Admin en
Admin en
Administrator Guide
© 2024 SAP SE or an SAP affiliate company. All rights reserved.
2 Architecture overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.1 Data Services and the SAP BI portfolio. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.2 Standard components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Designer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Job Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Access Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Management Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Adapter SDK. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.3 Management tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Manage license keys. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Repository Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Server Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
2.4 Operating systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.5 Distributed architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Host names and port numbers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.6 SAP applications integration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3 Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.1 Data protection and privacy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.2 Firewall for secure administrative functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.3 External DTD in XML documents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.4 Message client library. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.5 Temporary cache files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Encrypting temporary cache files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
3.6 SSL or TLS for Data Services components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Protected communication paths. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Default certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Copying certificates in a distributed environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Enable or disable SSL on select communication paths. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Using custom certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Generating keys and signing certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3.7 Configure SSL for the CMS connection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
3.8 SSL for Metadata Browsing and View Data Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Configuring SSL for Metadata Browsing and View Data Services. . . . . . . . . . . . . . . . . . . . . . . . 43
Administrator Guide
2 PUBLIC Content
Creating keystore file and certificates for default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.9 Password encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Encryption key storage locations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46
Encrypt passwords manually. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.10 Repository password required. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Accessing Data Services applications without repository credentials . . . . . . . . . . . . . . . . . . . . . 48
3.11 Blocking localhost IP addresses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.12 Block invalid domains and IP addresses to CMS server system from Data Services management
console web application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
5 Repository management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.1 Configuring a Data Services repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
5.2 Registering a repository in the CMC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
5.3 Accessing repository user security in the CMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Viewing rights for a user or group on a repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Assigning users and groups to an access control list for a repository. . . . . . . . . . . . . . . . . . . . . .66
Detailed repository rights. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
5.4 IBM DB2 SSL/TLS protocol for repositories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Configuring SSL/TLS for IBM DB2 repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Registering IBM DB2 repository with SSL/TLS in the CMC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
5.5 Microsoft SQL Server SSL/TLS protocol for repositories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Importing SSL certificate from Microsoft SQL Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
Configuring SSL/TLS for Microsoft SQL Server repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Registering Microsoft SQL Server repository with SSL/TLS in the CMC. . . . . . . . . . . . . . . . . . . .76
5.6 MySQL SSL/TLS protocol for repositories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79
Configuring SSL/TLS for MySQL repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Registering MySQL repository with SSL/TLS in the CMC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
5.7 Oracle TCPS protocol for repositories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Prerequisites for using TCPS for an Oracle repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Oracle TCPS configuration options with SSL/TLS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
Registering Oracle repository with TCPS in the CMC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
5.8 SAP HANA SSL/TLS protocol for repositories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Configuring SSL/TLS for SAP HANA repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Registering SSL/TLS in the CMC for SAP HANA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
5.9 Editing the java.security file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98
Administrator Guide
Content PUBLIC 3
6 Server Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
6.1 DSN-less and TNS-less connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
6.2 Setting UNIX environment variables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
6.3 Start services automatically for Windows and Unix. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
6.4 History retention and Job Server log retention. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
USPS-required log files and reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Setting the History Retention Period. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107
Job Server Log Retention. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Setting the Job Server Log Retention Period. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
6.5 Configure database connectivity for UNIX and Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Database connectivity for UNIX and Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Using the Connection Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Configure drivers with server name (DSN-less) connections. . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Configure drivers with data source name (DSN) connections. . . . . . . . . . . . . . . . . . . . . . . . . . 119
Configuring DataDirect ODBC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
6.6 Using the ODBC Drivers Selector for Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
6.7 Using the License Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
6.8 Use the Server Manager on Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Configuring Job Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Configuring runtime resources for Job Server operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Configuring Access Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .144
Configuring SSL paths. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Verifying that Job and Access servers are running. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
6.9 Using the Server Manager on UNIX systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Configuring Job Servers on UNIX. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Configuring runtime resources for UNIX server manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Configuring Access Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153
Configuring SSL paths. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Starting or stopping the service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Configure SMTP email. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
6.10 Configuring Metadata Browsing Service and View Data Service . . . . . . . . . . . . . . . . . . . . . . . . . . .156
Metadata Browsing Service configuration parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
View Data Services configuration parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
6.11 Data Services CMC application settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Administrator Guide
4 PUBLIC Content
7.5 Stopping a running job. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169
7.6 Deleting trace, monitor, and error logs for a batch job. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Administrator Guide
Content PUBLIC 5
11.2 Solution Manager Diagnostics (SMD) Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
11.3 SLD integration requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Administrator Guide
6 PUBLIC Content
1 Naming conventions and variables
This documentation uses specific terminology, location variables, and environment variables that describe
various features, processes, and locations in SAP Data Services.
Terminology
• The terms Data Services system and SAP Data Services mean the same thing.
• The term BI platform refers to SAP BusinessObjects Business Intelligence platform.
• The term IPS refers to SAP BusinessObjects Information platform services.
Note
Data Services requires BI platform components. However, when you don't use other SAP applications,
IPS, a scaled back version of BI, also provides these components for Data Services.
• CMC refers to the Central Management Console provided by the BI or IPS platform.
• CMS refers to the Central Management Server provided by the BI or IPS platform.
Variables
The following table describes the location variables and environment variables that are necessary when you
install and configure Data Services and required components.
Administrator Guide
Naming conventions and variables PUBLIC 7
Variables Description
Default location:
Note
INSTALL_DIR isn't an environment variable. The in-
stallation location of SAP software can be different than
what we list for INSTALL_DIR based on the location
that your administrator sets during installation.
Default location:
Example
C:\Program Files
(x86)\SAP BusinessObjects\SAP
BusinessObjects Enterprise XI 4.0
Note
These paths are the same for both BI and IPS.
Note
BIP_INSTALL_DIR isn't an environment variable.
The installation location of SAP software can be different
than what we list for BIP_INSTALL_DIR based on the
location that your administrator sets during installation.
Administrator Guide
8 PUBLIC Naming conventions and variables
Variables Description
Default location:
• All platforms
<INSTALL_DIR>\Data Services
Example
C:\Program Files (x86)\SAP
BusinessObjects\Data Services
Administrator Guide
Naming conventions and variables PUBLIC 9
Variables Description
Default location:
Note
The default value of <AllUsersProfile> environ-
ment variable for Windows Vista and newer is
C:\ProgramData.
Example
C:\ProgramData\SAP
BusinessObjects\Data Services
Note
The default value of <AllUsersProfile> en-
vironment variable for Windows older versions
is C:\Documents and Settings\All
Users.
Example
C:\Documents and Settings\All
Users\Application Data\SAP
BusinessObjects\Data Services
Note
Starting with Data Services 4.2 SP6, users
can designate a different default location for
Administrator Guide
10 PUBLIC Naming conventions and variables
Variables Description
Default location:
Note
The default value of <UserProfile> environment
variable for Windows Vista and newer versions is
C:\Users\{username}.
Note
The default value of <UserProfile> en-
vironment variable for Windows older ver-
sions is C:\Documents and Settings\
{username}.
Note
The system uses <DS_USER_DIR> only for Data
Services client applications on Windows. UNIX plat-
forms don't use <DS_USER_DIR>.
Administrator Guide
Naming conventions and variables PUBLIC 11
2 Architecture overview
Use information about SAP Data Services architecture, system components, and service components to
understand system essentials and to form a plan for system deployment, management, and maintenance.
Data Services and its architecture enables high performance across a broad spectrum of user and deployment
scenarios.
Example
Integrate Data Services into other technology systems in your organization by using the following tools:
• Web services
• Java
• .NET APIs
Use specialized tools and application to access, create, edit, and interact with Data Services projects and
reports. Use the following applications for data and system management tools:
To provide flexibility, reliability, and scalability, install Data Services components on one or across many
machines using vertical or horizontal scaling:
• Vertical scaling: One computer runs several, or all, server-side processes. Use vertical scaling to reduce
cost or to improve performance by distributing server processes between two or more networked
machines.
• Horizontal scaling: Run multiple, redundant versions of the same server process on more than one
machine, so that processing continues if the primary process encounters a problem.
Administrator Guide
12 PUBLIC Architecture overview
SAP Data Services integrates with SAP applications and infrastructures with specific tools, such as the
SAP System Landscape Directory (SLD) for lifecycle management of your SAP systems.
The SAP BusinessObjects Business Intelligence (BI) Suite delivers insight through specialized end-user tools
on a single, trusted, SAP BusinessObjects BI platform.
SAP Data Services supports the entire SAP BusinessObjects BI platform. On top of Data Services, the SAP
BusinessObjects BI Suite layers the most reliable, scalable, flexible, and manageable platform. The platform
supports integrated end-user interfaces for the following features:
• Reports
• Queries
• Analyses
• Performance management dashboards
• Performance management scorecards
• Performance management applications
SAP has created a data integration product that uses relational datastores and built-in intelligence for real time
and batch data access. Data is from ERP systems and other sources. With these capabilities, leverage your ERP
and enterprise application infrastructure for multiple uses.
With batch and real-time data integration, you can take advantage of analytic and supply-chain management
applications. With data integration solutions, you can maintain a real-time, on-line dialogue with customers,
suppliers, employees, and partners. Your company can provide customers, suppliers, employees, and partners
with information for transactions and business analysis.
Related Information
Administrator Guide
Architecture overview PUBLIC 13
2.2 Standard components
SAP Data Services works with standard components in the SAP BusinessObjects Business Intelligence (BI)
suite.
The following diagram shows how Data Services works with other user interfaces, platforms, repositories, and
components in the BI suite.
Note
The basic components required by Data Services are also provided by SAP Information platform services
as a scaled back version of the BI platform.
For a detailed list of supported environments and hardware requirements, see the Product Availability Matrix
(PAM) on the SAP Support Portal.
Administrator Guide
14 PUBLIC Architecture overview
The SAP Data Services Job Server starts the data movement engine that integrates data from multiple
heterogeneous sources.
Related Information
2.2.1 Designer
Designer is the graphical user interface for SAP Data Services that enables you to define data management
applications that consist of data mappings, transformations, and control logic.
To create jobs in designer, drag and drop objects into work flows and data flows. Configure the objects using
various icons in flow diagrams, table layouts, and nested workspace pages. The objects represent metadata,
which is stored in either a local or central repository.
Note
In our SAP Data Services documentation, when we refer to “Data Services” without specifically including
the word “Designer”, we're referring to SAP Data Services Designer unless otherwise stated.
Administrator Guide
Architecture overview PUBLIC 15
2.2.2 Repository
An SAP Data Services repository contains data, such as user-created and predefined system objects, source
and target metadata, and transformation rules.
Set up repositories on an open client—server platform to facilitate sharing data with other enterprise tools.
Create each repository on an approved RDBMS and register each repository in the Central Management
Console (CMC).
Associate your repository with one or more Job Servers, which run the jobs that you create. The following are
the repository types in Data Services:
• Local repository: Required. Used by an application designer to store definitions of objects, like projects,
jobs, work flows, and data flows. Also stores source and target metadata.
• Central repository: Optional. Used in a multiuser environment for version control. Stores a copy of all
objects in a project, and preserves all versions so reversion is possible.
Multiuser development includes other advanced features such as labeling and filtering to provide you with
more flexibility and control in managing application objects.
For more information about local and central repositories, see the Designer Guide.
• Profiler repository: Optional. Stores information generated by the Data Profiler, which helps you
determine the quality of your data.
The SAP Data Services Job Server starts the data movement engine that integrates data from multiple
heterogeneous sources.
The Job Server performs complex data transformations, and manages extractions and transactions from ERP
systems and other sources in batch and real-time modes. The Job Server delivers high data throughput and
scalability through the following techniques:
When you initiate a job in Designer, the Job Server runs the job as follows:
In your production environment, the Job Server runs jobs triggered by a scheduler or by a real-time service
managed by the Access Server.
In production environments, balance job loads by creating a Job Server group. Job Server groups consist of
multiple Job Servers that run jobs according to overall system load.
Administrator Guide
16 PUBLIC Architecture overview
Engine processes
When you run Data Services jobs, the Job Server starts engine processes to perform data extraction,
transformation, and movement. The engine uses parallel processing and in-memory data transformations to
deliver high data throughput and scalability.
Service
The Data Services service starts Job Servers and Access Servers when you restart your system. The installer
installs the service when it installs the Job and Access Servers. The service name on Windows is SAP Data
Services. The UNIX equivalent is a daemon named AL_JobService.
The Access Server collects message requests, routes them to a real-time service, and delivers message replies
within a user-specified time frame.
The Access Server queues messages and sends them to the next available real-time service across any number
of computing resources. This approach provides automatic scalability because the Access Server initiates
additional real-time services on additional computing resources when traffic for a given real-time service is
high. You can configure multiple Access Servers.
For more information about the Access Server, see the Post Installation section of the Installation Guide and
see the Administrator section of the Management Console Guide.
The Management Console contains a collection of Web-based applications for administering multiple SAP Data
Services features and objects.
Administrator Guide
Architecture overview PUBLIC 17
Application Description
Impact and Lineage Analysis Analyze the end-to-end impact and lineage for source and
target objects used within the Data Services local repository.
Operational Dashboard View dashboards that provide statistics for job execution, job
status, and job performance for one or more repositories
over a given time period.
Data Validation Dashboard Evaluate the reliability of your target data based on the vali-
dation rules that you created in your batch jobs. Quickly re-
view, assess, and identify potential inconsistencies or errors
in source data.
Auto Documentation View, analyze, and print graphical representations of all ob-
jects as depicted in the Designer including their relation-
ships, properties, and more.
Data Quality Reports View and export reports for batch and real-time jobs, such as
job summaries and data quality transform reports.
For details about the applications, and for more information about how to use the Management Console, see
the Management Console Guide.
The SAP Data Services Adapter SDK provides a Java platform for rapid development of adapters to other
applications and middleware products such as EAI (Enterprise Application Integration) systems.
Adapters use industry-standard XML and Java technology to ease the learning curve. Adapters provide all
necessary styles of interaction including the following:
• Reading, writing, and request-reply from SAP Data Services to other systems.
• Request-reply from other systems to SAP Data Services.
For detailed information about the Adapter SDK, see the Adapter SDK User Guide.
Administrator Guide
18 PUBLIC Architecture overview
2.3 Management tools
SAP Data Services provides utilities to help you manage your repositories and servers.
Related Information
Use the License Manager in command line mode to manage your product activation keycodes.
Activation keycodes are alphanumeric codes that the system refers to each time you run certain applications,
such as SAP Data Services Designer. You can't open or run Data Services without current license keys. For
more information about the License Manager, see Command line reference: License Manager [page 229]
Related Information
Administrator Guide
Architecture overview PUBLIC 19
2.3.2 Repository Manager
Use the Repository Manager to create repositories, upgrade repositories, and check the versions of
repositories.
The Repository Manager is a utility for creating and managing repositories. When you create a local repository
during installation, you don't have to use the Repository Manager. However, to create additional repositories,
edit existing repositories, or update existing repositories, you use the Repository Manager.
Related Information
Use the Server Manager to add, delete, and edit the properties of Job Servers and Access Servers and to define
links between Job Servers and repositories.
• Link multiple Job Servers on different machines to a single repository for load balancing.
• Link one Job Server to multiple repositories to support individual repositories, for example, to separate a
test repository from a production repository.
• Specify SMTP server settings for the smtp_to email function.
• Add or edit System Landscape Directory (SLD) registration information for Data Services.
Related Information
Administrator Guide
20 PUBLIC Architecture overview
2.4 Operating systems
SAP Data Services supports many types of operating systems and versions.
Ensure that the operating system on which you install SAP Data Services is tested and approved by SAP. For a
complete list of operating systems approved by SAP for SAP Data Services, see the Product Availability Matrix
(PAM) on the SAP Support Portal.
Related Information
SAP Data Services offers flexibility to design your system using a distributed architecture.
The architecture includes an Access Server, which can serve multiple Job Servers and repositories. The
multi-user licensed extension allows multiple Designers to work from a central repository.
Distribute components across a number of computers to best support the traffic and connectivity
requirements of your network. Design a system that is distributed minimally for developing and testing. Or,
design a system distributed so that it scales with the demands of a production environment.
Adhere to the following rules when you distribute software components across multiple computers:
• Engine processes must run on the same computer as the Job Server that spawns them.
• Adapters require a local Job Server.
The following diagram shows an example of Data Services Designer in a distributed architecture.
Administrator Guide
Architecture overview PUBLIC 21
Host names and port numbers [page 23]
Communication between your SAP Data Services systems occurs through TCP/IP connections that
you specify by IP addresses (host names) and port numbers.
Related Information
Administrator Guide
22 PUBLIC Architecture overview
2.5.1 Host names and port numbers
Communication between your SAP Data Services systems occurs through TCP/IP connections that you
specify by IP addresses (host names) and port numbers.
Communication in the Data Services system occurs between Web applications, the Access Server, the Job
Server, and real-time services. If your network doesn't use static IP addresses, use the name of the computer
as the host name. If your network uses static IP addresses, use the static IP number as the host name for
Access Server and Job Server configurations.
To create a system that is scalable, ensure that each component maintains its own list of connections. Define
the connections through the following components:
For a list of the default port numbers used by Data Services, see the Installation Guide.
SAP Data Services integrates with SAP applications and infrastructures with specific tools, such as the SAP
System Landscape Directory (SLD) for lifecycle management of your SAP systems.
The following table provides brief descriptions for each integration tool for your SAP environment.
SAP System Landscape Directory (SLD) Central source for system landscape information for lifecycle
management. Provides a directory with information about all
installable software available from SAP.
SAP Solution Manager Organizes SAP and non SAP solutions by implementing, sup-
porting, operating, and monitoring the following:
• Integrated content
• Tools
• Methodologies
Administrator Guide
Architecture overview PUBLIC 23
SAP tool Description
Change and Transport System (CTS+) Transports ABAP and non-ABAP objects, including Data
Services objects, from source systems to target systems for
lifecycle management.
Monitoring with CA Wily Introscope Web application management product that enables moni-
toring and diagnosing performance problems that occur in
Java-based SAP modules in production.
• Individual Servlets
• JSPs
• EJBs
• JCOs
• Classes
• Methods
Related Information
Administrator Guide
24 PUBLIC Architecture overview
3 Security
SAP Data Services addresses enterprise security concerns and provides administrators and system architects
with answers to security questions.
Data Services relies on the Central Management Server (CMS) for authentication and security features.
For complete information about the security features provided by the CMS, see the SAP BusinessObjects BI
Platform Administrator Guide or the SAP BusinessObjects Information Platform Services Administrator Guide.
SSL for Metadata Browsing and View Data Services [page 42]
Use Secure Sockets Layer (SSL) protocol for all network communications between SAP Data Services,
back-end engines, and EIM Adaptive Processing Server services.
Administrator Guide
Security PUBLIC 25
Block invalid domains and IP addresses to CMS server system from Data Services management console
web application [page 50]
To ensure a secure login and prevent server-side request forgery, you can provide a list of allowed CMS
names or IP addresses, along with the port numbers, by utilizing SAP BusinessObjects Enterprise's
(BOE) CMC global.properties file.
SAP provides specific features and functions to support compliance with relevant legal requirements, including
data protection and privacy.
Data protection is associated with numerous legal requirements and privacy concerns. In addition to
compliance with applicable data privacy regulations, SAP considers compliance with industry-specific
legislation in different countries. SAP doesn't give advice on whether the provided features and functions
are the best method to support company, industry, regional, or country-specific requirements. Also, SAP-
provided information doesn't give advice or make recommendations for additional features that are required in
particular IT environments. Make your protection and privacy decisions on a case-by-case basis. Consider your
system landscape and the legal requirements of your company, industry, region, or country.
Note
In the majority of cases, compliance with applicable data protection and privacy laws is not covered by an
SAP product feature. SAP software supports data protection compliance by providing security features and
specific data protection-relevant functions, such as simplified blocking and deletion of personal data. SAP
doesn't provide legal advice in any form. SAP uses definitions and other terms in this document that aren’t
from any given legal source.
SAP software places the data that you provide into trace logs, sample reports, repositories, and so on, as side-
effect data. In other words, your data finds its way into places other than output files. It's your responsibility to
delete this data.
In addition, Data Services doesn't run any virus scan applications on persisted data. To protect persisted data,
we strongly recommend running your own virus scan software on any system that runs Data Services.
The following list contains a few examples of where Data Services uses customer data:
• Log files: When you enable the Trace all option, Data Services prints data in some log files.
• Bulkload directory: If a job using bulk-load functionality fails, Data Services saves data files that contain
customer data in the bulkload directory so you can review and analyze the data. The default bulkload
directory location is %DS_COMMON_DIR%/log/BulkLoader.
• Data Services repository: The smtp_to and mailer functions use mail ID numbers as input parameters,
which Data Services saves in the repository.
• Data Services repository: Data Services places a sampling of customer data in the Data Services
repository when the “full” option is enabled during side-effect data generation for Global Address Cleanse
and Universal Data Cleanse.
• Sample Report: The Global Address Cleanse transform places a sample of user address data into the
sample report.
Administrator Guide
26 PUBLIC Security
Parent topic: Security [page 25]
Related Information
Use a firewall to prevent unintended remote access to SAP Data Services and administrative functions.
In a distributed installation, configure your firewall so that the Data Services components are able to
communicate with each other as needed.
For information about configuring ports on your firewall, see your operating system firewall documentation. For
information about port assignments, see the Installation Guide.
Related Information
Administrator Guide
Security PUBLIC 27
Blocking localhost IP addresses [page 50]
Block invalid domains and IP addresses to CMS server system from Data Services management console web
application [page 50]
Host names and port numbers [page 23]
An external DTD (Data Type Definition) in an XML document that you send to the SDK can increase security
vulnerabilities.
A DTD contains information that defines a document type, such as an XML document. When it's defined
separately (external) from an XML document, it can cause a security risk. Therefore, don't use external DTDs
(data type definitions) in XML documents that you send to the SDK.
Example
The following code example shows an XML document with a reference to an external DTD. The DTD file
note.dtd is defined in a file in the system that is external to the XML document.
Related Information
Administrator Guide
28 PUBLIC Security
3.4 Message client library
Some message client libraries with real-time services lack an authorization requirement.
The message client libraries, such as Java and C++ for real-time services don't require authorization to
connect. Keep this security risk in mind when you use these libraries.
For more information about using the Message Client library, see the SAP Data Services Integrator Guide.
Related Information
Temporary cache files are not encrypted and cause a security risk when they contain confidential or other
sensitive data.
SAP Data Services generates temporary cache files for functions and operations, such as profiling, joins, and
table comparisons. When you process confidential or other sensitive data, that data can end up in temporary
cache files. Both pageable and persistent caches create data files that aren't encrypted.
Secure your temporary files using the appropriate permissions at the operating system level.
Administrator Guide
Security PUBLIC 29
Pageable cache
The pageable cache option in a data flow enables the system to remove the files automatically after a data flow
finishes running.
