.
For the most up-to-date list of supported formats for third-party documents,
see the list of supported platforms.
Other limitations
Legacy Web Connect documents can be opened in XI R2, but not edited or
refreshed.
When VBA macros from BusinessObjects 6.x are updated in XI R2, they can
no longer be used in previous versions.
XI R2 can open and use LOV (list of values), UDO (user-defined objects), and
.rea files from version 6.x. The Import Wizard does not import UDOs because
UDOs are not usually stored in a repository.
chapter
6 Understanding Application Foundation object migration
Where you are now
Note: You must install XI R2 and configure and deploy the CMS before
running the Import Wizard. This includes configuring the administrator
account for managing the performance management repository, and making
a copy of the source Application Foundation repository available for the
migration process. See “Planning the migration” on page 221 for information
on the migration workflow.
The Import Wizard assumes that the source environment is clean. The Import
Wizard cannot resolve problems present in the source environment during
migration.
For example, if there are inconsistencies between universe IDs in the
Application Foundation repository (in the ci_source table) and the
BusinessObjects repository, the source ID will not be correctly mapped to the
CUID (the cluster unique ID that is assigned to the universe) assigned by the
Import Wizard during import. Double-check that universes referenced in the
ci_source table have the same id in the BusinessObjects repository before
running the Import Wizard. For information on checking the integrity of the
source environment, see Best Practices for Migrating to BusinessObjects
Performance Management XI R2.
Migrating dashboards
The Import Wizard migrates the information that makes up your Corporate
and Personal Application Foundation dashboards.
During migration, the Import Wizard imports the analytics, Web Intelligence
documents, and BusinessObjects documents that compose your dashboards
into the CMS and publishes them as InfoObjects. The XML menus and
submenus that define the structure of your applications and dashboards are
also migrated. In Application Foundation 6.x, XML menus and submenus
were stored in the local storage folder:
Application Foundation\Server\conf\menu.xml
The Import Wizard publishes dashboards as InfoObjects in the CMS.
When you select a dashboard in the Import Wizard, corporate documents
referenced by the dashboard are automatically imported. In version 6.x,
corporate documents are referenced in dashboards by their docID. During
migration, the Import Wizard assigns unique CUIDs to corporate documents
Dashboard security
If you migrate security, the security on your Application Foundation 6.x
dashboards at the application and menu levels is migrated and maintained in
performance management XI R2. User rights stored in the Business Objects
repository are now stored in the CMS as access levels, or ACLs.
Note: The Import Wizard does not import analytic-level security within
dashboards. See “Migrating security commands” on page 113 for more
information.
Agnostic documents
The Import Wizard imports the following types of agnostic (third-party)
documents referenced in dashboards and publishes them to the CMS:
• SVG, or snapshot views of analytics
• *.xml and *.swf (flash)
• *.csv used in custom calendar definition
• graphic files (such as *.gif, *.bmp, *.png, *.jpg files) used as backgrounds
in Strategy Builder definitions or Metric Tree backgrounds and in
dashboards
Migrating analytics
You can use the Import Wizard to migrate analytics (.afd documents) from the
BusinessObjects 6.x repository to performance management XI R2. During
migration with the Import Wizard, you can select individual analytics for
migration to performance management XI R2. The Import Wizard publishes
the objects you select for migration in the CMS as InfoObjects.
You can migrate both corporate and personal analytics in the Import Wizard.
Understanding rights
migration
chapter
7 Understanding rights migration
Where you are now
Security overview
Although the rights model for versions XI R2 and 6.x may seem similar at first
glance, fundamental differences between the inheritance, aggregation, and
default rules of versions 6.x and XI R2 can complicate rights migration.
For example, some version 6.x security commands are phrased in such a
way that granting them is actually placing a restriction on the user or group;
e.g. a user may be granted the right to Do not delete other user's documents.
In XI R2, all rights increase a user's power when they are granted, so
negatively-phrased 6.x rights are rephrased positively in XI R2, and the value
of the corresponding right is reversed during migration.
This chapter provides an overview of the rights models for versions 6.x and XI
R2, describes how their differences impact migration, and then explains the
approaches adopted to ensure equivalent rights in the migrated model.
Note: You do not have to import rights when importing your BI content to XI
R2. For information concerning whether to import security or rebuild security
in the destination environment from scratch, see “Importing security or not” on
page 225.
Term Definition
collapse If certain conditions are met on objects in 6.x, we need to
set rights directly on the corresponding object(s) in XI R2.
This may involve setting rights that were not explicitly set
on the relevant 6.x objects (due to the difference in
aggregation models). This process of copying explicit
rights from 6.x is known as collapsing rights on the XI R2
object. In most cases, inheritance is broken when
collapsing is done.
custom rights Rights that are defined in the plugin pinfile for an object
type (not including the meta-plugin types). The CMS is
not aware of custom rights and cannot enforce them: they
are enforced by the SDK.
explicit vs. Explicit rights are set directly on the object, while effective
effective rights rights are the net result rights considering inheritance,
aggregation, and default settings. When determining
whether a user is able to perform an action, it is only the
effective rights that are important.
newly-denied A right that is effectively denied on the principal but
effectively granted on the principal's parent (that is,
granted explicitly or via inheritance).
newly-enabled A security command that is effectively enabled on the
principal but effectively denied or hidden on the
principal's parent (explicitly or via inheritance).
newly-granted A right that is effectively granted on the principal but
effectively denied on the principal's parent (that is, denied
explicitly or via inheritance).
Term Definition
principal A user or group, typically one for whom rights are set on
some object
View right Abbreviation for the most basic access right to XI R2
objects.
• When referring to application objects, it corresponds
to a version 6.x product access right (in the CMC, the
option is worded Log on to <application_name> and
view this object in the CMC). It gives users/groups
the right to launch and use a product.
• When referring to other objects, it confers the right to
access and view the object.
• In XI R2, rights are inherited both through groups and through objects. In
this environment, for example, Tom and Lea would still inherit all
Marketing group rights. In addition, however, if the rights set for the Sales
Results folder allowed Tom to access that folder, if no subfolder or
document rights contradicted that right, Tom would automatically have
access to all the documents in that folder.
Breaking inheritance in XI R2
In the XI R2 inheritance model, you must break inheritance if you want to
grant a right for a child that has been specifically denied for a parent. (Partly
for this reason, the XI R2 BusinessObjects Enterprise SDK automatically
breaks the inheritance when a role is set on a principal.)
Breaking inheritance allows XI R2 to imitate the 6.x inheritance model
somewhat, but the break applies to all rights; you cannot turn off inheritance
for some rights but not others.
The following table shows how version 6.x negatively- and positively-phrased
security commands are migrated.
Full collapse
In some domain folder imports, a full collapse of rights is triggered. This
means:
• Group and folder inheritance is broken.
• The effective values for object-level security commands are mapped to
the domain folder.
