CRN Arch
CRN Arch
Version 10.2.2
Note
Before using this information and the product it supports, read the information in “Notices” on page 131.
Product Information
This document applies to IBM Cognos Business Intelligence Version 10.2.2 and may also apply to subsequent
releases.
Licensed Materials - Property of IBM
© Copyright IBM Corporation 2005, 2014.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Chapter 3. Communications . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Messaging and Dispatching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Local Preferred Dispatching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Log Message Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Planning Log Message Repositories in a Distributed Installation . . . . . . . . . . . . . . . . . 21
Recommendation - Consolidate Log Messages in a Distributed Environment Using a Remote Log Server . . . 23
Recommendation - Configure a Log File for Each Log Server . . . . . . . . . . . . . . . . . . 23
Database Connection Management . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Content Store Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Query Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Metric Store Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Microsoft .NET Framework Interactions . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Port Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Request Flow Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Accessing IBM Cognos BI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Viewing a Report or Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Running a Report or Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Scheduling a Task to Run. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Opening IBM Cognos Connection Folder . . . . . . . . . . . . . . . . . . . . . . . . 33
Running an Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Indexing content. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Searching content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Portal Pages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Chapter 4. Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Planning for Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Installing IBM Cognos Business Intelligence . . . . . . . . . . . . . . . . . . . . . . . . 42
Configuring IBM Cognos Business Intelligence . . . . . . . . . . . . . . . . . . . . . . . 43
Monitoring Configuration Changes . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Configuring Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Configuring IBM Cognos Business Intelligence for Multilingual Reporting . . . . . . . . . . . . . 44
Administering IBM Cognos Business Intelligence . . . . . . . . . . . . . . . . . . . . . . . 45
Using IBM Cognos BI for Reporting and Analysis . . . . . . . . . . . . . . . . . . . . . . 46
Creating Reporting Models and Packages . . . . . . . . . . . . . . . . . . . . . . . . 46
Authoring Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Using IBM Cognos Business Intelligence for Scorecarding . . . . . . . . . . . . . . . . . . . . 49
Packaging in Metric Studio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
iv IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Customizing Currency, Numbers, Dates, and Times . . . . . . . . . . . . . . . . . . . . . 103
Setting up a Multilingual IBM Cognos BI Environment . . . . . . . . . . . . . . . . . . . . 104
Configuring a Database for Multilingual Reporting . . . . . . . . . . . . . . . . . . . . . . 105
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Contents v
vi IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Introduction
This document is intended for use with IBM® Cognos® Business Intelligence.
This document is for the business intelligence solutions architect who oversees the
setup, administration, and use of IBM Cognos BI, a Web-based business
intelligence solution with integrated reporting, analysis, scorecarding, and event
management features. This document
v Describes the IBM Cognos BI architecture from the perspectives of structure,
communications, workflow, and security.
v Provides information to help you plan to install and configure IBM Cognos BI
and to maximize its performance.
v Describes the IBM Cognos BI security architecture and provides guidelines for
securing the deployment.
Audience
To use this guide effectively, you should already be familiar with your information
technology infrastructure and with the business needs of the people in your
organization who will use IBM Cognos BI.
Finding information
You can also read PDF versions of the product online help files by clicking the
PDF links at the top of each HTML page, or access the PDFs from the IBM Cognos
product documentation web page (www.ibm.com/support/
docview.wss?uid=swg27042003).
Forward-looking statements
Samples disclaimer
viii IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Chapter 1. IBM Cognos BI
IBM Cognos Business Intelligence is a solution designed to address the challenges
of enterprise-scale reporting, analysis, scorecarding, and event notification.
The IBM Cognos BI architecture was designed for scalability, availability, and
openness. It uses platform independent, industry proven technology, such as
Extensible Markup Language (XML), Simple Object Access Protocol (SOAP), and
Web Services Definition Language (WSDL). For this reason, IBM Cognos BI can
integrate with and leverage your existing technology infrastructure on multiple
platforms.
IBM Cognos BI also includes Data Manager for data integration. With Data
Manager, you can extract data from source systems and data files, transform the
data, and load it into a data warehouse, conformed data mart, or report staging
area.
For information about the Data Manager architecture, see the IBM Cognos Data
Manager Installation and Configuration Guide and the IBM Cognos Data Manager User
Guide.
User Interfaces
IBM Cognos BI is configured using IBM Cognos Configuration. You also use IBM
Cognos Configuration to start and stop IBM Cognos services.
Cognos Workspace
The interfaces that are available to users depend on user permissions and on the
IBM Cognos BI packages that your organization purchased.
IBM Cognos Connection is a Web portal provided with IBM Cognos Business
Intelligence, providing a single access point to the corporate data available for its
products. It provides a single point of entry for querying, analyzing, and
organizing data, and for creating reports, scorecards, and events. Users can run all
their Web-based IBM Cognos BI applications through IBM Cognos Connection.
Other business intelligence applications, and web addresses to other applications,
can be integrated with IBM Cognos Connection.
Like the other Web browser interfaces in IBM Cognos BI, IBM Cognos Connection
uses the default configurations of your browser. It does not require the use of
Java™, ActiveX, or plug-ins, and does not install them.
In addition to selections for viewing data and creating objects, IBM Cognos
Connection includes
v portal pages
4 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
The New Page button opens a wizard where users can create a
customizable page that uses portlets to show different types of content at the
same time.
v Public Folders
Public Folders store shared IBM Cognos BI content, such as packages “Creating
Reporting Models and Packages” on page 46, reports, agents, shortcuts, and jobs.
v My Folders
My Folders store personal IBM Cognos BI content, such as reports, shortcuts,
and jobs.
v User preferences
The My Area Options button includes links to My Watch Items, alert lists
and watch rules that help you monitor business events; My Preferences, settings
for format, language, time zone, contact information, and portal content; and My
Activities and Schedules, status windows where you can set priorities for and
monitor your IBM Cognos BI activities.
v Link to tools and applications
The Launch button provides links to the IBM Cognos BI studios, Drill-through
Definitions, which are used to navigate through related data when querying or
analyzing data, and IBM Cognos Administration.
For information about using Cognos Connection, see the IBM Cognos Connection
User Guide.
The open IBM Cognos BI architecture means that you can choose to integrate IBM
Cognos BI into your organization's existing Web portal. You can use Portal
Services, provided with IBM Cognos BI, to integrate IBM Cognos BI with a number
of portals, including
v SAP Enterprise Portal
v IBM WebSphere® Portal
v Oracle WebCenter Interaction Portal
v SharePoint Portal
For more information, see the IBM Cognos Administration and Security Guide.
For information about using Cognos Administration, see the IBM Cognos Business
Intelligence Administration and Security Guide.
Using Query Studio, users with little or no training can quickly design, create and
save reports to meet reporting needs not covered by the standard, professional
reports created in Report Studio.
For information about using Cognos Query Studio, see the IBM Cognos Query
Studio User Guide.
Using Report Studio, report authors create, edit, and distribute a wide range of
professional reports. They can also define corporate-standard report templates for
use in Query Studio, and edit and modify reports created in Query Studio or
Analysis Studio.
For information about using Cognos Report Studio, see the IBM Cognos Report
Studio User Guide.
In Analysis Studio, users can explore, analyze, and compare dimensional data.
Analysis Studio provides access to dimensional, OLAP (online analytical
processing), and dimensionally modeled relational data sources. Analyses created
in Analysis Studio can be opened in Report Studio and used to build professional
reports.
For information about using Cognos Analysis Studio, see the IBM Cognos Analysis
Studio User Guide.
In Event Studio, you set up agents to monitor your data and perform tasks when
business events or exceptional conditions occur in your data that must be dealt
with. When an event occurs, people are alerted to take action. Agents can publish
details to the portal, deliver alerts by email, run and distribute reports based on
events, and monitor the status of events. For example, a support call from a key
customer or the cancellation of a large order may trigger an event, sending an
e-mail to the appropriate people.
For information about using Cognos Event Studio, see the IBM Cognos Event Studio
User Guide.
6 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Users can monitor, analyze, and report on time-critical information by using
scorecards based on cross-functional metrics.
For information about using Cognos Metric Studio, see the IBM Cognos Metric
Studio User Guide.
Cognos Workspace
For more information about using Cognos Workspace, see the IBM Cognos
Workspace User Guide.
With IBM Cognos Workspace Advanced, a component of IBM Cognos BI, you can
perform advanced data exploration and author simple reports.
With Cognos Workspace Advanced you can extend your data exploration by
specifying additional measures, adding conditional formatting, and using advanced
calculations.
You can also create reports with relational or dimensional data sources that display
your data in lists, crosstabs, and charts. You have the option of using your own
external data source.
For more information about using Cognos Workspace Advanced, see the IBM
Cognos Workspace Advanced User Guide.
IBM Cognos Framework Manager is the modeling tool for creating and managing
business-related metadata for use in IBM Cognos BI analysis and reporting.
Metadata is published for use by reporting tools as a package, providing a single,
integrated business view of any number of heterogeneous data sources.
OLAP cubes are designed to contain metadata for business intelligence reporting
and analysis. All metadata, including all members, cube dimensions, hierarchies,
and levels are loaded at run time.
Metric Designer is the modeling tool used to create extracts for use in IBM Cognos
BI scorecarding applications. Extracts are used to map and transfer information
from existing metadata sources such as IBM Cognos Framework Manager and
Impromptu® Query Definition (.iqd) files.
For information about using Cognos Metric Designer, see the IBM Cognos Metric
Designer User Guide.
With IBM Cognos BI for Microsoft Office you can access IBM Cognos reporting
data directly from within Microsoft Office applications.
IBM Cognos BI for Microsoft Office makes use of the Microsoft .NET Framework
to allow clients to interact with server-based components. IBM Cognos BI for
Microsoft Office provide two types of clients:
v The smart client is a zero-administration client with a zero-deployment impact.
Product updates are automatically applied through the smart client.
v The COM add-in client requires a client installation. Product updates are
delivered by uninstalling and reinstalling the COM add-in client.
For more information about using IBM Cognos BI for Microsoft Office, see the IBM
Cognos BI for Microsoft Office User Guide. For more information about configuring
and deploying IBM Cognos BI for Microsoft Office clients, see the IBM Cognos
Business Intelligence Installation and Configuration Guide.
Cognos Transformer
IBM Cognos Transformer is the IBM Cognos BI modeling tool used to create
PowerCubes for use in IBM Cognos BI. Secured IBM Cognos BI PowerCubes are
not compatible with IBM Cognos Series 7.
For information about installing and configuring versions of Transformer that are
earlier than 8.4, see the documentation provided with your edition of Transformer.
For information about using Cognos Map Manager, see the IBM Cognos Map
Manager Installation and User Guide.
Cognos Insight
In IBM Cognos Insight, you can analyze data, explore scenarios, and influence
decisions by creating personal or managed workspaces. Use these interactive
8 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
workspaces to communicate results to managers. Because Cognos Insight supports
write-back, you can also use these workspaces to gather and consolidate
management targets, commitments, and forecasts.
IBM® Cognos® Insight is provided with IBM Cognos BI. Use the IBM Cognos
Connection Installer for Cognos Insight to install provisioning software on Cognos
BI servers. This software allows multiple users to download and install IBM
Cognos Insight on their computers from the Cognos Connection interface.
For more information about using Cognos Insight, see the IBM Cognos Insight User
Guide.
Web communication can also occur directly with an IBM Cognos BI dispatcher,
although this option is less common than using gateways.
Dispatcher
The dispatcher starts all IBM Cognos services configured and enabled on a
computer, and routes requests.
The dispatcher is a multithreaded application that uses one or more threads per
request. Configuration changes are routinely communicated to all running
dispatchers. The dispatcher includes IBM Cognos Application Firewall to provide
security for IBM Cognos BI.
The dispatcher can route requests to a local service, such as the report service,
presentation service, job service, or monitor service.
A dispatcher can also route requests to a specific dispatcher to run a given request.
Requests can be routed to specific dispatchers based on load-balancing needs, or
package or user group requirements. For example, if a particular OLAP data source
is available for only one IBM Cognos server group, you specify that all requests for
the data source be routed to that IBM Cognos server group. For more information
about routing requests based on packages or user groups, see the Administration
and Security Guide.
When you configure IBM Cognos BI gateways, you can list the universal resource
identifiers (URIs) of target dispatchers in order of most to least preferred. If a
dispatcher fails, requests are routed to another dispatcher based on the list. The
primary dispatcher status is monitored by the gateway, and requests are routed
back to this component when it returns to service. For more information, see the
IBM Cognos Business Intelligence Installation and Configuration Guide.
10 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
When a dispatcher starts, it registers itself with Content Manager. As a result, each
dispatcher is aware of the other dispatchers. If a dispatcher fails or is unavailable,
requests for that dispatcher are routed to the next available dispatcher until the
failed dispatcher reregisters itself.
After you install and configure IBM Cognos BI, one dispatcher is available on each
computer by default. Each dispatcher has a set of associated services, listed in the
following table.
Table 2. IBM Cognos services
Service Purpose
Runs agents. If the conditions for an agent
Agent service are met when the agent runs, the agent
service asks the monitor service to run the
tasks.
Enables the addition of commentary to
Annotation service reports via the IBM Cognos Workspace.
These comments persist across versions of
the report.
Manages background requests to run reports
Batch report service and provides output on behalf of the
monitor service.
Enhances the overall system performance
Content Manager cache service and Content Manager scalability by caching
frequent query results in each dispatcher.
12 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Table 2. IBM Cognos services (continued)
Service Purpose
Manages activities related to IBM Cognos
Mobile service Mobile client:
v Transforms Cognos Business Intelligence
reports and analyses for mobile
consumption.
v Compresses Cognos BI report and analysis
content for fast distribution over-the-air to
the mobile devices and access from those
devices.
v Pushes report and analysis content to the
mobile devices.
v Facilitates incoming and outgoing
report-related and analysis-related
requests between the mobile device and
the environment to search, browse, or run
reports.
v Synchronizes the mobile content store on
the server with the mobile database on
the mobile device.
v Translates Cognos BI Simple Object Access
Protocol (SOAP) messages into
wireless-friendly messages.
v Communicates with the mobile device.
Content Manager
Content Manager is the IBM Cognos BI service that manages the storage of
customer application data, including interactive visualization discovery, relational
metadata service, security, configuration data, models, metrics, report
specifications, and report output. Content Manager is needed to publish packages,
retrieve or store report specifications, manage scheduling information, and manage
the Cognos namespace.
14 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Figure 3. Diagram of the Content Manager
Your installation may include more than one Content Manager, each on a different
computer. One Content Manager computer is active and one or more Content
Manager computers are on standby.
Access Manager
It provides IBM Cognos BI with a consistent set of security capabilities and APIs,
including user authentication, authorization, and encryption. It also provides
support for the Cognos namespace.
Some security capabilities, such as user authentication, are external to IBM Cognos
BI but are exposed to IBM Cognos BI by Access Manager. Other capabilities, such
as authorization, are internal to IBM Cognos BI, and are implemented by Access
Manager.
Content Store
The content store is a relational database that contains data that your IBM Cognos
BI product needs to operate, such as report specifications, published models, and
the packages that contain them; connection information for data sources;
information about the external namespace, and the Cognos namespace itself; and
information about scheduling and bursting reports.
IBM Cognos BI includes the IBM Cognos Content Database as a default content
store for test and proof of concept installations but it should never be used in a
production environment.
The IBM Cognos service that uses the content store is named Content Manager.
Content Manager uses a JDBC (Java DataBase Connectivity) API to access the
content store and metric stores. IBM Cognos BI comes with the JDBC drivers for
IBM Cognos Content Database and IBM DB2®. If you are using Oracle, Microsoft
SQL Server, or Sybase databases, ensure you obtain the appropriate JDBC drivers.
Report results in other formats, such as HTML, XML, and CSV (comma separated
values), are stored in compressed form and are uncompressed by Content Manager
before they are sent to a user.
16 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
IBM Cognos Content Database
Apache Derby is open source software whose license terms can be found on the
Apache Derby Web site. Any modifications to the Apache Derby database, and its
use with other than IBM Cognos products is not supported. Any modifications you
make to the Apache Derby database are at your own risk.
IBM Cognos Content Database can be installed with other IBM Cognos BI
components or installed on a separate computer. The Cognos Content Database
service starts the Apache Derby database in which the IBM Cognos Content
Database is running.
If you install IBM Cognos Content Database on the same computer as Content
Manager, IBM Cognos Content Database will be used as the default content store.
For information about changing your content store, see the IBM Cognos Business
Intelligence Installation and Configuration Guide.
Data Sources
The data sources that can be accessed through IBM Cognos BI include relational
databases, dimensional or OLAP cubes, flat files, and other physical data stores.