Persistent cache
When you use metadata from a persistent cache type of datastore, the data isn't encrypted. It is your
responsibility to secure the data using operating system file and directory permissions.
long data
When you process long data types, such as BLOB or CLOB, in databases that are large, Data Services stores
the data in temporary cache files. When long data is cached, such as for a join, sort, or table comparison
process, Data Services deletes the cache when it finishes executing the job.
Data Services also deletes a long data cache file when the data is out of scope. For example, the data is out of
scope under the following circumstances:
Related Information
Administrator Guide
30 PUBLIC Security
3.5.1 Encrypting temporary cache files
Set SAP Data Services to encrypt specific temporary cache files to protect personal information.
Data Services deletes the files immediately after the data flow finishes executing.
Note
To encrypt the specific temporary cache files, perform the following steps:
pageable_cache_encrypt_data = yes
Secure Sockets Layer (SSL), and its newer version, Transport Layer Security (TLS), are cryptographic
protocols that provide security and data integrity for network communications.
Transport Layer Security (TLS) is the standard specification published by the IETF that is based on earlier SSL
specifications. Use TLS for Windows version 10 and higher.
Note
When you see the term “SSL” or “SSL/TLS” in this document, understand that you can use TLS when it is
supported by your database system, and when you use Widows 10 and higher versions.
The SSL/TLS protocol allows client/server applications to communicate across a network in a way designed
to prevent eavesdropping, tampering, and message forgery. SSL/TLS provides endpoint authentication and
communications confidentially over the network using cryptography.
Administrator Guide
Security PUBLIC 31
Protected communication paths [page 32]
Within the SAP Data Services platform, SSL/TLS is supported for all communication paths between
components that communicate over a network.
Related Information
Within the SAP Data Services platform, SSL/TLS is supported for all communication paths between
components that communicate over a network.
The following diagram illustrates the communication channels within the Data Services architecture that
support SSL/TLS.
Administrator Guide
32 PUBLIC Security
Note
Note
Depending on the communication for your web application server, you can switch your clients that use
HTTP to the HTTPS protocol.
For information about configuring HTTPS with Data Services Management Console, see SAP Note
1423991 .
When you use a server group with a distribution level of “Sub data flow”, SSL/TLS also protects the TCP/IP
communication path between sub data flows that are on different job servers within the server group. The
following diagram illustrates the communication path.
Administrator Guide
Security PUBLIC 33
Parent topic: SSL or TLS for Data Services components [page 31]
Related Information
By default, the SAP Data Services installer creates a set of SSL certificates for secure communication between
Data Services components.
The default certificates use 2048-bit RSA keys and are valid for 30 years.
To use your own custom certificates, configure the certificates after installation.
Parent topic: SSL or TLS for Data Services components [page 31]
Related Information
Administrator Guide
34 PUBLIC Security
Generating keys and signing certificates [page 40]
When you install SAP Data Services components on multiple machines, and each installation has its own root
and intermediate certificate authority (CA) configuration, you must manually copy the trusted certificate files
from one machine to all other machines.
Note
Trusted certificate files are root and intermediate CA certificate files. Trusted certificate files have a .crt
extension, and are located in the <LINK_DIR>\ssl\trusted_certs folder.
Remember
When you copy trusted certificates from one host machine to another, always copy the files to and from the
<LINK_DIR>\ssl\trusted_certs folder on each respective machine.
Each step represents a different scenario. Find the step that represents your situation and perform the
substeps.
1. If the Job Server and Access Server are installed on different machines, configure the hosts with the new
certificates by performing the following substeps.
a. Copy the trusted certificates from the Access Server to the Job Server host.
b. Run the following batch file on the Job Server host machine to refresh the
<LINK_DIR>\ssl\trusted_certs\jssecacerts keystore file:
• On Windows: <LINK_DIR>\bin\SetupJavaKeystore.bat
• On UNIX: $LINK_DIR/bin/SetupJavaKeystore.sh
After you run the batch files, adapters that communicate with the Access Server use the new
certificates.
c. Copy the trusted certificates from the Job Server to the Access Server host.
d. Restart the job service on both the Job Server and Access Server host machines.
2. If the Access Server and Management Console are installed on different machines, configure the
Management Console host with the new certificates by performing the following substeps:
a. Copy the trusted certificates from the Access Server to the Management Console host.
b. Run the following batch file on the Management Console host machine to refresh the
<LINK_DIR>\ssl\trusted_certs\jssecacerts keystore file:
• On Windows: <LINK_DIR>\bin\SetupJavaKeystore.bat
• On UNIX: $LINK_DIR/bin/SetupJavaKeystore.sh
c. Restart the web application server that hosts the Management Console.
3. If the Access Server and message client are installed on different machines, configure the message client
host with the new certificates by performing the following substeps:
a. Copy the trusted certificates from the Access Server to the message client host.
b. If the message client host uses Java, import the trusted certificates into the keystore used by the
message client application.
Administrator Guide
Security PUBLIC 35
For information about creating keystores, see the JDK help for the keytool command.
4. If the Job Server and job launcher or external scheduler are installed on different machines, copy the
trusted certificates from the Job Server to the job launcher or external scheduler host.
Note
If the scheduled job connects to multiple Job Servers through a server group, copy the trusted
certificates from all Job Servers within the group.
Task overview: SSL or TLS for Data Services components [page 31]
Related Information
SAP Data Services uses multiple communication paths, therefore, there are many methods to enable or disable
SSL for any given path.
Choose to enable or disable SSL on select communication paths based on your security and performance
requirements. The following table describes the types of communication paths.
Adapter management Enable SSL on your Job Servers to protect the communica-
tion path between your Job Servers and adapters and mes-
sage broker clients.
Administrator Guide
36 PUBLIC Security
Communication path Considerations
Real-time messaging Enable SSL on your Access Servers to protect the communi-
cation path between your Access Servers and their real-time
clients.
Note
By default, SSL is enabled for real-time messaging. If
you disable it on an Access Server, be sure to disable it
on any message clients or adapters that communicate
with that Access Server.
Note
You can enable or disable SSL on a per-server basis. You
don't have to configure SSL the same way for all Access
Servers.
Note
If you run multiple Job Servers within a server group,
configure SSL the same way on each Job Server.
Administrator Guide
Security PUBLIC 37
Communication path Considerations
Other communication paths SSL is required for other communication paths in the Data
Services architecture, and is already enabled.
Ensure that each client has the correct certificates for these
other communication paths. however, there are no addi-
tional configuration steps to perform.
Note
You must copy the certificates from the Job Server to
the Access Server, Management Console, and external
job launcher hosts. In all other cases, the certificates are
exchanged automatically.
Parent topic: SSL or TLS for Data Services components [page 31]
Related Information
Administrator Guide
38 PUBLIC Security
3.6.5 Using custom certificates
SAP Data Services includes a set of SSL certificates by default, however, you can use your own certificates.
Before you perform the following task, generate custom certificates and have them signed by a trusted
certificate authority (CA). For instructions, see Generating keys and signing certificates [page 40].
To use custom certificates instead of the certificates provided by Data Services, perform the following steps:
Note
The following steps are based on different Data Services deployments. Perform the steps that apply to your
specific deployment.
1. Copy all required custom certificates to the Data Services client machine or machines.
Note
When the system validates the certificates for the Data Services server, it requires that each Data
Services client has the certificates for all CAs in the certificate chain. The certificates within a
certificate chain are called “trusted certificates”. Trusted certificates must be present on the local
machine. In most cases, the certificate chain is the same for all clients, and therefore the same
certificates must be present on all client machines.
2. If you use Java-based clients, generate a keystore that contains the trusted certificates using the JDK
keytool utility.
3. Configure server certificate and keyfile paths with the SAP Data Services Server Manager.
4. Configure certificates for SAP Data Services Designer.
Task overview: SSL or TLS for Data Services components [page 31]
Related Information
Administrator Guide
Security PUBLIC 39
Configuring SSL paths [page 145]
To use custom certificates for SSL security in SAP Data Services, generate the certificates and have them
signed by a trusted certificate authority (CA), such as VeriSign.
To generate custom SSL certificates and have them signed, perform the following steps:
1. Open a command prompt and use the Open SSL toolkit with a command like the following:
Where:
• <mykey.pem> is the name of the key file to generate.
• <myreq.pem> is the name of the certificate file to generate.
Note
2. Send the RSA private key and certificate files to your external CA.
3. After you receive the signed certificate from your CA, use the SAP Data Services Server Manager to specify
the path to the new certificate and private key file.
Note
Task overview: SSL or TLS for Data Services components [page 31]
Related Information
Administrator Guide
40 PUBLIC Security
3.7 Configure SSL for the CMS connection
Use the Secure Sockets Layer (SSL) protocol for all network communications between SAP Data Services
clients and the SAP Central Management Server (CMS)
To set up SSL for all CMS communication, you need to perform the following tasks:
• Deploy the SAP BusinessObjects BI platform or Information Platform Services with SSL enabled.
• Create key and certificate files for each machine in your deployment.
• Configure the location of the key and certificate files in the Central Configuration Manager (CCM) and your
web application server.
For Data Services, use the sslconfig utility to configure all components that log into the CMS for SSL,
including the following components:
Note
For J2EE web application servers, configure SSL by modifying the startup script.
• For Windows:
<INSTALL_DIR>\SAP BusinessObjects Enterprise XI 4.0\win32_x86\sslconfig.exe
• For UNIX:
$INSTALL_DIR/sap_bobj/enterprise_xi40/<platform>/boe_sslconfig
Where <platform> matches your UNIX platform.
For more information about sslconfig.exe and configuring the SSL protocol for CMS and its clients, see
the SAP BusinessObjects BI Platform Administrator Guide or the SAP BusinessObjects Information Platform
Services Administrator Guide.
Related Information
Administrator Guide
Security PUBLIC 41
SSL for Metadata Browsing and View Data Services [page 42]
Password encryption [page 45]
Repository password required [page 47]
Blocking localhost IP addresses [page 50]
Block invalid domains and IP addresses to CMS server system from Data Services management console web
application [page 50]
Use Secure Sockets Layer (SSL) protocol for all network communications between SAP Data Services, back-
end engines, and EIM Adaptive Processing Server services.
Data Services provides the EIM Adaptive Processing Server services, but they're used by other SAP software
products, such as the Data Insight module of SAP Information Steward.
Data Services provides the keystore file and the trusted certificates file by default. The following table describes
each file.
File Description
Java Server keystore Contains a single key and all the certificates that are part of
the certificate chain involved in signing the key on the server
side. Password files for the Java Server keystore file and the
key are also required.
Trusted certificate Certificates in a certificate chain, used for signing the key
that is stored in the Java keystore on the server side. The
client side, the Data Services back-end engine, uses the
trusted certificates to communicate with the server.
Configuring SSL for Metadata Browsing and View Data Services [page 43]
The Metadata Browsing Service and View Data Service are EIM Adaptive Processing Server services
that use SSL.
Administrator Guide
42 PUBLIC Security
Parent topic: Security [page 25]
Related Information
The Metadata Browsing Service and View Data Service are EIM Adaptive Processing Server services that use
SSL.
To enable and configure SSL communications for Metadata Browsing and View Data Services, perform the
following steps:
1. Log into the Central Management Console (CMC) as a user with administrative rights to SAP Data
Services.
2. Open the Applications management page of the CMC.
3. Right-click Data Services Application and choose Settings.
4. Choose Yes from the Enable SSL communication for Metadata Browsing and View Data Services list.
5. To use the default keystore and certificates that Data Services provides, perform the following substeps:
a. Choose Yes from the Use Default SSL Settings list.
b. Select Save.
6. To use custom certificates, perform the following substeps:
Your keystore must be a Java keystore file that contains a single key with all the certificates that are part
of the certificate chain involved in signing the key. Provide a password for the key and a password for the
keystore file.
Your keystore file must be in the <LINK_DIR>\ssl\mds directory. The corresponding certificate files must
be in the <LINK_DIR>\ssl\mds\trusted_certs directory.
Administrator Guide
Security PUBLIC 43
a. For multiple instances of Metadata Browsing Service or View Data Service associated with the same
CMS server, copy the keystore and certificate files to all the machines where these instances are
installed.
b. Choose No from the Use Default SSL Settings list.
c. Enter the name of the KeyStore file in KeyStore File.
d. Enter the applicable password in KeyStore Password.
e. Enter the applicable password in Key Password.
f. Select Save.
7. Restart the EIM Adaptive Processing Server by performing the following substeps:
a. Open the Servers management area.
b. Expand the Service Categories node and select the Enterprise Information Management Services node.
c. Select the EIMAdaptiveProcessingServer from the Server Name column in the right pane.
d. Select Action Restart Server .
The State column lists “Stopping”, then “Starting”, and finally “Running”.
Selecting the Refresh icon helps to update the status in the State column.
Task overview: SSL for Metadata Browsing and View Data Services [page 42]
Related Information
Use custom keystore file and SSL certificate instead of using the default files provided for the Metadata
Browsing Service and View Data Service services.
Before performing the following steps, configure SSL for the Metadata Browsing Service and View Data Service
services following the instructions in Configuring SSL for Metadata Browsing and View Data Services [page
43]. Ensure that you select Yes for Use Default SSL Settings when you configure SSL for the services.
To create a keystore file and SSL certificates for the default SSL settings, perform the following steps:
Administrator Guide
44 PUBLIC Security
File name Location Description
Task overview: SSL for Metadata Browsing and View Data Services [page 42]
Related Information
Configuring SSL for Metadata Browsing and View Data Services [page 43]
In the SAP Data Services system, all passwords are encrypted using the AES algorithm with 128-bit keys.
Related Information
Administrator Guide
Security PUBLIC 45
Configure SSL for the CMS connection [page 41]
SSL for Metadata Browsing and View Data Services [page 42]
Repository password required [page 47]
Blocking localhost IP addresses [page 50]
Block invalid domains and IP addresses to CMS server system from Data Services management console web
application [page 50]
The SAP Data Services system stores passwords for files and applications, and it stores individual keys
associated with each password in specific locations.
The following table lists each file or application that has a password, and the associated password key location.
DSConfig.txt <DS_COMMON_DIR>/conf/DSConfig.key
Data Services-managed schedules If the schedule uses a password file, the password is stored
in the password file.
External scheduler command lines If the schedule uses a password file, the password is stored
in the password file.
Caution
For encryption keys that are stored in files, Data Services protects the security of the key file with strong
OS permissions. For example, the software sets owner-only read and write access to the file (chmod 600
on UNIX systems). You should also protect the key file by restricting user access to the server host machine
when possible.
Administrator Guide
46 PUBLIC Security
Related Information
Manually encrypt passwords when encryption isn't handled automatically by the SAP Data Services
applications and utilities.
When password encryption for some tasks isn't handled automatically by the Data Services application or
utility, manually encrypt the password.
Example
You quickly generate a data flow to use with the object creation XML toolkit. The data flow contains a
datastore that requires a password. Therefore, the password must be encrypted before you can import and
run the data flow successfully.
To manually encrypt a password, use the al_encrypt command-line utility installed with the software. For
more information about using al_encrypt for password encryption, see Command line: Password encryption
[page 253]
Related Information
By default, the SAP Data Services system requires that you enter the repository user name and password when
you log into applications that use the repository.
For example, your repository user name and password are required when you log into SAP Data Services
Designer or when you open a Data Quality report in SAP Data Services Management Console.
You, as an administrator, can disable the requirement of the repository user name and password through
permissions in the Central Management Console. After you disable the default behavior, the system sends the
repository credentials from the Central Management Server to the client, such as Data Services, without you
entering the repository user name and password.
Administrator Guide
Security PUBLIC 47
Caution
Although this password is encrypted, and you can secure the communication channel through SSL,
sending passwords can pose a risk, such as malicious users obtaining access to the password.
You can selectively grant the permissions for repositories. For example, you can grant the right for
development repositories but not for production repositories.
Related Information
Before peforming the following steps, understand the application rights by viewing the table in Detailed
application rights [page 55].
Caution
Although the repository password is encrypted, and you can secure the communication channel through
SSL, sending passwords can pose a risk, such as malicious users obtaining access to the password.
You can selectively grant the permissions for repositories. For example, you can grant the right for
development repositories but not for production repositories.
Administrator Guide
48 PUBLIC Security
To set repository permissions in the Central Management Console (CMC), perform the following steps:
To assign rights to a user group for all repositories, skip the next step where you select a specific
repository.
3. Select the applicable repository at right.
Select the repository to restrict access rights to a specific repository. For example, remove the requirement
for repository credentials for the test repository only. To assign rights to a user group for all repositories,
don't select a specific repository.
The User Security page opens. Check that you selected the correct repository by looking at the repository
name in the page banner.
5. Select the applicable user group under Name.
Before you select the user group, consider the application from which you want to remove the repository
credential requirement.
Example
• To remove the credential requirement from Data Services Designer, select Data Services Designer
Users.
• To remove the credential requirement from Data Quality reports in the Management Console,
select Data Services Monitor Users.
The Assign Security page opens. Check that you have the correct user group by looking at the Principal
value in the upper right corner of the page.
7. Open the Advanced tab.
8. Select Add/Remove Rights.
All users in the selected user group now have rights for accessing an application that uses the selected
repository without entering the repository credentials.
Administrator Guide
Security PUBLIC 49
3.11 Blocking localhost IP addresses
Blocking localhost IP addresses is not effective for limiting the use of localhost in a web application. This
prevention should be done at the firewall or system level by only allowing trusted IP addresses and DNS names.
Blocking a static list of IP addresses is not an effective way to limit the use of localhost. Because the host name
is used throughout the whole web application, blocking localhost related IP addresses cannot be accomplished
with a simple blocking option within the application.
This type of prevention needs to be at the firewall or system level. You need to only allow trusted IP addresses
and DNS names for your web application. It is your responsibility to prevent non-trusted localhost IP addresses
from being used in your network.
Related Information
To ensure a secure login and prevent server-side request forgery, you can provide a list of allowed CMS names
or IP addresses, along with the port numbers, by utilizing SAP BusinessObjects Enterprise's (BOE) CMC
global.properties file.
The global.properties file contains a property named allowed.cms where you include the
allowed CMS names or IP addresses, with port numbers. For more information, see SAP
BusinessObjects Business Intelligence Platform on SAP Help Portal at https://help.sap.com/docs/
Administrator Guide
50 PUBLIC Security
SAP_BUSINESSOBJECTS_BUSINESS_INTELLIGENCE_PLATFORM and search for CMC properties in the
Business Intelligence Administrator Guide.
In the SAP Data Services deployment, the global.properties and DSCmc.properties are located in the
following locations:
You need to add the CMS entry information into these files.
Example
The following is an example using Tomcat as the web application server, but other web application servers
require similar steps.
1. Go to <Tomcat folder>\tomcat\webapps\BOE\WEB-INF\config\custom
2. Edit the global.properties file in notepad.
If this file is not present, make a copy of global.properties
from <Tomcat folder>\tomcat\webapps\BOE\WEB-INF\config\default to <Tomcat
folder>\tomcat\webapps\BOE\WEB-INF\config\custom.
3. Configure the mandatory parameter allowed.cms=<server:port> for a single CMS environment.
Where there are multiple CMS, you can use a comma separated list in the parameter like
allowed.cms=<server1:port1,server2:port2,@clustername>.
Note that @clustername can also be configured in the allowed.cms parameter in addition to the server
and port but CMS host names and their ports are required for reliable operation.
Your addition to the global.properties file might look as follows:
allowed.cms=server1:6400,server2:6400,localhost:6400.
4. Edit the DSCmc.properties file in both locations with the following parameters:
• Set cms.default=<CMSHost:CMSPort>
• Set cms.visible=false
5. Save the file and restart Tomcat.
Related Information
Administrator Guide
Security PUBLIC 51
Password encryption [page 45]
Repository password required [page 47]
Blocking localhost IP addresses [page 50]
Administrator Guide
52 PUBLIC Security
4 User and rights management
SAP Data Services uses the Central Management Server (CMS) for user accounts and rights management.
To set user accounts and rights management for administrating procedures for applications other than
Data Services, see the SAP BusinessObjects BI Platform Administrator Guide or the SAP BusinessObjects
Information Platform Services Administrator Guide.
When you create users and groups in the Central Management Console (CMC), you also grant the user or
group access rights to the repository with which they work.
By default, the SAP Data Services installation program doesn't create any user accounts. Use the CMC to
create new user accounts, or assign existing user accounts to the default group accounts.
For information about creating user accounts for applications other than Data Services, see the SAP
BusinessObjects BI Platform Administrator Guide or the SAP BusinessObjects Information Platform Services
Administrator Guide.
Related Information
Administrator Guide
User and rights management PUBLIC 53
4.2 Group management
Groups are collections of users who share the same account privileges, such as users in the same department,
role, or location.
Manage groups in the Users and Groups area of the Central Management Console.
Groups enable administrators to change the rights and permissions for multiple users in one place instead of
modifying the rights and permissions for each user account individually. Also, administrators can assign object
rights to a group or groups.
In addition to the basic SAP BusinessObjects BI platform or Information Platform Services group accounts,
Data Services includes several default group accounts as described in the following table.
Data Services Administrator Members have access to all Data Services administrative
functionalities.
Note
Application rights and repository security rights are two
separate sets of rights. For more information about
repository rights, see Detailed repository rights [page
67].
Data Services Monitor Users Members have access limited to options available from the
Status tabs.
Example
• A Monitor User can cancel batch jobs but can't run
or schedule them.
• A Monitor User can restart, cancel, or shut down an
Access Server, service, adapter instance, or client
interface but can't add or remove them.
Data Services MU (Multi-user) Administrator Members are limited to managing secure central reposito-
ries. This role is a subset of the Data Services Administrator
role. Multi-user administrators have the rights to perform
the following tasks:
Data Services Operator Users Members have all Administrator privileges except they can't
modify repository, access, or CMS servers nor update data-
store settings.
Administrator Guide
54 PUBLIC User and rights management
Account name Description
Data Services Profiler Administrator Users Members are limited to managing profiler repositories. This
role is a subset of the Administrator role. Profiler administra-
tors can do the following:
Data Services Profiler Users Members of this group are limited to managing profiler tasks
in the profiler repository that is configured for the user.
Related Information
Each SAP Data Services user group has default rights to the application.
The following table lists all default application rights granted to each type of user group. In the Central
Management Console (CMC), each Data Services group name is prefaced with “Data Services”. For example,
Data Services Designer Users. However, because of limited space, we don't include “Data Services” in the table
for Data Services user groups.
Note
The Data Services Administrator group has access to all of the available Data Services application rights.
Therefore, the Administrator group isn't included in the table.
Administrator Guide
User and rights management PUBLIC 55
Data Services user groups
Administrator Guide
56 PUBLIC User and rights management
Data Services user groups
Note
Application rights and repository security rights have separate rights. When a repository is registered, the
owner is granted full access to the repository. By default, other Designer users have no access to the
repository.