Full collapsing on the domain folder is triggered in the following cases.
that domain folder. In the second case (Case B), the containing domain will
not have the view right explicitly granted when it is migrated. Therefore it must
be explicitly added to this document as Granted.
Full collapse
A full collapse of rights is triggered on connection objects when:
• a principal is imported without a parent
• the stored procedure right for a principal is newly-denied
Rights by product/component
This section includes:
• BusinessObjects/Desktop Intelligence rights
• Web Intelligence/Web Intelligence rights
• Designer rights
• Connection rights
Note: In this section, XI R2 rights:
• beginning with the words “securely modify” mean that the user with this
right can only grant or deny rights that they have themselves to other
users.
• ending with “on objects that the user owns” are calculated based on who
the owner of the object is
Designer rights
This section covers:
• Application rights in the destination vs. source environment
• Universe rights
• How Designer security commands migrate
Universe rights
In version XI R2, you can set rights on universes. Universes inherit general
rights, and have their own set of custom rights.
Connection rights
In version 6.x, you can allocate stored procedures to users.
In XI R2, a stored procedure is implemented as a new right for the connection
object: Use connection for Stored Procedures.
During migration, for all stored procedures enabled for a user, an ACE
(Access Control Entry) is created for the user, the corresponding connection
and the correct stored procedures access. This ACE is set to Granted.
Understanding Import
Wizard options
chapter
8 Understanding Import Wizard options
Where you are now
Overview
The Import Wizard contains a number of options that impact how selected
principals (users or groups) or objects are imported. These options concern
issues such as:
• whether objects are imported with or without source security settings
• whether imported objects can update existing objects in the CMS and if
so, how
• whether objects can be renamed to coexist with like-named objects
Object Value
Performance Management folder (top level) No Access
access level
All Desktop Intelligence rights Not specified
All Web Intelligence rights Not specified
All Designer rights Not specified
As these rights are set for the Everyone group, they apply to all users,
unless they are explicitly assigned another value. To give them access,
administrators must use the CMC to explicitly grant the proper users the
appropriate rights.
This is the most secure option, selected by default.
• The second option imports the objects’ contents and rights, in order to
reproduce the version 6.x security model, but does not set the restrictions
in the target CMS that it sets in the first option.
Default settings are set in the Everyone group for some rights, and apply
to all users. As these default values may be different from the version 6.x
defaults, this may allow migrated users to have more rights than they had
in the source environment.
If you want to avoid this, use the first option (see above) or do not migrate
security and recreate it in the new environment (see next section).
In both cases, the Import Wizard sets the access level for the Everyone group
to No Access for all imported domain folders. This restricts access for all
users for whom no default rights are given.
After the import, you must use the CMC to explicitly give access to users and
groups for specific folders. If you give access to a domain folder to the
Everyone group, all users will have access to this folder and be able to see all
documents in it.
Before doing this, make sure you have thoroughly reviewed the security using
the CMC.
These options primarily affect behavior when the same objects are imported
into a destination system multiple times. They also affect the conflict
resolution behavior when two different objects with the same name are
imported to the same location.
The options’ difference comes into play only when you re-import objects that
have already been imported into the CMS.
Note: The consequences of all Merge and Update options are summarized
in tables at the end of this section.
Merging environments
If you choose the Merge import scenario, the Import Wizard tries to add
objects from the source to the destination CMS without overwriting objects in
the destination environment.
In most cases, the Import Wizard looks for an object with the same path and
name in the CMS repository. If it finds no matching object, the 6.x object is
imported.
If it finds that an object with the same name exists:
• If you have chosen the Rename option, imported like-named objects are
renamed in the CMS. Its children are added under it and not renamed. If
the imported object has the same CUID, the renamed copy is given a
new CUID.
Users and groups cannot be renamed, so import typically fails if duplicate
users/groups exist. Certain other objects are always enforced to use
Update mode, even when Merge is selected (see the following section).
• If you did not choose the Rename option, the import of objects with the
same path and name fails.
Special case
The Import Wizard does not usually combine objects with the same name.
When it tries to locate users and groups in the destination database, however,
it looks for existing objects with the same name as imported objects. If it finds
top-level folders of the same name, it merges them if the Rename option is
not chosen.
Rename
In certain Update cases, you should select the Rename option because of
name clashes. For example:
• You update an object. One of the parameters to update is the document’s
name. Unfortunately, another document already has the same name =>
name clash.
• You import an object (there is no other object with the same CUID in the
CMS), but there is another object with a different CUID but with same
name => name clash
If you checked the Rename option, an imported object with the same path
and name as a pre-existing object in the destination CMS, the object import
fails.
Note: Whenever an object (excluding users and groups) is added to the
CMS, even renamed, its children are created beneath it.
Folder A [CUID =
3]
Rpt A [CUID = 4]
Merge Same CUID The source object is imported with a new name and the
Rename Same path/name same CUID. The object in the CMS with the same name and
CUID retains its name and loses its CUID.
For example:
Folder A [CUID =
1]
Rpt A [CUID = 2]
Update Different CUID The source object is added to the CMS, with the same name
No rename Different path/ and CUID.
name For example:
Source Destination pre- Destination post-
import import
Folder A [CUID = (no existing objects Folder A [CUID =
1] from version 6.x 1]
Rpt A [CUID = 2] deployment) Rpt A [CUID = 2]
Update Same CUID The source object is added to the CMS, keeping its name
No rename Different path/ and updating the object with the same CUID. Properties that
name don’t exist on the incoming object are preserved.
For example:
Source Destination pre- Destination post-
import import
Folder A [CUID = Folder B [CUID = Folder A [CUID =
1] 1] 1]
Rpt A [CUID = 2] Rpt A [CUID = 2] Rpt A [CUID = 2]
Update Different CUID The import of the source object fails: folder fails due to name
No rename Same path/name clash; report fails due to parent fail
For example:
Source Destination pre- Destination post-
import import
Folder A [CUID = Folder A [CUID = Import fails.
1] 4]
Rpt A [CUID = 2] Rpt A [CUID = 3]
Understanding deployment
configuration migration
chapter
9 Understanding deployment configuration migration
Where you are now
• XI R2 deployment rules
• XI R2 deployment rules
3. Preparing for import
4. Importing from the source to destination environment
5. Post-import checking and tuning
XI R2 deployment rules
Rule 1
An XI R2 repository must be connected to at least one CMS.
Why?
Rule 2
With XI R2, as with version 6.x, a single server process cannot be connected
to multiple repositories.
Rule 3
Each repository must have its own dedicated server machine, or cluster of
server machines. If you decide to cluster multiple server machines together to
provide more power, the clustering must be Business Objects clustering,
similar to version 6.x.
Rule 4
The CMS process is critical to all processes in an XI R2 cluster. All processing
is either initiated or controlled by this process. You can have multiple CMSs
running, but the CMSs must all be running on the same network subnet.
No other processes are restricted by this rule.
Rule 5
The CMS must be physically located as close to the repository database as
possible, as the amount of interaction between the CMS(s) and the repository
is considerably higher compared to version 6.x.