They also include the connection information necessary for accessing the data.
Application Tier Components use data source connections to access data sources.
IBM Cognos BI can be used with Enterprise Information Integration (EII) products
such as IBM Cognos BI Virtual View Manager.
IBM Cognos BI Virtual View Manager provides access to additional data sources
such as LDAP, Java Database Connectivity (JDBC), Open XML and WSDL, and
improves performance when querying data from different data sources.
In the following scenario, the EII product models a set of databases, producing a
unified view as a single virtual data source. IBM Cognos BI accesses the EII service
as though it were a single database, and the EII service joins data from the various
enterprise data sources as needed.
Metric Store
A metric store is a relational database that contains content for metric packages. A
metric store also contains Metric Studio settings, such as user preferences.
More than one metric store may be created. For example, one metric store may
contain content for a sales application and another metric store may contain
content for a finance application.
18 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Chapter 3. Communications
IBM Cognos Business Intelligence components communicate with each other, and
with any additional applications integrated with IBM Cognos BI, using the BI Bus.
The BI Bus is an open, documented, Simple Object Access Protocol (SOAP) API
that supports Web Services Definition Language (WSDL). For information about
integrating applications with IBM Cognos BI components, see the Software
Development Kit Developer Guide.
The BI Bus is not a software component like Content Manager or IBM Cognos BI
server, but a set of protocols that govern communications among IBM Cognos
services. It also defines how industry standards and protocols are used with IBM
Cognos BI, enabling IBM Cognos BI to be a fully open system.
Figure 5. A diagram highlighting the Content Store and IBM Cognos servers in the IBM
Cognos software architecture
The IBM Cognos BI architecture is tuned to minimize dispatch time. IBM Cognos
BI can use network capabilities, such as load-balancing routers, to ensure that
dispatchers and Web gateways are used evenly. Load-balancing routers distribute
requests across multiple Web or application servers, ensuring that all dispatchers
share the workload.
By using this option, the dispatcher does not perform load balancing. Requests that
can be processed locally will be processed locally. If the external load balancing
mechanism sends a request to a computer on which the required service is not
available, the dispatcher routes the request to an appropriate computer.
In addition to error messages, log messages provide information about the status
of components and a high-level view of important events. For example, log
messages can provide information about attempts to start and stop services,
completion of processing requests, and indicators for fatal errors. Audit logs, which
are available from a logging database, provide information about user and report
activity.
The IBM Cognos services on each computer send information about errors and
events to a local log server. A local log server is installed in the c10_location/logs
folder on every IBM Cognos BI computer that contains Content Manager or
Application Tier Components. Because the log server uses a different port from the
other IBM Cognos BI components, it continues to process events even if other
services on the local computer, such as the dispatcher, are disabled.
The following workflow shows the tasks that are required to prepare for logging.
20 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Figure 6. The workflow for implementing logging
v During planning, determine the logging configuration that is suitable for your
environment. For example, evaluate various log message repositories, such as
remote log servers and log files, such as the UNIX or Linux syslog or the
Windows NT Event log, in addition to the local log file. You can also send only
audit logging information to a database. Consider security, such as methods
available for protecting log files from system failures and user tampering.
For information about planning, see the IBM Cognos Business Intelligence
Architecture and Deployment Guide.
v During configuration, define the startup properties for logging, such as
connection settings for databases. You must also create a logging database if you
plan to collect audit logs. If communication between a local log server and a
remote log server must be secured, make the appropriate configuration changes
on both IBM Cognos BI computers. You can also enable certain logging features,
such as user-specific logging.
For information about configuring logging, see the IBM Cognos Business
Intelligence Installation and Configuration Guide.
v When setting up logging, specify the level of detail to log to focus messages on
the information that is relevant in your organization. Audit reports may also be
set up to track user and report activity.
For information about setting up logging, see the IBM Cognos Business Intelligence
Administration and Security Guide.
For information about using log messages to solve problems and resolving
logging-related issues, see the IBM Cognos Business Intelligence Troubleshooting Guide.
Chapter 3. Communications 21
Figure 7. A distributed installation of IBM Cognos software where multiple computers are
using the same log file location
You can also configure IBM Cognos BI to send audit log information from each log
server to a common database. The common database can be on the same computer
as one of the log servers, or on a different computer.
Figure 8. A distributed installation of IBM Cognos software where multiple computers are
using the same logging database
The local log server provides failover and recovery processes in the following three
circumstances:
v When the local log server is configured to send log information to a remote log
server that is not available, log information from the local log server is stored in
local recovery files. When the remote log server becomes available, an automatic
recovery process moves information from the local recovery files to the remote
log server, and deletes the local recovery files.
v When local IBM Cognos BI components are configured to communicate with the
local log server using a TCP connection and this connection is not available, log
information for these local components is stored in local recovery files. When the
22 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
TCP connection becomes available, an automatic recovery process moves
information from the local recovery files to the remote log server, and deletes the
local recovery files.
v When a log server is configured to send audit log information to a database, and
the connection between the log server and the database fails, no information is
logged in the database. When the connection is restored, information about the
connection failure and restoration is stored in the local log file, if it exists, and
the log server resumes sending new log information to the database. This
information stored in the local log file is not stored in the logging database.
For information about specifying where to send log messages and configuring TCP
connections, see the IBM Cognos Business Intelligence Installation and Configuration
Guide.
Log messages may be easier to interpret if all messages from each IBM Cognos BI
computer appear in a consolidated location. For example, the log messages can
then be sorted by their timestamp to determine the order in which events on
various IBM Cognos BI computers occurred.
If you are using a database to capture audit log messages, performance may be
improved if you route all audit log messages to a single log server that sends
messages to the database. If a single log server is not used, the local log server on
each IBM Cognos BI computer would require its own connection to the database.
Another benefit of using a single log server with a database is that configuration
changes to the database are easier to maintain. You must update the configuration
of only the remote log server.
For local log servers, do not remove the default log files, even if you specify
another repository for log messages, such as a database or remote log server. If the
log messages may contain sensitive information, ensure that the log files on each
computer are secured appropriately.
Chapter 3. Communications 23
If a communication issue occurs, the local log server writes the log messages that it
receives to the local log file. This action means that log messages are not lost when
they cannot be written to a repository that is no longer available. As well, the log
server writes information to the log file about the communication issue, which may
help diagnose the problem. For example, if a database becomes unavailable, the
log file contains information about when it failed, as well as when it recovered, if
applicable.
For some types of databases, such as Oracle, API client software must be installed
and configured on each IBM Cognos BI server.
When other IBM Cognos services are on the same computer as Content Manager,
requests may be divided between Content Manager and the other services. In this
case, the number of connections available to Content Manager may be fewer than
the maximum possible connections.
Query Databases
The IBM Cognos BI server computer accesses the query databases. You can
configure the maximum number of query database connections available to the
IBM Cognos BI server computer, and the duration that connections are retained. A
cleanup thread examines the connections every minute. Any connection that has
been inactive longer than the time-out value is removed.
Inactive query database connections can be claimed by a new request. This occurs
when the maximum number of connections has been reached and none of the
inactive connections can be used by the new request. In this case, the oldest
inactive connection is terminated and a new connection is created. A query
database connection is only reused when the database credentials of the connection
match those of the new request.
If the maximum number of connections is reached, and all are active, additional
requests fail.
24 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
v thresholds
v membership in scorecards
v links to related reports, initiatives, and counter measures
Metric Studio accesses the metric store database. Metric Designer is used to define
jobs that extract data from other query databases and populate the metric store
database, although you can also manually create processes to do this.
IBM Cognos for Microsoft Office uses Microsoft .NET Framework to allow users to
interact with server-based components. Microsoft .NET Framework and the
required updates are downloaded and installed by the setup file when you install
IBM Cognos for Microsoft Office. The setup file must be run on all user computers.
For a list of supported versions of Microsoft .NET Framework, see the IBM
Software Product Compatibility Reports page (www.ibm.com/support/
docview.wss?uid=swg27042164).
The Microsoft .NET Framework does not have to be installed on your IBM Cognos
BI server. IBM Cognos BI for Microsoft Office can run on any supported IBM
Cognos BI server platform.
For information about configuring IBM Cognos BI for Microsoft Office, see the IBM
Cognos Business Intelligence Installation and Configuration Guide.
Port Usage
All communication between IBM Cognos BI components, except for IBM Cognos
Content Database and log server communication, can take place through one
incoming port. This is true whether components are on the same computer or on
different computers and whether communication is all non-SSL protocol or all SSL
protocol. The default port number is 9300.
Log server communication must take place through a unique port. The default port
is 9362. You can configure log server communication to use either non-SSL or SSL
protocol.
Chapter 3. Communications 25
Framework Manager, Metric Designer, and IBM Cognos Transformer can
communicate with the IBM Cognos BI server using either of two routes: through
the Web server gateway, or directly to the Application Tier Components dispatcher.
For more information see “Modeling Tool Installation Options” on page 59.
For information about using SSL and specifying where to send log messages, see
the IBM Cognos Business Intelligence Installation and Configuration Guide.
Simple Object Access Protocol (SOAP) requests can be directed to either the IBM
Cognos BI Web gateway or the dispatcher. For more information, see the IBM
Cognos Business Intelligence Installation and Configuration Guide.
There are hundreds of types of requests and responses in IBM Cognos BI. To
illustrate request flow, this section describes how IBM Cognos BI responds to a
request.
For more information see “IBM Cognos Authentication Services” on page 108.
26 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Anonymous Access
When a user requests anonymous access to IBM Cognos BI, the following occurs:
1. The user attempts to access the IBM Cognos BI Welcome page or any other
IBM Cognos BI user interface from a Web browser, sending a request to the
IBM Cognos BI gateway.
2. The IBM Cognos BI gateway accepts the request and sends it to a dispatcher.
3. The dispatcher notes that there is no passport attached to the request, and
sends the request to Content Manager.
4. Content Manager sends the request to Access Manager.
5. Anonymous access is enabled in this IBM Cognos BI system, so a passport is
attached to the request and the request is returned through Content Manager to
the dispatcher.
6. The dispatcher processes the request and sends it to the presentation service.
7. The presentation service sends the Welcome page back through the dispatcher
and the gateway to the user.
Chapter 3. Communications 27
Authenticated Access
When a user requests authenticated access to IBM Cognos BI, the following occurs:
1. The user attempts to access the IBM Cognos BI Welcome page or any other
IBM Cognos BI user interface from a Web browser, sending a request to the
IBM Cognos BI gateway.
2. The gateway accepts the request and sends it to a dispatcher.
3. The dispatcher notes that there is no passport attached to the request and
sends the request to Content Manager.
4. Content Manager sends the request to Access Manager.
5. Anonymous access is disabled in this IBM Cognos BI system, so Access
Manager sends the request back to Content Manager with a fault attached.
The fault contains information about what is needed to log on. For example, if
there are multiple namespaces, the user may be required to select a
namespace. If there is only one namespace, the user may be required to
provide a user ID and password.
6. Content Manager returns the request with the attached fault to the dispatcher.
7. The dispatcher sends the request to the presentation service.
8. The presentation service creates the appropriate logon page for the user, and
returns the page through the dispatcher and the gateway to the user.
9. The user enters the required information, such as a user ID and password.
The information is attached to the original request and sent through the
gateway to the dispatcher.
10. The dispatcher sends the request to Content Manager.
28 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
11. Content Manager sends the request to Access Manager.
12. If all the required information is correct, Access Manager issues a passport,
attaches it to the original request, and sends the request back to Content
Manager. If the required information is incorrect or incomplete, then the
request faults back to step 9.
13. Content Manager sends the request to a dispatcher.
14. The dispatcher processes the request and sends it to the presentation service.
15. The presentation service sends the Welcome page back through the dispatcher
and the gateway to the user.
Chapter 3. Communications 29
4. Content Manager checks with Access Manager to see whether the user has read
privileges for the report or analysis. To do this, Content Manager sends Access
Manager the access control lists for the report or analysis, the attempted action
(read), and the user information.
5. Access Manager determines that the user can perform the action, and Content
Manager sends the report or analysis in the form of an HTML page or PDF
document through the dispatcher and gateway to the user. When serving a
PDF report or analysis, byte serving is used.
Figure 12. A diagram showing how the services interact when running an HTML report
When a user runs an HTML report or analysis through IBM Cognos Connection,
the following occurs:
1. The user clicks a report or analysis to run it, and the request goes through the
gateway and the dispatcher to the presentation service.
2. The presentation service sends the request to the report service through the
dispatcher.
3. The report service requests the report or analysis and metadata from Content
Manager, through the dispatcher.
30 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
4. Content Manager sends the report or analysis XML specifications and metadata
to the report service. Content Manager refreshes metadata only when IBM
Cognos BI is stopped and restarted or the model is updated and republished.
5. The report service returns one of these results to the presentation service:
v an error page
v a not ready page
v a page of an HTML report or analysis
6. The presentation service sends one of these results through the dispatcher and
gateway to the browser:
v an error page
v a wait or cancel page
v a page of a completed HTML report or analysis in the Cognos Viewer
interface
Figure 13. A diagram showing how services interact when running a PDF report.
When a user runs a PDF report or analysis through IBM Cognos Connection, the
following occurs:
1. The user clicks a report or analysis to run it, and the request goes through the
gateway and the dispatcher to the presentation service.
2. The presentation service sends the request to the report service through the
dispatcher.
3. The report service requests the report XML specification and metadata from
Content Manager, through the dispatcher.
Chapter 3. Communications 31
4. Content Manager sends the report XML specification and metadata to the
report service. Content Manager refreshes metadata only when IBM Cognos BI
is stopped and restarted or the model is updated and republished.
5. The report service returns one of these results to the presentation service:
v an error page
v a not ready page
v a PDF report or analysis
6. The presentation service sends the PDF result to Content Manager for storage
in the user's session temporary area. Byte serving is used.
7. The wait/cancel page polls every few seconds to see if the report or analysis is
complete. When it is complete, the Cognos Viewer HTML frame content is
replaced with the PDF. A request is sent through the gateway and the
dispatcher to the Content Manager and back with the PDF.
Figure 14. A diagram showing how services interact when scheduling a task
32 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
2. The event management service sends a request to the monitor service to run
the scheduled task through the dispatcher. This request is a background
request, and the conversation between the event management service and the
monitor service ends.
3. The monitor service sends a request to Content Manager through the
dispatcher to create a history object. This object is required to ensure that the
correct status appears in the user interface.
4. The monitor service forwards the run request to the relevant service through
the dispatcher and maintains the asynchronous protocol with the target service.
5. The monitor service updates the status of the history as "execution".
6. When the task completes, the target service stores any relevant information in
Content Manager and ends communication with the monitor service.
Information stored in Content Manager may include report output, agent event
lists, and so on.
7. The monitor service detects the final state of the task run and updates the
history object with a status that indicates whether the task was successful.
Figure 15. A diagram showing how services interact when opening a folder
When a user opens a folder in IBM Cognos Connection, the following occurs:
1. The user clicks a folder to open it, and the request goes through the gateway
and the dispatcher to the presentation service.
2. The presentation service sends the request to Content Manager through the
dispatcher.
Chapter 3. Communications 33
3. Content Manager checks with Access Manager to determine whether access is
granted.
4. Content Manager sends the folder contents or an error message to the
presentation service.
5. The presentation service formats the appropriate HTML page and sends it
through the dispatcher and the gateway to the user.
Running an Agent
You can run agents to monitor your data and detect occurrences of business
events.
Figure 16. A diagram showing how services interact when running an agent
When the user clicks an agent's run link, the following occurs:
1. The request goes through the gateway and the dispatcher to the monitor
service.
2. The monitor service authenticates the request and creates a history in Content
Manager for the agent run.
3. The monitor service forwards the request to the agent service. The monitor
service maintains the asynchronous protocol (wait/cancel) on behalf of the
gateway.
4. The agent service requests the agent definition and the previous agent event list
from Content Manager.
5. The agent service executes the agent condition through the batch report service.
34 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
6. The agent service compares the generated result set with the previous event
list, and creates and stores the updated agent event list in Content Manager.
7. Based on the authored agent tasks, the agent service executes its tasks through
the monitor service.
8. The monitor service creates a history in Content Manager for each step and
forwards the request (maintaining the asynchronous protocol) to the relevant
service. For example, email messages are forwarded to the delivery service,
reports are forwarded to the batch report service, and jobs are forwarded to the
job service.
Indexing content
Administrators create and update the search index using an index update task in
IBM Cognos Administration. When you create an index update task, you can run
the task immediately, or define a schedule to run the task at a later time.