Related Information
Administrator Guide
User and rights management PUBLIC 57
4.2.2 Viewing application rights assigned to a group
Administrators can view application rights assigned to each SAP Data Services group in the Central
Management Console (CMC).
To perform the following steps, you must have Administrator rights or be a member of the Data Services
Administrator Users group.
To view the assigned application rights for a group, perform the following steps in the CMC:
The Permissions Explorer opens and displays all of the current application rights that are assigned to your
selected user group.
Related Information
Administrators can manage application rights assigned to each SAP Data Services group in the Central
Management Console (CMC).
To perform the following steps, you must have Administrator rights or be a member of the Data Services
Administrator Users group.
For complete information about the windows and options mentioned in this topic, see the Business Intelligence
Platform Administrator Guide.
To manage the assigned application rights for a group, perform the following steps in the CMC:
Administrator Guide
58 PUBLIC User and rights management
5. Select the Advanced tab.
6. Select Add/Remove rights located below the tab labels.
The Add/Remove Rights window opens. Each right is in a row with options to grant or deny the right.
7. Find the row for the applicable right under Specific Rights for Data Services Application.
8. Select the applicable option:
• Select the radio dial under the Granted icon in the row for the applicable right to grant the right.
• Select the radio dial under the Deny icon in the row for the applicable right to deny access to the right.
9. Select Apply to save your changes and then select OK.
Related Information
Administrator Guide
User and rights management PUBLIC 59
5 Repository management
Before you can access an SAP Data Services repository in other components such as the Designer and Data
Services Management Console, configure the repository correctly.
Create and configure a repository by performing the tasks in the following workflow:
For descriptions of the repository types that you can create in Data Services, see Repository [page 16].
Administrator Guide
60 PUBLIC Repository management
5.1 Configuring a Data Services repository
To create a local, central, or profiler repository, enter the repository connection information in the Data
Services Repository Manager.
Before you configure a new repository, you must perform the following tasks:
• Create a database for the repository using an approved database management system.
For approved databases and versions for the Data Services repository, see the Product Availability Matrix.
• For server-based (DSN-less) connections, gather the following information: Server information, database
name, user name, and password.
• For data source name (DSN) connections, create the DSN following instructions in your database
documentation before you configure the repository. Then use one of the following utilities to connect
with the applicable driver and create the DSN:
• Windows: ODBC Data Source Administrator
• Linux and Unix: Data Services Connection Manager
Note
If you're creating additional repositories, don't use the tools in your DBMS to replicate the additional
repositories. Instead, use the Data Services Repository Manager to create and seed multiple repositories to
avoid potential issues related to the configuration of repository objects.
To create a repository in the Data Services Repository Manager, perform the following steps:
• Windows: Select the Start icon and then select SAP Data Services <version> Data Services
Repository Manager.
• Unix or Linux: Open a command prompt and open the Repository Manager in <$LINK_DIR>/bin/
repoman.sh.
2. Choose the repository type from the Repository Type list.
The remaining options appear based on the database type that you select.
4. Select Use data source name (DSN) or Use TNS name (Oracle).
Don't select this option if your connection is based on the server name.
Note
If your database doesn't support connecting with DSN or TNS, the option isn't available.
Options appear based on the type of database you selected and whether you selected to create a DSN
connection.
Administrator Guide
Repository management PUBLIC 61
Repository Manager Option Descriptions
Option Description
Data Source Name Specifies the DSN connection name that you created for
this repository. Not applicable for server-based (DSN-less)
connections
Database Name Enter the name of the database that you created for the
repository. Applicable for DSN-less connections.
Database Server Name Enter the server name for the repository database. Appli-
cable for DSN-less connections.
Database Version Select the version for the repository database manage-
ment system. Not applicable for all database types.
Encryption parameters Opens the Encryption parameters dialog box where you
set SSL/TLS options.
Note
Available when you select Use SSL encryption.
Password Enter the password associated with the stated user name.
Applicable for DSN-less connections.
Administrator Guide
62 PUBLIC Repository management
Option Description
Use SSL encryption Select to enable SSL/TLS encryption to secure your con-
nection.
Note
SSL/TLS is available only for certain database types.
User Name Enter the user name associated with the specified reposi-
tory database. Applicable for DSN-less connections.
Before you can use the new repository, perform the following tasks:
Related Information
Register a repository in the Data Services Central Management Console (CMC) by entering connection
information including server name, port number, and password.
Before you perform the following steps, make sure that you perform the following tasks:
• Create the repository in the Data Services Repository Manager: Configuring a Data Services repository
[page 61].
• Associate the repository to a Job Server: Associating a Job Server to a repository [page 141].
1. Log into the Central Management Console (CMC) as a user with administrative rights to the SAP Data
Services application.
2. Open the Data Services page.
Administrator Guide
Repository management PUBLIC 63
5. Select a type from the Database Type list.
6. Enter the connection information for the repository database. Options vary based on the database type
you select.
The following table contains descriptions for common connection options. For descriptions of options
specific to the database type, see that database type topic for registering a repository in the CMC.
Database Server Name The service or server name used to connect to the reposi-
tory.
Note
For Microsoft SQL Server or Sybase ASE, don't
use localhost for the server name. If you use
localhost, other machines are unable to connect
to the repository.
Database Name Enter the name of the database for the repository.
User Name Enter the user name for accessing the repository
Profiler Server Host Name Enter the host name of the web application server hosting
the profiler.
Profiler Server Port Enter the port number used by the web application server
hosting the profiler.
Administrator Guide
64 PUBLIC Repository management
Option Description
Data Source Name (DSN) Enter the data source name that you created for this repo-
sitory. Leave blank for a server-based (DSN-less) connec-
tion.
Note
DSN-less is the default connection type for DB2,
MySQL, or SAP HANA databases.
Note
If you use DSN connections in a distributed installa-
tion, configure the database connection to the reposi-
tory the same on each machine as in the CMC. For
example, if you configured a repository with the DSN
my_dsn in the CMC, you must also configure the
DSN of my_dsn for the Designer and Job Server ma-
chines.
The new repository appears in the list of registered repositories in the Data Services application page.
User security settings include granting access to the repository for users and groups, and other user and group
privileges to the repository.
Manage security settings for repositories that are registered in the Data Services Central Management Console
(CMC) using the security options in the Manage menu.
Note
To perform the following steps, you must have administrative rights to SAP Data Services.
To set user and group privileges to a repository, perform the following steps in the CMC:
Administrator Guide
Repository management PUBLIC 65
View user and group rights to a repository when you open the user security page in the Central
Management Console (CMC).
Assigning users and groups to an access control list for a repository [page 66]
Assign a user or group to an access control list, which specifies the users or groups that are granted or
denied rights to a repository.
View user and group rights to a repository when you open the user security page in the Central Management
Console (CMC).
To view user and group rights to a repository, perform the following steps:
1. Log into the CMC and open the Data Services page.
2. Select the Repositories node at left.
3. Select the repository for which you want to view security settings from the list at right.
Task overview: Accessing repository user security in the CMC [page 65]
Related Information
Assigning users and groups to an access control list for a repository [page 66]
Detailed repository rights [page 67]
Assign a user or group to an access control list, which specifies the users or groups that are granted or denied
rights to a repository.
To assign the same access right to select users and groups for a specific repository, perform the following
steps:
Administrator Guide
66 PUBLIC Repository management
1. Log into the CMC and open the Data Services page.
2. Select the Repositories node at left.
3. Select the applicable repository from the list at right.
Tip
To select both users and groups, first select the User List node, select the user or users, and select
the right-pointing arrow. Then select the Group List node, select the group or groups, and select the
right-pointing arrow.
The system adds the selected users or groups to the Selected Users or Groups list at right.
9. Select Add and Assign Security at the bottom of the page.
The Assign Security page closes and the User Security page reopens. Notice that the access type in the
Access list changes to the new access level for the applicable user or group.
Task overview: Accessing repository user security in the CMC [page 65]
Related Information
Each access right comes with specific repository rights for the user or group.
The following table lists some of the common repository rights that are available to the Full Control and the
View access rights.
Administrator Guide
Repository management PUBLIC 67
Repository right Full control View
Delete objects X
Edit objects X
Replicate content X
Translate objects X
View objects X X
To view all repository rights related to Full Control and View access rights, select the user or group that has
Full Control in the User Security page and select View Security. The rights are listed in the Permissions Explorer
page.
Note
Application rights and repository security rights are two separate sets of rights. When a repository is
registered, the owner is granted full access to the repository. By default, other Designer users have no
access to the repository.
Parent topic: Accessing repository user security in the CMC [page 65]
Related Information
Protect your IBM DB2 repository with the SSL/TLS secure authentication and data encryption for server-based
(DSN-less) connections.
Apply the SSL/TLS protocol for your local, profiler, and central repositories on both Windows and Linux.
Administrator Guide
68 PUBLIC Repository management
Note
SSL/TLS protocol support for your DB2 repository is applicable only for DB2 UDB server version 11.1 and
above.
Prerequisites
Before you configure your IBM DB2 repository with SSL/TLS protocol, ensure that you configure the applicable
ODBC driver. Also ensure that you have the keystore and key stash files in the applicable local locations. For
information about the key stash file, see your IBM DB2 documentation.
Registering IBM DB2 repository with SSL/TLS in the CMC [page 71]
Complete your IBM DB2 repository configuration with SSL/TLS by registering the repository in the
Central Management Console (CMC).
During repository configuration in the SAP Data Services Repository Manager, complete SSL/TLS settings to
secure the repository connection to your DB2 database.
Before you configure SSL/TLS for your DB2 repository, obtain the following information:
• The location and file name of your key store database (.kdb).
• The location and file name of your key stash file (.sth).
Perform the following steps twice; once for when you configure the repository in the Repository Manager, and
again when you associate a Job Server to your IBM repository using the Server Manager.
Perform the basic steps in the Repository Manager and the Server Manager using the instructions in the
following topics:
As you perform the basic steps in the Repository Manager and the Server Manager, perform the following
additional steps:
Administrator Guide
Repository management PUBLIC 69
Option Description
Key Store Database Specify the name of the key store database using either
a relative or an absolute path. The key store database
contains the SSL/TLS server certificate.
The key store database has the file extension KDB, for
example, mydbclient.kdb.
Key Stash Specify the name of the key stash file using either a rela-
tive or an absolute path. The key stash file contains an
encrypted password to the key store database.
The IBM Global Security Kit (GSKit) uses the key stash
file to obtain the password to the key store database.
The key stash file has the extension STH, for example,
mydbclient.sth.
Key Stash is applicable when you select Yes for Use SSL
Encryption.
Note
For the Key Store Database and Key Stash settings, the Repository Manager searches for the file in the
file location keyword “DB2_KeyStore”, which is specified in %DS_COMMON_DIR%/conf/DSConfig.txt
file. If you leave the options blank, or the keyword “DB2_KeyStore” isn't specified in the configuration
file, the Repository Manager defaults the setting to %LINK_DIR%/ssl/DB2_KeyStore.
4. Select OK.
Continue completing the general steps in the Repository Manager or the Server Manager.
After you've successfully configure the repository, SAP Data Services updates the DSConfig.txt file with the
SSL/TLS options for the specific Job Server section.
Example
[JobServer1]
...
UseSSLEncryption=yes
EncryptionParameters=" KeyStash=<relative or absolute path to .sth>;<relative
or absolute path to .kdb>"
Note
For command line information in the Repository Manager, see Command line: Repository Manager
(Windows) [page 232] or Command line: Repository Manager (Unix) [page 236]
For command line information in the Server Manager, see Command line: Adding a Job Server (Windows)
[page 248] or Command line: Adding a Job Server (Unix or Linux) [page 242].
Administrator Guide
70 PUBLIC Repository management
Task overview: IBM DB2 SSL/TLS protocol for repositories [page 68]
Related Information
Registering IBM DB2 repository with SSL/TLS in the CMC [page 71]
Complete your IBM DB2 repository configuration with SSL/TLS by registering the repository in the Central
Management Console (CMC).
Before you register the repository in the CMC, you must first configure SSL/TLS settings in both the
Repository Manager and the Server Manager. For instructions, see Configuring SSL/TLS for IBM DB2
repository [page 69].
There's a conflict between the required version for TLS for Java and IBM DB2. Java requires a TLS version of
1.2, and DB2 requires a version of 1.1. To ensure that there isn't a mismatch between the server and client TLS
versions, perform the following steps:
Perform the general steps in Registering a repository in the CMC [page 63]. As you perform the general steps,
complete the following additional steps to enable SSL/TLS for your IBM DB2 repository. Perform the following
steps in the Add Data Services Repository dialog box:
Option Description
SSL TrustStore Enter the path and file name for your SSL/TLS TrustStore.
Administrator Guide
Repository management PUBLIC 71
Option Description
SSL TrustStore Type Choose the file format type for your SSL/TLS TrustStore
from the list:
• JKS: Java KeyStore, which is format-specific for Java
only.
• PCKS12: Public-Key Cryptography Standards for Java
and other languages. Standardized and language-
neutral.
SSL TrustStore Password Enter the password for your SSL/TLS TrustStore.
Key Store Database Specify the name of the key store database using either
a relative or an absolute path. The key store database
contains the SSL/TLS server certificate.
Note
For the Key Store Database, the Repository Man-
ager searches for the file in the file location
keyword “DB2_KeyStore”, which is specified in
%DS_COMMON_DIR%/conf/DSConfig.txt file.
If you leave the option blank, or the keyword
“DB2_KeyStore” isn't specified in the configuration
file, the Repository Manager defaults the setting to
%LINK_DIR%/ssl/DB2_KeyStore.
Administrator Guide
72 PUBLIC Repository management
Option Description
Key Stash Specify the name of the key stash file using either a rela-
tive or an absolute path. The key stash file contains an
encrypted password to the key store database.
The IBM Global Security Kit (GSKit) uses the key stash
file to obtain the password to the key store database.
The key stash file has the extension STH, for example,
mydbclient.sth.
Note
For the Key Stash option, the Repository Man-
ager searches for the file in the file location
keyword “DB2_KeyStore”, which is specified in
%DS_COMMON_DIR%/conf/DSConfig.txt file.
If you leave the option blank, or the keyword
“DB2_KeyStore” isn't specified in the configuration
file, the Repository Manager defaults the setting to
%LINK_DIR%/ssl/DB2_KeyStore.
Note
Required by the ODBC driver.
The CMC adds the new repository to the repository node in the Data Services page.
Task overview: IBM DB2 SSL/TLS protocol for repositories [page 68]
Related Information
Choose the SSL/TLS protocol when you configure your Microsoft SQL Server repository for server-based
(DSN-less) connections.
Administrator Guide
Repository management PUBLIC 73
Drivers
Before you configure SSL/TLS for your SQL Server repository, ensure that you have the applicable ODBC and
JDBC drivers installed.
• ODBC driver: Download and install the ODBC driver for Windows. Check the Product Availability Matrix
(PAM) on the SAP Support Portal to determine the correct version for SQL Server.
• JDBC driver: Data Services bundles the JDBC driver with your installation. Check the PAM for the correct
version for SQL Server.
Certificates
If you configure SSL/TLS to validate the server certificate, import the trusted certificate files to your certificate
store using the Microsoft Management Console. Importing certificate files is not applicable when you choose to
not validate the server certificate.
Configure repository
Configure your Microsoft SQL Server repository, and set SSL/TLS options, in each of the following
applications:
Registering Microsoft SQL Server repository with SSL/TLS in the CMC [page 76]
Register your Microsoft SQL Server repository and include SSL/TLS settings in the Central
Management Console (CMC).
If you configure SQL Server in SAP Data Services to validate the SSL/TLS certificate, you must import the
certificate files to your certificate store using the Microsoft Management Console.
Before you perform the following steps, consult the following documentation for more information:
• For information about SSL/TLS in Data Services and generating keys, see SSL or TLS for Data Services
components and subtopics in the Administrator Guide.
Administrator Guide
74 PUBLIC Repository management
• For more information about SSL/TLS in SQL Server, see Enable encrypted connections to the Database
Engine in your Microsoft documentation.
• For information about the Microsoft Management Console (MMC), see Step-by-Step Guide to the
Microsoft Management Console in your Microsoft documentation.
1. Generate a private key file and get a server certificate for Microsoft SQL Server from a trusted authority.
2. Open the MMC and import the SQL Server database certificate file to your local Trusted Root Certification
Authority folder.
Task overview: Microsoft SQL Server SSL/TLS protocol for repositories [page 73]
Related Information
To protect your Microsoft SQL Server repository with the SSL/TLS protocol, configure SSL/TLS in both the
Data Services Repository Manager and the Data Services Server Manager.
Prerequisites:
If you plan to have SAP Data Services validate certificates, import the trusted certificate files to your local
certificate store as described in Importing SSL certificate from Microsoft SQL Server [page 74].
Follow the basic instructions for using the Repository Manager and the Server Manager to configure the
repository in the following topics:
As you perform the basic steps, perform the following additional steps in both the Repository Manager and the
Server Manager:
Note
Administrator Guide
Repository management PUBLIC 75
Remember
The Validate Certificate option is selected by default. When you deselect the option, SSL/TLS
encryption is still enabled, but SAP Data Services doesn't validate the certificate.
Restriction
If you select to validate certificates, you must import the certificates as mentioned in Prerequisites.
4. Select OK.
Task overview: Microsoft SQL Server SSL/TLS protocol for repositories [page 73]
Related Information
Register your Microsoft SQL Server repository and include SSL/TLS settings in the Central Management
Console (CMC).
Before performing the following task, follow the steps in Configuring SSL/TLS for Microsoft SQL Server
repository [page 75].
Note
You must perform the steps twice: Once in the Repository Manager and once in the Server Manager.
Open the CMC and perform the general steps in Registering a repository in the CMC [page 63]. As you perform
the general steps, complete the following additional steps to enable SSL/TLS for your SQL Server repository:
Note
• Yes: SAP Data Services verifies the SSL/TLS server certificate based on the information you enter in
the additional SSL/TLS options.
• No: Data Services uses the SSL/TLS protocol, but doesn't verify the SSL/TLS server certificate.
When you select No, the remaining SSL/TLS options are disabled. However, finish the registration by
following the general instructions.
Administrator Guide
76 PUBLIC Repository management
3. Complete the remaining SSL/TLS options based on the descriptions in the following table.
The following options are disabled if you chose No for Verify Server Certificate.
Option Description
Host Name in Certificate Enter the host name that is listed on your SSL/TLS certif-
icate. Data Services uses this host name to validate the
SQL Server SSL/TLS certificate.
SSL KeyStore Enter the path and file name for the Java SSL/TLS Key-
Store file.
Note
The Java SSL/TLS KeyStore stores the private keys
and the column master key used with Always En-
crypted data.
SSL KeyStore Password Enter the password for the Java SSL/TLS KeyStore.
SSL KeyStore Type Choose the file format type for the Java SSL/TLS Key-
Store from the list:
• JKS: Java KeyStore, which is format-specific for Java
only.
• PCKS12: Public-Key Cryptography Standards for Java
and other languages. Standardized and language-
neutral.
SSL TrustStore Enter the path and file name for your SSL/TLS TrustStore.
Note
The SSL/TLS TrustStore is the repository for trusted
certificates.
SSL TrustStore Type Choose the file format type for your SSL/TLS TrustStore
from the list:
• JKS: Java KeyStore, which is format-specific for Java
only.
• PCKS12: Public-Key Cryptography Standards for Java
and other languages. Standardized and language-
neutral.
SSL TrustStore Password Enter the password for your SSL/TLS TrustStore.
Administrator Guide
Repository management PUBLIC 77
Option Description
Unix SSL TrustStore The SSL truststore file to use for establishing a secure
connection from a Unix client to a repository database.
For example,
if SQLServer_UnixTrustStore=/.../
SQLServer_UnixTrustStore_Dir is defined
in the DSconfig.txt file and Unix SSL
Truststore is set to truststore.p12, then
SAP Data Services uses the SSL truststore
file /.../SQLServer_UnixTrustStore_Dir/
truststore.p12 to connect to the SQL Server reposi-
tory when SSL is enabled for the repository.
Unix SSL TrustStore Password Enter the password to access the certificate from the
UNIX truststore file.
The CMC adds the new repository to the repository node in the Data Services page.
Task overview: Microsoft SQL Server SSL/TLS protocol for repositories [page 73]
Related Information
Administrator Guide
78 PUBLIC Repository management
5.6 MySQL SSL/TLS protocol for repositories
Connect to your MySQL repository with the SSL/TLS protocol when the repository uses a server-based
(DSN-less) connection.
Prerequisites
Note
When you use a MySQL repository with a DSN connection, configure SSL/TLS when you configure the
DSN.
Before you configure SSL/TLS for your MySQL repository, ensure that you download and install the applicable
ODBC driver following instructions in the MySQL Connector/ODBC Developer Guide .
Configure the ODBC driver following instructions based on your platform. For instructions to configure the
ODBC driver on Windows, and for information about unixODBC Driver manager, see the following topics in the
Designer Guide:
Also before you configure SSL/TLS for your MySQL repository, follow specific directions in Using Encrypted
Connections in the MySQL Reference Manual to generate the SSL certificate and key files, and to enable
SSL/TLS on your MySQL server.
Note
Support for SSL/TLS for server-based (DSN-less) connections to your local repository begins with Data
Services version 4.3.00.00 for Windows and Linux. Supported MySQL versions for SSL/TLS are:
See the Product Availability Matrix (PAM) on the SAP Support Portal for details about supported
versions and platforms. Select the icon under Essential Information.
Administrator Guide
Repository management PUBLIC 79
5.6.1 Configuring SSL/TLS for MySQL repository
Configure SSL/TLS protocol for your MySQL repository in the Data Services Repository Manager and the Data
Services Server Manager.
Before you configure SSL/TLS in the following task, complete the prerequisite tasks in MySQL SSL/TLS
protocol for repositories [page 79], which includes:
The following steps are applicable when the repository uses a server-based (DSN-less) connection. When you
use a MySQL repository with a DSN connection, configure SSL/TLS when you configure the DSN.
Perform the basic steps in the Repository Manager and the Server Manager using the instructions in the
following topics:
To configure SSL/TLS, perform the following additional steps in both the Repository Manager and the Server
manager as you perform the basic steps:
Option Description
RSA Public Key Enter the file name for the RSA public key file. Applicable
only when you include RSA for the SSL Cipher option.
Note
The Repository Manager searches for
the file in the file location keyword
MySQL_SecureCertStore, which is specified in
<DS_COMMON_DIR>\conf\DSConfig.txt. If
the file location isn't specified or is left blank in
MySQL_SecureCertStore, the Repository Manager
looks in <LINK_DIR>\ssl\MySQL_Certs by de-
fault.
Administrator Guide
80 PUBLIC Repository management
Option Description
SSL CA File Enter the file name for the Certificate Authority certificate
file.