Rule 6
The File Repository Server (FRS) cannot be geographically distributed. It can
exist in one location only.
Though multiple FRS server processes can be running on different server
machines, connecting to the same file system, only one is active; the others
remain passive, available for failover only.
Assessing migration by
product and functionality
chapter
10 Assessing migration by product and functionality
Where you are now
• BusinessObjects/Desktop Intelligence
• Web Intelligence
• Designer and universes
• Auditing and Auditor
• Scheduling and publishing
• SDKs
• Application Foundation/performance management
• Web Intelligence OLAP
3. Preparing for import
4. Importing from the source to destination environment
5. Post-import checking and tuning
Deployment
2-tier deployments of Desktop Intelligence
For administrators, however, a major deployment difference consists of
having to install a CMS server somewhere on the network. Even for Desktop
deployments, however, you will need a web and application server, as well as
a server to house the CMS somewhere on the network. Unlike in 2-tier
deployments of BusinessObjects, Desktop Intelligence users log in through
the CMS server, via the CORBA protocol.
Here, for example, is a simple source deployment.
This is what the same deployment looks like in the destination environment.
Features
• Desktop Intelligence supports Unicode data sources, as well as report
instances and discussions.
• You can set a value that formats a document’s data (ndependently of the
UI’s language). It is this value that is taken into account when calculations
are performed within the document. Each document therefore has its own
locale.
• OLAP data providers are no longer available. You can rebuild those
documents using Crystal Reports, Web Intelligence, or OLAP
Intelligence.
Macros Add-ins
Client D D
Server D
Potential calculation issues after conversion to new format
Due the changes in the calculation engine over the course of version 5.x to
6.x development, the automatic conversion of BusinessObjects documents to
Desktop Intelligence format during import may in specific cases return
different results than in the original documents. For complete information, see
“Checking for calculation updates” on page 301.
Unicode implications
Unicode font sizes are different than their non-Unicode equivalents.
Therefore, if you have migrated BusinessObjects documents to Desktop
Intelligence, and have also migrated your 6.x data sources to a Unicode
database, you may encounter the following:
• Documents are not pixel-per-pixel identical.
• When a cell isn’t big enough to display all its contents, it uses “###” to
indicate that the contents have been truncated. Because the Unicode
fonts are sometimes bigger than their non-Unicode equivalents, you may
see ### in cells where previously you saw data.
• The size of documents may be affected.
• Functions like NumberOfPages() may return different values in the case
of Autofit cells. For changes in the calculation engine, see “Checking for
calculation updates” on page 301.
Note: The move to Unicode has no impact on sorts.
Compatibility
Repository and server connection
Desktop Intelligence can connect to an XI R2 repository or cluster only.
BusinessObjects cannot connect to an XI R2 repository or cluster.
BusinessObjects 6.x cannot connect to a version XI R2 repository, and cannot
open Desktop Intelligence reports.
Universes
Desktop Intelligence can use any universes imported into, or created in
BusinessObjects Enterprise XI R2. The Import Wizard imports version 6.x
universes, automatically converting them into version XI R2 format.
❏ If required:
• Re-establish report-to-report hyperlinks.
• Update any VBA macros. Some macros may no longer work
because the platform-related part of the BOSDK object model has
been updated.
❏ Check the rights on the imported documents, using either the CMC or the
Query Builder tool.
Web Intelligence
Web Intelligence users and consumers (who view Web Intelligence
documents through a portal such as InfoView) will face two set of changes:
• Portal changes. XI R2 InfoView presents a new look-and-feel. You can
customize it using the BusinessObjects Enterprise SDK.
• Potential Web Intelligence report changes for customers using Web
Intelligence version 2.x
Web Intelligence XI R2 provides a set of new features which give it roughly
the same query and reporting capabilities as BusinessObjects. Here's a
summary of the top new features in XI R2:
• Advanced queries (same as BusinessObjects 6.5)
• Multiple data providers with synchronization
Universe storage in XI R2
Universe files are stored in the FRS (File Repository Server) as both .unv and
.unw. The difference is transparent to users.
In XI R2, all universe information is contained in the .unv file (except for
universe security, which is separate).
.unw files
.unw files are an internal universe storage format used by Web Intelligence.
These files are stored:
• in the FRS stored in the file system
• in the cache folder used by Web Intelligence
Under no circumstances should you modify or move these files, as it may
cause a universe to become unusable in Web Intelligence.
Universe security
In XI R2, universe security is composed of:
• ACLs, which define what universe groups/users are allowed to use the
universes
Managed in the CMC via the Universes page, an ACL is created for each
universe folder or each universe.
VBA macros
In version 6.x, you can embed VBA macros in BusinessObjects documents to
extend the Broadcast Agent Scheduler functionality. In XI R2, VBA add-ins
(.rea files) won't work server side; embedded VBA macros, however, will
continue to work (except for VBA macros that include calls to the platform
such as Login or Logout).
Business Objects therefore recommends that you use VBA macros instead of
VBA add-ins.
Publishing profiles
Profiles let you personalize the scheduled publication for groups of recipients.
Profiles are defined in the Central Management Console.
Personalization uses the following concepts:
• Profile name—Identifies the name for the personalization to be applied,
such as city or store name. Each user or group can have one or more
profiles defined.
• Profile value—Defines the value of the profile name, such as city = “San
Diego”.
• Profile target—Defines how a profile name applies to a report. Profile
objects can be an object within a universe, a variable within a report, or a
field within a table.
SDKs
Client SDK
BusinessObjects (renamed Desktop Intelligence SDK) and Designer SDKs
are available in XI R2 and almost unchanged from version 6.5.
Server SDKs
SDKs no longer available in XI R2:
• Web Intelligence SDK
• Administration SDK
• RECOM, as MSFT is replacing COM with .NET
SDKs available in XI R2:
• BusinessObjects Enterprise SDK (Java, .NET, and COM)
• BusinessObjects Enterprise .NET Server Controls
• BusinessObjects Enterprise JavaServer Faces Components
• Report Application Server SDK (Java, .NET, and COM)
• Report viewers SDK (COM, Java)
• Business Objects web services
Documentation and samples are provided to explain how to rewrite an
application based on WICOM or WIBean with RENET or REBean, and with
the BOE SDK.
Application Foundation/performance
management
In XI R2, these products are known as performance management.
Features
• The analytics displayed in dashboards and scorecards are enhanced to
offer more interactivity and flexibility in display and formatting options.
• New visualization techniques are applied to gauges and charts.
• New metric attributes are available.
• You can add additional metadata about metrics to metrics properties,
providing end users with information about the name of an owner, the last
refresh date, and a metric description. This helps users understand and
identify the source of the information on dashboards and scorecards and
makes it easy for users to take actions that improve business
performance.
• Instead of entering goals manually, you can now use a universe to import
goals from corporate data sources to populate the values of goals such
as the target or tolerance limits, and then visualize those goals in query-
based analytics such as Interactive Metric Trends (IMT).