Chapter 3. Communications 35
2. The scheduling service executes the index update task.
3. The index update service requests a capability check from Content Manager.
4. The index update service sends an index start request to the index data
service.
5. Terms are extracted from Content Manager.
6. The index update service extracts all references to queryItems, then queries
the report service for values.
7. The report service retrieves every unique query item instance used in all
objects.
8. The index add request is sent to the index data service.
9. The index data service writes to the index.
10. Term extraction and writing to the index is repeated iteratively until the
indexing is complete.
11. The index update service informs the scheduling service that the index update
is complete.
Searching content
Users can run a full-text search from IBM Cognos Connection, IBM Cognos
Analysis Studio, IBM Cognos Query Studio, or IBM Cognos Viewer.
When a search is run, one of two check methods is applied: Content Manager
security check or internal security check. To use the internal security check, select
Index Access Control List in Index, General, in Search, General, and in Storage,
General. If all three settings do not match, the Content Manager security check is
used.
This method checks the security of Content Manager items referenced in the result
set each time a search is run. The Content Manager security check is used for
searching if Index Access Control List is set to false.
36 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Figure 18. A diagram showing events in a full-text search that has the index access control
list set to false
When a user runs a full-text search and Index Access Control List is set to false,
the following occurs:
1. The search request is sent to the index search service.
2. The index search service requests a capability check from Content Manager.
3. The search request is sent to the index data service.
4. The result set is extracted from the index.
5. The security of metadata and sample data referenced in the result set is
checked. This step is dependent on the Secure refinement results index data
service setting.
6. The security of Content Manager items referenced in the result set is checked.
7. The filtered result set is returned to the index search service.
8. The result set is returned to the user.
The access control list is created when you generate or update an index. The
internal security check is faster than the Content Manager security check. To
capture ongoing security changes, run frequent incremental index updates. The
Chapter 3. Communications 37
internal security check is used for searching if Index Access Control List is set to
true. This is the default approach.
When a user runs a full-text search and Index Access Control List is set to true, the
following occurs:
1. The search request is sent to the index search service.
2. The index search service requests a capability check from Content Manager.
3. The search request is sent to the index data service.
4. The result set is extracted from the index based on an internal security check in the
index.
5. The security of metadata and sample data referenced in the result set is checked. This
step is dependent on the Secure refinement results index data service setting.
6. The filtered result set is returned to the index search service.
7. The result set is returned to the user.
Figure 19. A graphic showing events in a full-text search that has the index access control list
set to true
Portal Pages
Whether you are using IBM Cognos Connection or another portal, all IBM Cognos
functionality is available on the BI Bus. You can search for reports and view them
in the portal and perform additional analysis, if needed. You can also monitor,
configure, and administer IBM Cognos users and content using the portal. Whether
38 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
you are working with reports or performing administration tasks, requests are sent
to the BI Bus and then forwarded to the appropriate IBM Cognos service for
processing.
The following IBM Cognos functions are commonly provided through portlets:
v Cognos Navigator retrieves selected content.
v Cognos Search finds and opens published content.
v Cognos Viewer shows content selected in Cognos Navigator or Cognos Search.
For each portlet, all security permissions and credentials are inherited and passed
along through the request. For example, if you go to a particular folder or search
for a particular object, only those objects that you have permission to view are
returned. Similarly, if you click a report in the Cognos Navigator or Search portlet,
the report identifier and security credentials are included with the request. You can
view the report in either the same portlet or a new portlet, but only the data that
you have access to will appear.
Chapter 3. Communications 39
40 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Chapter 4. Workflow
The series of tasks that people in your organization will perform to understand,
install, configure, and use IBM Cognos Business Intelligence include the following:
v planning for implementation
Implementation planning should be done before installing and configuring IBM
Cognos BI. It is typically carried out by a team assembled and led by the
business intelligence solutions architect.
v installing and configuring IBM Cognos BI
Technical personnel install and configure IBM Cognos BI, typically under the
direction of the business intelligence solutions architect.
v administering IBM Cognos BI
Administrators establish and maintain security, set up multilingual capabilities,
install fonts, manage report distribution, and perform ongoing administration.
v working with models and packages to author reports and analyses for viewing
Modelers create one or more metadata models, and use those models to publish
packages that can be used to author reports and analyses.
Authors use published models to create and maintain reports and analyses.
Report users view and print reports and analyses through IBM Cognos
Connection. For more information, see the IBM Cognos Connection User Guide.
Mobile report users view reports with a IBM Cognos Mobile client application.
Authors and report users import report data to Microsoft Office workbooks and
presentations using IBM Cognos BI for Microsoft Office.
v creating scorecarding applications and monitoring metrics
Scorecard authors create packages that contain connection, report, and
maintenance task information. Authors then deploy, maintain, and access
scorecard applications in Metric Studio.
Business users use metrics to monitor and analyze performance in key business
areas. For more information, see the Metric Studio User Guide.
v creating Transformer models and PowerCubes
v Modelers create one or more metadata models and then use those models to
create PowerCubes that can be used in reporting and analysis
v managing events
Users create agents to monitor data and detect occurrences of business events.
When you install IBM Cognos BI using the Installation wizard, you specify where
to install each of these components:
v gateways
For more information, see “Tier 1. Web Server: IBM Cognos BI Gateways” on
page 9.
v Application Tier Components
For more information, see “Tier 2. Applications: IBM Cognos BI Servers” on
page 10.
v Content Manager
For more information, see “Content Manager” on page 14.
42 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
You can install the components on one computer, or distribute them across a
network. Before installing IBM Cognos BI, choose the appropriate installation and
configuration option Chapter 6, “Installation Options,” on page 53.
You can choose to install optional Windows-based metadata modeling tools. If you
plan to use IBM Cognos BI for scorecarding, you can install Metric Designer. If you
plan to create PowerCubes in IBM Cognos BI, you can install IBM Cognos
Transformer.
Unattended Installation
For more information, see the IBM Cognos Business Intelligence Installation and
Configuration Guide.
For information about initial configuration, see the IBM Cognos Business Intelligence
Installation and Configuration Guide.
Chapter 4. Workflow 43
Monitoring Configuration Changes
Each time you save a configuration after making changes, date-stamped versions
of these two configuration files are automatically saved in the
c10_location/configuration directory:
v cogstartup.xml
This file records configuration settings. An example is
cogstartup_200211231540.xml
v coglocale.xml
This file records locale settings used for multilingual reporting. An example is
coglocale_200211261401.xml
For more information about the cogstartup.xml and coglocale.xml files, see the IBM
Cognos Business Intelligence Installation and Configuration Guide. For information
about troubleshooting, see the IBM Cognos Business Intelligence Troubleshooting
Guide.
Configuring Security
IBM Cognos BI integrates with an existing security infrastructure to provide user
authentication.
IBM Cognos BI can secure content by using the user and group definitions from
your security system, without any changes required. An Cognos namespace is
included to provide the optional ability to define additional groups for securing
content. These groups can simplify security administration by including users and
groups from one or more authentication providers.
IBM Cognos BI includes IBM Cognos Application Firewall, which is included with
the dispatcher to validate and filter incoming and outgoing traffic at the dispatcher
layer. By default, IBM Cognos Application Firewall is enabled.
If you intend to set up security for IBM Cognos BI, it should be the first thing you
do after installation. For information about setting up and maintaining security, see
Chapter 10, “Security Architecture,” on page 107 and the Administration and Security
Guide.
44 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Installing Fonts
IBM Cognos BI uses fonts to render PDF reports and to render charts used in PDF
and HTML reports. To show output correctly, fonts must be available where the
report or chart is rendered. This may involve installing additional fonts on the IBM
Cognos BI server, and on the personal computers of IBM Cognos BI users. If users
specify a font that is not installed, IBM Cognos BI substitutes a default font. For
more information, see “Adding Fonts to the IBM Cognos BI Environment” on page
99.
Configuring Browsers
For information about using IBM Cognos Connection, see the IBM Cognos
Connection User Guide. For information about administration, setting up sample
report projects and models, and troubleshooting problems, see the Administration
and Security Guide and IBM Cognos Business Intelligence Troubleshooting Guide.
Chapter 4. Workflow 45
Using IBM Cognos BI for Reporting and Analysis
The following diagram shows the complete reporting and analysis workflow for
IBM Cognos BI.
Figure 21. Reporting and analysis workflow for IBM Cognos BI software
Creating models and publishing packages are tasks that should be planned
carefully. Models and packages that are well-designed from the start ensure that
user requirements are met, data is secure, and your IBM Cognos BI application can
be easily administered.
To understand the modeling and packaging process, users can study the sample
models, packages, and reports provided with IBM Cognos BI. For information
about setting up the samples, see the IBM Cognos Administration and Security Guide.
For IBM Cognos BI reporting, models and packages are created using Framework
Manager. The following topics provide an overview. For more information, see the
IBM Cognos Framework Manager User Guide.
46 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Modeling
Framework Manager is used to create a model that provides users with a single,
integrated, business view of the database, and to provide IBM Cognos BI with
information about how data is accessed, related, and secured.
A model that is designed to meet user requirements adds significant value to your
data. It structures, adds to, and manages the data in ways that make sense to
business users. Creating a model is an important task that should be planned and
executed by a modeler or a modeling team familiar with both the database
structure and the needs of your business users.
Packaging
After a model is created, packages are published to locations on the IBM Cognos
BI server where report authors can use them to create reports. A different package,
containing only the necessary information, can be published for each group of
users.
Reports cannot contain data from more than one package. When publishing a
package, it is important to ensure that the package contains all the data required to
meet the needs of the intended users.
The hierarchical structure of a package controls the way in which folders, reports,
and other data objects are structured in the interface used by the report author. It
also controls how security is applied to the objects, and how easy it is to deploy
the package to other environments. As a result, it is important to ensure that the
structure of a package makes sense from the perspective of a business user, and
not just from an administrative perspective.
Authoring Reports
IBM Cognos BI can be used to create many different types of reports, including
lists, crosstab reports, charts, master and detail reports, and user-designed reports.
You create planned, professional reports in Report Studio, and ad hoc reports in
Query Studio. You can explore and analyze data in Analysis Studio. You can use
report data from Report Studio, Query Studio, and Analysis Studio in Microsoft
Office applications through Cognos BI for Microsoft Office.
Chapter 4. Workflow 47
development, see the Software Development Kit Developer Guide. For information
about integrating IBM Cognos BI with other enterprise portals, see the IBM Cognos
Administration and Security Guide.
Query Studio
Report authors and users create ad hoc reports using Query Studio. Ad hoc
reports, also called ad hoc queries, can be created quickly, with little or no training,
to meet reporting needs not covered by standard, professional reports.
Authors can save query specifications for future revision, or as templates for other
new reports. Reports can be made available in interactive mode, so that users can
expand them, or in read-only mode. Reports created in Query Studio can be
viewed and edited in Report Studio.
Before creating ad hoc queries, users should complete the tutorial provided to
familiarize themselves with best practices in report creation. For more information,
see the Getting Started Guide.
For information about Query Studio, see the IBM Cognos Query Studio User Guide.
Report Studio
Report authors create professional reports using Report Studio. Planned reports are
standard, professional reports designed to meet specific, recurring needs of
business users. Authors can also use Report Studio to edit reports generated in
Query Studio.
To create a report in Report Studio, an author specifies the model that will provide
data for the report. The author then builds a report specification that defines the
queries and prompts used to retrieve the data. The author also creates the layouts
and styles used to present the data. In addition to creating new reports, authors
can modify existing reports.
Before creating reports for corporate use, report authors should use the tutorial
provided to familiarize themselves with best practices in report creation. For more
information, see the Getting Started Guide.
For information about Report Studio, see the IBM Cognos Report Studio User Guide.
Analysis Studio
In Analysis Studio, users can explore, analyze, and compare dimensional data.
Analysis Studio provides access to dimensional, OLAP (online analytical
processing), and dimensionally modeled relational data sources. Analyses created
in Analysis Studio can be opened in Report Studio and used to build professional
reports.
For information about using Analysis Studio, see the IBM Cognos Analysis Studio
User Guide.
48 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
IBM Cognos BI for Microsoft Office
Authors and report users may want to use data from IBM Cognos reports in
Microsoft Office workbooks, documents, and presentations. In IBM Cognos BI for
Microsoft Office, users can import or remove IBM Cognos report elements from
Microsoft Excel workbooks, Microsoft Word documents, and Microsoft PowerPoint
presentations. Users can run reports using the IBM Cognos studios and publish
workbooks and presentations to IBM Cognos Connection.
For information about using IBM Cognos BI for Microsoft Office, see the IBM
Cognos BI for Microsoft Office User Guide. For more information about configuring
and deploying IBM Cognos BI for Microsoft Office, see the IBM Cognos Business
Intelligence Installation and Configuration Guide.
Figure 22. Scorecarding workflow for IBM Cognos Business Intelligence software
You must create a package the first time you access Metric Studio. You can create
other packages in IBM Cognos Connection or Metric Studio. For more information,
see the IBM Cognos Metric Studio User Guide.
Chapter 4. Workflow 49
You create scorecarding applications using Metric Studio. You use a Metric Studio
package to deploy, maintain and access a scorecarding application. For more
information, see the IBM Cognos Metric Studio User Guide.
Figure 23. Transformer model and PowerCube workflow for IBM Cognos Business
Intelligence software
Managing Events
An event is any situation that can affect the success of your business. To ensure
that the appropriate personnel are made aware of an event, you create agents in
Event Studio to monitor your data and detect occurrences of business events.
50 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Chapter 5. Implementation Planning Checklist
To get the most from IBM Cognos Business Intelligence, you must implement it
effectively. This means installing and configuring IBM Cognos BI so that it
integrates with your information technology infrastructure and meets your
reporting requirements.
When you complete your planning and are ready to install and use IBM Cognos
BI, refer to the other IBM Cognos BI documents for step-by-step instructions.
When you assess your installation options for IBM Cognos BI, you must consider
whether you are installing the product for the first time or upgrading. For
information about upgrading, see the IBM Cognos Business Intelligence Installation
and Configuration Guide.
When you install IBM Cognos BI, you specify where to install the gateways,
Application Tier Components, and Content Manager. You can install all IBM
Cognos BI components on one computer, or distribute them across a network.
You must install Framework Manager, the metadata modeling application for
business intelligence. You can choose to install optional metadata modeling
applications such as Metric Designer for scorecarding and Transformer for creating
PowerCubes.
In the following diagram, all IBM Cognos BI components are installed on one
computer.
54 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Installing the Gateway on a Separate Computer
You can install the gateway and a Web server on one computer, and install the
remaining IBM Cognos BI components on other computers. If you have a Web
farm, you may want to install an IBM Cognos BI gateway on each Web server.
Using multiple Web servers to manage incoming requests provides a better level of
service.
If you install only the gateway component on the same computer as the Web
server, your Web server manages the core Web services and does not process user
requests. This separation of processing may be required if you have a network
firewall between the Web server and your Application Tier Components
computers.
In the following diagram, the Web server has a gateway installed. Incoming
requests are passed to the gateway and forwarded to the Application Tier
Components computer. If request information is not saved, the result is returned
from the Application Tier Components computer. If request information is saved, it
is saved in the content store.
Figure 26. IBM Cognos components installed on different computers, where the gateway is
separated from the Application Tier Components and Content Manager
56 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
You may choose to install Content Manager separately from the Application Tier
Components to isolate and protect sensitive data that is managed by Content
Manager.
You may also choose to install Content Manager on a separate computer if large
volumes of data are managed by Content Manager. In this type of environment,
IBM Cognos BI scalability can be improved by increasing the size of the processor
on which Content Manager is installed.
In the following diagram, incoming requests are routed to a gateway. The gateway
forwards the request to the Application Tier Components computer. The
Application Tier Components computer forwards it to the active Content Manager
computer, which queries the content store and sends the results back to the
Application Tier Components computer for rendering.
Figure 28. Installing application tier components and content manager on separate computers
58 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Multiple Application Tier Components
The modeling tools communicate with the Application Tier Components, which
can be installed on one or more Web servers. Modeling tools can communicate
with Application Tier Components using one of these routes:
v connect to the Application Tier Components dispatcher using the Internal
dispatcher URI. This route is the preferred route.
v connect to an additional, dedicated gateway that is configured to connect to the
dispatcher using the Internal dispatcher URI. You must configure appropriate
security for this gateway. This method is useful when the modeling tool is
outside a network firewall.
Important: Do not change your main gateway to use the Internal dispatcher
URI. Doing so reduces the security of the IBM Cognos BI portal and studios.