Note
The Repository Manager searches for
the file in the file location keyword
MySQL_SecureCertStore, which is specified in
<DS_COMMON_DIR>\conf\DSConfig.txt. If
the file location isn't specified or is left blank in
MySQL_SecureCertStore, the Repository Manager
looks in <LINK_DIR>\ssl\MySQL_Certs by de-
fault.
SSL Certificate Enter the file name of the public key certificate file.
Note
The Repository Manager searches for
the file in the file location keyword
MySQL_SecureCertStore, which is specified in
<DS_COMMON_DIR>\conf\DSConfig.txt. If
the file location isn't specified or is left blank in
MySQL_SecureCertStore, the Repository Manager
looks in <LINK_DIR>\ssl\MySQL_Certs by de-
fault.
SSL Cipher Enter the list of permitted ciphers for the connection en-
cryption. You designate the ciphers in the MySQL server
configuration.
SSL Key Enter the file name of the server private key file.
Note
The Repository Manager searches for
the file in the file location keyword
MySQL_SecureCertStore, which is specified in
<DS_COMMON_DIR>\conf\DSConfig.txt. If
the file location isn't specified or is left blank in
MySQL_SecureCertStore, the Repository Manager
looks in <LINK_DIR>\ssl\MySQL_Certs by de-
fault.
Administrator Guide
Repository management PUBLIC 81
Option Description
SSL Mode Enter the type of SSL/TLS mode Data Services uses to
connect to the MySQL server.
• Preferred: Permits, but doesn't require, encrypted
connections. If client can't connect using encryption,
it uses an unencrypted connection. Preferred is the
default setting.
• Required: Requires encrypted connections. Connec-
tion fails if client can't connect using an encrypted
connection.
• Verify_CA: Requires an encrypted connection and
also performs verification against the server CA cer-
tificate. Connection fails if client can't connect us-
ing an encrypted connection and-or the verification
against the server CA certificate fails.
• Verify_Identity: Requires an encrypted connection
and also performs verification against the server host
name in the CA certificate. Connection fails if client
can't connect using an encrypted connection and-or
the verification against the server host name in the
CA certificate fails.
4. Select OK.
Continue completing the general steps in the Repository Manager and the Server Manager.
After you've successfully configured the repository, SAP Data Services updates the DSConfig.txt file with
the SSL/TLS options for the specific Job Server section.
Example
[JobServer1]
...
UseSSLEncryption=yes
EncryptionParameters="sslmode=VERIFY_CA;sslkey=sanitized-client-
key.pem;sslcert=client-cert.pem;sslca=ca-
cert.pem;sslcipher=;rsakey=rsakey.pem"
Before you can use your MySQL local repository, register the repository in the Central Management Console
(CMC).
Related Information
Administrator Guide
82 PUBLIC Repository management
5.6.2 Registering MySQL repository with SSL/TLS in the
CMC
To complete the configuration of your MySQL repository for SSL/TLS protocol, complete the applicable
settings in the Central Management Console (CMC) when you register the repository.
Before you register the repository in the CMC, perform the following tasks:
1. Complete the prerequisite tasks in MySQL SSL/TLS protocol for repositories [page 79].
2. Perform the steps in Configuring SSL/TLS for MySQL repository [page 80]
Perform the general steps in Registering a repository in the CMC [page 63]. Include the following additional
steps in the Data Services Repository Properties dialog box in the CMC:
Option Description
RSA Public Key Enter the file name for the RSA public key file. Applicable
only when you include RSA for SSL Cipher.
Note
Location:
SSL CA File Enter the file name for the Certificate Authority certificate
file.
Note
Location:
Administrator Guide
Repository management PUBLIC 83
Option Description
SSL Certificate Enter the file name of the public key certificate file.
Note
Location:
SSL Cipher Enter the list of permitted ciphers for the connection en-
cryption. You designate the ciphers in the MySQL server
configuration.
SSL Key Enter the file name of the server private key file.
Note
Location:
SSL KeyStore Enter the path and file name for the Java KeyStore.
Note
The KeyStore stores the private keys and the column
master key.
Administrator Guide
84 PUBLIC Repository management
Option Description
SSL KeyStore Type Select the file format of the Java KeyStore to use:
• JKS: Java KeyStore, which is format-specific for Java
only.
• PCKS12: Public-key Cryptography Standards for Java
and other languages. Standardized and language-
neutral.
SSL Mode Select the type of SSL/TLS mode Data Services uses to
connect to the MySQL server.
• Preferred: Permits but doesn't require encrypted con-
nections. If client can't connect using encryption, it
uses an unencrypted connection. Preferred is the de-
fault setting.
• Required: Requires encrypted connections. Connec-
tion fails if client can't connect using an encrypted
connection.
• Verify_CA: Requires an encrypted connection and
also performs verification against the server CA cer-
tificate. Connection fails if client can't connect us-
ing an encrypted connection and-or the verification
against the server CA certificate fails.
• Verify_Identity: Requires an encrypted connection
and also performs verification against the server host
name in the CA certificate. Connection fails if client
can't connect using an encrypted connection and-or
the verification against the server host name in the
CA certificate fails.
SSL TrustStore Enter the path and file name for the Java SSL TrustStore.
Note
The SSL TrustStore is the repository for trusted certif-
icates.
SSL TrustStore Type Select the file format of the Java TrustStore to use:
• JKS: Java TrustStore, which is format-specific for
Java only.
• PCKS12: Public-key Cryptography Standards for Java
and other languages. Standardized and language-
neutral.
The CMC adds the new repository to the repository node in the CMC Data Services page.
Administrator Guide
Repository management PUBLIC 85
Task overview: MySQL SSL/TLS protocol for repositories [page 79]
Related Information
Choose TCPS (Transmission Control Protocol Secures) for an Oracle repository to perform credential
authentication between server and client, and encrypt/decrypt all data.
TCPS is an optional feature for connecting to an Oracle repository with the SSL/TLS protocol. TCPS offers
various levels of security, including the following:
Implement TCPS for your repository when you connect using TNS (Transparent Network Substrate) or TNS-
less (server-based) connections. The method of configuring TCPS varies based on your connection type:
• TNS connection: Copy the TNS connection string that your Oracle database administrator entered into the
tnsnames.ora file.
• TNS-less connection: Enable SSL in SAP Data Services Repository Manager and set encryption options in
the Encryption Parameters dialog box.
Oracle references
For information about Oracle TCPS protocol, and the prerequisite steps, see the following documentation:
• To learn about how to prepare for SSL/TLS configuration in your Oracle database, see Enabling Secure
Sockets Layer in the Oracle Database Security Guide.
• For additional information about your connection and using wallets for TrustStores, see SSL with Oracle
JDBC Thin Driver, an Oracle white paper. To access the whitepaper, copy and paste the following URL in
your browser:
https:/www.oracle.com/technetwork/topics/wp-oracle-jdbc-thin-ssl-130128.pdf
• For information about the Oracle Security requirements, see your Oracle Database Documentation .
Select your version from the list, then select Security under Topics.
Administrator Guide
86 PUBLIC Repository management
Prerequisites for using TCPS for an Oracle repository [page 87]
Before you configure an Oracle database for your repository with TCPS, configure settings in both
Oracle and SAP Data Services.
Before you configure an Oracle database for your repository with TCPS, configure settings in both Oracle and
SAP Data Services.
Note
For instructions to configure JDBC driver files for Oracle, see the Data Services Installation Guide.
• To connect using TNS (Transparent Network Substrate), ensure that your database administrator creates
the TNS.
Obtain the following information after you install the Oracle Advanced Security files:
• For a TNS connection, the TNS connection string from the tnsnames.ora file.
• For a server-based connection, server connection information.
• For the TLS-SSL network protocol, Cipher Suite names to use.
• SSL TrustStore location, type, and password, as applicable.
• KeyStore location, type, and password, as applicable.
Administrator Guide
Repository management PUBLIC 87
Related Information
Cipher Suites with key lengths of 128 bits are included in the Oracle Advanced Security files along with the
necessary JAR files. Cipher Suites with key lengths of more than 128 bits, such as 256 bits, provide stronger
encryption. To use Cipher Suites with stronger encryption, you must perform extra steps.
Before you perform the following steps, obtain the JAR files for the stronger Cipher Suites from the JCE
(Java Cryptography Encryption) Unlimited Strength Jurisdiction Policy Files. For more information about the
JCE files, and to access the JCE Cipher Suites download page, see “Enabling Cipher Suites for Stronger
Encryption” on the Open Source Elastic Stack Web page at https://www.elastic.co/guide/en/shield/current/
ciphers.html .
To implement the JCE Unlimited Strength Jurisdiction Policy Files Cipher Suites, perform the following steps:
1. Download and unzip the JCE zip file and extract the following 2 files to
<BOE_INSTALL_DIR>\SAP BusinessObjects Enterprise XI 4.0\<win64_x64 or
win32_x32>\sapjvm\jre\lib\security:
• local_policy.jar
• US_export_policy.jar
2. Restart the EIM Adaptive Processing Server in the Central Management Console (CMC).
a. Log into the CMC.
b. Open the Servers page
c. Expand Service Categories and select Enterprise Information Management Services.
d. Highlight the EIM Adaptive Processing server and select Actions Restart Server.
The status in the State column switches to Stopping, Starting, and finally Running.
Note
Select the Refresh icon several times to update the State column.
3. Obtain the official Cipher Suite names. SAP Data Services requires the names when you configure the
Oracle repository for TCPS protocol. To obtain the official JCE Cipher Suite names, perform the following
steps:
a. Go to the Oracle documentation “Java Cryptography Architecture Standard Algorithm Name
Documentation for JDK 16” at https://docs.oracle.com/en/java/javase/16/docs/specs/security/
standard-names.html .
The link takes you to Java SE 16 documentation. Make sure to look at the list relative to your version of
Java SE.
Administrator Guide
88 PUBLIC Repository management
b. To open the list, scroll down the list of names in the Standard Names list and click the “JSSE Cipher
Suite names” link.
c. Find the name of the Cipher Suite you downloaded in the Standard Name column.
d. When you configure the repository connection in the CMC in a later process, enter the Cipher Suite
name or names in the SSL Cypher Suite option as they're listed in the JSSE Cipher Suite names list.
Task overview: Prerequisites for using TCPS for an Oracle repository [page 87]
Related Information
When you enable the TCPS protocol for your Oracle repository, configure the Cipher Suite information by
editing the Java Security file based on the security selections that you make.
When you configure the Oracle repository using TCPS, you need the following information to configure the
repository:
Note
Use the Cipher Suite that doesn't use the Diffie-Hellman anonymous authentication.
• TCPS information.
• If you choose to use PKCS12 wallet for the SSL TrustStore Type option, edit the java.security file for the
Oracle PKI provider. For instructions, see Editing the java.security file [page 98].
• If you choose to use Cipher Suites, modify the java.security file to comment out a specific row. For
instructions, see Editing the java.security file [page 98].
• If you choose to use Cipher Suites that have stronger encryption (key lengths greater than 128 bits), obtain
and add additional JAR files to the security folder. For instructions, see Configuring JCE Cipher Suites with
stronger encryption [page 88].
Parent topic: Prerequisites for using TCPS for an Oracle repository [page 87]
Related Information
Administrator Guide
Repository management PUBLIC 89
5.7.2 Oracle TCPS configuration options with SSL/TLS
Create and configure an Oracle repository that uses TCPS protocol in the Data Services Repository Manager
and in the Data Services Server Manager.
Complete the prerequisite tasks in Prerequisites for using TCPS for an Oracle repository [page 87].
Follow the basic instructions for using the Repository Manager and the Server Manager in the following topics:
Note
If you created an Oracle repository during installation, configure the repository for TCPS and SSL/TLS after
installation.
The following table contains descriptions for the TCPS and SSL/TLS options in the Repository Manager and
Server manager.
Use TNS name Specifies whether to connect to your Oracle database using
a TNS (Transparent Network Substrate).
Note
Your administrator must configure the TNS in Ora-
cle and enter the applicable connection string in
tnsnames.ora file.
TNS name Enter the connection string from the tnsnames.ora file.
Note
To enable SSL/TLS, your administrator must have in-
cluded the SSL/TLS information in the connection
string.
SID or Service Name Enter the database identifier for the Oracle database that
you use for the repository.
Port Enter the port number for the Oracle listener port for TCPS.
The default port number is 2484.
Administrator Guide
90 PUBLIC Repository management
Option Description
User name Enter the user name to access the repository database in
Oracle.
Use SSL encryption Select to enable SSL/TLS encryption to secure your connec-
tion with the Oracle database.
When you select Use SSL encryption, the system enables the
Encryption parameters button.
Related Information
Administrator Guide
Repository management PUBLIC 91
5.7.3 Registering Oracle repository with TCPS in the CMC
Secure your Oracle repository using TCPS protocol and SSL/TLS when you register the repository in the
Central Management Console (CMC).
Ensure that you perform the prerequisites in Prerequisites for using TCPS for an Oracle repository [page 87].
For details about configuring the JDBC driver for Oracle, see the topic “Configurinng JDBC drivers for SAP
HANA, Oracle, and My SQL” in the Installation Guide.
Perform the general steps in the CMC by following the steps in Registering a repository in the CMC [page 63].
To configure your Oracle repository with TCPS protocol, perform the following additional steps:
Consult your Oracle documentation about using Oracle RAC. These instructions don't include steps for
Oracle RAC.
Note
If you set Use Oracle RAC to Yes, you must complete the option TNS Name as described in the following
TCPS option descriptions table.
Option Description
Applicable only when you select Yes for Use Oracle RAC.
Database Server Name Enter the Oracle host computer name for the repository
database.
Port Enter the Oracle listener port number for the repository
database. The default port number is 2484.
SID or Service Name Enter the database identifier for the Oracle database that
you use for the repository.
Administrator Guide
92 PUBLIC Repository management
Option Description
SSL Cipher Suites Enter the official Cipher Suite name or names, or leave
blank when not applicable.
When you enter more than one name, separate each Ci-
pher Suite name by a comma.
Example
Note
Line breaks added for readability.
(SSL_RSA_WITH_RC4_128_CBC_SHA,
SSL_RSA_WITH_3DES_EDE_CBC_SHA,
SSL_RSA_WITH_RC4_128_SHA,
TLS_RSA_WITH_AES_256_CBC_SHA)
SSL TrustStore Enter the path and file name for the SSL TrustStore.
Note
The SSL TrustStore is the repository for trusted cer-
tificates. Use the SSL TrustStore for authenticating
server certificates for two-way SSL.
Note
If you use Oracle PKCS12, remember to update the
java.security file with the Oracle PKI provider.
SSL KeyStore Enter the path and file name for the SSL KeyStore.
Note
The keystore contains the client certificate and a set
of private and public key pairs for encryption.
Administrator Guide
Repository management PUBLIC 93
Option Description
Note
If you use Oracle PKCS12, remember to update the
java.security file with the Oracle PKI provider.
User Name Enter the user name to access the repository database.
5. Select Save.
Related Information
Choose the SSL/TLS protocol for an SAP HANA repository for either DSN or server-based (DSN-less)
connections.
SSL/TLS protocol is an optional feature that adds additional security for repositories that use the SAP HANA
database.
Note
The following SAP Data Services versions are required for implementing SSL/TLS protocol for an SAP
HANA repository:
Administrator Guide
94 PUBLIC Repository management
• DSN-less connection: Version 4.3.00 (14.03.00.00) or later versions.
Edit the Java security file by performing the steps in Editing the java.security file [page 98].
Download and install the SAP Common Crypto Library to a local directory, and create the system variable
named SECUDIR. The Common Crypto Library encrypts communication between the Data Services client and
the SAP HANA server. For complete instructions, see in Data Services Supplement for Big Data. Then gather
the following information:
Note
The locations of the Java SSL TrustStore and Java SSL KeyStore must be local so the Central Management
Console can access them.
Download and install the ODBC driver. Consult the Product Availability Matrix (PAM) on the SAP Support
Portal for the correct version.
To add SSL/TLS protocol for your SAP HANA repository, enable SSL/TLS in the Data Services Repository
Manager and the Data Services Server Manager.
Before you perform the following steps, complete the prerequisite tasks in SAP HANA SSL/TLS protocol for
repositories [page 94].
Follow the basic instructions for using the Repository Manager and the Server Manager to configure the
repository in the following topics:
As you perform the basic steps, perform the following additional steps in both the Repository Manager and the
Server Manager:
Administrator Guide
Repository management PUBLIC 95
1. Select the Use SSL encryption checkbox.
2. Select the Encryption Parameters button.
Encryption parameters
Option Description
Note
When this option isn't selected, the remaining options
aren't available to complete.
Key Store Enter the location and name of the local key store file.
Certificate Host Enter the server host name as it appears in the certificate.
Enter an asterisk (*) or leave blank to skip the verification
of the server host name.
4. Select OK.
Before you can use your SAP HANA local repository, register the repository in the Central Management
Console (CMC).
Task overview: SAP HANA SSL/TLS protocol for repositories [page 94]
Related Information
Register your SAP HANA repository and included SSL/TLS settings in the Central Management Console
(CMC).
Before you perform the following steps, perform the prerequisite tasks in SAP HANA SSL/TLS protocol for
repositories [page 94]
Administrator Guide
96 PUBLIC Repository management
Perform the general steps to register the repository in the CMC in Registering a repository in the CMC [page
63].
As you perform the general steps, complete the following additional steps to enable SSL/TLS:
• No: SAP Data Services doesn't validate the server certificate but still uses SSL/TLS protocol.
When you select No, continue by completing the remaining general steps for registering the repository.
• Yes: Data Services validates the SSL server certificate based on your settings in the remaining
SSL/TLS options.
3. Set SSL/TLS options based on the descriptions in the following table.
Host Name in Certificate Enter the host name that is listed on your SSL/TLS certif-
icate. SAP Data Services uses this host name to validate
the SAP HANA SSL/TLS certificate.
SSL KeyStore Enter the path and file name for your Java KeyStore.
Note
Make sure that the CMC can access the KeyStore:
• Windows: Locate the KeyStore in a local drive.
• Unix/Linux: Location doesn't matter as long as
the CMC can access the folder.
SSL KeyStore Type Choose the file format type for your Java KeyStore from
the list:
• JKS: Java KeyStore is format-specific for Java only.
• PKCS12: Public-Key Cryptography Standards for Java
and other languages. Standardized and language-
neutral.
SSL KeyStore Password Enter the password to access the private key from the
specified Java KeyStore file, if applicable.
SSL TrustStore Type Choose the file format type for your Java SSL TrustStore
from the list:
• JKS: Java KeyStore is format-specific for Java only.
• PKCS12: Public-Key Cryptography Standards for Java
and other languages. Standardized and language-
neutral.
Administrator Guide
Repository management PUBLIC 97
Option Value
SSL TrustStore Password Enter the password to access the private key from the
specified Java SSL TrustStore, if applicable.
Common Crypto SSL KeyStore Enter the name of the PSE file that you configured in
SECUDIR.
4. Test the connection. After the repository connection test is successful, select Save.
The CMC adds the new repository to the repository node in the CMC Data Services page.
Task overview: SAP HANA SSL/TLS protocol for repositories [page 94]
Related Information
Edit the java.security file based on the TrustStore type that you select when you use either SAP HANA,
Oracle, IBM DB2, or SQL Server for your repository.
• Oracle: When you select to use an Oracle PKCS12 as your TrustStore type or you choose to use Cipher
Suites with either PKCS12 or JKS.
• SAP HANA: When you select to use PKCS12 or JKS as your TrustStore type.
• SQL Server and IBM DB2: When you select to use JKS as your TrustStore type.
The following steps apply to either Oracle, SAP HANA, or SQL Server databases as your repository.
The provider information and instructions for specific placement are located in the Oracle white paper,
SSL with Oracle JDBC Thin Driver. To access the whitepaper, copy and paste the following URL in your
browser: https:/www.oracle.com/technetwork/topics/wp-oracle-jdbc-thin-ssl-130128.pdf.
b. SAP HANA: If you select to use PKCS12 or JKS as the SSL TrustStore type, copy the SAP HANA
provider information from SAP HANA and paste the information to the specified location in the
provider list in the java.security file.
Administrator Guide
98 PUBLIC Repository management
Search the Java security file for the following sentence: List of providers and their
perference order. Enter the provider information in the format specified in the Java security file.
3. Oracle only: If you use Cipher Suites for TCPS protocol with either PKCS12 or JKS, perform the following
substeps:
a. In the java.security file, search for the line that contains the option
jdk.tls.disabledAlgorithms=.
b. Type a “#” to comment out the line.
If you don't comment out this line, the connection that you create using the Cipher Suites fails.
4. SQL Server and IBM DB2: If the JKS keystore type loads keystore files only in the JKS format, perform the
following substeps:
a. Open the java.security file.
b. Search for the line that contains the option keystore.type.compat=.
c. Set to false: keystore.type.compat=false.
Note
For SQL Server and IBM DB2, the JKS keystore type supports loading keystore files in either JKS or
PKCS12 format.
Note
Administrator Guide
Repository management PUBLIC 99
6 Server Management
Manage the Job Server and database servers using server management tools, and configure ODBC drivers,
data source name (DSN), and server name (DSN-less) connections.
Configuring Metadata Browsing Service and View Data Service [page 156]
SAP Information Steward uses the Metadata Browsing Service and the View Data Service to connect to
and view data in profiling sources.
Administrator Guide
100 PUBLIC Server Management
6.1 DSN-less and TNS-less connections
DSN-less and TNS-less (Oracle) connections are also known as server name connections.
If you configure a repository during installation, SAP Data Services creates a DSN-less or TNS-less (Oracle)
connection to the repository database by default.
Server name connections eliminate the need to configure the same DSN (Data Source Name) or TNS ( Oracle
Transparent Network Substrate) entries on every machine in a distributed environment.
Restriction
To configure the repository using a DSN or TNS connection, skip the repository creation during installation
and create the repository after installation.
The following table lists all eligible database types for the Data Services repository, and the supported
connection types.
For databases that you use as sources and targets in Data Services, the database type determines the type of
connection you can create. Some databases support both types of connections while other support one or the
other.
The following table lists all eligible source and target databases and the connection types they support.
Administrator Guide
Server Management PUBLIC 101
Database DSN DSN-less
HP Vertica Yes No
ODBC Yes No
The information in the database tables is subject to change and may not reflect the most up-to-date
information. For current lists of supported databases and versions for repository or sources and targets, see
the Product Availability Matrix (PAM) on the SAP Support Portal.
Set up UNIX or Linux environment variables by running a script with the applicable syntax for your
environment.
When you install SAP Data Services on UNIX or Linux platforms, the SAP Data Services Job Server requires
that you set environment variables. To set these variables, run the script file al_env.sh.
Example
$ cd $LINK_DIR/bin/
$ . ./al_env.sh
Administrator Guide
102 PUBLIC Server Management
You can also add a command to your login script so that the environment variable is always configured. For
example, add the following line to .profile:
. $LINK_DIR/bin/al_env.sh
Troubleshooting
If the script fails to run, the system does not issue an error. Therefore, to check that you properly set the
variable values, check one or more of the environment variables described in the following table:
Variable Details
$SHLIB_PATH For 64-bit Oracle clients, make sure that you list
$LINK_DIR/bin before any 64-bit Oracle shared library
path.