• You can build queries that include multiple SQL statements, which allow
you to build powerful queries that match the level of complexity provided
by Web Intelligence, and then visualize results in analytics.
• You can create query-based analytics on universes mapped to OLAP
data sources.
• The workflow for creating new analytics has been simplified.
• Enhanced process tracking includes:
• expanded document attachments to activities to Desktop Intelligence
and OLAP Intelligence
• calling Process Tracker instances via URLs
• Support for activity duration, suggested activity end dates based on
input duration, and enhanced activity date validation
• A variety of Portal Integration Kits is provided.
chapter
11 Recreating security in XI R2
Where you are now
Security requirements
This chapter takes as an example an organization with four separate
business areas. These business areas do not all share content between
groups, so content used by each group is isolated from each other.
This organization also has five different functional user profiles:
• Universe designers: users with access to the Designer application to
create universes. Practically speaking, these users should also have the
same rights as Report Developers, which makes this profile — even if not
implemented in that way — the most functional of all, apart from
Administrators, who can do everything.
• Report Developers: users who can create documents, whether inside
Web Intelligence to create Web Intelligence ad-hoc reports, or develop
Web Intelligence or Crystal Reports documents for use by other users in
their business area, available through the public folders for their group.
• Power Users: users who can create ad-hoc reports and edit existing ones
for themselves inside Web Intelligence and can share them with others,
but whose reports are not intended or allowed to end up in the public
area.
• Casual Users: users who can view documents and refresh them
• Consumer: users who can only view documents
Note that not all exact rights and privileges are specified in this list for these
profiles. There are business requirements for additional functionality and
some confusion still exists about some of them, like sending reports to other
users through the system, or via e-mail, FTP or unmanaged (by the
BusinessObjects Enterprise XI R2 environment) disk.
Evaluate these elements of functionality separately for the different groups,
especially where implementation of it has architectural and security
consequences. Make sure therefore that you keep the structure for the
profiles such that you can actually make changes later on without weakening
the security structure.
Note: These profiles or roles are relatively arbitrary. The definitions for
universe and report developers are obvious, but the actual definition of Power
Users, Casual Users or Consumers can be different in different locations, and
even have different names. The point is that you have multiple profiles, which
you will later on combine with a business group.
Separate from these user profiles, you have administrators who administer
the system and fall outside these user profiles.
Note: The diagrams used in this section list business areas, but they might
also be geographical areas or whatever grouping is most appropriate for your
organization.
These master profile groups cover common functionality into a single profile;
their subgroups tie into a business area (or content or subject area) and
inherit this master profile.
This allows you to make global changes to a profile, overriding it for individual
groups if you need to. For instance, you could think of a profile that by default
doesn't allow for scheduling, but would allow on-demand refresh. Suppose
that the documents in one content area take over 20 minutes to run. In that
case you could subjectively decide that this one group, even though the
master profile doesn't allow it, can schedule documents. That makes this
quite a flexible model.
For example, the top group for all report developers in the environment is the
BO Report Developers group. This group sets the most restrictive settings for
the profile of a report developer: these users are able to create new Web
Intelligence and Crystal Reports and edit existing ones, but are not allowed to
publish documents to any public folders outside the development
environment.
Since the groups for report developers within the various business areas
belong to the BO Report Developers group, they inherit all these rights and
privileges and under normal circumstances will not require changes in these
rights. This means you set the main rights and restrictions on functionality
only once for all users.
If, however, report developers in one business area have an important
business requirement for particular types of functionality -- for instance, with
HR needing the ability to save documents away to an FTP location or
unmanaged disk, which according to best practices you should only allow
after an evaluation of security and technological impact -- you can apply this
as an override on the group of HR Report Developers. This change would
only apply to the HR Report Developers, so it makes it easy to grant
additional rights without impacting report developers of other business areas.
This method not only provides flexibility, but allows you to see relatively easily
the specific privileges for an individual group that are different from the
parent, as those would be rights explicitly granted, instead of inherited from
BO Report Developers.
In this diagram you see that for each right you have three options. If you set
the right to be Denied on the top group, you cannot override this on lower
levels, so all subgroups will have that right denied. When you grant a right on
a top group (see left branch of the diagram), you can either deny it on a
subgroup, or the right will be granted whether through inheritance or by
setting it more explicitly.
Best practices for security follow the model you see in the right branch of the
diagram. If you use it consistently, it is easy for you to follow the principle of
most-restrictive. On the top level, you either grant a right, or you do not set it.
Since by default a right is denied if it is not specified, this means that for each
child group, you should grant rights that are additional to the most-restrictive
set you granted on the top group.
Note that some of the boxes in the diagram have thicker borders: these are
the paths you should use. That is, you do one of the following:
• deny a right on a top group (which may or may not have subgroups) to
explicitly deny a certain right completely
• grant a right on a parent group, and inherit it — by not specifying it — in
the child group
• do not set the right at the parent, and only grant it if the child group should
have rights, and leave it inherited and not specified when it should not
Make full use of the Not Specified option. If you deny something on a high
level, it will always be denied, so only grant rights, and try to not deny unless
you know that it will never be used. Of course, you can change a Denied to
Not Specified, and inheritance should still ensure that if it wasn't explicitly
denied lower down the hierarchy, it will still effectively be denied. But it gets
confusing fast. Grant the least rights you need for any of these profiles, and
then grant explicitly if there are changes or overrides for individual groups.
As a best practice, avoid double grants and double denies. That is, if
something is already granted on a higher level, avoid granting the right again
for a subgroup. If you grant a right to a profile which you later want to revoke
by setting it to Not Specified, if a subgroup has the right granted, still that
group would be able to do it, as the effective right would be set to Granted.
Therefore, following the principle of “least-privilege” or “most-restrictive,” set
the lowest rights on the master profile, and only grant additionally where
needed.
Be careful with Denies. Since a continuous hierarchy of Not Specified leads to
an effective denied, there is no explicit need for setting anything to denied.
Moreover, you would lose the flexibility of changing a master profile and the
change being inherited by the lower groups if the right is denied in the
subgroup. Since you can never grant a right that has been denied in the
parent group, avoid using explicit “denies” in subgroups.
Now set access to folders for each specific business area at its top level
group, so that it is inherited by all the groups within that business area. In the
example here for Sales, you set the Sales group to have access to the Sales
folder within the <customer name> folder, and no others. Repeat this for each
group, so that each group has its own area that nobody else — but
administrators — is able to see.
Summary of benefits
This flexible model makes it easy to grant or deny access to content for an
entire business area, or grant or remove rights to do certain tasks. It allows for
group (or even individual) overrides if you need them, and ensures that users
exist only in a single group, rather than copied into multiple groups as you
would in version 6.x group structures.
If a user needs access to multiple content groups, you can add a separate
group that combines the two content groups and a functionality profile, and
you can inherit from two business area groups and the functionality profile.
You can even have different profiles in the two content areas. In this case you
would pick the highest profile group, and then set the rights on the content as
required.