To ensure that the modeling tool can communicate with IBM Cognos BI
components, on the computer where the tool is installed, configure cryptographic
properties and the following environment properties:
v Gateway URI
v Dispatcher URI for external applications
For more information, see the IBM Cognos Business Intelligence Installation and
Configuration Guide.
For Web servers other than Microsoft Internet Information Services (IIS), no
functional difference exists between the two communication routes between the
modeling tool and the Application Tier Components dispatcher. For either route,
the modeling tool uses the BI Bus SOAP API. If you use the Web server route, and
you have medium-sized and large models (approaching 1 MB in size), the models
are broken into smaller pieces (chunked) for transmission.
If you use a Web server other than Microsoft IIS, configure the modeling tool to
communicate through your Web server gateway (Route 1). This eliminates the need
to set up additional communications channels if you use firewalls to separate the
modeling tool, your Web server, and your Application Tier Components.
When the modeling tool is outside a network firewall that protects the Application
Tier Components, communication issues with the dispatcher can occur. For security
reasons, the default IBM Cognos BI configuration prevents the dispatcher from
accepting requests from the modeling tool when it is outside the network firewall.
Figure 30. IBM Cognos components installed on different computers, with the modelling tools
installed outside of the network firewall
60 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Figure 31. IBM Cognos components installed on different computers, with the modelling tools
installed inside the network firewall
The installation wizard for IBM Cognos BI can recognize compatible directories
and shows a warning when conflicts occur. After IBM Cognos BI is installed, you
can access objects that are created in another IBM Cognos product in IBM Cognos
BI. The requirements for access depend on how you choose to run the two
products.
Many IBM Cognos products use similar services, such as the report service and the
presentation service. If you are using multiple products, such as IBM Cognos
Business Intelligence with IBM Cognos Metrics Manager or IBM Cognos
PowerPlay, you must ensure that you disable some of the duplicated services to
ensure your products work properly.
For example, you have IBM Cognos Business Intelligence and IBM Cognos
PowerPlay installed. Both products have a reports service and a presentation
service. If both products are accessed through the same gateway, reports that must
be run on the IBM Cognos BI services could be routed to the IBM Cognos
PowerPlay services. The result may be that your reports will display an error.
Cognos ReportNet
For ReportNet and IBM Cognos BI to run concurrently, each version must have
unique ports, content stores, Web aliases, and cookie settings. If you use the
default settings, configuration is required only to select new ports and a new
content store for IBM Cognos BI.
You cannot use content from ReportNet directly in IBM Cognos BI until you
upgrade ReportNet. When you upgrade to IBM Cognos BI, the content store is
upgraded to use the IBM Cognos BI schema and cannot be used by previous
versions. Therefore, you need to maintain both the old and new content stores to
run both product versions. You can maintain both content stores using one of the
following approaches:
v create a copy of the ReportNet content store database using database export
utilities and use the copy with IBM Cognos BI
v use the embedded export feature in IBM Cognos Connection to export the
ReportNet content store database and import the exported deployment into IBM
Cognos BI
You can upgrade reports at the same time or upgrade them later if compatibility is
required with some existing Software Development Kit applications.
For instructions about running concurrently and upgrading, see the upgrade
chapter in the IBM Cognos Business Intelligence Installation and Configuration Guide.
To use data store content from IBM Cognos Metrics Manager in IBM Cognos BI,
you upgrade by exporting the content from the data store to flat files, installing
IBM Cognos BI, and then importing the flat files into the IBM Cognos BI metric
62 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
store. Note that the cube picker feature (the ability to map specific metrics to cube
intersections) in IBM Cognos Metrics Manager is not available in other IBM
Cognos BI studios.
For instructions about upgrading, see the upgrade chapter in the IBM Cognos
Business Intelligence Installation and Configuration Guide.
Cognos DecisionStream
You can continue to run IBM Cognos DecisionStream Series 7 concurrently with
IBM Cognos BI products. Catalogs that are created using DecisionStream Series 7
must be upgraded before you can use them with Data Manager.
You can also upgrade the following reports to IBM Cognos BI reports by using
IBM Cognos Migration Assistant:
v PowerPlay Windows reports
v PowerPlay Web Explorer reports
v PowerPlay for Excel reports
v PowerPlay for Windows reports published to PowerPlay Web
The tools are available at the IBM Cognos Customer Center (http://
www.ibm.com/software/data/support/cognos_crc.html).
The last release of the migration tools was version 10.1.1. You can use these tools
to migrate to IBM Cognos Business Intelligence version 10.1.1 (Report Studio or
Analysis Studio), and then upgrade the migrated content to IBM Cognos BI version
10.2.0. You can also use the migration tools to migrate Series 7 PowerPlay content
to IBM Cognos BI PowerPlayversion 10.2.0.
For a list of supported IBM Cognos Series 7 versions and to download IBM
Cognos Migration Assistant tools and documentation, see the IBM Cognos
Customer Center (http://www.ibm.com/software/data/cognos/customercenter).
You can migrate Architect models for use as a metadata source for Framework
Manager.
Impromptu
You can migrate Impromptu catalogs and reports to IBM Cognos BI. You use
migrated catalogs as a metadata source for Framework Manager. After completing
the catalog migration process, you can migrate and deploy Impromptu reports.
Upfront
You can migrate Upfront content to IBM Cognos BI. The migration process maps
the Upfront content structure to an IBM Cognos Connection folder structure. By
preserving the existing Upfront organization, it is easier to complete administrative
tasks, such as applying security to the migrated content.
You can migrate Impromptu Web Reports content, such as schedules and events, to
IBM Cognos BI. You migrate Impromptu Web Reports content using an IBM
Cognos Series 7 Deployment Manager package as the migration source. Before you
migrate Impromptu Web Reports you must migrate the Impromptu catalog
metadata used by the reports.
You cannot migrate Impromptu query definition files (.iqd), but you can continue
to use existing .iqd files to build cubes in IBM Cognos BI Transformer 8.4. To do
so, you must install the optional component, Series 7 IQD Bridge, which is
available to install with IBM Cognos BI on IBM Cognos Series 7 supported
platforms.
PowerPrompts are not migrated, but you can implement similar functionality using
either the built-in administrator functionality or the IBM Cognos Software
Development Kit.
You can access published plan data in IBM Cognos BI by using the Generate
Framework Manager Model wizard, which requires IBM Cognos Planning -
Analyst 7.3 MR1 or later.
If you want to use this product with the IBM Cognos BI server, you must ensure
that both products are the same version.
For more information, see the IBM Cognos Analyst User Guide.
64 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Cognos Planning - Contributor
If you want to use this product with the IBM Cognos BI server, you must ensure
that both products are the same version. You cannot install IBM Cognos Planning
in the same path as 64-bit IBM Cognos BI.
For more information, see the IBM Cognos Contributor Administration Guide.
Cognos Finance
You can access IBM Cognos Finance cubes that are secured against a Series 7
namespace by using the IBM Cognos Finance Network API Service. You can also
export data and metadata from IBM Cognos Finance for use in Framework
Manager.
Cognos Controller
You can access IBM Cognos BI to create IBM Cognos Controller Standard Reports
by using a predefined Framework Manager model that is created when IBM
Cognos Controller is installed. You can also access published Controller data and
structures in Framework Manager for custom reporting and analysis.
If you want to use this product with the IBM Cognos BI server, you must ensure
that both products are the same version.
Cognos Transformer
You can use IBM Cognos PowerCubes and Transformer models that were
generated by Transformer 7.3 or later directly in IBM Cognos BI. The cubes and
models are upwards compatible and require no migration or upgrade tools. You
can run reports and analyses in IBM Cognos BI against the IBM Cognos
PowerCubes.
If you want to use the new integration features of Transformer with IBM Cognos
BI, you can upgrade IBM Cognos Series 7.x Transformer models to IBM Cognos BI
Transformer 8.4 or later. This allows you to use IBM Cognos BI data sources (such
as published packages), list reports authored in Query Studio or Report Studio,
authenticate using IBM Cognos BI security, and publish directly to IBM Cognos
Connection.
Before you load the model, the IBM Cognos Series 7 namespace must be
configured in IBM Cognos BI. The name ID that is used to configure the
namespace in IBM Cognos BI must match the name used in IBM Cognos Series 7.
For more information about configuring an IBM Cognos Series 7 namespace in
IBM Cognos BI, see the IBM Cognos Business Intelligence Installation and
Configuration Guide.
For more information about upgrading IBM Cognos Series 7 secured PowerCubes,
see the IBM Cognos Business Intelligence Transformer User Guide.
If you use an IBM Cognos Series 7 PowerCube as a data source, IBM Cognos BI
converts the cube data from the encoding that was used on the system where the
PowerCube was created. For a successful conversion, IBM Cognos Series 7
PowerCubes must be created with a system locale set to match the data in the
PowerCube.
Data Manager is used to create data warehouses and data repositories for
reporting, analysis, and performance management. When Data Manager is installed
in your IBM Cognos BI environment, you can use the Data Movement Service to
run builds and JobStreams in IBM Cognos Connection. You must install the Data
Manager engine in the same location as your IBM Cognos BI Application Tier
Components. Both Data Manager and IBM Cognos BI must be the same version.
Some IBM Cognos Analytic Application components are available for installation
on 64-bit systems. The default installation directories for 64-bit installations are
different from the default installation directories for 32-bit installations. Whether
you are installing all server components together on a single server or on multiple
servers, 32-bit and 64-bit components must be in separate directories.
66 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Cognos Lifecycle Manager
For more information, see the IBM Cognos Lifecycle Manager User Guide.
IBM Cognos BI Business Viewpoint Studio helps to provide you with one version
of the truth for dimensions used in an enterprise's performance management
processes. With Business Viewpoint Studio, you have a controlled, collaborative,
workflow-oriented business process to manage both manual and automated
changes to all data related to how enterprises analyze and manage their business.
Both IBM Cognos BI Business Viewpoint Studio and IBM Cognos BI must be at the
same version.
With IBM Cognos Content Archival, you can store report output versions and their
source report specifications to an external content archival repository. This
enhances system performance and extends IBM Cognos product scalability by
reducing the size of the Content Store, while helping to adhere to strict regulatory
requirements. IBM Cognos Content Archival supports an IBM FileNet® Content
Manager with IBM FileNet® CMIS external repository.
For more information, see the IBM Cognos Business Intelligence Installation and
Configuration Guide.
Cognos TM1
For more information, see the IBM Cognos TM1 User Guide.
Cognos Query
You can use IBM Cognos Migration Assistant to identify IBM Cognos Query
objects in the IBM Cognos Series 7 migration source. You can then duplicate most
IBM Cognos Query functionality in IBM Cognos BI. Foundation queries are
available in IBM Cognos BI when you migrate an Architect model to Framework
Manager. You can also manually replicate saved queries using SQL components in
Report Studio.
Cognos Visualizer
You can duplicate some functionality by using the charting, layout, and formatting
options in Report Studio and Analysis Studio.
Cognos NoticeCast
You can duplicate alert and notification functionality by using Event Studio and
other IBM Cognos BI components.
You can duplicate most IBM Cognos Web Services functionality using the IBM
Cognos Software Development Kit.
CognosScript
You can duplicate automation functionality using the IBM Cognos Software
Development Kit.
You can duplicate most IBM Cognos Portal Services functionality using IBM
Cognos Connection.
68 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Chapter 7. Performance Planning
Performance is a measure of how effectively a system completes the tasks it was
designed to accomplish. It is a function of processing capacity and workload.
To ensure that IBM Cognos BI performs optimally, plan your IBM Cognos BI
implementation with performance in mind. Planning for performance is part
science, part art. It involves assessing the needs of different types of users, making
decisions based on available resources, and developing a solution that considers
security, application integration, and other factors.
This section does not provide absolute rules for planning IBM Cognos BI
performance. It describes variables that affect performance, and ways to consider
them when implementing IBM Cognos BI. The variables include the following:
v capacity
Decide how much hardware you need to run IBM Cognos BI, given your
expected processing workload.
v scalability
Decide how to install and configure IBM Cognos BI components to take
advantage of the ability of IBM Cognos BI to scale to meet increasing demand.
v availability
Decide how to implement IBM Cognos BI to take advantage of its ability to
provide failover support in the event of a hardware failure or another system
anomaly.
Capacity Planning
Planning for capacity means determining the hardware needed for your system to
perform well under its anticipated workload.
As a general rule, the ratio of named to active to concurrent users for business
intelligence applications is about 100:10:1. In other words, for every 1000 named
users there are 100 active users and 10 concurrent users.
The concurrency ratio can vary over time, and is affected by many factors. For
example, the number of concurrent users relative to active and named users tends
to be higher when the user population is small. However, the most important
determinant of the concurrency ratio is how processing demand is distributed over
time.
70 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
v requests made through automated or event-driven processes, including
scheduled and burst reports
By determining when users are most likely to be using IBM Cognos BI and
submitting processing requests, you can decide when to schedule automated
processes. This allows you to distribute the processing load evenly over time, so
that you make the best use of your system resources to maintain optimal
performance. The key to doing this is estimating the number of concurrent users
that will be applying load to your IBM Cognos BI system at any time.
Factors such as business hours, business practices, and the geographic distribution
of users can determine how the concurrency rate changes over time, and how you
choose to ensure adequate capacity.
On the other hand, if your user population is distributed across several time zones,
user load on the system tends to be spread out over more hours, and there are
fewer available non-peak hours for scheduled activities. In this situation, you may
choose to dedicate separate hardware resources for interactive and noninteractive
use.
For information about tuning report scheduling and bursting after IBM Cognos BI
is implemented, see “IBM Cognos BI Tuning” on page 88. For information about
how to schedule reports, see the IBM Cognos Administration and Security Guide.
By identifying reports run at peak times, and improving their efficiency while
meeting user requirements, you can improve performance during peak times.
Because reporting patterns change over time, assessing application complexity, and
improving reporting efficiency, should be ongoing activities. For more information,
see Chapter 8, “Performance Monitoring and Tuning,” on page 85.
Use true server computers, rather than fast workstations. True server computers
run business applications faster and provide systems that are less likely to fail.
Will Web and application servers be dedicated solely for use by IBM Cognos BI, or
shared by other software products? If other applications are sharing the resources,
these applications must be taken into account when determining capacity
requirements.
Install only gateway components on server computers that are dedicated to Web
server processing. Web servers are designed to handle many small requests.
Application servers often handle larger requests.
Use the gateway type most appropriate for your environment. For example, for
some environments, ISAPI or Apache may provide better performance than CGI.
The complexity of your security infrastructure can increase response time. As your
security infrastructure becomes more complex, a user request must be validated
more frequently. For example, if you implement multiple network firewalls, each
firewall must validate every request that passes through it. This can increase the
time taken to complete the request. In addition, if you use SSL, the overhead of
SSL encryption adds both processing overhead and size to the response.
Because notification service generates additional email traffic, ensure that your
mail server can scale to support the increased load.
72 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Sizing Your Content Store
The content store is used by Content Manager to store all IBM Cognos BI
information that is visible in, or managed through, IBM Cognos Connection or
your third-party portal. The content store is at the heart of IBM Cognos BI, and
must have sufficient resources to operate effectively. To maximize IBM Cognos BI
performance and scalability, ensure that your content store has the resources
required to ensure that it does not become a bottleneck.
The size of the IBM Cognos BI content store you need depends on the number and
size of the IBM Cognos BI items, such as reports, packages, and schedules, that
you will create and store. Over time, as users create more items, the amount of
space needed for the content store typically increases.
When determining the amount of space to allocate for your content store, consider
the following:
v number of users
The greater the number of users, the greater the number of reports typically run
and stored, and the larger the content store needed.
v number of saved reports
The greater the number of reports saved, the larger the content store needed.
Reports designed for use throughout an organization, and stored in public
folders, are often duplicated by users in private folders. This increases the
number of reports stored and the space required for them.
v number of saved views
The greater the number of report views saved, the greater the space required.
v number of folders
IBM Cognos BI typically uses public folders as well as one or more private
folders for each user. The number of characters in the name and description of
each folder can increase the folder size.
v number of schedules
Schedules can exist for daily, weekly, and monthly print runs. The greater the
number of schedules, the greater the content store space required.
v number of Framework Manager packages
The greater the number of packages, and the number of tables and query
subjects in those packages, the greater the space required.
v additional storage items
Additional storage items, such as transaction logs and temporary space
requirements, increase the size of the content store required.
The size of an empty content store hosted in a Microsoft SQL Server database is
approximately 2 to 3 Mb. Depending on your size allocation strategy, this may
vary for other supported databases.
The number of concurrent users affects the size of the content store because
temporary disk space is allocated to serve report run requests, even if the requests
are not saved.
The following table provides an example of how to estimate the size of the content
store you need.