Administrator Guide
Server Management PUBLIC 103
Variable Details
Note
For the MySQL ODBC driver, set the driver location
in the $ODBCSYSINI environment variable instead of
the $ODBCINST environment variable. Make sure that
the odbcinst.ini file exists. If you do not set the
location in $ODBCSYSINI, Data Services uses /etc/
odbcinst.ini by default for the instance file.
Tip
If you don't properly configure the variable settings and you start any Data Services utility, the software issues
error messages that indicate there are missing database server files.
If you see errors about missing database server files, verify that al_env.sh contains commands to set the
appropriate database home locations. Run al_env.sh for the account used by the Job Server, or start the Job
Server using an account that has all necessary environment variables defined in its .profile.
Tip
To use the RFC Server Interface in the Management Console on a 64-bit UNIX platform, see the
Management Console Guide for additional environment configuration information.
To run properly, SAP Data Services requires the Job Service and related services, and the packaged Tomcat
service.
Some configurations for Data Services require that you stop services. The services also stop when you close
Data Services. In some cases, you restart the services manually. Otherwise, Data Services restarts the services
automatically.
On Windows
The Data Services service and packaged Tomcat service start automatically when you start or restart your
computer. The Data Services service starts Job Servers and Access Servers on the restarted computer.
Administrator Guide
104 PUBLIC Server Management
If applicable, you can change service startup to Manual in the Windows services window.
Note
To manually log in Web applications, refer to “Configuring tracing for web applications” section in the
Information platform services Administration Guide.
On UNIX
To start Job and Access Servers automatically when the server restarts, install the actaservices script with
root privileges. Data Services stores the script file in $LINK_DIR/bin.
Example
# cd $LINK_DIR/bin/
# autostrt.sh $LINK_DIR
The job execution history files and the Job Server logs contain data to produce internal statistics, regulatory
reports, or other nonregulatory reports.
Set a time period for data retention in the history files and Job Server logs. After the set time period, SAP Data
Services deletes retained data automatically and permanently. Therefore, know what these logs contain before
setting the retention period.
Tip
To create reports based on specific jobs, transforms, time periods, and job statistics, back up the job
execution files and the Job Server log files before the retention period expires.
It's important to delete files periodically to maintain efficient system processing. If you don't delete files
periodically, the history files and Job Server logs can get large, which slows job performance. The files get large
because Data Services appends information to files for each job that you run. Therefore, we recommend that
you establish a maintenance management procedure.
Caution
You can select to delete Job Server and history files for a specific batch job in the Data Services
Management Console. Data Services deletes the selected job, history, and log files, and ignores the set
retention periods in the Central Management Console (CMC).
For more information about deleting jobs, history, and log files for the selected job in the Data Services
Management Console, see the Management Console Guide.
Administrator Guide
Server Management PUBLIC 105
USPS-required log files and reports [page 106]
Set the log retention period so that you don't lose data before the creation and submission of USPS-
required logs and reports.
Related Information
Set the log retention period so that you don't lose data before the creation and submission of USPS-required
logs and reports.
Set the number of days in History Retention Period in the Central Management Console (CMC). If you have
postal certification requirements such as CASS certification, the USPS requires that you submit log files to the
postal authorities on a periodic basis.
Example
For CASS certified mailings, the USPS requires that you submit certification log files each month. The
default setting for the History Retention Period option is 30 days. Thirty days don't provide enough time for
you to export and send the log files to the USPS by the monthly due date. And 30 days don't account for
months that include 31 days. Therefore, set the history retention to longer, such as 50 days, to ensure that
you submit complete monthly logs to the USPS.
In addition to sending monthly data to the USPS, you must have report data available for the USPS to examine
for several years after the job is processed. To ensure that you retain all required reports and logs before the
data is deleted from the repository, consider exporting the required reports and logs from the repository to
a local folder on a monthly basis. Exporting reports and logs to a local folder also prevents the repository
contents from becoming so large that the export process times out because of the volume of statistics
retained.
View stored job execution history files in the Administrator application of the SAP Data Services Management
Console.
Administrator Guide
106 PUBLIC Server Management
Caution
Many history files contain job statistics and other information required for statistics and regulatory reports.
Make sure that you understand what your job history files are used for before you set a number of days
to delete them. Also be aware of current USPS rules for data retention by viewing your USPS licensing
agreement.
For information about regulatory statistics and log files, see the Designer Guide. For information about trace
and error logs, data quality reports, and troubleshooting, see the Management Console Guide.
Parent topic: History retention and Job Server log retention [page 105]
Related Information
Change the default setting of 30 days for history log file retention to increase or decrease the number of days
that SAP Data Services retains the files before deleting them.
To change the History Retention Period setting, perform the following steps:
1. Log into the Central Management Console and open the Applications page.
2. Right-click Data Services Application from the Application Name column and select Settings.
Example
Value Results
4. Select Save.
Administrator Guide
Server Management PUBLIC 107
If Data Services is performing background processes, it can take up to an hour before the new setting goes
into effect.
Task overview: History retention and Job Server log retention [page 105]
Related Information
Deleting log files regularly alleviates security concerns and reduces the possibility of performance degradation.
By default, Data Services deletes Job Server log files every 30 days. However, you can change the default
number of days for log file deletion in the Central Management Console. After you set the number of days for
retention, Data Services deletes the log files, including the following:
• In <DS_Common_Dir>\log\:
• server_eventlog_*.txt
• error_*.txt
• Monitor_*.txt
• trace_*.txt
• In <Link_Dir>\logging\:
• AL_Designer_*_trace.glf
• AL_JobLauncher_*_trace.glf
• BIClient (RFC logs)
Before you set the Job Server Log Retention Period, consider any legal requirements for retaining information,
such as for postal regulations. To retain some information for longer periods of time, move the applicable log
file to a secure location before the deletion time.
For information about your data security responsibilities, see Data protection and privacy [page 26].
Note
Data Services doesn't delete bulk loading files with the history and Job Server log files. Instead, Data
Services deletes the bulk loading files based on the setting for Clean up bulk loader directory after load
option in the target editor of the data flow.
View stored log files in the Data Services Management Console. For information about how to view the stored
log files, see the Management Console Guide.
Parent topic: History retention and Job Server log retention [page 105]
Administrator Guide
108 PUBLIC Server Management
Related Information
The Job Server Log Retention Period provides a set schedule for automatically deleting Job Server log files,
such as server_event*.logs.
The default setting for the Job Server Log Retention Period is 30 days. To change the setting, perform the
following steps:
1. Log into the Central Management Console (CMC) and select Applications.
2. Right-click Data Services Application from the Application Name column and select Settings.
The value sets the number of days that SAP Data Services retains the Job Server log files.
Example
Value Results
4. Select Save.
If Data Services is performing background processes, it can take up to an hour before the new setting goes
into effect.
To view stored Job Server log files, open the Administrator application in the Data Services Management
Console.
Task overview: History retention and Job Server log retention [page 105]
Administrator Guide
Server Management PUBLIC 109
Related Information
Each time you add an ODBC database type for SAP Data Services processing, configure a supported driver in
the SAP Data Services (DS) Connection Manager to establish a connection to the database.
Although the required information is similar, the processes for configuring an ODBC driver on UNIX and Linux
operating systems are different than for Windows operating systems. For example, to configure installed ODBC
drivers in UNIX and Linux, you use the SAP Data Services Connection Manager. For Windows, you use either
the Microsoft ODBC Data Source Administrator for data source name (DSN) connections or the ODBC Drivers
Selector for server name (DSN-less) connections.
Configure a DSN connection at the same time you configure the driver. For a DSN connection, you need
information about the data source, including server information, user name, and password. When applicable,
configure SSL/TLS for secure data transfer.
Configure drivers with data source name (DSN) connections [page 119]
On Linux and Unix platforms, SAP Data Services requires the ODBC driver information with a data
source name (DSN) connection be included in the ODBC driver manager library and the ODBC driver
library.
Related Information
Administrator Guide
110 PUBLIC Server Management
6.5.1 Database connectivity for UNIX and Linux
To configure database connectivity on UNIX or Linux platforms, use the SAP Data Services (DS) Connection
Manager.
Use the DS Connection Manager to configure ODBC drivers and to create DSN connections. The DS
Connection Manager adds the driver information to the odbcinst.ini file, and the DSN information to the
ds_odbc.ini file. The ds_odbc.ini file lists the DSN with the name of the ODBC driver.
When you install Data Services on UNIX or Linux, you can select to have the SAP Data Services installation
setup program configure the repository. To have the installer configure the repository, you enter the database
type for the repository. By default, the installer automatically performs the following repository database tasks:
If you want to use a DSN or TNS (for Oracle) connection for your repository, skip repository creation during
installation.
Use the DS Connection Manager after installation to configure the repository database and establish a DSN or
TNS (Oracle) connection. Additionally, use the DS Connection Manager to add additional databases and DSN
connections to Data Services.
• Add information about the ODBC driver including driver manager location and driver name.
• Add information about a DSN connection, including a name for the data source, server information, and
applicable user names and passwords.
Data Services includes the DS Connection Manager in the installation and places it in the following location by
default: $LINK_DIR//bin/DSConnectionManager.sh.
See the Product Availability Matrix (PAM) on the SAP Support Portal for a list of supported databases
and versions that you can use for your repository. The PAM also includes the non-repository databases and
versions supported in Data Services plus the applicable ODBC drivers.
Parent topic: Configure database connectivity for UNIX and Linux [page 110]
Related Information
Administrator Guide
Server Management PUBLIC 111
Configure drivers with server name (DSN-less) connections [page 113]
Configure drivers with data source name (DSN) connections [page 119]
Configuring DataDirect ODBC [page 128]
The SAP Data Services Connection Manager is a command-line utility that adds the ODBC driver information
to SAP Data Services driver library files.
Before you run the Connection Manager to configure the ODBC driver for a database, perform the following
tasks:
• Check the Product Availability Matrix (PAM) on the SAP Support Portal to determine the ODBC driver
and version for the applicable database type.
• Download and install the supported ODBC driver, and read all information about the driver in the vendor
documentation to make sure you configure the driver correctly.
• Optional. To use a graphical user interface for the Connection Manager, install the GTK+2 library. The
GTK+2 is a free multi-platform toolkit that creates user interfaces. For more information about obtaining
and installing GTK+2, see https://www.gtk.org/ .
Connection Manager sets the ODBC driver and DSN information in the SAP Data Services driver manager files
as follows:
• Connection Manager adds the driver information to the odbcinst.ini file including the name and
location of the vendor client driver file. The vendor location must be readable and writable.
Example
The default location for DataDirect drivers is $LINK_DIR/DataDirect/odbc/. Therefore, set the
following location when the Connection Manager asks for the information:
The following instructions assume that you have the user interface for Connection Manager.
1. Open the Connection Manager with the following command, replacing $LINK_DIR with the path to the
Data Services installation directory:
$ cd $LINK_DIR/bin/DSConnectionManager.sh
The options in the Drivers tab may differ based on the driver type.
3. For DSN connections, open the Data Sources tab and configure the data source name connection.
The options in the Data Sources tab differ based on the database type.
4. Click Restart Services to restart the EIM Adaptive Process Service and the Data Services Job Service.
Administrator Guide
112 PUBLIC Server Management
Task overview: Configure database connectivity for UNIX and Linux [page 110]
Related Information
On UNIX and Linux platforms, SAP Data Services requires the ODBC driver information be included in the
ODBC driver library when you configure the driver for a DSN-less connection.
The UNIX ODBC driver configuration file contains driver names that reference ODBC driver libraries. The UNIX
ODBC driver configuration is an instance file referenced by the $ODBCINST variable.
When you configure the ODBC driver for natively-supported databases in the SAP Data Services (DS)
Connection Manager, the DS Connection Manager automatically updates the ODBC driver library files in
$ODBCINST.
Configuring native ODBC drivers for UNIX and Linux [page 114]
Configure ODBC drivers for UNIX and Linux that have a server name (DSN-less) connection using the
SAP Data Services (DS) Connection Manager.
Parent topic: Configure database connectivity for UNIX and Linux [page 110]
Related Information
Administrator Guide
Server Management PUBLIC 113
6.5.3.1 Configuring native ODBC drivers for UNIX and Linux
Configure ODBC drivers for UNIX and Linux that have a server name (DSN-less) connection using the SAP Data
Services (DS) Connection Manager.
Ensure that you perform the following prerequisite tasks before you configure the ODBC native driver:
• Configure the ODBC driver library and the associated environment variables for the database client. For
instructions, see Setting UNIX environment variables [page 102].
• Ensure that the database is eligible for server name connection. For a current list of databases and
supported connections, see the Product Availability Matrix (PAM) on the SAP Support Portal.
• Optional. To work in the GUI for the DS Connection Manager, install the GTK+2 library. For download
instructions, see Using the Connection Manager [page 112].
The following steps are for the GUI version of the DS Connection Manager.
$ cd $LINK_DIR/bin/DSConnectionManager
The Configuration for... dialog box opens with the value filled in for the option ODBC Inst File.
4. Enter information about the driver and the database server.
Note
The Connection Manager does not save the values that you enter for future use.
Note
• If you installed Data Services on a different computer than IPS or BI platform, Connection Manager
restarts the Data Services Job Service.
Administrator Guide
114 PUBLIC Server Management
Task overview: Configure drivers with server name (DSN-less) connections [page 113]
Related Information
The SAP Data Services (DS) Connection Manager configures the applicable environment variables for native
ODBC drivers based on the property values that you enter.
The following table contains a list of native database types and the information required in the DS Connection
Manager to configure the ODBC driver.
Note
We add support for additional database types on a regular basis. Therefore, the following table may not be
up-to-date.
Administrator Guide
Server Management PUBLIC 115
Database Type Properties on Drivers tab
Google BigQuery ODBC • Driver Name (Must use Simba ODBC driver for Google
BigQuery)
• Driver location
• UNIX ODBC Lib Path
• Google BigQuery Oauth Mechanism and options based
on the type chosen:
• BigQuery Refresh Token
• BigQuery e-mail
• BigQuery Private Key
• Google BigQuery catalog
• Optional. Proxy server information:
• Host
• Port
• Username
• Password
• Google BigQuery Trusted Certificates
Administrator Guide
116 PUBLIC Server Management
Database Type Properties on Drivers tab
Administrator Guide
Server Management PUBLIC 117
Database Type Properties on Drivers tab
Parent topic: Configure drivers with server name (DSN-less) connections [page 113]
Related Information
Configuring native ODBC drivers for UNIX and Linux [page 114]
Administrator Guide
118 PUBLIC Server Management
6.5.4 Configure drivers with data source name (DSN)
connections
On Linux and Unix platforms, SAP Data Services requires the ODBC driver information with a data source name
(DSN) connection be included in the ODBC driver manager library and the ODBC driver library.
Some ODBC driver vendors include ODBC driver manager and ODBC driver capabilities in one library,
while others separate them into two libraries. To accommodate all ODBC vendors, Data Services requires
configurations in two libraries for DSN connections:
• UNIX ODBC driver configuration file, referenced by $ODBCINST environment variable: Contains
DSN instances that reference ODBC driver manager libraries. The default location is $LINK_DIR/bin/
ds_odbc.ini.
Tip
For ODBC databases that Data Services supports natively, do not configure the ds_odbc.ini file
manually. Instead, configure the driver using the SAP Data Services (DS) Connection Manager to
automatically add the information to the Unix ODBC driver manager library.
• Vendor ODBC configuration files, referenced by the $ODBCINI environment variable: Contains data
source name (DSN) instances that reference the ODBC driver libraries and the database server connection
information.
Note
One ODBC configuration file can contain multiple DSN instances. For example, a file referenced by
$ODBCINI may contain DSNs for MySQL, Netezza, and Teradata.
Properties for ODBC data sources using DSN connections [page 122]
The Connection Manager configures the $ODBCINI file based on the property values that you enter on
the Data Sources tab.
Parent topic: Configure database connectivity for UNIX and Linux [page 110]
Related Information
Administrator Guide
Server Management PUBLIC 119
Configure drivers with server name (DSN-less) connections [page 113]
Configuring DataDirect ODBC [page 128]
SAP Data Services supports several ODBC data sources natively with DSN connections.
For native ODBC data sources, configure the driver and the data source using the SAP Data Services
Connection Manager. Set the Data Services ODBC configuration and associated environment variables. Non
native ODBC data sources require additional manual configuration.
Note
For the most current list of database types that the Connection Manager supports, see the Product
Availability Matrix (PAM) on the SAP Support Portal.
Enter values in the Connection Manager to set the $ODBCINI to a file that contains the DSN connection. Before
you run Connection Manager, ensure that the file is readable and writable by using the following command:
export ODBCINI=<dir-path>/ds_odbc.ini
touch $ODBCINI
Parent topic: Configure drivers with data source name (DSN) connections [page 119]
Related Information
For non-native ODBC data sources, you need to manually configure the driver and data source.
Administrator Guide
120 PUBLIC Server Management
UID=<user ID>
PWD=********
AwsRegion=us-east-2
S3OutputLocation=s3://xian-analytics-data-day-2020/athena_results/
For more information about the attributes, see the Magnitude Simba Amazon Athena ODBC Data
Connector Installation and Configuration Guide on the Amazon AWS website.
3. Move to $LINK_DIR/bin/, open ds_odbc.ini, and add the following lines for your data source:
[Athena_DSN]
Driver=<unixODBC so file>
Parent topic: Configure drivers with data source name (DSN) connections [page 119]
Related Information
To configure ODBC data sources in Linux or UNIX, use the SAP Data Services Connection Manager.
Data Services supports several ODBC data sources natively with DSN connections. Ensure that Data Services
supports your ODBC data source.
Ensure that you have the correct privileges to change the configuration files mentioned in these steps.
Install the GTK+2 library to make a graphical user interface for Connection Manager. The GTK+2 is a free
multi-platform toolkit that creates user interfaces. The installation is at https://www.gtk.org/ .
$ cd $LINK_DIR/bin/
$ ./DSConnectionManager.sh
Administrator Guide
Server Management PUBLIC 121
For a list of relevant properties for each database type, see Properties for ODBC data sources using DSN
connections [page 122].
5. Provide the following properties:
• User name
• Password
Note
The Connection Manager does not save this information for further use.
Task overview: Configure drivers with data source name (DSN) connections [page 119]
Related Information
The Connection Manager configures the $ODBCINI file based on the property values that you enter on the Data
Sources tab.
The following table lists the properties that are relevant for each database type.
Note
We add support for additional database types on a regular basis. Therefore, the following table may not be
up-to-date.
Administrator Guide
122 PUBLIC Server Management
Database Type Properties on Data Sources tab
Administrator Guide
Server Management PUBLIC 123
Database Type Properties on Data Sources tab
Administrator Guide
124 PUBLIC Server Management
Database Type Properties on Data Sources tab
Administrator Guide
Server Management PUBLIC 125
Database Type Properties on Data Sources tab
Snowflake • User
• Password
• Server
• Database
• Schema
• Warehouse
• Role
• Tracing(0-6)
• Authenticator
• Proxy
• NoProxy
Administrator Guide
126 PUBLIC Server Management
Database Type Properties on Data Sources tab
Parent topic: Configure drivers with data source name (DSN) connections [page 119]
Related Information
6.5.4.5 Troubleshooting
The following are some of the more common issues to troubleshoot when you configure drivers with DSN
connections:
Administrator Guide
Server Management PUBLIC 127
Trouble with libraries
To determine whether all dependent libraries are set properly in the environment variables, use the ldd
command on the ODBC driver manager library and the ODBC driver library.
Example
ldd tdata.so
If you see that any dependent libraries are missing, ensure that you've added the environment settings to the
session running the job service, or consult your ODBC driver vendor's documentation.
If an error occurs when using the Connection Manager, invoke it from the command line by using the -c option,
and use the -d option to show details in the log.
Example
$LINK_DIR/bin/DSConnectionManager.sh -c -d
Parent topic: Configure drivers with data source name (DSN) connections [page 119]
Related Information
The DataDirect driver is included with your SAP Data Services installation to use with applicable databases
such as Microsoft SQL Server or DB2 on zSeries or iSeries.
Before you manually configure the ODBC DataDirect driver for your database, ensure the following:
Administrator Guide
128 PUBLIC Server Management
• Ensure that you have the proper permission to edit the odbc.ini and the odbcinst.ini files.
• Determine the applicable DataDirect version and database version by looking in the latest Product
Availability Matrix (PAM) on the SAP Support Portal.
• Consider using the SAP Data Services (DS) Connection Manager to automatically add driver and data
source information to the .ini files in $ODBCINI and $ODBCINST.
To manually configure the DataDirect ODBC driver for the applicable database type on a Linux or Unix platform,
perform the following steps:
[test_Microsoft_SQL_SERVER]
[test_DB2]
[test_Microsoft_SQL_SERVER]
Driver = <install_location>/lib/[DA][DD]sqls<xx>.so
[test_DB2]
Driver = <install_location>/lib/[DA][DD]db2<xx>.so
Note
A Rebranded Library value is required when you use the SAP rebranded DataDirect driver.
For Microsoft SQL Server:
[test_Microsoft_SQL_SERVER]
Driver = <install_location>/lib/[DA][DD]sqls<xx>.so
RebrandedLib = TRUE
[test_DB2]
Driver = <install_location>/lib/[DA][DD]db2<xx>.so
RebrandedLib = TRUE
5. Add the data source to the ODBC vendor configuration file referenced by the Unix variable $ODBCINI.
Administrator Guide
Server Management PUBLIC 129
Note
The version number and driver filenames are subject to change with each release. Access
$LINK_DIR/DataDirect/odbc/odbc.ini to view the current version information.
Note
For Microsoft SQL Server, the prompts are bolded for illustration:
[test_Microsoft_SQL_SERVER]
Driver=<install_location>/lib/[DA][DD]msss<xx>.so
Description=DataDirect <current version number> SQL Server Wire Protocol
AlternateServers=
AnsiNPW=Yes
ConnectionRetryCount=0
ConnectionRetryDelay=3
Database=<database_name>
EnableQuotedIdentifiers=1
HostName=<SQL_Server_host>
LoadBalancing=0
LogonID=
Password=
PortNumber=<SQL_Server_server_port>
QuotedId=No
ReportCodePageConversionErrors=0
DriverExpirationBehavior=1
[test_DB2]
Driver=<install_location>/lib/[DD][DA]db2<xx>.so
Description=DataDirect <current version number> DB2 Wire Protocol
AddStringToCreateTable=
AlternateID=
AlternateServers=
ApplicationUsingThreads=1
AuthenticationMethod=0
CatalogSchema=
CharsetFor65535=0
#Collection applies to z/OS and iSeries only
Collection=<collection_name>
ConnectionRetryCount=0
ConnectionRetryDelay=3
#Database applies to DB2 UDB only
Database=<database_name>
DefaultIsolationLevel=1
DynamicSections=200
EncryptionMethod=0
GrantAuthid=PUBLIC
GrantExecute=1
GSSClient=native
HostNameInCertificate=
IpAddress=<DB2_server_host>
LoadBalancing=0
#Location applies to z/OS and iSeries only
Location=<location_name>
LogonID=
Password=
PackageCollection=<package_collection>
PackageOwner=
Administrator Guide
130 PUBLIC Server Management
ReportCodePageConversionErrors=0
TcpPort=<port number>
TrustStore=
TrustStorePassword=
UseCurrentSchema=1
ValidateServerCertificate=1
WithHold=1
XMLDescribeType=-10
Example of a driver manager configuration file for DSN connection [page 131]
Each ODBC driver you use has information in the driver library files, which are editable only by
authorized users.