For example, UserA is a power user in HR, but a report consumer in the
Marketing group. For the HR folder you would then set the rights as for HR
Power Users while setting the rights for the Marketing folder as with
Marketing Consumers.
Administrators group
Entirely separate from this group model, you have an Administrators group.
This group only and exclusively contains system administrators for the
environment, that is, those who configure the servers, perform maintenance
and other system tasks, and are the guardians of the system. These
administrators create users and perform the promotions between
environments. All administrators are IT staff.
Content wise, too, these administrators have access to everything. They have
full rights on the root content folder which contains the Marketing, Sales, HR
and Finance groups.
chapter
12 Planning the migration
Where you are now
Single pass
You can migrate to version XI R2 in a single pass with the Import Wizard,
either with or without security.
• Single pass with security
Do a single pass with security if your BI deployment is relatively small,
and you don't want to recreate your security system in the new
environment, or you want to go into production quickly.
Typically, migrating security means you may end up with all documents in
a single folder (assuming you had a single doc domain), which is quick
but far from ideal.
• Single pass without security
Do a single pass without security if you want to recreate security from
scratch (applying best practices etc.) and if you want to migrate all your
groups and applications at the same time, which is unlikely to happen in a
large organization.
Note: Single pass implies moving your XI R2 environment to production
relatively quickly to minimize desynchronized modification of BI content in
source or destination environments. Even after a single pass migration, an
additional period of time is nonetheless required for specific post-migration
procedures, verification of the migrated objects, comparison with the objects
in the source deployment, verification of security, and other adjustments.
There is no such thing as an instant migration.
Incremental
Most migrations are performed gradually, both in the initial, phased import of
BI content, and in the ongoing updating of the destination environment in the
transition period between the final shutdown of the source environment, and
the switch to the destination system.
The initial migration
By importing your source user groups and content into the new environment
gradually, you can validate the import’s success after each pass with the
Import Wizard; if there are issues, you don’t have to begin the entire migration
all over again.
How you structure you migration’s phases can depend on the structure of
your repository or the logical groupings of user groups and resources.
Business Objects recommends using Supervisor to help you analyze your
repository for logical groupings that help speed and ease migration.
You might decide, for example to migrate incrementally by:
• department
Your repository may reflect your organization’s structure, with separate
universe and document domains for specific departments, such as sales,
HR, or marketing. Migrating this way allows you to treat each
department’s import as a separate project that you can test and fine-tune
in the new environment.
• application (by resource type)
Importing by resource type allows you to concentrate on a specific type of
import at a time and limit use of the deployment to specific applications in
the new environment in each stage.
• domain
Importing universe and document domains separately allows the Import
Wizard to perform a single type of import at a time. As documents and
universes are organized by domains, and all the objects in a domain are
migrated to the same folder in the CMS database, domains represent
natural sets of objects within the migration process.
This type of import is also logical given that different domains may be
linked to different databases, or located in different places. Authorization
may also differ from one domain to another.
• locale
In some cases, the locales used in BusinessObjects and Web
Intelligence documents may not be stored in the document definitions. As
XI R2 documents require a locale, when you import documents, the
Import Wizard allows you to choose a default locale for the entire set of
documents you are importing. Importing sets of documents which use the
same locale can therefore streamline the migration process by getting
locales right immediately.
Ongoing updates
For most migration scenarios, safe migration requires a certain period of time,
during which the imported content can be tested, fine-tuned and verified,
often using staging areas and BIAR files for moving the content from the
testing environment to production. The final environment will undoubtedly
need adjusting for your organization’s particular requirements, security
testing, and rollout.
Although you can import version 6.x rights to XI R2 and obtain the same
effective rights in XI R2, because of the difference in security models,
subsequent modifications to rights can have unforeseen consequences.
If you do not have a small deployment, Business Objects recommends
rebuilding your environment’s security from scratch in version XI R2’s
superior security structure.
One of the major advantages of version XI R2 is its flexible and granular
security structure based on ACLs, a common IT standard. These ACLs
encompass what in version 6.x environments are known as security
commands, profiles, document access, and delegated administration.
In version 6.x, you can use security commands to restrict user and group
access to functionalities in Business Objects products.You cannot restrict
access at the object level. For example, if you grant a group the right to
refresh, but not create documents, the restriction will apply regardless of the
documents being used.
In XI R2, the use of ACLs means that imposition of restrictions is much more
granular. You can apply user, group, and role level security at the object level,
to documents, categories, folders, universes, connections, applications, and
even servers and groups of servers.
All hierarchies are based on inheritance:
• Folder hierarchies include “root” folders, and their cascading subfolders,
and continue down through the objects each folder contains.
• Group hierarchies include root groups and their cascading groups.
Common rules are used to compute aggregation and inheritance for these
hierarchies.
The resulting granularity means, for example, that you can allow a group to
refresh document A, but not refresh document B.
See “Security migration options” on page 166 for the Import Wizard options
you can use to migrate your BI deployment without bringing security over with
it.
If you decide to recreate your security in the new environment, see
“Recreating security in XI R2” on page 209 for guidelines.
Note: Never change the repository ID. Any modification could lead to a
number of unwanted side effects that could stop your system from working.
To arrive at this situation, you must follow one of two workflows depending on
whether you deployed your version 6.x system:
• within a single repository: if this is the case there are other important
considerations to be considered
• using separate repositories for each life-cycle phase
Support for separate, distinct repositories for each life-cycle phase in XI R2 is
considerably superior to version 6.x. The Import Wizard is designed to move
content from one repository to another. When using the Import Wizard you
specify which content (documents, universes, connections, users, etc.) you
want to import. The Import Wizard can then either directly load that content
into a target repository, or it can store the selected content into a BIAR file
(Business Intelligence Application Resource). A BIAR file is like a .zip file,
which can be passed around and loaded into a target repository later on. The
file can also be re-applied. One of its advantages is that, should you want to
roll-back, you can simply re-apply your original BIAR file.
For more information on BIAR files, see the Import Wizard online help.
Different life-cycle phases within a single repository
The Update scenario is only available when you use separate, distinct
repositories for each life-cycle phase. If you decide you want to manage
different life-cycle phases within one repository, you will not be able to take
advantage of the benefits of using the Update scenario.
In version 6.x, you can manage different life-cycle phases such as
Development, Test, and Production within a single repository by creating
many different document/universe domains.
With this type of deployment you have the option to:
• use different hardware for each life-cycle phase
• use a different installation of the Business Objects software for each life-
cycle phase. This means you can test a Service Pack or a Hot Fix in
isolation from your production environment.
With XI R2 you no longer have these options. You can still manage all your
different life-cycle phases within one repository, however. One repository
directly implies the same cluster, the same hardware and the same software
version (rules 1 and 3).
Note: The diagram uses the term “XI R2 repository” to represent both the
repository and the FRS.
1. Migrate users, documents, universes, connections, and so on from your
source repository to your new Development XI R2 repository. Migrate
only content from your security domain and your production universe and
document domains -- not from your Development and Test domains.