*As a rule of thumb, the ratio of named to active to concurrent users is 100:10:1.
However, the ratio varies with the environment. For more information, see
“Estimating Concurrent Users” on page 70.
Table 3. Example of factors that affect the size of a content store
Estimate of content
store requirements
Factor Number (Kb)
Total -- 14,200,600
74 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
For more information about capacity planning, visit the IBM Cognos Customer
Center ( (http://www.ibm.com/software/data/support/cognos_crc.html).
Scalability Planning
Scalability is the ability of a system to adapt to increased processing demands in a
predictable way, without becoming too complex, expensive, or unmanageable. As
you deploy a system to larger numbers of users, often in different locations and
time zones and with different language requirements, scalability becomes
increasingly important.
IBM Cognos BI was designed for scalability. It scales vertically using more
powerful computers, and horizontally using a greater number of computers. How
you install and configure IBM Cognos BI components can enhance its scalability.
Load Balancing
Load balancing spreads tasks among all available processors. It is important in any
system, and is a key to processing capacity and scalability. In IBM Cognos BI, load
balancing means ensuring that processing requests are distributed appropriately
among all the available IBM Cognos BI servers. IBM Cognos BI does this
automatically, but you can configure load balancing as well.
While automatic load balancing may be appropriate when hardware resources are
identical throughout a server topology, it may not be ideal in environments
containing a mix of hardware resources with different capacity characteristics. In a
hardware environment that contains servers with varying degrees of processing
capacity, it is desirable to balance the processing load according the server's
capacity.
In IBM Cognos BI, you can set process capacity settings using server
administration options. For example, if you have two servers, one of which has
twice the capacity of the other, you might assign the more powerful server a
weight of two and the less powerful server a weight of one. IBM Cognos BI then
submits twice as many requests to the more powerful server.
For more information about IBM Cognos BI dispatcher settings, see the IBM Cognos
Business Intelligence Administration and Security Guide.
This extra step can be avoided by either implementing load balancing without an
external load balancing mechanism, or by using a router or other load balancing
mechanism.
Since gateway servers often have less load than IBM Cognos BI servers, you may
achieve better performance by configuring dispatchers together with the gateways,
as shown in the following diagram.
This ensures that the processing capacity of the IBM Cognos BI servers is directed
toward serving report requests rather than load balancing requests.
76 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
You can also achieve load balancing by having gateways direct all traffic to an IBM
Cognos BI server computer that is dedicated to dispatching, as shown in the
following diagram.
Figure 34. Load balancing by configuring gateways to direct traffic to a dedicated IBM
Cognos BI server used for dispatching
This configuration also removes dispatching load from the IBM Cognos BI servers.
However, it does require separate dispatching computers.
You can also use routers with multiple gateways, as shown in the following
diagram.
Figure 36. Using external load-balancing mechanisms to use routers with multiple gateways
Request Affinity
Affinity refers to whether a request is assigned to a specific server or whether a
load-balancing mechanism can assign it to another server. Affinity between request
and server ensures that requests are routed to an appropriate computer for
processing. IBM Cognos BI uses the following types of affinity: absolute, control,
high, low, session, and server. The cancel operation is handled with a dedicated
connection and does not have an affinity type.
78 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
To ensure that requests are managed efficiently and load is balanced, IBM Cognos
BI uses request affinity to route some requests. For example, requests are routed
back to the IBM Cognos BI server that handled earlier, related requests. IBM
Cognos BI does this automatically. The use of one or more load-balancing
mechanisms does not disrupt request affinity processing.
Absolute Affinity
Absolute affinity requests are always routed back to the server that processed the
original request. If the server is not available, the request fails. For example, when
a user cancels a running report, absolute affinity routes the cancel request back to
the executing process. Absolute affinity is used to create an association between the
client and the executing server to ensure that long-running requests do not time
out.
Control Affinity
Control affinity requests are routed in the same way as absolute affinity requests.
A control affinity request is reserved for system operations such as wait and
cancel.
High Affinity
For example, when a pageDown command is run while reading a report, the
command can be run most efficiently by using the process that served up the page
that is shown. If that process is not available because the administrator shut down
the computer or there was a network failure, the request is routed to another
available process. The next page can still be served up, although the process will
be slower.
IBM Cognos BI routes high affinity requests to a specific server regardless of the
load balancing used. A high affinity request is used with the following operations:
back, email, firstPage, forward, lastPage, nextPage, previousPage, print, render,
save, and saveAs.
Low Affinity
Low affinity requests will operate just as efficiently on any computer. For example,
a report request can run on any computer in the IBM Cognos BI system.
For more information about affinity in IBM Cognos BI, see “Setting Affinity
Connections” on page 90.
Session Affinity
Session affinity requests are routed according to the conversation context node ID.
If the node ID is present, they are routed in the same way as a high affinity
request. If the node ID is absent, they are routed in the same way as a low affinity
request. Session affinity is used with the query reuse feature: when query reuse is
turned on and you run a report for the first time, the query is stored in the cache
of your current session and reused the next time you run the report. For more
information, see the Framework Manager User Guide.
Server Affinity
Server affinity requests are routed in the same way as absolute affinity
requests.Server affinity is used for data source testing in administration: an
administrator can test the connection to a new data source. For more information,
see the topic about creating a data source in the IBM Cognos Business Intelligence
Administration and Security Guide.
Only one Content Manager is active at a time. The others are on standby. A
standby Content Manager becomes active only if the computer on which the active
Content Manager is installed fails.
To improve scalability, you can enable or disable Content Manager and the
dispatcher services on individual application servers to balance the load for a
given computer by request type. For example, if you have three application server
computers, you might dedicate one to running interactive report requests, another
to Content Manager, and the third to the other IBM Cognos services.
By targeting processing at specific computers in this way, you can control the load
on each computer. For example, putting Content Manager on its own computer
ensures that other requests do not downgrade its performance by competing for
resources. Because report runs tend to be resource intensive, isolate the report
services from other activities, especially in larger IBM Cognos BI deployments.
However, before making this type of tuning configuration, analyze your user
requirements carefully.
80 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Report and Batch Report Services
The report and batch report services are multi-instance components of IBM Cognos
BI. As a result, one or more instances can be configured to operate on each IBM
Cognos BI computer.
The same program is used for both the report service, which handles interactive
requests, and the batch report service, which handles scheduled tasks. For
information about configuring the number of instances of the report services and
the number of threads that each instance handles, see the IBM Cognos
Administration and Security Guide.
Content Manager
Content Manager, which can be installed in Tier 2 or 3 of IBM Cognos BI, stores
information in the content store. To allow fast retrieval, Content Manager builds an
in-memory cache to service many requests. This ensures optimal performance and
enhances scalability by limiting the number of database reads required to meet
user requests.
In the single Content Manager process, multiple threads can concurrently service
requests for content. Content Manager creates one or more threads for each user
request. Performance depends on the power of the central processor unit (CPU) of
the computer on which Content Manager is installed.
Indexed Searching
Having multiple instances of the index search service has little impact on the
scalability of the search function. However, this approach does add redundancy to
the environment.
The quality of the search results is dependent upon the quality of the index
content. Indexing updates should be run regularly to index new and updated
content. Unfortunately, indexing processes can take a significant amount of time to
run.
Because the indexing services and processes rely heavily on the report service, we
recommend that you schedule index updates for off-peak times. The initial
indexing process, as with any full-text indexing process, can take several hours
depending on the size of the IBM Cognos BI content store and related data.
However, there may only be a limited amount of time in which the index update
can occur due to other server processes. You may want to scale the index update
Other Services
The scalability of the presentation service, job and schedule monitor service, and
log service, is primarily dependant on the CPU size and the available memory.
These components can be scaled in two ways:
v vertically, by using a larger computer capable of managing more concurrent
request threads
v horizontally, by running the services on additional computers
Availability Planning
Availability is the ability of a system to withstand or recover from exceptional
situations, such as a computer failure. All IBM Cognos BI components have built-in
failover features to ensure that IBM Cognos BI handles exceptions well.
You can configure components in each of the IBM Cognos BI tiers to enhance
availability. As a general rule, make all IBM Cognos BI components available on at
least two computers. If the computer on which a IBM Cognos BI component is
running fails, another computer takes over.
If, for tuning reasons, you are not running all IBM Cognos BI components on every
IBM Cognos BI server, ensure that each component is running on at least two
servers. In the event of a computer failure, the remaining component processes
requests. Performance may degrade, but there will be service.
Use two or more Web servers with IBM Cognos BI. This ensures that the failure of
a single server does not result in the loss of IBM Cognos service. You can also use
an external load-balancing mechanism, such as a router, to distribute requests
across all available dispatchers.
In the unlikely event of a failure, the IBM Cognos BI gateway and IBM Cognos
Application Firewall are restarted automatically by the Web server.
The dispatcher manages the IBM Cognos BI presentation service, batch report and
report services, job and schedule monitor service, and log service. To ensure that
the failure of one computer or service does not cause IBM Cognos BI to become
82 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
unavailable, install two or more IBM Cognos BI servers. You can distribute services
across IBM Cognos BI servers, and you do not need to enable all services on all
IBM Cognos BI servers.
The Java technology of the IBM Cognos BI server provides Content Manager and
the dispatcher with built-in failover support. Both components are multithreaded,
and the threads are isolated from each other. If a failure occurs, it affects only a
single request thread. If that thread is lost, no other threads are affected, and the
failure does not affect the service as a whole.
If Content Manager or the dispatcher fails, the IBM Cognos BI server restarts it
automatically. If you use the IBM WebSphere Application Server Liberty Profile
provided with IBM Cognos BI, the IBM Cognos service monitors and restarts the
application server. If you use an application server other than WebSphere, the
administration services for that application server restart it.
Your installation may include more than one Content Manager, each on a different
computer. One Content Manager computer is active and one or more Content
Manager computers are on standby.
This failover mechanism works because dispatchers and the active Content
Manager routinely communicate with each other. If a dispatcher can no longer
reach Content Manager, the dispatcher signals a standby Content Manager, which
becomes the active Content Manager. The other installations of Content Manager
remain in standby mode for continuing failover support. The standby Content
Managers retrieve cryptographic settings, such as the common symmetric key
(used to encrypt and decrypt data), from the active Content Manager.
Monitoring performance means regularly checking the status of your IBM Cognos
BI installation and its resources. IBM Cognos BI provides metrics for checking the
performance of the system, servers, dispatchers, or services. You can set thresholds
for metrics to identify when the performance exceeds or falls short of expected
ranges. You can configure the system to notify anyone who should be made aware
of the problem when a performance issue occurs. You should conduct regular and
targeted monitoring of the IBM Cognos BI servers. This is important to assess the
occurrence and impact of paging, memory use, and other measures of an efficient
system.
Perform additional tuning as required. This can involve modifying PDF rendering
settings, changing low bandwidth connections, performing regular disk
maintenance, and other tasks.
Performance Metrics
You can monitor current system performance using metrics. You can assess the
status of the system as a whole, as well as the status of individual servers,
dispatchers, and enabled services.
The availability of a metric depends on the resource with which the metric is
associated. For example, some metrics are available for the system, servers,
dispatchers, and services. Other metrics may be available for only a subset of these
resources.
You define the threshold values that determine whether the status for a resource
indicates excellent performance (a green indicator), average performance (a yellow
indicator), or poor performance (a red indicator). There are no default threshold
values. If you define thresholds, the values are stored in the content store.
You can also create an agent that monitors the metrics and notifies you when
threshold values are exceeded. For example, you can create an agent that sends
you an email when a threshold value is exceeded.
For information about system metrics, including how to define threshold values
and notifications, see the IBM Cognos Business Intelligence Administration and
Security Guide.
Database Tuning
The data source used by IBM Cognos BI is usually a relational database
management system, such as IBM DB2, Microsoft SQL Server, or Oracle. To ensure
that IBM Cognos BI continues to perform well, it is important to maintain the
performance of your database.
86 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
This means optimizing it for querying, reporting, and analyzing. If IBM Cognos BI
and other applications demand more of a database than it can provide, or queries
are too large for a database to handle efficiently, you may experience increased
response times and degradation in IBM Cognos BI performance and scalability.
Regardless of the application server you use, to enhance and maintain IBM Cognos
BI performance, you should monitor memory settings and connection limits and
tune them based on IBM Cognos BI usage characteristics.
The memory allocation strategy for your application server depends on the
available capacity of your resources, and on the resource needs of other
applications running on the server. In general, configure your application server
with a minimum of 512 Megabytes of memory for multi-user applications. You
may be able to reduce application server memory to 256 Megabytes, but you
should only consider this for single users, or for proof of concept or demonstration
applications.
If the value of this application server setting is too low, users may encounter
difficulties when making IBM Cognos BI requests. It is a good practice to monitor
the application server process and its use of connections.
For information about Web server scalability in IBM Cognos BI, see “Web Server
and Gateway Scalability” on page 75. For information about tuning your Web
server, see its documentation.
To improve query performance, models can include reports that prompt a user for
a descriptive name, as well as perform filtering on a code or key value.
You can modify a model to ensure that queries sent to the data source are efficient,
well formed, and secure. To ensure optimal performance, the Framework Manager
modeler can
v specify the rules governing query generation
v restrict user access to specific rows or columns of data
v model data relationships to hide the complexity of data from report authors
For more information, see the IBM Cognos Framework Manager User Guide.
88 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
The database server does as much of the SQL processing and execution as
possible. However, some reports or report sections use local SQL processing.
v database only
The database server does all the SQL processing and execution. An error appears
if any reports or report sections require local SQL processing.
Although the database server can usually run the SQL and run reports much faster,
local processing is sometimes necessary. For example, choose limited local
processing if you want to create cross database joins or if you want report authors
to use unsupported SQL99 functions.
Some complex queries, such as a query that must generate an At clause to avoid
double-counting, require limited local processing. In this case, the query
automatically uses limited local processing even if the package was published with
database only processing.
For more information, see the IBM Cognos Framework Manager User Guide.
You can monitor IBM Cognos BI dispatchers using administration options. For
more information, see “ IBM Cognos Connection” on page 4.
In a distributed IBM Cognos BI environment, there are two or more servers, each
with a dispatcher to manage the IBM Cognos BI request flow. The dispatcher is
responsible for routing requests to the services configured on a particular IBM
Cognos BI server.
For more information, see the IBM Cognos Administration and Security Guide.
Depending on how your system is set up, you may want to control how reports
are distributed among servers. For example, you have different departments that
maintain their own servers, or you have specific servers set up for specific data
For more information, see the IBM Cognos Administration and Security Guide.
There are a number of processes associated with the report service and the batch
report service. For a complete list, see “IBM Cognos services” on page 11. When
these services receive requests from the dispatcher, they start processes to handle
the requests. You can specify the maximum number of processes that these services
can start at any one time.
For example, a server with four available CPUs should generally be configured to
use more batch report service processes than a server with only two available
CPUs. Similarly, given two servers with an equal number of CPUs, the server with
a significantly faster CPU clock rate should be configured to use more batch report
and report service processes.
For the report data service, you can specify the maximum report size that can be
sent.
For more information about server administration settings, see the IBM Cognos
Administration and Security Guide.
A high affinity connection is used to handle a high affinity request, and each
connection handles one request at a time. A high affinity request is a transaction
that can benefit from a previously processed request. It can be processed on any of
a number of servers, but resource consumption is minimized if the request is
routed back to the report service process that was used to execute the original
process.
Each report process has a configurable number of high affinity connections. The
number of high affinity connections to set should be based on the number of low
affinity connections set for each report process, as well as the capacity required for
other services on the same server.
90 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
The distribution decision between high and low affinity connections per batch
report process should be a function of the anticipated distribution of request types.
For example, an HTML reporting application may have a greater likelihood of high
affinity requests than a PDF reporting application. The page down request for an
HTML report uses a high affinity connection whenever possible.
In general, the number of batch report service and report service processes should
be the primary parameter to be optimized when deploying an IBM Cognos BI
application. After system resource use is configured to operate efficiently, the
number of affinity connections can be tuned for further optimization.
Note: If the number of affinity connections per process is set too high, the process
may be overburdened with managing connections. This will result in competition
for system resources, and requests will take longer to complete due to inefficient
use of server resources.
A low affinity connection is used to handle a low affinity request. Each connection
handles one request at a time. A low affinity request will operate just as efficiently
on any server.
Both the report service and batch report service are capable of handling low
affinity requests. Low affinity requests that have been initiated by scheduled
activity will make use of the low affinity connections configured for a batch report
service. Low affinity requests that have been initiated by user-driven activity will
make use of the low affinity connections configured for a report service.