Task overview: Configure database connectivity for UNIX and Linux [page 110]
Related Information
Each ODBC driver you use has information in the driver library files, which are editable only by authorized
users.
When you add a data source name, enclose the names in square brackets ([]). Enter data source properties on
subsequent lines in the following format: PropertyName = PropertyValue.
Example
[test_source]
Driver = /path/to/driver
OdbcConformanceLevel =
LazyLoading =
ODBC64SqlHandleSize =
ODBC64SqlLenSize =
DriverUnicodeType =
The data source in this example is [test_source], which can be loaded using the specified driver library file.
SAP Data Services uses default values when you leave optional properties blank.
Administrator Guide
Server Management PUBLIC 131
Follow these guidelines when you edit the Data Services ODBC file named <LINK_DIR>/bin/ds_odbc.ini
file:
• Define at least one driver property for each data source name. A driver property allows the driver manager
to load the driver when it connects to the database.
• Begin any comment line with a pound sign (#) as the first character to denote a comment.
• Data Services ignores all leading blanks and trailing blanks in data source names and properties.
The following table contains the data source configuration parameters (Keys) in the ds_odbc.ini, whether is
required, valid value description, and an example.
Administrator Guide
132 PUBLIC Server Management
Key Required Valid value Example
Note
An ODBC driver can be
compliant to either 2.x or
3.x or both. The UNIX
ODBC driver manager
detects if the driver is 2.x
or 3.x compliant and
loads the respective
compatible ODBC API
functions. If the driver is
both 2.x and 3.x compli-
ant, then the driver man-
ager only loads the 2.x
ODBC API. You can over-
ride this behavior by
specifying, for example,
OdbcConformanceL
evel = 3.0. As a re-
sult, the ODBC driver
manager only loads 3.x
ODBC API functions.
Administrator Guide
Server Management PUBLIC 133
Key Required Valid value Example
Administrator Guide
134 PUBLIC Server Management
Key Required Valid value Example
ODBC64SqlHandleSize Yes, for 64-bit platforms only. Specifies the size of the ODBC64SqlHandleSize
ODBC handle. =64
Enter 32 or 64.
Note
This option is required
only for 64-bit platforms.
Administrator Guide
Server Management PUBLIC 135
Key Required Valid value Example
ODBC64SqlLenSize Yes, for 64-bit platforms only Specifies the SQL length size ODBC64SqlLenSize=64
of the ODBC driver.
Enter 32 or 64.
Note
This option is required
only for 64-bit platforms.
Administrator Guide
136 PUBLIC Server Management
Key Required Valid value Example
DriverUnicodeType Yes, for ODBC drivers that Specifies the ODBC driver DriverUnicodeType=2
only support W functions
Unicode type.
only.
Enter one of the following in-
tegers:
• 1: For UTF16
• 2: For UTF8
Note
This option is required
only for ODBC drivers
that only support W
functions.
Administrator Guide
Server Management PUBLIC 137
4. If the status doesn't appear in the State column, click in the empty column and the applicable state
appears. The state should be “Installed”.
Note
The list of drivers in the ODBC Driver Selector is the same as the list of drivers in the ODBC Data Source
Administsrator for data sources using DSN connections.
5. Click OK.
Open the DSConf.txt file and verify that the data source and driver are present in the [DBClientDrivers]
section. The format is <DATASOURCE_VERSION>=<ODBC_DRIVER>.
The License Manager allows you to add and delete licenses that you receive from SAP, such as when you buy
the software or when your current license expires.
The License Manager is a command-based utility. For a list of commands and location of the License Manager,
see Command line reference: License Manager [page 229].
Use the Data Services Server Manager for many tasks, such as to create, edit, or delete Job Servers and
Access Servers after installation.
The Server Manager user interface consists of several tabs in which to view, add, and edit your environment
related to SAP Data Services. The following table describes the tabs in the Server Manager.
Tab Description
Administrator Guide
138 PUBLIC Server Management
Tab Description
Miscellaneous Specify the SMTP server settings and Windows cluster set-
tings.
To use the Server Manager for Job Servers, perform the following steps:
1. Open the Windows Start menu, expand SAP Data Services <version>.
2. Right-click Data Services Server Manager and select More Run as administrator.
From the Job Server Configuration Editor you can perform the following tasks:
• Add a new job server and associate it with an existing repository.
• Edit an existing Job Server.
• Delete an existing Job Server.
• Resync an existing Job Server with the associated repository.
4. Decide which configuration task to perform:
Note
If the Job Server has associated repositories, you must first delete those and then click OK before
you can delete the Job Server.
5. In the Job Server Properties window, enter configuration information for the Job Server.
6. In the Associated Repositories section, configure any local or profiler repositories that you want to
associate with the Job Server. Each Job Server must be associated with at least one local repository.
a. If you want to use a server name connection (for DB2, MySQL, SQL Anywhere, or SAP HANA database
types), clear the Use data source name (DSN) checkbox.
b. If you want to use a server name connection for an Oracle database type, clear the Use TNS name
checkbox.
c. When you have finished configuring associated repositories, including one default, click OK.
7. Click OK to return to the Server Manager window.
8. Click Restart to restart the services with any updated configurations.
Administrator Guide
Server Management PUBLIC 139
Associating a Job Server to a repository [page 141]
A repository must have a Job Server for moving data into and out of SAP Data Services.
When you open a Job Server, the Server Manager displays information about the Job Server.
The following table describes the Job Server Properties listed in the Server Manager.
Property Description
Job Server name Specifies a name that uniquely identifies the Job Server.
Job Server port Specifies the TCP/IP port that the Job Server uses to receive
commands from the Designer and the Access Server. If a
computer hosts multiple Job Servers, each Job Server must
have a unique port number. Additionally, the post number
must not be used by another process on the computer.
If you are unsure of which port number to use, use the de-
fault port number and increment it for each additional Job
Server that you configure.
Support adapter and message broker communication Enables communication between the Job Server and adapt-
ers. Each computer that hosts adapters must have exactly
one Job Server designated to manage them.
Use SSL protocol for adapter, message broke and communi- Enables SSL security on the communication paths between
cation the Job Server and any adapters or message brokers.
Communication port Specifies the TCP/IP port number that the Job Server uses
for communicating with adapters. The default port is 4001.
Related Information
Administrator Guide
140 PUBLIC Server Management
6.8.1.2 Associating a Job Server to a repository
A repository must have a Job Server for moving data into and out of SAP Data Services.
For more information about Job Servers, and other standard components, see Architecture overview [page 12].
In addition to a repository association, each Job Server can be associated with other local and profiler
repositories.
1. Open the Data Services Server Manager from the Windows Start menu selecting to run as an
administrator.
2. Select Configuration Editor.
Note
8. Select Apply to save your entries and associate the repository with the Job Server.
The associated repository entry updates with the Job Server's computer name and port number.
9. To change the default repository setting, perform the following substeps beginning in the Job Server
Configuration Editor dialog box:
a. Select the Job Server with which the repository is associated and select Edit.
b. Select the repository under Associated Repositories and select Edit.
c. Under Repository Information, enter the password.
d. Check or uncheck Default repository, indicating whether this repository is the default repository for the
Job Server.
e. Select Apply.
Restriction
You can change only whether an associated repository is the default for the Job Server. To change
other configurations, delete the existing associated repository and add a new one with the updated
configuration information.
Administrator Guide
Server Management PUBLIC 141
a. Select the Job Server with which the repository is associated and select Edit.
b. Select the repository under Associated Repositories and select Delete.
c. Under Repository Information, enter the password.
d. Select Apply to remove the associated repository from the Job Server configuration.
Related Information
There are times when you must resynchronize a Job Server with the local repository, such as after a
reinstallation.
The following lists situations when you must resynchronize the Job Server and the local repository:
• The Job Server information isn't available or not correct in the local repository.
• You've uninstalled SAP Data Services and reinstalled the same version, without creating a new local
repository.
• You create a new local repository using the Repository Manager after creating a repository and Job Server
when you installed Data Services.
1. Open the Data Services Server Manager from the Windows Start menu, and select to run as an
administrator.
2. Select Configuration Editor.
Administrator Guide
142 PUBLIC Server Management
Related Information
Configure runtime resources to control Job Server operations, such as pageable cache or parallel processes.
Note
For memory-intensive operations such as Group By, Order By, and Detailed profiling, specify a
pageable cache directory that fulfills the following criteria:
• The directory contains enough disk space for your data. To estimate the amount of space required for
pageable cache, consider factors such as:
• Number of concurrently running jobs or data flows.
• Amount of pageable cache required for each concurrent data flow.
• The directory exists on a separate disk or file system from the SAP Data Services system and
operating system (such as the C: drive on Windows, or the root file system on UNIX systems).
• The directory limits the disk space that data flows consume. The pageable cache uses all available disk
space on the file system that contains the pageable cache directory. So, to limit the disk space that
data flows consume, create a file system (or partition on Windows) with a limited size. Use the new file
system (partition on Windows) as the pageable cache directory.
The software uses this directory in the following situations:
• For pageable caching, which is the default cache type for data flows.
• When selecting a file transfer type and Automatic is specified in the Data_Transfer transform.
3. In the Peer-to-peer options area, change the values for Start port and End port to restrict the number
of ports used by the software. The default values for Start port and End port are 1025 and 32767,
respectively.
The software uses these ports for peer-to-peer communications when sending data between data flows or
sub data flows.
Note
If you want to enable SSL security on the communication paths between data flows and sub data flows,
select Use SSL protocol.
Administrator Guide
Server Management PUBLIC 143
Related Information
When you configure the location for an Access Server installation, SAP Data Services creates space for the
Access Server log files.
1. Open the Server Manager, click the Access Server tab and click Edit.
2. Decide which configuration task to perform:
Property Description
Directory Specifies the location of the log files for this instance of the Access Server. Click
the ellipses button to browse to the Log directory under the directory where
you installed the software.
Communication Port Specifies the port on this computer that the Access Server uses to listen for
incoming messages from clients.
Make sure that this port number is unused and is unique for each Access
Server.
Note
Additional Access Server parameters can be viewed by typing
AL_AccessServer at the command line. For more information, see
“Real Time Performance” in the Management Console Guide.
Use SSL protocol Enables SSL security for real-time messaging on this Access Server.
Enable Access Server Controls whether the Access Server is automatically started when the Data
Services service starts.
Administrator Guide
144 PUBLIC Server Management
Related Information
Use the Server Manager to configure the paths to SSL certificates and keyfiles.
Note
By default, the paths for the SSL certificate and keyfiles are automatically configured during installation.
You do not need to change them unless you want to use your own certificates.
Note
If you change the SSL certificate configuration, you must resync all repositories associated with the Job
Server before you can run jobs successfully.
Note
The server certificate must be in PEM format. Valid extensions for certificates in the trusted certificates
folder include .pem, .crt, and .cer. Regardless of the file extension, all certificate file contents must
be in PEM format.
3. If you want to specify a private key password file, select Use server private key password file and specify the
location of the password file.
4. Click Close and Restart to close the Server Manager and restart any Data Services servers on the machine
with the updated certificate information.
Note
The certificate information specified in the Server Manager applies to all Data Services servers running on
that physical machine. For example, any Job Servers, Access Servers, and so on.
Administrator Guide
Server Management PUBLIC 145
2. If you do not see all the processes expected, check for error messages in the Job Server event log in
<LINK_DIR>/log/<JobServer name>/server_eventlog.txt.
Note
Use the Server Manager to create, edit, or delete Job Servers and Access Servers after installation on your
UNIX platform.
The following tables describe the options that the Server Manager displays.
Option Description
Server name This name uniquely identifies the Job Server. The Job Server
name cannot be changed.
TCP/IP port number The port number is a TCP/IP port that the Job Server uses to
receive commands from the Designer and an Access Server.
If a computer hosts multiple Job Servers, each Job Server
must have a unique port number. Choose a port number that
is not used by another process on the computer. It's recom-
mended that you use 3500. If you are unsure of which port
number to use, use the default port number and increment it
for each additional Job Server you configure.
Supports adapter communication on port If this computer hosts adapters, you must designate one
(and only one) Job Server to support them. Once a Job
Server is set to support adapters (a port is entered and
saved), it is marked on the Job Server Configuration screen
with this label.
Option Description
Pageable cache directory This directory contains the pageable cache that the software
uses for memory-intensive operations and for file transfer
types when Automatic is specified in the Data_Transfer
transform.
Administrator Guide
146 PUBLIC Server Management
Option Description
Start port The software uses this starting port number for peer-to-peer
communication between data flows or sub data flows that
are running on different Job Servers. The default is 1025.
Option Description
Server number This sequence number uniquely identifies the Access Server
on this machine. The Access Server number cannot be
changed.
Communication port This port number is used to communicate between the Ac-
cess Server and the Administrator. The default is 4000.
Option Description
• Running
• Not running
Option Description
Administrator Guide
Server Management PUBLIC 147
Option Description
Sender The email address that will appear in the From field of the
email.
For information about configuring an Access Server, see the Management Console Guide.
Use the Server Manager executable to configure the Job Server and to configure a repository Job Server for
your Unix or Linux platform.
Before you perform the following steps, ensure that you set all required environment variables.
The following steps provide an overview of the process, and don't include all of the details specific for each
database type.
1. Start the Server Manager by opening a command prompt and typing the following commands:
$ cd $LINK_DIR/bin/
$ . ./al_env.sh
$ ./svrcfg
Oracle <username>@<TNSname_user>
DB2
MySQL
Administrator Guide
148 PUBLIC Server Management
Database Type Format of Repository String
SQL Anywhere
• The following table contains the formats for a server name connection (also known as DSN-less or
TNS-less connection):
Oracle <username>@<server_SID_user>
DB2
SAP Sybase
3. Enter the command for the applicable configuration task as described in the following table.
If you resynchronize your Job Server configuration with a repository, you must re-add a connection for this
repository to the Administrator. For more information, see the Management Console Guide.
Administrator Guide
Server Management PUBLIC 149
Note
If a computer hosts multiple Job Servers, enter a unique port number for each Job Server.
Additionally, the port number must not be used by another process on the computer.
If you are unsure of which port number to use, use the default port number and increment it for
each additional Job Server that you configure.
c. Enter Y or N for Do you want to manage adapters for the Job Server as applicable.
d. If your database type is SAP Sybase, specify the Sybase server name specified in the Interfaces file.
e. To configure SSL/TLS, enter Y for Do you want to use SSL/TLS 'Y|N'? [Y].
Database Prompt
Administrator Guide
150 PUBLIC Server Management
Database Prompt
Microsoft SQL Server – Azure PaaS • 1: SQL Server Authentication. Valid for Microsoft
SQL Server, Microsoft SQL Server - Azure VM, and
Microsoft SQL Server – Azure PaaS databases.
• 2: Azure Active Directory - Password. Use for the
Microsoft SQL Server – Azure PaaS database.
Note
The Server Manager for UNIX systems does not prompt for the repository password except
when creating a Job Server or adding a repository. To update the repository password in the
<DS_COMMON_DIR>/conf/DSConfig.txt file, enter u. All options use the updated password
from DSConfig.txt file.
6. When you are satisfied with your configuration settings, enter Y to confirm the information is correct.
7. Enter q to quit and then x to exit the Server Manager.
Task overview: Using the Server Manager on UNIX systems [page 146]
Related Information
1. Ensure required environment variables are set, and run the Server Manager.
$ cd $LINK_DIR/bin/
$ . ./al_env.sh
$ ./svrcfg
Administrator Guide
Server Management PUBLIC 151
The Server Manager main screen appears.
2. Enter 4 to configure runtime resources.
The runtime resource information screen appears.
3. Enter e to edit the runtime resource configuration.
4. Accept the default Pageable Cache Directory, or specify a different location.
Restriction
Note
For memory-intensive operations such as Group By, Order By, and Detailed profiling, specify a
pageable cache directory that fulfills the following criteria:
• The directory contains enough disk space for your data. To estimate the amount of space required,
consider factors such as the number of concurrently running jobs or data flows and the amount of
pageable cache required by each concurrent data flow.
• The directory exists on a separate disk or file system from the Data Services system and operating
system.
• The directory limits the disk space that data flows consume. The pageable cache uses all available
disk space on the file system that contains the pageable cache directory. To limit the disk space
that data flows consume, create a file system with a limited size. Use the new file system as the
pageable cache directory.
5. Change the values for Start port and End port to restrict the number of ports used by the software for
peer-to-peer communications. The default values are 1025 and 32767, respectively.
The software uses these ports for peer-to-peer communications when sending data between data flows or
sub data flows that are running on different Job Servers.
6. Specify whether you want to use the SSL security protocol on the communication paths between data
flows and sub data flows.
7. Enter q and then x to exit the Server Manager.
Task overview: Using the Server Manager on UNIX systems [page 146]
Related Information
Administrator Guide
152 PUBLIC Server Management
Configure SMTP email [page 156]
When you configure the location for an Access Server installation, SAP Data Services creates space for the
Access Server log files.
1. Ensure required environment variables are set, and run the Server Manager.
$ cd $LINK_DIR/bin/
$ . ./al_env.sh
$ ./svrcfg
4. When you create or edit an Access Server, specify additional configuration details:
a. If you are editing an existing Access Server, enter the number of the Access Server shown in the
Access Server configuration information screen.
b. Specify the directory for the Access Server.
c. Specify the TCP/IP port that the Access Server should use for communication.
Note
You can configure more than one Access Server on the same computer, but each must have
separate ports. If you enter a port number already in use, an error message appears.
Note
Additional Access Server parameters can be viewed by typing AL_AccessServer at the command
line. For more information, see “Real Time Performance” in the Management Console Guide.
e. Specify whether you want to use the SSL security for real-time messaging on this Access Server.
f. Specify whether you want to enable the Access Server.
5. When you delete an Access Server, specify the number of the Access Server to delete.
Note
When you delete an Access Server, all Access Servers are stopped. When you exit the Server Manager,
any remaining Access Servers restart.
Administrator Guide
Server Management PUBLIC 153
6. When you are satisfied with your configuration changes, enter q and then x to exit the Server Manager.
Task overview: Using the Server Manager on UNIX systems [page 146]
Related Information
Use the Server Manager to configure the paths to SSL certificates and keyfiles.
Note
By default, the paths for the SSL certificate and keyfiles are automatically configured during installation.
You do not need to change them unless you want to use your own certificates.
1. Ensure required environment variables are set, and run the Server Manager.
$ cd $LINK_DIR/bin/
$ . ./al_env.sh
$ ./svrcfg
Note
The server certificate must be in PEM format. Valid extensions for certificates in the trusted certificates
folder include .pem, .crt, and .cer. Regardless of the file extension, all certificate file contents must
be in PEM format.
5. When you are satisfied with your configuration changes, enter q and then x to exit the Server Manager.
Administrator Guide
154 PUBLIC Server Management
The certificate information specified in the Server Manager applies to all Data Services servers running on that
physical machine (for example, any Job Servers, Access Servers, and so on.)
Task overview: Using the Server Manager on UNIX systems [page 146]
Related Information
The SAP Data Services service (AL_JobService) is a daemon associated with $LINK_DIR that starts locally-
configured Job Servers and Access Servers and then monitors them and attempts to restart them if they are
not running.
After you exit the Server Manager, AL_JobService automatically retrieves any changes made to Job Servers
or Access Servers. You do not need to restart AL_JobService.
$ cd $LINK_DIR/bin/
$ . ./al_env.sh
$ ./svrcfg
Note
The second command sets required environment variables before ./svrcfg starts the Server
Manager.
Task overview: Using the Server Manager on UNIX systems [page 146]
Administrator Guide
Server Management PUBLIC 155
Related Information
Use the Server Manager to specify SMTP server settings for the smtp_to email function.
For more information, see “Defining and enabling the smtp_to function” in the Reference Guide.
Parent topic: Using the Server Manager on UNIX systems [page 146]
Related Information
SAP Information Steward uses the Metadata Browsing Service and the View Data Service to connect to and
view data in profiling sources.
When you install SAP Data Services, the installation configures the two services with default settings, and
lists them under the server EIMAdaptiveProcessingServer. You can change the configuration settings to more
effectively integrate Information Steward with your hardware, software, and network configurations.
To change the configuration settings for Metadata Browsing Service and View Data Service, perform the
following steps in the Central Management Console (CMC):
Administrator Guide
156 PUBLIC Server Management
The Properties page opens.
4. Double-click the service to change.
5. Change the configuration as applicable and select Save or Save & Close.
Note
Not all changes occur immediately. If a setting can't change immediately, the Properties page displays
both the current setting (in red text) and the updated setting. When you return to the Servers
management area, the server is labeled as Stale. When you restart the server, it uses the updated
settings from the Properties page and removes the Stale flag from the server.
You can change the following properties of the Metadata Browsing Service.
Service Name Name of the service configuration. Alphanumeric string with a maximum
length of 64. The Service Name cannot
contain any spaces.
Maximum Data Source Connections Maximum number of data source con- integer.
nections that can be opened at any
Default value: 200
time under a service instance.
Retry attempts to launch Service Pro- Maximum number of attempts to Default value: 1
vider launch a new service provider when
there is contention to access a shared
service provider.
Stateful Connection Timeout (seconds) Maximum duration in which a state- Default value: 1200
ful connection is open. Stateful connec-
tions include SAP Applications and SAP
BW Source.
Stateless Connection Timeout (sec- Maximum duration in which a state- Default value: 1200
onds) less connection is open. Stateless con-
nections include all relational database
sources.
Administrator Guide
Server Management PUBLIC 157
Server Configuration Parameter Description Possible Values
Collect Connection Statistics Enable or disable the collection of sta- Default is enabled.
tistic information for each open con-
nection.
Listener Port Port number used to communicate with Four-digit port number that is not cur-
the Data Services back end engine. rently in use.
JMX Connector Port Port number used for the JMX Connec- Four-digit port number that is not cur-
tor. rently in use.
Parent topic: Configuring Metadata Browsing Service and View Data Service [page 156]
Related Information
Administrator Guide
158 PUBLIC Server Management
6.10.2 View Data Services configuration parameters
You can change the following properties of the View Data Service.