2. Copy all the content from your Development XI R2 repository to Test XI
R2 repository.
3. Copy all the content from Test to Production.
The CUID of an object in one repository will now have the same CUID as its
corresponding objects in the other repositories.
This process implies that all development and test work has been promoted
to production, since these domains are not migrated.
1. Migrate all users and content from your Production source repository to
your new Development XI R2 repository. Do not migrate content from
your Development and Test repositories.
2. Copy all the content from your Development XI R2 repository to Test XI
R2 repository.
3. Copy all the content from Test XI R2 to Production XI R2.
The CUID for an object in one repository will now have the same CUID as its
corresponding objects in the other repositories.
If you do not follow this workflow, but decide to migrate each repository to an
XI R2 repository, then each object will have a CUID that is not shared across
the other repositories. You will not benefit from the Update scenario features
mentioned above, and will only be able to use the Merge scenario.
This process implies that all development and test work has been promoted
to production, since these domains are not migrated.
BusinessObjects documents
For each BusinessObjects document in the source environment, you have
four migration options:
• Declare the document obsolete and either leave it in the source
environment or delete it altogether.
• Import the document, then re-use it in the new Desktop Intelligence
format.
• Import the document, and then convert it to Web Intelligence format using
the Report conversion tool.
• Rewrite the document in the new environment using Crystal Reports.
Enterprise reports
The scenario is typically the following:
• A group of IT experts centralizes users requests and creates reports to
address users’ needs.
• The documents are pushed to a large number of report consumers
through the InfoView portal.
In this type of scenario, it may be better to use Crystal Reports to author the
reports. Crystal Reports provides better scalability and on a large scale, is a
better solution for enterprise reporting.
You can do this before or after the import, but the structure must be in place
before users begin using the system.
If you don’t import security, you will need to create your new security system
in XI R2 before system use. For detailed information, see “Recreating security
in XI R2” on page 209.
Setting up an adequate initial folder/group structure in the destination
repository involves:
• Creating a new document folder structure in the destination repository
• Creating a new group structure based on role in the destination
repository
• Implementing the relationships between the two
Once you have created your new folder structure, and after you have
imported your documents into their destination domain folders, you copy (do
not move) the documents into the appropriate folders in the new folder
structure.
Advantage Disadvantage
You don’t have to create shared You may end up with lots of copies
folders. of documents that may need
maintaining.
• Option 2: For documents being shared by the same groups, you can
create shared folders.
Advantage Disadvantage
You have only one instance of a You must create stored folders,
shared document to manage. which requires the proper analysis
up front.
Note: The following table sums up the main actions users can take on
documents, as well as the mechanisms which enforce rights to these actions
in version 6.x, and in version XI R2.
International considerations
Specifying document locales for import
In the 6.x repository, some .wqy and .rep (as well as associated .rea and .ret
files) documents may not store their locale. To set the locales in these
documents when they are saved in the CMS after their conversion into XI R2
format, the Import Wizard asks for default locales:
• the document’s locale
• the locale of the machine used to create the document
Locale format is: language iso-639(lower case) + "_" + country iso-3166
(upper case). For example: en_US.
chapter
13 Before using the Import Wizard
Where you are now
• Before installing XI R2
• Installing XI R2
• Before importing
4. Importing from the source to destination environment
5. Post-import checking and tuning
Before installing XI R2
Before installing version XI R2, prepare your system by:
• Running a Repair and Compact on your source repository
• Backing up your source repository
• Exporting locally stored objects
• Updating platforms and versions if required
• Creating data sources on destination machines for all domains in source
deployment
ONAMES on Oracle
The Import Wizard does not support Oracle systems that use ONAMES
naming servers. You must use TNSNAMES instead.
Installing XI R2
For complete instructions for installing BusinessObjects Enterprise XI R2, see
the BusinessObjects Enterprise Installation Guide.
❏ Install at least one CMS.
❏ Install Desktop Intelligence on client machines.
❏ Install the Import Wizard on a Windows machine.
Before importing
Before importing with the Import Wizard:
❏ Backing up the destination CMS database
❏ Ensuring you have appropriate rights
❏ Checking for correct Import Wizard installation
❏ Mapping the Import Wizard to Inbox and personal files
❏ Ensuring the Import Wizard can connect to the XI R2 CMS
❏ Starting destination servers
❏ Setting up auditing in the destination system
❏ If you count on using an LDAP external user management system,
Configuring the LDAP security plug-in
If you plan on using an LDAP provider for authentication, you must configure
the LDAP wizard in the BusinessObjects XI R2 system before importing the
external users.
1. Configure LDAP from the CMC. You just have to configure the connection
parameters, you don’t have to map any groups.
2. Use the Import Wizard to import your content – make sure you check the
option when it asks you about LDAP users.
Note: The Import Wizard will add an LDAP alias to every group brought
over that it can find in the configured LDAP system (it does this by
matching the name of the group to the name of a group in the LDAP
system)
Note: The Import Wizard will do an “update” of the LDAP plug-in after
the users and group have been brought over, this will add an LDAP alias
to every user that belongs (in the LDAP system) to one of the groups with
an LDAP alias.
3. After Import, it’s recommended that the administrator go through the
users and groups in the XI system to make sure that the Import Wizard
made correct assumptions about what users and groups were intended
to be LDAP users and groups. Administrator should delete/re-assign/add
LDAP aliases as necessary. Additional LDAP groups can also be
mapped at this point if you want to.
Note: If you chose to import user’s personal content, only users that actually
exists (i.e. have user objects) in the repository will have their personal content
imported to XI R2.
chapter
14 Using the Import Wizard
Where you are now
Overview
The Import Wizard lets you import Business Intelligence resources to XI R2.
These resources include users and user groups, universes, connections, and
documents.
Chapter 5: Understanding object migration explains how the Import Wizard
imports resources. This chapter explains how to perform the import.
Note: Before using the Import Wizard, you must have completed all steps in
Chapter 13: Before using the Import Wizard.
Summary of steps
The remaining steps in the Import Wizard are divided into:
• Type of import and type of object
• Setting the source and destination environment
• Selecting the types of objects to import
• Selecting import options
• Selecting an import scenario
• Importing specific objects
• Users and groups
• Broadcast Agents
• Categories
• Document domains and documents
• Universe and connection objects
• Universe domains and universes
Select if you want group mappings from LDAP and Active Directory to be
migrated to XI R2.
You need to have the same LDAP or Active Directory configuration on the
source and destination.
Select the third-party group mapping you want to migrate and then click Next.
Broadcast Agent
If you are importing Broadcast Agents, the Broadcast Agents dialog box
appears.
This dialog box enables you to select the Broadcast Agents you want to
import.
Note: A Broadcast Agent job can be migrated from BusinessObjects
Enterprise 6.x to XI R2 only if the job is supported in XI R2. (For details, see
“Broadcast Agent” on page 86.)