Each report and batch report process has a configurable number of low affinity
connections. The number of low affinity connections per report service process
should be set in coordination with the settings specified for the batch report
service.
The distribution decision between high and low affinity connections per process
should be a function of the anticipated distribution of request types. For example,
an HTML reporting application may have a greater likelihood of high affinity
requests than a mainly PDF reporting application. The page down request for an
HTML report uses a high affinity connection whenever possible.
In general, the number of report service and batch report service processes should
be the primary parameter to be optimized when initially deploying an IBM Cognos
BI application. Once system resource use is configured to operate efficiently, the
number of affinity connections can be tuned for further optimization.
Note: If the number of affinity connections per process is set too high, the process
may be overburdened with managing connections. This will result in competition
for system resources and requests will take longer to complete due to inefficient
use of server resources.
For more information about affinity, see “Request Affinity” on page 78. For
information about setting affinity connections, see the IBM Cognos Administration
and Security Guide.
92 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Each activity or step within a job can run concurrently, or be given a sequence
ordering. The job service submits steps to the monitor service. The monitor service
queues the job steps, and manages how many reports are forwarded to the batch
report service depending on how it is configured.
All scheduled activity is managed by the monitor service. This service forwards
tasks to different target services for processing and monitors their execution. For
example, reports are forwarded to the batch report service.
The job service is responsible for retrieving job definitions from the Content Store,
inspecting those definitions, and forwarding step execution requests to the monitor
service
For information about these and other job and schedule service settings, see the
IBM Cognos Administration and Security Guide.
Report bursting offers scalability benefits and helps in the effective management of
resources. It also reduces network traffic, minimizes database queries, and enables
IBM Cognos BI to process multiple personalized reports in parallel.
For more information about bursting reports, see the IBM Cognos Report Studio User
Guide or the Software Development Kit Developer Guide.
For more information about PDF documents, see the documentation provided with
Adobe Acrobat.
You can also reduce default page sizes in Query Studio and Report Studio. In
heavy volume installations, the amount of HTML generated can be high. You can
improve performance by lowering the default page size to reduce the amount of
HTML initially passed back to the Web server and on to your users.
Disk Maintenance
Over time, data on a physical disk becomes fragmented, which can cause
performance degradation when writing to or accessing from the disk. Disk
defragmentation should be a regular system maintenance activity.
Each version of a report is sent only once. It is then stored in a cache on the mobile
device. A mobile user can then view the report any number of times on the device
without consuming any additional bandwidth.
94 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Other operations, such as browsing the content store and answering prompts, also
consume bandwidth. The bandwidth consumed is proportional to that used by a
desktop browser performing the same action, but smaller because extraneous
formatting information would not be exchanged.
IBM Cognos Mobile engages in intelligent polling to detect changes on the server.
In an idle state, each mobile device sends a small data message to the server every
24 hours. (Note that this value is configurable). If there is heavy usage, where a
mobile device user runs many reports throughout the day and schedules many
reports for delivery to the mobile device, the device automatically checks in with
the server more frequently.
(number of users) x (average size of a report) x (number of adhoc reports run each
day per user + number of scheduled reports sent to each user per day).
The resources needed by a desktop user to browse folders, run reports, answer
prompts and view the resulting report are approximately the same as the resources
needed by a mobile user to perform the same actions. As a result, to estimate the
number of servers needed for your mobile users you can use the same formula
that you use to estimate the number of servers needed for your desktop users.
Procedure
1. Remove all reports from the mobile device.
2. Run the report that you want to know the size of.
3. On your desktop browser, type the following request: http://servername/
alias/cgi-bin/cognos.cgi/mobileService?mob_op=about
4. If you have security enabled, log on.
Ensure that you log on as the same user that ran the report on the mobile
device.
A small XML document appears. Within the document there is a section that
looks like the following example showing the number 28. The actual number
you see depends on your report:
<s2><inbox>28</inbox></s2>
Tip: Because you have only one report, only one number should appear. If you
see multiple numbers separated by colons, this means that you did not delete
all reports. You must delete all reports and repeat steps 1 to 3.
5. Type the following request, replacing the number 28 with the number that you
obtained in step 4: http://servername/alias/cgi-bin/cognos.cgi/
mobileService?mob_op=downloadDB&mob_ir=28
The response to this request is the actual report contents.
Settings in the rsvpproperties.xml file are very sensitive to change. Changing these
properties may greatly impact the behavior of IBM Cognos BI. As a result, you
should use discretion when changing these values. For more information, contact
Cognos Software Services.
96 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Chapter 9. Globalization Considerations
Many businesses perform transactions in the global market. In this environment,
users speak different languages, work in different currencies, use different date and
time formats, and expect different sorting orders.
IBM Cognos BI supports both Unicode and non-Unicode data sources. A single
installation of IBM Cognos BI supports multiple languages, and reports can be
generated once for use in different languages.
If you will use IBM Cognos BI in a global environment, decide how to configure
IBM Cognos BI so that interface elements and report contents appear in the
languages that users need.
For information about installing and configuring IBM Cognos BI, see the IBM
Cognos Business Intelligence Installation and Configuration Guide.
Locales
IBM Cognos BI supports various types of locale. By default, IBM Cognos BI
ensures that all locales, which may come from different sources and in various
formats, use a consistent format. That means that all expanded locales conform to
a language and regional code setting.
A locale specifies linguistic information and cultural conventions for character type,
collation, format of date and time, currency unit, and messages. More than one
locale can be associated with a particular language, which allows for regional
differences.
Product Locale
The product locale controls the language of the user interface and all messages,
including error messages.
Content Locale
The content locale consists of the language and region combinations that are
supported for Content Manager objects, Framework Manager objects, Content
Manager data formatting, report data formatting, report text (titles), and database
data (if the database tool is configured to use locale).
Server Locale
The server locale ensures that all log messages are in one language. It is configured
during installation. In a distributed environment, each IBM Cognos BI server
obtains the server locale from Content Manager.
Do not change the server locale after specifying any IBM Cognos groups or roles
as part of security modeling within your environment. As well, if more than one
Content Manager exists in your IBM Cognos BI installation, ensure that the server
locale is set to the same value for all Content Managers.
Author Locale
The author locale is based on content locale and is the locale used when a report
or query specification is created. It determines model binding and literal data
formats. Author locales must be supported by the metadata model on which the
report is based.
User Locale
A user locale specifies the default settings that a user wants to use for formatting
dates, times, currency, and numbers. IBM Cognos BI uses this information to
present data to the user.
IBM Cognos BI obtains a value for user locale by checking these sources, in the
order listed:
1. authentication provider
98 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
If the authentication provider has locale settings that are configured, IBM
Cognos BI uses these values for the user product and content locale.
2. user preference settings
If the user sets the user preference settings in IBM Cognos Connection, IBM
Cognos BI uses these settings for the user product and content locale and for
default formatting options. The user preference settings override the values
obtained from the authentication provider.
3. browser cookie
Anonymous and guest users cannot set user preference settings. For these
users, IBM Cognos BI obtains a user locale from the browser cookie stored on
the computer.
Run Locale
Run locale refers to a user product and content locales for a specific IBM Cognos
BI session. IBM Cognos BI obtains a value for run locale by checking these sources,
in the order listed:
1. URL
2. user account object in the content store
3. account information from the authentication provider
Product locale is used, if specified. Otherwise, content locale is used.
4. language settings in the browser
Each entry in the locale list for the browser is checked against the product
mapping table, and then against the content locale mapping table. For more
information, see “Mapping Content Locale” on page 102.
5. server locale for the Content Manager computer
To show output correctly, fonts must be available where the report or chart is
rendered.
In the case of charts and PDF reports, the fonts must be installed on the IBM
Cognos BI server. For example, if an IBM Cognos Report Studio user selects the
Arial font for a report, Arial must be installed on the IBM Cognos BI server to
properly render charts and PDF files. If a requested font is not available, IBM
Cognos BI substitutes a different font.
Because HTML reports are rendered on a browser, the required fonts must be
installed on the personal computer of each IBM Cognos BI user who will read the
HTML report. If a requested font is not available, the browser substitutes a
different font.
When creating reports, you must select fonts that your IBM Cognos server or users
have installed. Microsoft delivers a broad selection of fonts with different language
packs, so this will likely not be an issue in Microsoft Windows operating systems.
However, UNIX operating system servers rarely have fonts installed. You should
be prepared to purchase and install the fonts you need on both the server and
browser clients.
If you plan to use different fonts, you must license and install those fonts on each
server computer in your authoring environment and production system. You must
also ensure that the fonts used in the authoring environment match the fonts used
on your Windows and UNIX server computers.
For information about configuring fonts and about mapping substitute fonts, see
the IBM Cognos Business Intelligence Installation and Configuration Guide.
Embedded Fonts
To ensure that PDF reports appear correctly in Adobe Reader, IBM Cognos BI
embeds required fonts in reports by default. To minimize the file size, IBM Cognos
BI embeds only the characters (also called glyphs) used in the report rather than all
characters in the font set. IBM Cognos BI embeds fonts only if they are licensed for
embedding. The license information is stored in the font itself and is read by IBM
Cognos BI.
If you are confident that the fonts used in reports are available on users'
computers, you can limit or eliminate embedded fonts to reduce the size of PDF
reports. When limiting fonts, you specify whether a font is always or never
embedded, using an embedded fonts list in IBM Cognos Configuration.
For more information about limiting embedded fonts, see the IBM Cognos Business
Intelligence Installation and Configuration Guide.
If a requested font is not found, the IBM Cognos server renders PDF files and
charts using a default font. The default font, Andale WT, is a sans serif font. While
it has most of the Unicode characters for many languages, it is not necessarily
complete for all languages and does not have the attractive appearance of most
purchased fonts. Also, this font has no Glyph Substitution (GSUB) and Ligature
support in most languages.
IBM Cognos Report Studio is an HTML and Java-based application that runs in a
browser. Because of the browser design, IBM Cognos Report Studio operates
within the browser security sandbox and has no access to the list of fonts installed
on the local computer. As a result, the list of fonts presented in IBM Cognos Report
Studio depends on the fonts installed in the c10_location\bin\fonts directory of the
IBM Cognos BI server. If the IBM Cognos BI server is installed on a Windows
computer, IBM Cognos Report Studio also uses the fonts installed in the Windows
font directory.
100 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
The product locale is different from the content locale. The language in the user
interface does not control the language or content of reports, or the object names,
descriptions, or tips in Content Manager.
You can ensure that all regions for a locale use the same language, or that a
specific, complete locale (language-region) uses a particular language.
Content locale consists of the language and region combinations that are supported
for the following:
v Content Manager objects
v Framework Manager objects
v Content Manager data formatting
v report data formatting
v report text (titles)
v database data, if the database tool is configured to use locale
Content locale does not apply to PowerCubes, whether they are created in IBM
Cognos BI Transformer or IBM Cognos Series 7 Transformer. Each PowerCube is
created with a single language encoding. For multiple languages, a separate
PowerCube is required for each language.
If you have a multilingual model, you can specify the content locale of query data.
User preferences allow the user to specify a locale or use the Web browser locale
for both the product and content locale.
When you map partial locales, IBM Cognos BI does the mapping after checking for
a user locale. If all users are using the same Web browser types, mappings behave
the same way for all users. However, if you have multiple browsers, results vary.
For example, on Internet Explorer, locale identifiers for many European regions do
not exist. In other words, the user locale of fr-fr (French, France) cannot be
selected. Only the fr (French language identifier) is available. To correct the
problem, fr can be mapped to fr-fr, so that the language-region value is returned.
Netscape provides region identifiers, so locale mapping is not required to return a
value of fr-fr. This distinction may produce inconsistent results for different
browser users. On Internet Explorer, where fr is mapped to fr-fr, users receive
content that is region specific (fr-fr). On Netscape, where fr does not return a value
of fr-fr, users receive content that is not region specific.
102 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
User Choices
In a Framework Manager model, users can specify the column titles and column
descriptions that they want to see in their own language. A report automatically
switches to the user preferred language. No action is required by the author.
For example, data in US currency can be shown with the US currency symbol ($)
and the format that is appropriate for the user locale. A French user may see 123,45
$, and a US user $123.45.
By default, IBM Cognos BI shows only a subset of supported currencies in the user
interface. You add or remove currencies in the Currency table on each Content
Manager computer.
When users are prompted for numerical data, IBM Cognos BI automatically
accepts the data in the user locale format.
Dates in an Imperial calendar are entered and shown using the year, which can be
specified as a year or a given emperor's reign.
Users have the option of using English year and month names for either the
Imperial or Gregorian calendar.
IBM Cognos BI supports Sankaku negative signs. In the following table, a triangle
is used in place of the western negative sign (-).
Table 4. Sankaku negative signs
0x81A2 U+25B3
0x81A3 U+25B2
0x81A4 U+25BD
0x81A5 U+25BC
You can combine data sources from multiple locales. If you use an IBM Cognos
Series 7 PowerCube as a data source, IBM Cognos BI converts the cube data from
the encoding that was used on the system where the PowerCube was created. For
a successful conversion, IBM Cognos Series 7 PowerCubes must be created with a
system locale set to match the data in the PowerCube. After conversion in IBM
Cognos BI, PowerCubes from multiple locales can be combined with no concern
about server locale.
The samples databases provided with IBM Cognos BI store a selection of text
fields, such as names and descriptions, in more than 25 languages to demonstrate a
multilingual reporting environment. For information about how data is stored in
the samples databases and how the samples databases are set up to use
multilingual data, see the IBM Cognos Administration and Security Guide.
104 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
– Define multilingual properties, such as a name, screen tip, and description,
for each entry in the portal.
– Specify the default language to be used when a report is run.
Tip: You can specify the default language on the run options page, in the
report properties, or in your preferences.
– Specify a language, other than the default, to be used when a report is run.
For more information, see the IBM Cognos Connection User Guide.
The data then appears in the language and with the regional settings specified in
v the user's Web browser options
v the run options
v the IBM Cognos Connection preferences
Any text that users or authors add appears in the language in which they typed it.
When querying databases with two or more data encodings, Report Studio
requests the data in Unicode. Some databases require specific configuration of the
client or server software to enable this capability. For more information, see the
database documentation.
The Round Trip Safety Configuration utility ensures the round trip safety of
Shift-JIS characters only when it is used to convert the characters both from
Shift-JIS to Unicode and from Unicode to Shift-JIS. If data is requested from a
database that has its own conversion mechanism to convert the Shift-JIS characters
to Unicode automatically, IBM Cognos BI does not call the Round Trip Safety
Configuration utility to convert the characters back to Shift-JIS. In this situation,
the round trip safety of characters in the data cannot be ensured.
Figure 37. A graphic showing the IBM Cognos architecture and highlighting the security components
For information about setting up security in IBM Cognos BI, see Chapter 11,
“Securing the Deployment,” on page 113.
For information about configuring IBM Cognos Application Firewall, see the IBM
Cognos Business Intelligence Installation and Configuration Guide.
To set up authentication for IBM Cognos BI, you must configure IBM Cognos BI
using one or more of these authentication providers:
v LDAP
v Microsoft Active Directory
v IBM Cognos 7 namespaces created using IBM Cognos 7 Access Manager and
available with other IBM Cognos products
v eTrust SiteMinder
v Custom Java provider
For information about anonymous access and authenticated access, see “Request
Flow Processing” on page 26.
Cognos Namespace
IBM Cognos BI has its own namespace that exists regardless of any additional
namespaces that are configured based on third-party authentication providers. The
Cognos namespace does not replicate the groups and roles defined in your
authentication provider. Instead, you may want to use the Cognos namespace to
define groups and roles that can span multiple third-party authentication
providers. This practice can add value to your existing groups and roles by
reorganizing them for IBM Cognos BI without changing them in your
authentication provider.
You can use the Cognos namespace to set up security that links easily with client
security systems. For an example, see “Using the Cognos Namespace to Restrict
Access” on page 123. For more information, see the Administration and Security
Guide.
108 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Single Signon
You can configure IBM Cognos BI for single signon. Users can then sign on once to
an environment that includes IBM Cognos BI and other programs, without having
to sign on each time they move between programs. Implementation of a single
signon solution depends on the environment and authentication provider
configuration.
For more information, see the IBM Cognos Business Intelligence Installation and
Configuration Guide.
Distributed Administration
The IBM Cognos BI security model supports the distribution of security
administration.
Because objects in Content Manager, such as folders and groups, can be secured
separately, security administration can be assigned to individuals in separate
functional areas of the organization. Security administration does not have to be
centralized with an Information Technology group or other overall administration
group.
Permissions
Permissions define access rights to objects, such as directories, folders, and other
content, for each user, group, or role. Permissions also define the activities that can
be performed with these objects.