Service Name Name of the service configuration. Alphanumeric string with a max-
imum length of 64. The Service
Name cannot contain any spaces.
Listener Port Port number used to communicate with the Data Four-digit integer.
Services backend engine.
Default value: 4012
If you change the port number, you must restart the
EIMAdaptiveProcessingServer for the change to take
effect.
JMX Connector Port Port number used for the JMX Connector. Four-digit integer.
If you change the port number, you must restart the Default value: 4013
EIMAdaptiveProcessingServer for the change to take
effect.
Batch Size (kilobytes) Size of the data to be stored in a view data response. Minimum value: 1000
Minimum Shared Service Minimum number of shared Data Services backend en- Default value: 1
Providers gines that need to be launched at the startup time of
the service.
Maximum Shared Service Maximum number of shared Data Services backend en- Default value: 5
Providers gines that can be launched during the time to service
the view data requests.
Maximum Dedicated Service Maximum number of dedicated Data Services backend Default value: 10
Providers engines that can be launched at any instant of time.
Recycle Threshold Maximum number of requests that will be processed by Any integer.
a service before the Data Services backend engine is
recycled to free memory that was allocated for viewing Default value: 200
data.
Number of attempts to Number of attempts to be made to try launching the Default value: 1
launch service provider Data Services backend engine instance.
Maximum idle time for Maximum number of minutes that a Data Services Default value: 120
shared service provider (mi- backend engine can remain without processing any re-
nutes) quests. After this time is exceeded, the Data Services
backend engine is shut down.
Administrator Guide
Server Management PUBLIC 159
Server Configuration Pa-
rameter Description Possible Values
Log Level Level of logging of trace messages to the log file. Information Steward logs:
If there is more than one instance of View Data • Info: Logging disabled. (same
Service configured in the CMS, the same level of as None)
information is collected from all instances. The log
• Finer: All traces, requests,
level defined for the first running service is the level
and responses.
used.
Data Services logs:
Parent topic: Configuring Metadata Browsing Service and View Data Service [page 156]
Related Information
You can change the following settings for the Data Services Application on the Central Management Console
(CMC).
Setting Description
History Retention Period Number of days to retain the job execution history.
Default value: 30
• If you enter 0, then the software does not retain job history.
• If you enter a negative number, then the software retains job history indefi-
nitely.
Administrator Guide
160 PUBLIC Server Management
Setting Description
Job Server Log Retention Period Number of days to retain the Job Server logs.
Default value: 30
• If you enter 0, then the software does not retain Job Server logs.
• If you enter a negative number, then the software retains Job Server logs
indefinitely.
Job History Cleanup Period Number of seconds from the job start time that the Data Services
Management Console cleans up the bad or crashed job history.
With this setting, you can find jobs that are either running longer than the
normal time, or jobs that have crashed abnormally.
A job that crashes for an abnormal reason fails to update the job history
metadata tables or the local repository, and the software doesn't register an
end time. Therefore, even though the job crashed, the Management Console
may show it as still running.
• If you keep the default of 0, or set to a negative number, then the software
does not clean up the bad or crashed job history.
• If you set to 1 or higher, then the software cleans up the bad or crashed job
history in the set number of seconds from the job start time.
When you enter a positive number in this setting, enter a number that provides
enough time for your longest running jobs to complete. After the time elapses,
any jobs that do not have an end timestamp will be marked as failed. For these
jobs, you can check the log files to discover if the job ended abnormally.
For example, if your longest-running job takes 30 minutes, set this option to
3600 seconds, so that, after an hour from the job start time, the status in the
batch status page in the Management Console shows the job is no longer proc-
essing. That way, you can see a list of jobs that potentially crashed abnormally,
without having to wait a long period of time.
Enable SSL communication for Metadata Specifies whether or not to use SSL communications for Metadata Browsing
Browsing and View Data Services Service and View Data Service of the EIM Adaptive Processing Server.
Other SAP software products, such as SAP Information Steward, use the Met-
adata Browsing Service and View Data Service service to browse and import
metadata and to view the data in connections.
Use Default SSL Settings Specifies whether or not to use the default SSL keystore and certificates.
Default value: No
If you specify No, then you must enter values in KeyStore File, KeyStore
Password, and Key Password.
KeyStore File File name of the keystore that contains the key and all the certificates that are
part of the certificate chain involved in signing the key.
Administrator Guide
Server Management PUBLIC 161
Setting Description
Encryption passphrase Passphrase to use for encrypting passwords that are sent as part of requests
to the Metadata Browsing Service and View Data Service.
Other SAP software products, such as SAP HANA, use this Encryption
passphrase to encrypt passwords when sending an open connection request.
The backend engine will use this passphrase to decrypt the password and
process the open connection request.
Administrator Guide
162 PUBLIC Server Management
7 Monitoring jobs
To view the overall status of a batch job and job statistics, SAP Data Services provides job monitoring tools in
the Management Console Administrator.
Monitor the job execution information of any batch job in a connected repository. Monitor jobs that you run
from the Administrator or from the Designer.
Deleting trace, monitor, and error logs for a batch job [page 169]
View and delete trace, monitor, and error logs for job instances in the SAP Data Services Management
Console.
To view the overall status of each batch job execution and to access more detailed statistics and log files, use
the list in the Batch Job Status tab of the SAP Data Services Management Console Administrator.
Before you perform the following steps, execute the batch job, log in to the Management Console, and open the
Administrator.
To view the overall status of an executed job, perform the following steps:
1. Expand the Batch node on the left of the Administrator window and select the repository name.
The Batch Job Status tab opens at right. The tab shows filter options and a list of each job execution
instance for the selected repository.
2. Optional: Filter the list of batch jobs displayed by performing the following substeps:
Administrator Guide
Monitoring jobs PUBLIC 163
a. Choose a job name from the Job name list.
b. Select Search.
3. Optional: Further filter the list of batch jobs displayed using one of the following Display options:
• To display the instance of the last execution for the job or jobs: Choose Last execution of job and select
Search.
• To display the instances of the job or jobs executed in the specified number of days: Choose Last,
choose the number of days from the Days list, and select Search.
• To display the instances of the job or jobs executed within the specified date range: Choose All
executions, enter a From and To date, and select Search.
4. Optional: Sort a specific column by selecting a column heading and choosing Ascending or Descending in
the Batch jobs history section.
5. View the status indicator in the Status column.
Status indicators
Indicator Description
A green icon indicates that the batch job ran without error.
A yellow icon indicates that the batch job has one or more
warnings.
6. Optional: View the End Time column to see when the job completed.
Note
If a job is running longer than usual, and there's no end time listed, there's an issue with the job, or
the job completed abnormally. When a job completes abnormally, it doesn't update the job history
metadata or the local repository, so there's no end time. You can set a limit for how long jobs display as
running in the Central Management Console. For more information, see Data Services CMC application
settings [page 160].
7. Optional: To view job processing information, select one of the following links under the Job information
column:
Note
Configure jobs to execute by a specific Job Server, or by a server group. If you choose to execute a job
using a server group, use the Batch Job Status tab to see which Job Server actually executed the job.
Note
When the job includes a server group icon in the Job Server column, a server group executed the job.
To view the name of the server group, roll your cursor over the Server Group icon. The Job Server
Administrator Guide
164 PUBLIC Monitoring jobs
listed is the Job Server in the server group that executed the job. If you explicitly select a Job Server to
execute a job, the Server Group icon doesn't appear for the job, even when the Job Server is a part of a
server group.
Related Information
7.2 Statistics
The SAP Data Services Management Console Administrator contains statistics for each job that you run.
Statistics quantify the activities of the components of the job. View the following types of statistics in the
Administrator:
• Job statistics, such as time spent in a given component of a job and the number of data rows that
streamed through the component.
• Data flow object statistics, such as the cache size used by a transform within a data flow.
Related Information
Administrator Guide
Monitoring jobs PUBLIC 165
7.2.1 Viewing job statistics
Before you perform the following steps, run a job for which you want to improve job performance.
To view job statistics in SAP Data Services Management Console, perform the following steps:
1. Expand the Batch node on the left of the Administrator window and select the repository name.
System Configuration Name of the set of datastore configurations that the job
used to connect to source and target databases when you
ran the job.
Job Server Name of the Job Server on which the job ran.
Start Time The date and time that the job started.
End Time The date and time that the job stopped.
Run # The number of times that the job instance ran before it
completed.
After the Monitor log file name, each line in the log provides the information described in the following
table.
Administrator Guide
166 PUBLIC Monitoring jobs
Column name Description
Row Count Indicates the number of rows processed through this ob-
ject. This value updates based on the Monitor sample rate
(# of seconds) set as an execution option on the Execute
Batch Job page.
Elapsed Time Indicates the number of seconds since the object received
its first row of data.
Absolute Time Indicates the number of seconds since the running of this
entire data flow, including all of the transforms, began.
Related Information
Related Information
Administrator Guide
Monitoring jobs PUBLIC 167
7.3 Ignoring error status
When you view the job status logs for jobs with warnings or errors, use the Ignore Error Status button to change
the status indicator to green to indicate that you've reviewed the job logs.
When you initially look at the Batch Job Status page in SAP Data Services Management Console, the Status
column shows icons whose color indicates whether the job ran successfully (green), has warnings (yellow), or
has errors (red). After you've reviewed a job that has warnings or errors, use the Ignore Error Status button to
change the icon to green, and move on to review the next job with warnings or errors.
To use the Ignore Error Status feature, perform the following steps in the Batch Job Status page:
1. Choose the job and examine the logs to discover why the job has warnings or wasn't successful.
2. Select the Ignore Error Status button.
The page refreshes, and the row that you've selected now display a green icon in the Status column.
3. Continue in this manner until you've reviewed all jobs that had warnings or errors.
Related Information
The Batch Job Status page in the SAP Data Services Management Console includes an option to delete
information about how a job ran.
Delete selected rows from the Batch Job Status page. To delete entire log files on a periodic basis, set the Job
Server Log Retention Period or the History Retention Period options in the Central Management Console. For
more information about the log retention settings in the Central Management Console, see History retention
and Job Server log retention [page 105]. See the Management Console Guide for more information about the
Batch Job Status page.
Administrator Guide
168 PUBLIC Monitoring jobs
Related Information
Stop a running batch job in the SAP Data Services Management Console Administrator while you monitor job
status.
The Batch Job Status page includes an option to stop batch jobs while they are running. If a batch job is running
and you need to stop it, select the check box next to the job name and select Abort.
Related Information
7.6 Deleting trace, monitor, and error logs for a batch job
View and delete trace, monitor, and error logs for job instances in the SAP Data Services Management Console.
Delete a set of batch log history files from a Job Server computer and its corresponding repository. The
corresponding Job Server must be up and running to view or delete these logs.
Caution
The trace, monitor, and error log files can contain important files that the system needs to create
regulatory or certified reports as well as statistical tables. Therefore, make sure that the log files you
delete aren't required for reporting purposes. If you're not sure, make backup copies of any files that you
need before you delete the batch job history.
Administrator Guide
Monitoring jobs PUBLIC 169
1. Expand the Batch node on the left of the Administrator window and select the repository name.
Related Information
Administrator Guide
170 PUBLIC Monitoring jobs
8 Lifecycle migration
Lifecycle migration is the process of moving SAP Data Services applications through multiple development
phases to production.
Data Services supports simple and complex migration through all phases into production.
SAP Data Services supports multiple phases to conform to your development requirements.
The ETL application development process typically involves the following distinct phases:
Administrator Guide
Lifecycle migration PUBLIC 171
Data Services supports separate repositories for each development phase to control environment differences.
Your environment can have as many phases as you require. Further, you can create each phase on a different
computer in a different environment with different security settings. Data Services provides migration tools and
mechanisms for moving objects from phase to phase in an ordered manner.
Related Information
Administrator Guide
172 PUBLIC Lifecycle migration
8.1.1 The design phase
In the design phase, define applications that instruct SAP Data Services in your data movement requirements.
The design phase has its own local repository. Data Services stores objects and applications in the local
repository for reuse or modification as your system evolves.
Design your project with migration in mind. Consider the following basic guidelines as you design your
applications:
Related Information
In the test phase, test applications for errors and trace the flow of data without exposing actual data to security
risks.
If you discover data movement problems or other errors during this phase, return to the design phase to
correct the application. Then move the corrected application to the test phase for further testing.
• The first part includes designing the data movement through the application using your local repository.
• The second part includes fully emulating your production environment, including increasing the data
volume.
Use SAP Data Services Management Console Administrator to view feedback through trace, error, and monitor
logs during both parts of the test phase. For more information about the Management Console trace and error
monitoring, read about batch jobs in the Management Console Guide.
In the second part of the test phase, emulate the production repository environment as closely as possible. For
example, schedule jobs through the Central Management Console rather than starting jobs manually.
Administrator Guide
Lifecycle migration PUBLIC 173
Related Information
In the production phase, use actual data, set a schedule to run applications, monitor application performance,
and evaluate results.
After moving objects from test to production, continue to use the SAP Data Services Management Console
Administrator to monitor performance and results. Most issues are caught during testing. However, if the
performance or results still aren't what you expect, return to the test phase to optimize performance and refine
your target requirements.
• View trace and monitoring logs in the Management Console Administrator for information about each job,
and the work flows and data flows contained within the job.
Note
Customize log details in jobs to provide the information that is most helpfulWhen you adjust log
details to provide more information, the job takes longer to complete. Balance job run time against the
information necessary to analyze job performance.
For more information about the Management Console trace and error monitoring, read about batch jobs in
the Management Console Guide.
• Check the accuracy of your data by reviewing output and reports.
If you determine that adjustments are necessary, enhance, or correct your applications.
Example
You notice that an application produces unexpected results. You perform the following tasks:
1. Export the application to the design environment, find issues, and update the application.
2. Export the adjusted application to the test environment.
3. Test the application.
4. When you are satisfied with the results, export changed application to the production environment.
Related Information
Administrator Guide
174 PUBLIC Lifecycle migration
The test phase [page 173]
Migration tools help you create a foundation for your development phases and migration structure.
Prepare for migration using one or both tools based on your development environment. The following table
describes the migration tools.
Tool Description
Multiple configuration datastore and system configurations Use if your source data comes from multiple, homogeneous
systems.
Related Information
Administrator Guide
Lifecycle migration PUBLIC 175
8.2.1 Naming conventions for migration
Use common naming conventions to ensure fast and seamless migration across all systems and phases of your
development environments.
Just as we recommend that you standardize object prefixes, suffixes, and path name identifiers to simplify your
projects internally, we also recommend that you use naming conventions externally for migration purposes.
When you consider using naming conventions for migration, look at your data. Even though the actual data that
you extract, transform, and load is different based on database type, the essential structure of the data should
be the same.
The goal is to make migration for applications between users and development phases as quick and easy
as possible. Using common naming conventions translates to significantly reducing or eliminating time spent
reconfiguring your jobs to work in each specific environment.
Related Information
When you create multi-configuration datastores for a data source, use generic names for the connections to
reduce the time to reconfiguring them in other development phases.
Note
If you use this naming structure, use the multi-configuration datastore migration mechanism.
Administrator Guide
176 PUBLIC Lifecycle migration
Note
When you use this generic, cross-phase naming method, you can't access both design and test from the
same computer because the connection string maps only to one instance. If you require access to both
instances, use the multiple datastore configuration mechanism.
Make connection names meaningful based on the development phase and specific computer system name.
Example
Example
You create a multi-configuration datastore for your data warehouse source. You use the following
connection names for design and test phases, incorporating the phase name and the source type:
When you run a job that uses the data warehouse datastore, select to use the Des_DW for the design phase
and the Test_DW for the test phase.
Alternatively, drop the “Des” and “Test” prefixes and name the connection “DW”. Then, regardless of the
phase, the datastore configuration works without having to create multiple configurations.
Related Information
Administrator Guide
Lifecycle migration PUBLIC 177
8.2.1.2 Directory names
Use logical directory names, such as x:\, or point to common local drives to standardize directory locations.
Example
Since every computer has a C:\ drive, pointing to the directory location, C:\TEMP is a reproducible
standard.
Related Information
Provide the same owner name for all database instances with the same schema structure from which you read
and to which you load data.
Regardless of the name, the owner of each schema structure can vary, and SAP Data Services reconciles them.
Administrator Guide
178 PUBLIC Lifecycle migration
Parent topic: Naming conventions for migration [page 176]
Related Information
Use multi-configuration datastores and system configurations as tools for reducing the tasks required to
execute the same logic against different datastore environments.
With datastore and system configurations, migration between development phases becomes faster and more
simplified.
For more information about multiple configuration datastores and system configurations, see the Designer
Guide.
Administrator Guide
Lifecycle migration PUBLIC 179
Multiple configurations in multi-user environments [page 180]
An efficient way to streamline migration of datastore configurations in a multi-user environment is to
use multiple configurations in one datastore.
Related Information
In a multi-user development environment, a team can work on an application during the design, testing, and
production phases. Further, different teams can work on the phases simultaneously.
A team uses a central repository to store, check in, and check out objects that belong to the primary
application. Individual team members work on objects checked out from the central repository in their local
repository, then check in the changed object to the central repository as a version. The central repository
preserves all versions of an application's objects, allowing you to revert to a previous version if needed.
The easiest way to set up your environment to work with multiple users is by establishing the same
environment naming standards for each user. In each developer's environment, the configuration is different.
For example, a database connection string points to their local database.
However, if implementing these naming standards isn't possible, you can still save time and streamline your
multi-user environment by using multiple-configuration datastores.
Example
If developers on a team use databases with the same metadata structure but different database instances
and owners, define a datastore configuration for each developer on the team. Map different owners to a
common set of aliases used by all. This way, the owners can share and contribute to the same projects
without having to set up their datastore connection information each time they check out a project from
the central repository.
Administrator Guide
180 PUBLIC Lifecycle migration
Related Information
Use datastores with multiple configurations for faster migration, and then, create system configurations to
facilitate migration in a multi-user environment.
Without multiple configuration datastores, each time you export and import from one repository to another,
you need to reconfigure the datastore connection to work with the new repository. With multiple configurations
in a datastore, migrating to a new environment involves opening the datastore and selecting the configuration
for the new environment.
The following diagram shows the migration of a job. The multiple configuration datastore has three
configurations. For each new repository, the configuration changes based on the repository.
All objects that you include in a multiple configuration datastore must share the same owner.
Administrator Guide
Lifecycle migration PUBLIC 181
System configurations
A system configuration contains a group of selected datastore configurations. With system configurations,
you can associate substitution parameter configurations with the system configuration. SAP Data Services
maintains system configurations separate from jobs. You can't check in or check out system configurations
from a central repository.
Note
You must create datastore configurations for the datastore in your repository before you can create system
configurations.
The following diagram illustrates multiple datastore configurations in a single system configuration.
Administrator Guide
182 PUBLIC Lifecycle migration
Parent topic: Datastore and system configurations [page 179]
Related Information
Decide which migration mechanism to use to migrate aplications from one development phase to the next.
Choose a migration mechanism based on several criteria, such as project size, team size, and types of objects
to migrate. SAP Data Services provides two migration mechanisms:
Administrator Guide
Lifecycle migration PUBLIC 183
Multi-user development migration [page 185]
Multi-user development migration in SAP Data Services includes advanced features, like labeling and
filtering, to provide flexibility and control in managing application objects.
Related Information
Export and import migration in SAP Data Services involves exporting applications from the local repository in
one phase, to the local repository in another phase.
Alternately, instead of importing to another local repository, use an intermediate file and then import the jobs
into another local repository.
Consider using the export and import mechanism for the following environment:
The following diagram shows the movements between three repositories: Design, Test, and Production. The red
lines show an indirect route using a temporary file between the export and import. The blue lines show a direct
route from one repository to the next repository.
Administrator Guide
184 PUBLIC Lifecycle migration
Example
Related Information
Multi-user development migration in SAP Data Services includes advanced features, like labeling and filtering,
to provide flexibility and control in managing application objects.
Instead of exporting and importing applications like you would for simpler environments, multi-user
development provides a more secure check-in, check-out, and get mechanism. Multi-user migration uses a
central repository to store the primary copies of your application elements.
Administrator Guide
Lifecycle migration PUBLIC 185
• Team includes multiple developers or multiple teams of developers.
• Teams work use interdependent parts of Data Services applications through all phases of development.
For more information about migrating multi-user jobs, see the Designer Guide.
Related Information
To determine the best mechanism to use, examine factors, such as the size of your development team, the size
of your projects, and the complexity of your projects.
Not all situations comply exactly with our guidelines for determining the mechanisms and tools to use for
migration.
SAP Data Services supports a multi-user environment, however, a multi-user environment isn't required on
all projects. If your project is small to medium and consists only of one or two developers, then a Central
Repository isn't a solution for integrating the work of the developers.
Example
Two consultants worked on an HR data mart application. Instead of using a central repository, the
consultants worked in the following manner:
Consultant 2 used the export utility to export the completed new section from the copy of the local
repository into the original local repository. Then consultant 2 created a copy of the local repository. The
copy wrote over the previous copy.
Use the following matrix to help determine which mechanism and tools work best in your environment.
Legend:
• X = Optimal solution
• O = Compatible solution
• blank = Not applicable
Administrator Guide
186 PUBLIC Lifecycle migration
Migration Mechanism Migration Tool
Team: Multiple X X O
Databases: Different X X
source and target da-
tabases between the
environments
Requirement: A “fast O X
and easy” migration
solution
Related Information
Use the flexibility of the export and import features in SAP Data Services to migrate projects with single and
multiple developers in different development environments.
When you export a job from a test repository to a production repository, change the properties of objects being
exported to match your production environment, for example:
• Datastore definitions
• Application locations
• Database locations
• Login information
Choose to export objects directly to another repository or indirectly to a flat file (ATL or XML) and then to
another repository. You must be able to connect to and have write permission for target repositories, and the
current and new repository versions must match.
Restriction
Administrator Guide
Lifecycle migration PUBLIC 187
The export editor [page 188]
The SAP Data Services Designer Export editor enables you to select individual objects, object trees,
and all objects within the tree for exporting.
Related Information
The SAP Data Services Designer Export editor enables you to select individual objects, object trees, and all
objects within the tree for exporting.
Add the objects to export using drag and drop from the object library into the Export editor. When you select
objects, such as work flows, Data Services adds all associated objects to the Export editor. Select objects in the
Export editor to exclude from the export, if applicable.
Example
Export a work flow and all tables contained in the work flow, but exclude the associated data flow.
After you've specified all objects to export, select the file or repository as the target object for the export.
When you export objects to a file, enter a passphrase so that Data Services encrypts all passwords associated
with the exported objects. Later, you must enter the passphrase when you import the objects to the target
environment.
Administrator Guide
188 PUBLIC Lifecycle migration
Parent topic: Migrate with export and import [page 187]
Related Information
When you export objects directly to another repository, you change environment-specific information defined
in datastores and file formats to match the new environment.