To select Broadcast Agents for import
1. In the Broadcast Agent dialog box, select the Broadcast Agents whose
jobs you want to import.
Note that all the jobs, for each Broadcast Agent, are selected by default.
2. Click Next.
Broadcast Agent
If you are importing Broadcast Agents, the Broadcast Agents dialog box
appears.
This dialog box enables you to select the Broadcast Agents you want to
import.
Dashboards
If you are importing dashboards, the Dashboards dialog box appears.
To select dashboards
1. Select the dashboards you want to import.
When you select an application, its submenus are also selected.
2. Click Next.
The Import Wizard checks whether any dashboards in the source
repository include security. If the Import Wizard detects security on any
dashboards, the Import Dashboard Option dialog box appears. If none of
the dashboards selected for import includes security, skip to step 4.
3. If dashboards selected for import include security, select one of the
following options:
• Import and apply page security on all page elements
The Import Wizard migrates the dashboard and any sub-menus and
applies standard page-level security, which is translated as an ACL
in the CMS. With this option, the least restrictive set of rights is
applied.
• Don’t import such dashboards
The Import Wizard imports all dashboards, including dashboards
with analytic-level security restrictions, but empties all content from
pages containing secured elements. Dashboard menu structures are
preserved.
Categories
If you are importing categories, the Categories dialog box appears.
To select categories
1. Select the categories you want to import.
For large document domains, you can import incrementally, and import
documents one category at a time.
2. If you want to import all the objects associated with the category, select
the Import all objects that belong to the selected categories check box.
3. Click Next.
To select universes
1. Select the universes you want to import.
The universes that are linked to specific documents cannot be cleared
from the list.
You can select additional universes that are not used by any imported
document.
2. Click Next.
The Import Wizard checks that universe IDs and names are consistent
between the Application Foundation repository and BusinessObjects
repository, and that the two repositories are of the same version. If the
Import Wizard detects inconsistencies in universe names/ids or
repository versions, universes selected for import (or imported by default
because they are referenced by other objects selected for import) a
warning is displayed and you are prompted to resolve the inconsistencies
before migrating. See Best Practices for Migrating to BusinessObjects
Performance Management XI R2 for more information on resolving
universe inconsistencies.
If the universe is not found, the associated documents will not be
imported and a warning message appears. If this occurs, link the
documents to a universe, republish them to the repository, and retry the
import.
chapter
15 Checking and adapting the new environment
Where you are now
Overview
Now that you have finished using the Import Wizard, you need to:
• verify that objects have been properly imported
• verify the functioning of the objects in the destination environment
• perform final adjustments
You can access the log via the Import Progress dialog box, or by opening the
log file from the installation directory.
Broadcast Agent documents that cannot be migrated because the job is not
supported in XI R2 will appear in the log according to the first non-supported
job detected by the system, even if there are others.
It can also show the total number of objects, as well as information about the
objects.
You can review the list of users in the CMS and check whether 6.x users and
groups have been correctly created. If you are migrating security, then you
can also check that rights and assignments are correctly set.
Locale
In some Web Intelligence 2.x versions, locale was not stored in the .wqy file.
Normally, during the import, if no locale is found in the .wqy file, the Import
Wizard prompts you for a locale.
Business Objects recommends checking the locale of converted Web
Intelligence documents, to make sure it has been correctly migrated.
Also make sure that temporary disk space has not been completely used up
by the Import Wizard temporary files.
Update any VBA macros. Some macros may no longer work because the
platform-related part of the BOSDK object model has been updated.
Documents containing OLAP data providers are migrated by the Import
Wizard, but these data providers can no longer be refreshed. Therefore, the
documents must be rebuilt.
No matter which option you selected, Business Objects recommends that you
make sure the Everyone group gives or denies only the rights you want for
your users. Check the rights given or denied to Everyone for:
• BusinessObjects Enterprise applications; for example, InfoView
• folders
Remember that when users have access to a folder, they have access to
the contents of the folder unless explicitly denied.
• documents
• universes
• connections
For detailed information and instructions on setting user rights and access to
applications, see the BusinessObjects Enterprise XI Release 2
Administrator’s Guide.
For example, to check and adjust the rights for InfoView
1. Log into the CMC.
2. Select BusinessObjects Enterprise Applications > InfoView.
3. Click the Rights tab.
4. Adjust the rights to InfoView for the Everyone group.
Non-supported jobs
In XI R2, the first action for scheduled documents is always a refresh.
Therefore, a job can be imported from 6.x only if its first action is a refresh.
A job cannot be imported if it has any of the following:
• multiple outputs
• conditional processing
• custom macros
You can, however, have embedded VBA macros (those that include calls
to the platform, such as Login or Logout, will need to be updated).
• report bursting (“refresh with the profile of each recipient”)
• saved in XML, RTF, HTML, or TXT format
chapter
16 Checking for calculation updates
Where you are now
Global filters
Global filters are filters that apply to an entire report tab, as opposed to block
filters, which apply to specific blocks only. Global filters behave differently in
BusinessObjects 5.1.3 and 5.1.4+.
Are your reports affected?
If your reports contain global filters and multiple cubes, whether from single or
multiple data providers, your reports are affected by the change in global
filters behavior.
Global filters behavior in BusinessObjects 5.1.3
In this example a report has three data providers containing several linked
objects:
Data Provider 1: Country, Resort, Service, Service Line, Revenue
Data Provider 2: Country, Resort, Service, Service Line, Revenue
Data Provider 1: Country, Resort, City
The City object in Data Provider 3 is not linked to the other data providers, but
Country and Resort in Data Provider 3 are both linked to Country and Resort
of Data Provider 1 and 2.
There is a global filter defined on City with a condition that is not met: City =
‘test’.
BusinessObjects 5.1.3 creates a report with one table per data provider.
You have a report with three blocks. The third block contains the objects
Country (from Data Provider 1), Resort, Revenue and Future Guests. If you
add a sum on the Revenue and Future Guest columns in the third block and a
complex filter, Resort=’Bahamas Beach’, on the Resort object, you get the
following result:
The Sum for Future Guests is wrong in BusinessObjects 5.1.3 because the
indirect filters behavior is not implemented. In this case, the filter on the first
data provider is not applied indirectly to the second data provider, with the
result that the Future Guests figure is counted twice. In BusinessObjects
5.1.4+, the sum is correct.
Note: if you add a sum to the Future Guests column before applying the
complex filter, BusinessObjects still gives the figure 102, even though the
column contains three figures: 46, 56 and 56. For an explanation of this, see
“Aggregation levels in synchronized data providers” on page 312.
BusinessObjects 5.1.4 calculates the correct sum as follows:
• filter on the first data provider to get a list of rows that need to be
preserved.
• join this set of rows with the second data provider on the data providers’
linked dimensions. This join returns a row only if there is a row in each
data provider.
In the example:
• filter on Resort in the first data provider to return one row (US, Bahamas
Beach).
• join to the second data provider to return one row and the correct value
for Future Guests.