Users
A user entry is created and maintained in a third-party authentication provider to
uniquely identify an account belonging to a person or a computer. You cannot
create user entries in IBM Cognos BI.
The user entry stored in the authentication provider may include information such
as first and last names, passwords, IDs, locales, and email addresses. However,
IBM Cognos BI may require additional information, such as the location of the
users' personal folders or their format preferences for viewing reports in the portal.
This additional information is stored in IBM Cognos BI.
For more information about users, see the IBM Cognos Administration and Security
Guide.
Both groups and roles are used to assign access permissions in IBM Cognos BI.
Users always log on with all the permissions associated with the groups and roles
to which they belong.
For more information about groups and roles, see the IBM Cognos Administration
and Security Guide.
Cryptographic Services
Cryptographic services ensure that IBM Cognos BI communications and sensitive
data are secure.
You can use the built-in IBM Cognos BI certificate authority (CA) or a supported
third-party CA, such as Entrust. To use a third-party CA, you must purchase and
install appropriate software before you configure the new cryptographic resource.
To use encryption with Entrust, you must purchase and install an Entrust Public
Key Infrastructure (PKI), which includes its own CA. The PKI must be available
before you configure the a new cryptographic resource for use with the Entrust
security infrastructure.
By default, IBM Cognos BI provides a simple built-in CA. You may choose to
disable it and use a third-party CA. You can use any third-party CA that generates
Base-64 encoded X.509 certificates. For more information, see the IBM Cognos
Business Intelligence Installation and Configuration Guide.
110 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
The SSL protocol is used to secure communication between IBM Cognos BI
components installed on the same computer or on different computers.
v trusted requests on BI bus messages
Signatures are used to digitally sign some messages to ensure that they come
from a recognized IBM Cognos service.
v encryption of the deployment process
Symmetric algorithms are used to encrypt and decrypt data in the export and
import processes.
v encryption of temporary files
Symmetric algorithms are used to encrypt and decrypt temporary files.
The IBM Cognos cryptographic provider can be used with the built-in certificate
authority (CA) or with a third-party CA.
You must ensure that users cannot, either through inadvertent or malicious actions,
view data that they are not authorized to view, bypass authentication and
authorization mechanisms, steal or violate session states to assume the identity of
another user, or escalate existing privileges. You must also prevent users from
causing disruptions in service for the application.
This information will help you configure an IBM Cognos BI installation for
maximum security. The issues discussed include the environment security, which
involves the operating system and network security, and the application security.
All of these areas were considered during the security audit that was conducted on
IBM Cognos BI as part of the developmental cycle.
The following IBM Cognos BI functional areas were developed with special
attention to security.
Web request and content validation checks the data before the data is processed.
Transport Security
Encryption
The effectiveness of the security strategy depends on how data is encrypted and
stored.
Application logs identify when errors occur or when sensitive transactions are
complete. In addition, application logs record error messages that provide system
information. Error messages should expose the minimum amount of information to
meet business requirements.
The effectiveness of the security strategy depends on where the log files are stored,
and whether auditing capabilities are built into the application.
Administration
Administrative access includes the right to add and remove users, provide group
and role-based access, and configure application components. Administrative
access should be restricted to appropriate individuals.
The physical security of the system is essential. Threats can come through the Web,
but they can also come from a physical terminal. Even if the Web access is very
secure, if an attacker obtains physical access to a server, breaking into a system is
much easier.
114 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Review security policies and recommendations for your operating system.
Consider implementing the following security best practices.
User Accounts
v Limit the number of user accounts on the server computers.
Unnecessary and legacy user accounts increase system complexity and may
present system vulnerabilities.
Fewer user accounts reduces the amount of time administrators spend on
account administration.
v Ensure that only a few trusted users have administrative access to the server
computers.
Fewer administrators make it easier to maintain accountability. The
administrators must be competent.
v Assign the minimum required access permissions for the account that runs the
application.
If attackers obtain access to the application, they have the permissions of the
user who runs the application.
Account Policies
v Develop and administer password policies that promote operating system
security.
Examples of such policies are the strong password rule and the password
change schedule.
v Test the strength of users' passwords by breaking the passwords.
The users who do not comply with the strong password rule receive a
notification to update their passwords according to the organization password
policy.
Software is available to help you with this task.
v On a UNIX operating system, activate the shadow password file.
On UNIX, passwords are stored in the /etc/passwd file. This file is open to
everyone, which presents a security risk. To enhance password security, activate
the shadow password file named /etc/shadow. If this file is available,
passwords are stored in it instead of the passwd file. Because permissions for
the /etc/shadow file are more restrictive, the security risk is lower.
File System
v Grant the users read-only permissions for required directories.
If attackers obtain access to an application, they have the user permissions.
v Deny access by default.
Access to resources is denied for everyone except for the users to whom access
is granted explicitly.
You can deny read and write permissions for all directory structures for all
users. Only users to whom these permissions are granted explicitly have access
to the directories and files. This policy also protects any resources that were
overlooked by an administrator.
Network Services
v Provide the minimum number of required services on the server computer.
Use only the services that you need to run the application. Each service is a
potential entry point for a malicious attack. Reducing the number of running
services also makes your system more manageable.
System Patches
v Run the latest, vendor-recommended patches for the operating system.
The patches may be core OS patches, or patches required by additional
applications.
v Schedule regular maintenance of security patches.
116 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
– set up multiple logging servers for redundancy
– use a remote server for logging
This protects the logs if the system is compromised and, for example, the
hard drive is destroyed.
Because an IPF server is accessed through the network, it can be located
anywhere in the world.
v Secure the logging configuration file.
The configuration file contains settings that, if changed, can compromise the
reliability of the log system. For example, setting the log level incorrectly may
cause some failures not to be logged.
v Enable logging of access requests on the Web server.
This can be useful in identifying malicious activity.
System Integrity
v Build production systems from a known and repeatable process to ensure the
system integrity.
v Check systems periodically against snapshots of the original system.
v Use available third-party auditing software to check the system integrity.
v Back up the system resources on a regular basis.
Web Servers
Consider implementing the following security best practices for all types of Web
servers:
v Remove any unused virtual directories.
v Remove or disable example default cgi-bin or ASP scripts provided with your
web server application. For example: Apache: cgi-bin/printenv.pl.
v Grant read, write, and execute permissions explicitly for each Web site and
virtual directory.
The best practices provided here are not a complete list of all configuration tasks
required to secure your application. However, they address the most critical issues
that include IBM Cognos Application Firewall, the cryptographic environment, the
SSL protocol, and the temporary files. They also address securing access to IBM
Cognos Connection, IBM Cognos PowerCubes, data source signons, and the
content store.
118 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
In a distributed environment, all CAF settings must be the same for all computers
where IBM Cognos BI Application Tier Components are installed. If CAF is
disabled on some computers and enabled on others, unexpected behavior and
product errors may result.
CAF protects the IBM Cognos BI components from processing malicious data. The
most common forms of malicious data are buffer overflows and cross-site scripting
attacks (XSS links), either through script injection in valid pages or redirection to
other Web sites.
Using IBM Cognos Configuration, you can change settings for third-party XSS tool
support, and add host and domain names to the IBM Cognos list of valid names.
You can also track firewall activity by checking the log file, which contains rejected
requests. By default, log messages are stored in the c10_location\logs\cogserver.log
file.
Typical factors that influence the decision how secure a system must be, include
v external exposure
Who are the users? Are there internal users as well as external or guest users?
v use of the public Internet
Is the system accessible by the Internet? Does a virtual private network (VPN)
exist?
v data sensitivity
Departments such as human resources, finance, and accounting likely want the
data protected the best way possible.
For more information about cryptography in IBM Cognos BI, see “Cryptographic
Services” on page 110. For more information about configuring the cryptographic
settings, see the IBM Cognos Business Intelligence Installation and Configuration Guide.
You can configure cryptographic providers for use with a supported certificate
authority, such as Entrust.
When choosing the cryptographic provider, cipher strength should not be the main
concern. The encryption provided by the IBM Cognos provider is secure enough
for most applications. A high-security setup relies not only on the cipher strength,
but on the security of the whole system, which includes physical access to
directories, password policies, and so on. If your environment is exposed to the
Internet and deals with highly sensitive data, you should consider using a
third-party certificate authority.
When you implement the IBM Cognos cryptographic provider, the IBM Cognos BI
certificate authority, AutoCA, is used by default. AutoCA signs the internal
certificates and provides all the functionality needed to establish the root of trust in
the IBM Cognos security infrastructure.
AutoCA is sufficient for simple setups and test environments, but has limitations
in development and production environments. For example, it cannot provide full
administration capabilities for issued and revoked certificates, issue certificates
based on purpose, such as mail, server, and private certificates, or sign the Web
server and client certificates.
If you intend to enable SSL for the Web server or application server, or use client
certificates, you need a third-party CA. This can likely be a CA that your
organization already implemented as part of its security infrastructure. When using
a third party CA, the necessary certificates must be generated and imported. For
more information, see the section about configuring IBM Cognos BI components to
use a third-party certificate authority in the IBM Cognos Business Intelligence
Installation and Configuration Guide.
For internal systems that are not exposed to the Internet, you can set up your own
CA using the open source software OpenSSL.
IBM Cognos BI does not support self-signed certificates because they do not
adhere to the public key infrastructure (PKI) principles.
In distributed installations, you must specify the same set of cipher suites for all
installation components. Mixing ciphers, especially high-numbered ciphers with
low-numbered ciphers, can cause problems. The sets must contain at least one
common suite. Otherwise, the SSL negotiation fails and the connection cannot be
established.
The cipher suites are also affected by the application server that is used to run IBM
Cognos BI. If WebSphere Application Server is used, the IBM Cognos code
generates the server certificates and switches WebSphere Application Server to SSL
listeners. The cipher suites configured in IBM Cognos BI are the only ciphers that
can be used. If an application server other than WebSphere Application Server is
used, SSL must be enabled on the application server before the cipher suites are
configured in IBM Cognos BI. Ensure that the set of cipher suites you specify in
IBM Cognos Configuration contains at least one of the cipher suites configured on
the application server. Otherwise, the SSL connection will not initialize.
Specify the list of cipher suites in priority sequence where the higher-numbered
ciphers appear first.
Enabling SSL
When you use secure sockets layer (SSL), you protect the data crossing between
the Web servers, application servers, and LDAP servers. Except for the Web
servers, the servers are internal and protected by a firewall. You can usually rely
on the network security for external network links. If this security is not enough,
SSL should be enabled for communications between IBM Cognos BI components
and other servers.
120 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Enabling SSL requires a certificate authority (CA), and an administrator with a
good knowledge of the public key infrastructure (PKI) technology and SSL.
You can configure IBM Cognos components to use the SSL protocol for:
v internal connections
If you configure SSL only for internal connections, IBM Cognos components on
the local computer communicate using this protocol. The dispatcher listens for
secure connections on a different port than for remote, HTTP requests. Therefore,
you must configure two dispatcher URIs.
If you use WebSphere Application Server to run IBM Cognos BI, you configure
the SSL protocol in IBM Cognos Configuration. If you use a different type of
application server, the SSL protocol must be configured on the application
server.
v external connections
If you configure SSL only for external connections, communications from remote
IBM Cognos components to the local computer use the SSL protocol. You must
configure the dispatcher to listen for secure remote requests on a different port
than local HTTP requests. You must also configure the Content Manager URIs
and the dispatcher URI for external applications to use the same protocol and
port as the external dispatcher.
For externally accessible Web servers, SSL should always be enabled. For more
information, see the IBM Cognos Business Intelligence Installation and Configuration
Guide
v internal and external connections
If you configure SSL for all connections, the dispatcher can use the same port for
internal and external connections. Similarly, if you do not use SSL for local or
remote communication, the dispatcher can use the same port for all
communications.
You must also update the Content Manager URIs, dispatcher URI for external
applications, and Gateway URI to use SSL, if required.
v LDAP connections
If you use an LDAP directory server, you can enable LDAPS, the secure LDAP
protocol, for communications between the Access Manager component of
Content Manager and the LDAP directory server. Unsecured LDAP traffic is
transmitted as clear text.
To enable LDAPS, you must install a server certificate that is signed by a
certificate authority (CA) in your directory server, create a certificate database to
contain the certificates, and configure the directory server and the IBM Cognos
BI LDAP namespace to use LDAPS.
For more information, see the sections about configuring LDAP authentication
providers in the IBM Cognos Business Intelligence Installation and Configuration
Guide.
For more information about configuring the SSL protocol, see the IBM Cognos
Business Intelligence Installation and Configuration Guide.
The common symmetric key (CSK) is used to encrypt and decrypt data between
components in your IBM Cognos BI installation. The CSK can be stored locally or
it can be requested each time a cryptographic operation is made. The default is to
store the key locally.
Requesting the CSK for each cryptographic operation is intended only for the
gateway computer in cases where you have installed the IBM Cognos BI gateway
separately from Content Manager or the Application Tier Components. Storing the
CSK locally on your Content Manager and Application Tier Component computers
is adequate as those components would be behind your firewall, while the
gateway may not be.
For more information, see the section about configuring temporary files properties
in the IBM Cognos Business Intelligence Installation and Configuration Guide.
Such scripts may be inserted into the browser using a Cross Site Scripting (XSS)
attack on the same server or web application that the user has authenticated to.
122 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Administrators who want to enable this feature should ensure that users have a
browser that supports the HTTPOnly attribute.
The methods and best practices discussed in this section apply mostly to the LDAP
authentication providers, Oracle directory server and Active Directory.
Tip: In IBM Cognos Configuration, set the value of the Restrict access to members
of the built-in namespace property to True.
For more information about managing groups and roles in IBM Cognos BI, see the
Administration and Security Guide. For more information about configuring IBM
Cognos BI to use an authentication provider, see the IBM Cognos Business
Intelligence Installation and Configuration Guide.
IBM Cognos BI provides built-in multitenancy capabilities. Before you can use IBM
Cognos multitenancy, you must configure an advanced property within Cognos
Configuration which maps the path within your authentication source that can be
used to identify the tenant ID for a user.
For more information about multitenancy, see the IBM Cognos Business Intelligence
Administration and Security Guide.
Using Roles
The roles for this technique are created using Oracle directory server. For more
information about creating this type of roles, see the Oracle directory server
documentation.
Ensure that the following parameters are properly defined in IBM Cognos
Configuration, in the Security, Authentication category.
v User lookup
Configure the user lookup string to contain the attribute that will be used to
authenticate against the ${userID} variable. This variable takes the user name
entered at logon and substitutes the variable with the value before passing the
search string to the directory server. The distinguished name (DN) of the role
must also be included in the string.
Here is an example of the lookup string:
(&(uid=${userID})(nsrole=cn=Cognos,ou=people,dc=cognos,dc=com))
In this example, all members of the IBM Cognos BI role located in the
organizational unit (ou) named people have access to IBM Cognos Connection.
v Use external identity?
Set the value to True if single signon is enabled.
v External identity mapping
124 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Specify this property if Use external identity? is set to True.
Construct a string to locate a user in the LDAP directory server. At logon time,
the environment variable ${environment("REMOTE_USER")} in this string is
replaced by the user name.
In the following example, the Web browser sets the environment variable
REMOTE_USER that matches the user's uid attribute:
(&(uid=${environment("REMOTE_USER")})(nsrole=cn=Cognos,ou=people,dc=cognos,dc=com))
In some cases, the REMOTE_USER variable, which is typically in the
DOMAIN\username format, may not match any of the user's uid attributes. To
solve this problem, include the replace function in the string, as in the following
example:
(&(uid=${replace(${environment("REMOTE_USER")},"ABC\\
","")})(nsrole=cn=Cognos,ou=people,dc=cognos,dc=com))
If the replace function is included, the domain name, ABC in this example, is
replaced with a blank string, and only the user name is passed to the directory
server.
The domain name is case sensitive in this context.
After the role is created, configure it for access to IBM Cognos Connection using
IBM Cognos Configuration. The role can also be added to the Cognos namespace.
Using Groups
The groups for this technique are created using Active Directory. This technique
involves modifications to the user lookup string. Because Active Directory does not
have this property, it cannot be used. Instead, the associated LDAP provider is
used.
Ensure that the following parameters are properly specified in IBM Cognos
Configuration, in the Security, Authentication category.
v User lookup
Configure the lookup string to contain the attribute that will be used to
authenticate against the ${userID} variable. This variable takes the user name
entered at logon and substitutes the variable with the value before passing the
search string to the directory server. The distinguished name (DN) of the group
must also be included in the string.
Here is an example of the lookup string:
(&(sAMAccountName=${userID})(memberOf=cn=ReportNet,ou=Groups,dc=cognos,dc=com))
v Use external identity?