Complex filters
Complex filters are filters that are based on a formula, for example:
Country <> ‘France’
Country(DP1) Revenue(DP1)
France $835,420
US $2,451,104
Country)DP2) Revenue(DP2)
US $2,451,104
Country(DP1) Revenue(DP2)
France
US $2,451,104
If you add a complex filter on Revenue on the third table,
<Revenue(DP2)> <> 2451104, BusinessObjects 5.1.3 takes the empty value into
consideration and the third table with synchronized data providers contains
one row:
Country(DP1) Revenue(DP2)
France
Incompatible objects
BusinessObjects 5.1.4+ contains changes that can affect reports containing
incompatible objects under certain circumstances. Incompatible objects are
objects that belong to different contexts in a universe. BusinessObjects
universe designers often use contexts to resolve loops in database structures.
If a query references incompatible objects, it cannot be expressed as a single
SQL query; BusinessObjects therefore builds multiple data cubes and
synchronizes them.
There is no true relationship between the Year and Reservation Year objects
in this cube. The cube contains two different kinds of information, based
around the incompatible objects:
• Revenue by Country by Year
• Future Guests by Country by Reservation Year
This information is synchronized around the one common dimension –
Country, but the relationship between Year and Reservation Year for any row
is arbitrary.
Incompatible objects and filters
A problem arises if you apply a filter on, for example, the Reservation Year
column and exclude Year from the report. If you restrict Reservation Year to
‘FY96’ only, the cube produces the following data:
In this situation the Revenue column clearly displays incorrect data. It shows
the revenues for France and US for FY93. But because Year, the second
object around which Revenue is aggregated, does not appear in the report, it
should show the total revenues for France and US respectively, irrespective
of year. (That is, by Country - the other object on which Revenue is
aggregated.).
The Sum and Count figures for the Future Guests column are clearly
anomalous. The point to note is that Future Guests is compatible with both
Country and Resort, yet it is placed in the third block from a data provider that
aggregates solely by Country. As a result, BusinessObjects recognizes only
two values for Future Guests (which is why the sum is anomalous) and does
not calculate future guests by country and resort (which is why the values for
the two US resorts are anomalous).
You remove this anomaly by including the Resort dimension in the data
provider that contains Future Guests. BusinessObjects is then able to
calculate Future Guests correctly.
BusinessObjects splits the query into two or more cubes in order to resolve it.
You do not control the creation of multiple cubes; BusinessObjects does this
internally.
Multiple data providers occur when you explicitly create more than one cube
in a report, by building the report from more than one data provider.
The Count() function in BusinessObjects 5.x
In this example your report contains two data providers:
Data Provider 1: Country, Year, Reservation Year, Number of Guests
Data Provider 2: Country
When you run DP1, BusinessObjects cannot resolve it with a single query
because the Year and Reservation Year objects are incompatible.
BusinessObjects creates two cubes: (Country, Year, Number of Guests) and
(Country, Reservation Year). As a result your report has three cubes in total:
DP1 Cube 1: Country, Year, Number of Guests
DP1 Cube 2: Country, Reservation Year
DP2: Country
It is this combination of multiple cubes and data providers that causes the
Count() function to return different results in BusinessObjects 5.x and 6.0. If
you create a block that contains the Country object from DP2 and the Number
of Guests object from DP1, then apply the Count() function to the Number of
Guests column, you get the following result:
The Sum and Sum Other totals are incorrect. Sum totals all Number of
Guests figures in the report, rather than those left in the block by the ranking,
and Sum Other does not include the figures excluded from the block by the
ranking.
These sums are correct in BusinessObjects 6.0.
Unicode fonts
The sizes of the Unicode fonts used by Desktop Intelligence are not identical
to the sizes of the corresponding non-Unicode fonts. This might have the
following impacts:
• Data in cells which previously displayed all the cell data is now truncated,
resulting in ###s to denote the truncation.
Decimal precision
Desktop Intelligence supports up to 24 decimal places, as opposed to 10 in
previous versions. This increased precision might affect the output of some
functions, in particular the euro conversion functions.
appendix
A Migration checklist for single pass migrations
Overview
Overview
This appendix provides a migration checklist that you can print out and check
off as you go through a single pass migration.
The items in this checklist do not necessarily need to be performed in the
order in which they appear.
appendix
B Business Objects Information Resources
Documentation and information services
Documentation
You can find answers to your questions on how to install, configure, deploy,
and use Business Objects products from the documentation.
Address Content
Business Objects product Information about the full range of
information Business Objects products.
http://www.businessobjects.com
Product documentation Business Objects product
http://www.businessobjects.com/ documentation, including the
support Business Objects Documentation
Roadmap.
Business Objects Documentation Send us feedback or questions
mailbox about documentation.
documentation@businessobjects.com
Online Customer Support Information on Customer Support
http://www.businessobjects.com/ programs, as well as links to
support/ technical articles, downloads, and
online forums.
Business Objects Consulting Information on how Business
Services Objects can help maximize your
http://www.businessobjects.com/ business intelligence investment.
services/consulting/
Business Objects Education Information on Business Objects
Services training options and modules.
http://www.businessobjects.com/
services/training
N P
.NET Server Controls for BusinessObjects Password security command 74
Enterprise 61 Password Validity settings security command 74
Netegrity SiteMinder 51 passwords
NoFilter() function 311 using the DBUSER/DBPASS variables 91
and Where clause 317 performance management 28
and Where clause in BusinessObjects 5.x 317 managing use rights 114
and Where clause in BusinessObjects 6.0 317 PIKs 208
Not Specified option repository 105
best practices 216 security migration limitations 115
troubleshooting schedule migration 111
O what you cannot migrate 114
what’s new in XI R2 207
object IDs 92
performance management engines 108
Object Security level security command 74
performance management repository 97
objects
Personal Categories folder 93
CUID 171
personal document domains
exporting 253
equivalent in XI R2 43
restrictions 92
personal documents
rights 121
importing 267, 277
selecting for import 265
mapping Import Wizard to 257
storage 41
migrating 29
which should you migrate? 239
storage after import 85
OLAP
planning see migration planning
document migration overview 30
Platform COM SDK 95
installation of OLAP products 47
platform support
OLAP data providers
list of supported platforms 31
and Desktop Intelligence 194
platforms
OLAP Intelligence
updating 253
scheduling 58, 204
XI R2 platform and version support 237
ONAMES 254
Populate Database Credentials dialog box 270
Online Customer Support 331
Populate Database Credentials for Users dialog
Only look for documents in personal inbox option
box 280
115
Portal Integration Kits
openDoc
for performance management 208
document-to-document links 295
predefined settings 74
Oracle
pre-rendering
ONAMES 254
and Application Foundation dashboards 115
TNSNAMES 254
primary nodes 43
ORB
principals
configuring 47
defined 66, 120
configuring in version 5/6 46
Process Tracker
orphan documents
what’s new in XI R2 208
defined 94
product access rights
default and aggregate rules 122