Set the value to True if single signon is enabled.
v External identity mapping
Specify this property if Use external identity? is set to True.
Construct a string to locate a user in the LDAP directory server. At logon time,
the environment variable ${environment("REMOTE_USER")} in this string is
replaced by the user name and then the string is passed to the directory server.
In the following example, the Web browser sets the environment variable
REMOTE_USER that matches the user's uid attribute. Instead of substituting the
hard-coded sAMAccountName value with ${userID}, the environment variable is
read from the browser session.
(&(sAMAccountName=${environment("REMOTE_USER")})(memberOf=cn=Cognos,cn=Groups,dc=cognos,dc=com))
For this method to work, you must properly set up the Base Distinguished Name
and User lookup properties in IBM Cognos Configuration, under the Security,
Authentication category. By using different values for these properties, you can
grant access for different OUs in your LDAP directory structure.
Figure 38. Tree of organizational units of a fictitious company broken down by east and west
If users from only the East OU need access to IBM Cognos Connection, the values
can be specified as listed in the following table.
Table 5. The Base Distinguished Name and User Lookup values for the East Organisational
Unit
Property Value
Base Distinguished Name ou=East, ou=people, dc=abc, dc=com
User lookup uid=${userID}
If users from both East and West OUs require access, the values can be specified as
listed in the following table.
Table 6. The Base Distinguished Name and User Lookup values for the East and West
Organisational Units
Property Value
Base Distinguished Name ou=people, dc=abc, dc=com
User lookup (uid=${userID})
The parentheses () in the User lookup property are used as a filter that can search
all OUs located under the specified Base DN. In the first example, only the East
OU is searched for user accounts. In the second example, both the East and West
OUs are searched.
However, in both of the above examples, groups are excluded from access to IBM
Cognos Connection because they are located in a different branch of the directory
tree than users. To include both the groups and users, the Base DN must be the
root of the directory tree. The values would then be as listed in the following table.
126 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Table 7. The Base Distinguished Name and User Lookup values for groups and users
located at the root of the directory tree
Property Value
Base Distinguished Name dc=abc, dc=com
User lookup (uid=${userID})
As a result, all users in the directory have access to IBM Cognos Connection.
The last example shows that using OUs may not always be the most efficient way
of securing access to IBM Cognos Connection. You can use this method if you
want to grant access for all users in a particular OU. If you want to grant access
only for specific users, you may want to consider creating a designated IBM
Cognos BI group or role in your directory server, and granting this group or role
access to IBM Cognos Connection.
To use secured PowerCubes from IBM Cognos Series 7 in IBM Cognos BI, you
must have a Series 7 namespace configured as an available authentication
provider. PowerCubes that you create in IBM Cognos BI can be secured against
any available authentication provider.
For more information, see the IBM Cognos Transformer User Guide or the IBM
Cognos Administration and Security Guide.
For more information about data source signons, see the IBM Cognos Administration
and Security Guide.
Security Audit
A methodical security audit was conducted on IBM Cognos BI to check the
effectiveness of the implemented security strategy.
128 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Figure 39. A representation of the IBM Cognos installation that was used for audit testing
This material may be available from IBM in other languages. However, you may be
required to own a copy of the product or product version in that language in order
to access it.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service. This document may
describe products, services, or features that are not included in the Program or
license entitlement that you have purchased.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law: INTERNATIONAL
BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS"
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE. Some states do not allow disclaimer of express or implied warranties in
certain transactions, therefore, this statement may not apply to you.
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
If you are viewing this information softcopy, the photographs and color
illustrations may not appear.
132 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Depending upon the configurations deployed, this Software Offering may use
session and persistent cookies that collect each user's
v name
v user name
v password
for purposes of
v session management
v authentication
v enhanced user usability
v single sign-on configuration
v usage tracking or functional purposes other than session management,
authentication, enhanced user usability and single sign-on configuration
If the configurations deployed for this Software Offering provide you as customer
the ability to collect personally identifiable information from end users via cookies
and other technologies, you should seek your own legal advice about any laws
applicable to such data collection, including any requirements for notice and
consent.
For more information about the use of various technologies, including cookies, for
these purposes, see IBM's Privacy Policy at http://www.ibm.com/privacy and
IBM's Online Privacy Statement at http://www.ibm.com/privacy/details in the
section entitled "Cookies, Web Beacons and Other Technologies" and the "IBM
Software Products and Software-as-a-Service Privacy Statement" at
http://www.ibm.com/software/info/product-privacy.
Trademarks
IBM, the IBM logo and ibm.com are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the Web at “ Copyright and
trademark information ” at www.ibm.com/legal/copytrade.shtml.
Notices 133
134 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
Index
Special characters availability (continued)
content store 85
.xml configuration files 44 IBM Cognos BI gateway 82
IBM Cognos BI server 82
maximizing 82
A planning 82
absolute affinity 79
Access Manager 16
accessing IBM Cognos BI 26 B
anonymous access 27 balancing loads 20
authenticated access 28 bandwidth
Active Directory 123 estimating 94
ActiveX 4 batch report service 11
administration 45 batch report services
distributed 109 tuning 90
IBM Cognos Connection 45 best practices
affinity security 113
high 90 BI Bus API,
IBM Cognos BI activities 91 See IBM Cognos BI Bus API
low 91 browsers
request 79 configuring 45, 99
setting 90 fonts in HTML reports 99
agent service 11 builds
agents running in IBM Cognos Connection by using Data
running 34 Movement service 66
analysis bursting reports 93
Analysis Studio 6 Business Viewpoint Studio 67
running 30, 31
viewing 29
Analysis Studio 6
annotation service 11 C
Apache Web server 117 CAM password cookies, protecting 122
application servers capacity planning 69
SSL 120 infrastructure components 72
tuning 87 certificate authority 110, 120
Application Tier Components 10 CGI,
installing 57 See common gateway interface
log server 20 cipher strength 119
applications tier 10 cipher suites 120
Architect models coglocale.xml files 44
migration to IBM Cognos BI 64 Cognos namespace 44, 108
architecture securing IBM Cognos Connection 123
communications 19 cogstartup.xml files 44
scalability 75 common gateway interface 9
security 107 common symmetric key 83
workflow 41 in encryption 110
audience of document vii common symmetric key settings 121
audit logs communications 19
See also log messages components
See also troubleshooting IBM Cognos BI 53
log destinations 20 installing 53
authenticated access 28 startup configuration 43
authentication 108 Composite Information Server,
authentication providers See IBM Cognos Virtual View Manager
Active Directory 123 compressing PDF reports 16
Oracle directory server 123 configuration
Series 7 namespace 127 browsers 99
author locale 98 fonts 99
authorization services 109 multi-lingual reporting 45
availability 69 planning 51
Content Manager 83 security 44
136 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
H IBM Cognos services
scalability 81
high affinity 79 IBM Cognos Virtual View Manager 17
HTML reports IBM Cognos Visualizer
running 30 duplication of functionality in IBM Cognos BI 68
viewing 29 IBM Cognos Web Services
human task service 11 migration overview 68
IBM Cognos Workspace 7
IBM Cognos Workspace Advanced 7
I IBM CognosScript
IBM Cognos Administration 5 migration overview 68
IBM Cognos Application Firewall 10, 107, 119 IBM WebSphere Portal 4
IBM Cognos BI IIS Web server 117
accessing 26 implementation planning 42
communications 19 checklist 51
configuring 43 Impromptu catalogs and reports
dispatchers 13 migration to IBM Cognos BI 64
gateways 9 Impromptu Web Reports
installing 42 migration to IBM Cognos BI 64
performance tuning 85 index data service 12
scalability 75 index search service 12
security 107, 110 index update service 12
services 13 indexed search scalability 81
tuning 89 installation
user interfaces 3 Application Tier Components 57
workflow 41 components 42
IBM Cognos BI Bus API 19 Content Manager 57
IBM Cognos BI files fonts 45
securing 122 Framework Manager 59
IBM Cognos BI for Microsoft Office 8, 25, 49 gateways 55
IBM Cognos BI servers 10 Metric Designer 59
availability 82 options 53
IBM Cognos Configuration 43 planning 51
user interfaces 3 setting up security 110
IBM Cognos Connection 4 interfaces 3
opening a folder 33 Internet Server API 9
securing 123, 124, 126 ISAPI,
IBM Cognos Content Database 16, 17 See Internet Server API
IBM Cognos Controller
data access in IBM Cognos BI 65
IBM Cognos DecisionStream J
requirements to upgrade catalogs to IBM Cognos BI 63 job service 12
IBM Cognos Finance JobStreams
data access in IBM Cognos BI 65 running in IBM Cognos Connection by using Data
IBM Cognos Insight 8 Movement service 66
IBM Cognos Metrics Manager JVM metrics 86
requirements to upgrade to IBM Cognos BI 62
upgrading to IBM Cognos BI 62
IBM Cognos NoticeCast
duplication of functionality in IBM Cognos BI 68 L
IBM Cognos Planning - Analyst language
data access in IBM Cognos BI 64 restrictions for PowerCubes 101
IBM Cognos Planning - Contributor languages
data access in IBM Cognos BI 65 supported 101
migration to IBM Cognos BI 64 user interface 101
IBM Cognos Portal Services user preferences 101
migration overview 68 LDAP
IBM Cognos PowerPlay Web namespaces 123
requirements to upgrade reports to IBM Cognos BI 63 Lifecycle Manager 67
IBM Cognos Query load balancing 75
duplication of functionality in IBM Cognos BI 68 automatic in IBM Cognos BI 75
IBM Cognos Report Studio 47 configuring 75
IBM Cognos Series 7 settings 20
migration to IBM Cognos BI 63 with external mechanisms 77
IBM Cognos Series 7 PowerCubes without external mechanisms 76
requirements for successful language conversion 65 load distribution
application complexity 72
Index 137
load distribution (continued) monitor service 13
concurrent users 70 multilingual
estimating 71 Map Manager 104
local preferred dispatching 20 multilingual reporting
locales configuring 45
author 98 multitenancy 124
content 98, 101
content mapping 102
description 98
product 98, 101
N
namespaces
run 99
Active Directory 123
server 98
IBM Cognos 123
user 98, 99
LDAP 123
log destinations
multiple tenants 124
types of 20
Oracle directory server 123
log messages
Series 7 127
See also audit logs
network
See also troubleshooting
securing 117
log destinations 20
remote log server 20
logging
dispatcher 107 O
secure 107 OLAP 7
logging database operating system
adding metrics 86 securing 114
logs Oracle directory server 123
message processing 20 organizational units (OUs) 126
service 12
low affinity 79
P
packages
M creating 46
maintaining disks 94 Framework Manager 47
Map Manager 8, 104 parameter signing 107
maximizing availability 82 PDF
memory settings report compression 16
WebSphere Application Server Liberty Profile 87 running reports 30, 31
messaging 20 viewing reports 29
metadata modeling 47, 49 PDF rendering 94
Metadata service 12 performance
Metric Designer 8 application complexity 72
configuration requirements 59 dispatch times 20
installation options 59 estimating 94
metric store 16 estimating bandwidth 94
Metric Studio 6 estimating load distribution 71
Metrics Manager service 12 estimating servers 95
metrics, performance 86 planning 69
Microsoft .NET Framework 8, 25, 49 performance metrics 86
Microsoft Office performance tuning 85
IBM Cognos BI report data 8 permissions 109
IBM Cognos BI report data in workbooks and planning
presentations 49 availability 82
report data service 14 checklist 51
migration configuration 51
from other IBM Cognos products to IBM Cognos BI 63 implementation 42, 51
Migration service 12 installation 51
mobile service 13 performance 69
modeling 7, 8 planning data service 13
and IBM Cognos BI performance 88 planning job service 13
databases 47, 49 planning Web service 13
metadata 47, 49 plannning administration console service 13
packages 47 plug-ins 4
users 47, 49 port usage 25
models 47 portal pages 39
creating 46 portal services 4
Framework Manager 47, 49 portlets 39
publishing 47
138 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
PowerCubes requirements
access in IBM Cognos BI 65 modeling 47, 49
combining cubes from multiple locales 104 robustness,
conversion from IBM Cognos Series 7 104 See availability
language restrictions 101 roles 110
requirements for successful language conversion 65 securing IBM Cognos Connection 124
securing 127 routers
PowerPlay using 77
considerations for upgrading to IBM Cognos BI 62 rsvpproperties.xml files 96
migrating PowerPlay Web reports to IBM Cognos BI 64 run locale 99
PowerPlay Web running
requirements to upgrade reports to IBM Cognos BI 63 analysis 30
PowerPoint HTML reports 29, 30
See Microsoft Office 8 reports 30
presentation service 13
presentations
using IBM Cognos BI data in Microsoft Office
PowerPoint 8
S
scalability 69, 75
process capacity setting 89
Content Manager 81
processing log messages 20
IBM Cognos BI gateway 75
product locales 98, 101
IBM Cognos BI server 80
prompts 88
planning 75
Web server 75
search capability scalability 81
Q searching
query processing types 88 access control list 37
query service 14 request flow 36
Query Studio 6, 47 security check methods 36
queue metrics 86 secure logging 107
secure sockets layer 110
secure sockets layer,
R See SSL
SecureError 107
report bursting 93
securing
report data
content store 128
using in Microsoft Office 8, 49
data 122
report data service 14
data source signons 127
tuning 90
IBM Cognos Connection 123, 124, 126
report service metrics 86
network 117
report services 14
operating system 114
scalability 81
PowerCubes 127
tuning 90
temporary files 122
Report Studio 6
Web servers 117
report types
security
capacity planning 70
See also cryptographic keys
ReportNet
access control list 37
requirements to upgrade to IBM Cognos BI 62
audit 128
upgrading 62
authentication providers 108
reports
best practices 113
bursting 71, 93
configuration 44
creating 47
Content Manager 109
estimating sizes 95
IBM Cognos BI 107, 110
multilingual 104
keys, 110
running 30
security check
scheduling 32, 71, 92
Content Manager 36
viewing 29
internal 37
repository services 14
searching 36
request affinity 79
Series 7 namespace 127
request flow
Series 7 PowerCubes
creating the index 35
requirements for successful language conversion 65
searching 36
server
updating the index 35
locales 98
requests
server affinity 80
distributing 20
server metrics 86
flow processing 26
servers
managing 20
estimating numbers 95
Index 139
service Transformer (continued)
graphics 11 data access in IBM Cognos BI 65
human task 11 troubleshooting
index data 12 logging 20
index search 12 tuning
index update 12 application servers 87
service request metrics 86 databases 87
services dispatchers 89
agent 11 IBM Cognos BI 85
annotation 11 report services 90
authorization 109
batch report 11
Content Manager 11, 14
data integration 11
U
UNIX servers
delivery 11
fonts 99
event management 11
updating the index
IBM Cognos BI 13
request flow 35
IBM Cognos Content Database 16
Upfront
job 12
migrating content to IBM Cognos BI 64
load balancing 20
upgrading
log 12
from other IBM Cognos products to IBM Cognos BI 61
Metadata 12
tools that support upgrading from IBM Cognos
Metrics Manager 12
ReportNet 67
Migration 12
user community
mobile 13
size 70
monitor 13
user interfaces 3
planning data 13
user interfaces
presentation 13
windows-based 3
query 14
web-based 3
report 14
user load
report data 14
estimating 70
repository 14
user locale 98, 99
scalability 81
users 109
system 14
active 70
visualization gallery service 14
concurrent 70
services metrics 86
named 70
session affinity 80
session metrics 86
signing key pair 110
single signon 109 V
sizing the content store 73 viewing
SSL analysis 29
application servers 120 HTML reports 29
enabling 120 PDF reports 29
enabling on Web servers 117 Virtual View Manager 17
SSL, visualization gallery service 14
See secure sockets layer
standby
Content Manager 14
standby Content Manager 10, 81
W
Web browsers
startup configuration 43
configuring 45
files 44
Web portal 4
system metrics 86
Web server tier 9
system service 14
Web servers 59
Apache 117
enabling SSL 117
T IIS 117
temporary files scalability 75
securing 122 securing 117
thresholds, metrics 86 tuning 88
tiers Web-based user interfaces 4
applications 10 WebSphere Application Server Liberty Profile 82
data 16 memory settings 87
Web server 9 Windows-based user interfaces 7
TM1 workbooks
business planning 67 using IBM Cognos BI data in Microsoft Office Excel 8
Transformer 8 workflow 41
140 IBM Cognos Business Intelligence Version 10.2.2: Architecture and Deployment Guide
workspaces 8
Y
Year, in dates 103
X
XML configuration files 44
XML support 16
Index 141