Before you export objects from one repository to another repository, ensure that the repositories are created
and that they're the same versions.
To export objects from one repository to another repository, perform the following steps, starting in SAP Data
Services Designer:
1. Right-click an object to export from the object library and select Export.
The Export editor opens in the workspace.
2. Drag and drop additional objects to export from the object library to the Objects to export list.
3. Optional: To exclude objects from export:
a. Right-click the applicable object or tree in the Export editor.
b. Select Exclude.
A red “X” appears on the icon that represents the excluded objects. If you change your mind, you can
add back any object with a red “X”.
4. Right-click an empty area of the Export editor and choose Export to repository.
The login dialog box opens for the Central Management Console (CMC)
5. Enter your user credentials for the CMC and select Log on.
After a successful login, the CMC displays a list of repositories available to your user name.
6. Select the applicable repository for the export target and select Next.
The following table shows the applicable values in the Destination status column. The values reflect the
status of the component in the target database and the proposed action.
Administrator Guide
Lifecycle migration PUBLIC 189
Destination Status Action
Change the Destination Root Path for any file format to match the new destination.
13. Select Finish.
Data Services copies objects in the Export editor to the target destination. When copying is complete, the
objects display in the Output window. The Output window shows the number of objects exported as well as a
list of any errors.
Related Information
When you export objects to an ATL or XML file, the process doesn't provide options to change environment-
specific information.
To export objects to a file, perform the following steps in SAP Data Services Designer:
Administrator Guide
190 PUBLIC Lifecycle migration
3. Optional: To exclude objects from export:
a. Right-click the applicable object from the specific area of the Export editor.
b. Select Exclude.
A red “X” appears on the icon that represents the excluded object. If you change your mind, you can
add back any object with a red “X”.
4. Right-click an empty area of the Export editor and choose Export to ATL file or Export to XML file, based on
the type of file format for the export.
Tip
Even though ATL is the Data Services' proprietary format, XML is easier to read the repository content.
You can also use XML with the object creation XML toolkit.
By default, Data Services doesn't include non-executable elements in an export to an XML file for improved
readability.
Example
The order of transforms in a data flow isn't included in the export, but Data Services automatically
arranges the transforms when you import the data flow into the next phase of Data Services.
Note
The passphrase is required when you import the file so that the passwords are also imported. If you use
an incorrect passphrase, or don't enter a passphrase on import, Data Services imports the objects but
removes the stored passwords.
If you select the option Export to XML file, your SAP Data Quality Management SDK developer can configure
Data Quality transforms within Data Services Designer, and export the settings to an XML file to use with the
Data Quality Management SDK.
However, if you employ Data Services as a configuration tool for the Data Quality Management SDK, Data
Services doesn't create a change log for changes to the configuration.
You can use the Data Services central repository concept to manage changes to the Data Quality transforms,
but no change log is created.
Administrator Guide
Lifecycle migration PUBLIC 191
Related Information
When you export an entire repository to a file, SAP Data Services also exports all jobs and their job execution
schedules.
• You can't export and import schedules without including the associated job and the job's repository.
• Data Services doesn't provide options to change environment-specific information.
1. In Data Services Designer, right-click in the Local Object Library and choose Repository Export To
File.
2. Browse the directory to change the location, set the file type (XML or ATL), and enter a name for the file.
3. Select Save.
4. Enter a case-sensitive passphrase to encrypt all passwords that are stored in the repository and select
Export.
Note
The passphrase is required when you import the file so that the passwords are also imported. If you use
an incorrect passphrase, or don't enter a passphrase on import, Data Services imports the objects but
removes the stored passwords.
Related Information
Administrator Guide
192 PUBLIC Lifecycle migration
8.4.5 Importing objects or a repository from a file
After you export objects to an ATL or XML file, import the objects to a repository in the target environment.
Before you perform the following steps, export objects from an instance of Data Services to an ATL or XML file.
Ensure that the target repository has the same version as the source repository.
Note
Importing objects or an entire repository from a file overwrites existing objects with the same names in the
destination repository.
To import objects or a repository from an ATL or XML file, perform the following steps in Data Services
Designer:
1. Right-click in the object library and choose Repository Import from File .
Import an individual file or an entire repository by selecting ATL, XML, DMT, or FMT from the list.
3. Select a file to import and select Open.
A Data Services warning appears, if applicable, telling you that the imported file overwrites existing objects.
Select Yes to continue.
For ATL and XML file types, the Import Plan dialog box opens.
4. Select objects to import in one of the following ways:
• Select Import to import all objects listed in the Import Plan dialog box.
• Highlight objects and use the buttons at the bottom of the window to include or exclude the objects
during import and select Import.
• The following table describes the buttons at the bottom of the Import Plan dialog box.
Option Description
Administrator Guide
Lifecycle migration PUBLIC 193
Option Description
Exclude Tree Select to exclude the selected object tree from the list
of objects to be imported.
Example
Select a project parent object and select Exclude
Tree. The project object and all jobs in the project
appear with a red “X” for exclusion from the im-
port.
Example
If you select a project tree and select Exclude
Tree, but you decide to import one or two of the
jobs in the project, select the job or jobs within
the project and select Include.
Include Tree Select to include the selected parent object and all
child objects in the import. If you've previously ex-
cluded the tree, the red X on all icons disappears.
When you import the tree, the parent and all children
objects are copied to the destination.
Select All Select to include all objects. The red “X” disappears
from any objects that had a red “X”, and all other
listed objects are included in the import.
5. Enter the passphrase to decrypt the passwords and include them in the import.
6. Select Import.
Note
If the passphrase is incorrect, or if you select Import without entering a passphrase, Data Services
continues with the import, but doesn't import the passwords. When Data Services doesn't import the
passwords, you must set the passwords manually.
7. Perform any additional steps based on the file type you import. The following table describes additional
steps based on file type.
Administrator Guide
194 PUBLIC Lifecycle migration
File type Information
ATL file from an earlier version of Data Services Displays a warning that the version of the ATL file is older
than the repository version, and that the ATL file you're
about to import can contain objects that don't make opti-
mal use of your upgraded repository.
Example
New features and options in the current version of
Data Services may not be available in the imported
ATL file.
Workaround: Before you import the ATL file into the newer
version of Data Services, import it into a repository with
the same version as the ATL, then upgrade the repository.
Options:
• Cancel the import by selecting No to the warning.
• Continue the import by selecting Yes to the warning.
ATL file saved from a repository that is newer than your Displays an error that the version of the ATL file is newer
current version than the repository version, and that the file can't be im-
ported.
Related Information
To avoid data loss by accidentally deleting or overwriting data, adopt the best practice of backing up your
repositories on a regular schedule, and especially before migration.
During the migration process, accidents can happen. Therefore, before you migrate from one development
phase to the next, back up your repositories. If the import process overwrites any data, use the backup copy to
restore your lost objects.
Administrator Guide
Lifecycle migration PUBLIC 195
To back up repositories, follow instructions from the database management system that supports the
repository.
Related Information
After you migrate to a new environment, performance is affected by factors such as different locales between
source and target data sources.
The cause
Data Services allows you to use different codepages for your source and target databases without causing
errors. Data Services attempts to treat equivalent settings without any transcoding. However, mismatched
locales can result in performance degradation from the transcoding process during job execution.
Example
• Data Services, the local repository, and the Job Server are on the same computer.
• There's one datastore with two configurations: The source database and the target database.
Administrator Guide
196 PUBLIC Lifecycle migration
Solution
If you notice a significant difference between the speed of design and test environments after migration, check
the locale settings of the data sources in the test environment.
Related Information
Administrator Guide
Lifecycle migration PUBLIC 197
9 The Enhanced Change and Transport
System (CTS+)
CTS+ transports ABAP and non-ABAP objects between systems for lifecycle management.
Use CTS+ to transport ABAP and non-ABAP objects to a new system, such as upgrading to a new service pack.
Note
To migrate from one environment to another environment, such as design to test, use one of the migration
mechanisms described in Migration mechanisms [page 183].
CTS or CTS+
CTS and CTS+ are part of SAP Solution Manager and SAP NetWeaver. CTS+ is a newer version of CTS, which
supported transporting only ABAP objects.
For simplicity, we use the term CTS to mean one of two things:
If you don't need a transport management system like CTS, use Object Promotion in the SAP Data Services
Management Console Administrator to transport objects over secure FTP. For more information about Object
Promotion, see Object promotion management [page 200].
To use CTS in your environment, ensure that you use the following:
• SAP Data Services 4.2 Support Pack 6 patch 1 and later versions
• SAP Solution Manager or SAP NetWeaver that supports a separate CTS+ plug-in, or a version that has the
CTS+ plug-in included in the installation.
Transport the following Data Services objects, and their dependents, using CTS:
• Projects
• Jobs
Administrator Guide
198 PUBLIC The Enhanced Change and Transport System (CTS+)
• Workflows
• Dataflows
• File formats
• Functions
• Datastores (as top-level object only)
For complete information about CTS+, see the Configuration Guide for CTS+ for version requirements.
Administrator Guide
The Enhanced Change and Transport System (CTS+) PUBLIC 199
10 Object promotion management
The object promotion tool in SAP Data Services Management Console Administrator enables you to move one
or more objects from one environment to another environment using FTP or shared directories.
To maintain security in both source and target environments, configure the environments so that there is no
direct access between them. Also, actions such as exporting and importing objects, and creating export and
import configurations, require specific user types and application or repository rights.
Understand the special requirements for object promotion, such as user types, application rights, and shared
directory requirements.
The following table is an overview of the special requirements for configuring and using the promotion
management feature.
Administrator Guide
200 PUBLIC Object promotion management
Considerations Description
User rights and permissions To configure promotion management, and to export and im-
port objects, the Management Console requires that users
have specific rights and permissions.
Example
If you have a design, test, and production environment,
repositories in each environment must have the same
Data Services version.
Datastore reconfiguration You must reconfigure datastores after import for the follow-
ing reasons:
Related Information
Administrator Guide
Object promotion management PUBLIC 201
Before you export and import objects [page 209]
Object promotion options [page 209]
Exporting objects [page 210]
Importing objects [page 212]
Export and import trace and error log [page 214]
User and rights management [page 53]
Detailed application rights [page 55]
Detailed repository rights [page 67]
The user who starts the Server Intelligence Agent (SIA) server for the shared directories must at least be a SAP
Data Services user with full read and write access to the shared directories.
If you use shared directories for object promotion, and the Data Services user who starts the SIA server for the
shared directory doesn't have full read and write access to the directory, the export and import configurations
fail validation.
Before you can complete an export or import using the shared directories, you must reset the failed
configuration.
• Data Services user must have the application right: Manage Object Promotion Configurations.
• Open the export and/or import configuration that failed.
• Select Test, or select Save.
After resetting the failed configuration, ensure that a user with full read and write access to the shared
directories restarts the SIA server.
Related Information
If you export the same objects multiple times, and them import the objects, SAP Data Services Management
Console imports the objects sequentially by export date.
If you import objects that you've already imported, the Management Console doesn't overwrite the objects
in the target system. It displays all imported objects in the Import Configuration page. Objects that you've
Administrator Guide
202 PUBLIC Object promotion management
imported multiple times appear in a group, with the objects in the group listed sequentially based on export
date.
Related Information
The tasks for configuring and performing object promotion in SAP Data Services Management Console require
the correct user type, user group, application rights, or repository rights.
The following list contains the various user permissions and rights required for tasks in object promotion:
• User types:
• Data Services Administrator
• Data Services user
• User group: Data Services Administrator group
• Application rights:
• Manage Object Promotion Configurations
• Manage Object Promotion Import
• Repository rights:
• View access
• Full control
The following table summarizes the minimum user requirements for the processes in object promotion.
Create export and import Export objects from source Import objects to target re-
User requirements configurations repository pository
Administrator Guide
Object promotion management PUBLIC 203
Create export and import Export objects from source Import objects to target re-
User requirements configurations repository pository
Related Information
Before you create export and import configurations for object promotion, familiarize yourself with some rules
and tips for a successful configuration.
• Ensure that you obtain the required user rights to create and edit export and import configurations. For
more information, see User rights for promotion management [page 203].
• For security reasons, only a system administrator can create a shared directory for export and import.
Administrator Guide
204 PUBLIC Object promotion management
• To clear space on a shared directory, delete the exported ATL and Manifest files after you've imported
them.
Tip
If you create a separate export configuration for each release, it's easier to identify the groups of files
you can safely archive or delete.
• You can associate the same repository with multiple export configurations.
• If a shared directory hasn't yet been created but you've been granted permission to configure exports and
imports, the only available transport option for your configuration is FTP.
• If you set an export configuration to use FTP to promote objects to a UNIX system, configure the FTP
server to have full read and write access to the shared directory for exported objects.
Related Information
Administrator Guide
Object promotion management PUBLIC 205
Importing objects [page 212]
Export and import trace and error log [page 214]
Create an export configuration to export objects and dependencies over secure FTP or to a shared directory.
Before you perform the following steps, ensure that you comply with the requirements listed in Export and
import configuration requirements [page 204] and Requirements for object promotion [page 200].
1. Log into SAP Data Services Management Console and open the Administrator.
Start Management Console from your Windows Start menu or by selecting the link in the Start Page of
Data Services Designer.
2. Expand the Object Promotion node from the Administrator tree.
3. Select the Export Configuration node.
The Export Configuration page opens to the right of the Administrator tree.
4. Open either the FTP tab or the Shared Directory tab.
If you don't select Secure FTP, the system exports information in clear text format instead of encrypted
format.
d. Select one or more repositories listed in the Available Repositories list and select the right-pointing
arrow to add the repositories to the Associated Repositories list.
You can export objects only from the repositories that you include in the Associated Repositories list.
e. Select Test.
Testing ensures that the configuration can access the associated repositories and the directory that
you indicated in the Target Directory option.
f. Select Save.
6. To transport objects directly to an existing shared directory, open the Shared Directory tab and perform the
following steps:
a. Select Add.
Administrator Guide
206 PUBLIC Object promotion management
The target directory is the shared directory for exported objects.
d. Select one or more repositories listed in the Available Repositories list and select the right-pointing
arrow to add the repositories to the Associated Repositories list.
You can export objects only from the repositories that you added to the Associated Repositories list.
e. Select Save.
When you test the FTP configuration, or save the shared directory configuration, the Object Promotion
Management tool validates whether the Server Intelligence Agent (SIA) can read and write content to the
shared directory. If the configuration can access the repositories with which it has been associated and the SIA
validates access to the shared directory, the Management Console saves the configuration with the name that
you specified.
The Management Console displays the export configuration name in the following locations:
Related Information
Create an import configuration to import objects and dependencies from an export shared directory.
Before you perform the following steps, ensure that you comply with the requirements listed in Export and
import configuration requirements [page 204] and Requirements for object promotion [page 200].
1. Log into SAP Data Services Management Console and open the Administrator.
Start Management Console from your Windows Start menu or by selecting the link in the Start Page of
Data Services Designer.
2. Expand the Object Promotion node from the Administrator tree at left.
3. Select Import Configuration.
Administrator Guide
Object promotion management PUBLIC 207
5. Select a repository from the Repository list.
The Management Console checks that it can access the specified shared directory.
If the import configuration can access the shared directory to where the objects are exported, Management
Console saves the configuration. The configuration now appears in the following locations:
Related Information
Users with the correct permission and access can edit or delete export and import configurations.
A regular SAP Data Services user who is granted the Manage Object Promotion Configurations rights can edit
or remove configurations.
Related Information
Administrator Guide
208 PUBLIC Object promotion management
10.4 Before you export and import objects
Ensure that you and your systems are ready for export and import.
Check that you comply with the following items before you export and import objects using the object
promotion feature:
• You've read and complied with the information in Requirements for object promotion [page 200].
• You've met the user rights requirements stated in User rights for promotion management [page 203].
• The repository from which you're exporting objects is associated with an export configuration.
• The repository to which you're importing objects is associated with an import configuration.
• The source and target repositories are running the same version of SAP Data Services.
• You import to a local repository.
Note
Related Information
The Object Promotion page in SAP Data Services Management Console offers export and import options.
Access the Object Promotion page by selecting the Object Promotion node in Management Console. Select an
action from the Select an object list in the Object Promotion page. The following table describes each action.
Administrator Guide
Object promotion management PUBLIC 209
Action Description
Export Substitution Parameters Select to export existing substitution parameters in the se-
lected repository.
Related Information
Use object promotion in SAP Data Services Management Console to export objects from a Data Services
environment.
Before you perform the following steps, ensure that you comply with the requirements listed Before you export
and import objects [page 209].
1. Log into SAP Data Services Management Console and open the Administrator.
Start Management Console from your Windows Start menu or by selecting the link in the Start Page of
Data Services Designer.
2. Select the Object Promotion node from the Administrator tree at left.
Administrator Guide
210 PUBLIC Object promotion management
a. Select Export objects from the Objects list and select Next.
b. Select the repository from the Select Repository list.
Remember that you must export all datastores separately from any parent object.
The Export page opens with a list of the latest versions for all of the objects that match the selected
object type. Only the objects that are available in your chosen repository appear in the list.
Management Console lists up to 23 entries on each page. Use the page navigation icons to move to
additional pages, if applicable.
d. Optional: Set search criteria to narrow the list of objects and select Search.
Search suggestions:
• Enter specific text in the Object Name search field.
• Combine search terms with an asterisk as a wildcard to find objects that partially match or are a
part of a common naming schema.
• If you select a central repository for exporting, use the additional filter options.
Example
If the selected Object Type is Project, select a different version in the Get list (the default is
Latest Version).
When you submit the query, it matches the parent object's label with the associated version. If
the label for a child of an object does not match with the specified label, when a parent object
is exported, the latest version of the child object will be exported.
Management Console lists up to 23 entries on each page. Use the page navigation icons to move to
additional pages, if applicable.
c. Choose up to 23 Object Name entries displayed on the current page, or choose Select All on Current
Page to import all 23 objects on the currently displayed page.
d. Optional: Use the Search field to narrow the list to only objects that you want to export.
Results:
For each object, Management Console writes export data to an ATL file and a manifest file, and sends the files
to the target directory that is specified in the export configuration.
The Confirmation page displays progress for the export. The Management Console refreshes the Status
automatically every five seconds. When the export is completed, the automatic refresh ends, and the final
Administrator Guide
Object promotion management PUBLIC 211
status is Completed. The Confirmation page lists each item exported with an export completed date and time,
and a status of success or failure.
For more information about the trace and error logs, and the confirmation ID, see Export and import trace and
error log [page 214].
Related Information
Import objects into a new environment that is different than the export environment.
Before you import objects, ensure that you've created an import configuration. Also, you must first export the
objects so that they are available to import. Ensure that you comply with the requirements in Before you export
and import objects [page 209].
1. Log into SAP Data Services Management Console and open the Administrator.
Start Management Console from your Windows Start menu or by selecting the link in the Start Page of
Data Services Designer.
2. Select the Object Promotion node from the Administrator tree at left.
Administrator Guide
212 PUBLIC Object promotion management
• Source Repository version
• Date exported (includes the time)
• Whether the object has been imported
• Exported by
• All
• Objects exported the last <number> Days
• From <date range>
b. Use the Search by options to build an expression:
• Select All object types, or an object type from the first list.
• Select not imported, imported, older export, or All from the next list.
• Enter a word or words in the object name in the last text box. Combine with an asterisk wild card, if
applicable.
c. Select Search.
6. Select objects to import per page, or check Select All to select all objects on the page.
Use the page navigation icons to move to the next page and repeat selecting objects on the page.
7. Select Import.
Result:
The Confirmation page opens. The Status column reflects the import progress. Management Console updates
the status automatically every five seconds.
When the import is completed, the automatic refresh ends, the ending status information is success or failure.
For more information about the logs and the unique conformation ID, see Export and import trace and error log
[page 214].
Post-requisites:
Required permissions and rights for updating datastores and substitution parameters include one of the
following:
Administrator Guide
Object promotion management PUBLIC 213
Task overview: Object promotion management [page 200]
Related Information
The SAP Data Services Management Console generates trace and error information, which you can access
from the Confirmation page after an export or import completes.
View the log information after export or import completes, but while you still have the Confirmation page open.
Select view log under the Status column for a specific object.
A dialog box opens showing the unique export or import Confirmation ID in the banner. There's a Trace and an
Error tab:
Further, the Management Console stores log information under the repository table AL_EXPORT_HISTORY.
Export Confirmation ID
The Management Console assigns a unique Confirmation ID to each export or import attempt and displays it in
the Confirmation page and the Trace and Error dialog box. The Confirmation ID is a unique ID stored under the
AL_EXPORT_HISTORY table. The Management Console uses the Confirmation ID to pass information to the
target environment when you import the objects. The Confirmation ID consists of the following information:
Administrator Guide
214 PUBLIC Object promotion management
Example
You can't return to the Confirmation page after you dismiss it. If you want to refer to the trace and error
information later, copy the unique confirmation ID, and any information from the Trace and/or Error tab, and
save it to a text file.
Alternately, the Management Console saves a copy of the log to the repository under the
AL_EXPORT_HISTORY table. Therefore, to find log information after you close the Confirmation page, query
the AL_EXPORT_HISTORY table.
Related Information
Administrator Guide
Object promotion management PUBLIC 215
11 Integration with SAP and SAP Solution
Manager
Integrate SAP Data Services with the SAP System Landscape Directory and the SAP Solution Manager
diagnostics features to manage, monitor, and maintain your SAP Data Services deployment.
The System Landscape Directory (SLD) is a central repository for your system landscape information, which
helps SAP Solution Manager manage SAP software lifecycles.
The SLD contains a description of the systems and software components that are currently installed. The
SLD uses all gathered system information to provide a foundation for tool support so that you can better plan
software lifecycle tasks in your system landscape. The SLD also provides a directory that contains information
about all installable software available from SAP. Additionally, SLD automatically updates existing data about
systems that are already installed in your landscape.
The SAP Data Services installation program registers all associated vendors, product names, and versions
with the SLD. The installation program also registers server and front-end component names, versions, and
location.
Parent topic: Integration with SAP and SAP Solution Manager [page 216]
Related Information
Administrator Guide
216 PUBLIC Integration with SAP and SAP Solution Manager
11.2 Solution Manager Diagnostics (SMD) Agent
The SMD component of SAP Solution Manager provides all functionality to centrally analyze and monitor a
complete system landscape.
If an SMD Agent is installed, the SMD server monitors SAP Data Services and Data Services systems. The SMD
Agent reports information to Solution Manager for analysis, which uses the information for root cause analysis.
SAP Data Services supports performance monitoring through CA (Wily) Introscope, which works with Solution
Manager Diagnostics through an integration with the NCS (Native Component Supportability) library. The Data
Services installer installs the NCS library automatically.
Parent topic: Integration with SAP and SAP Solution Manager [page 216]
Related Information
SAP Data Services and SAP Solution Manager require specific components to enable System Landscape
Directory (SLD) support.
The following table summarizes the components that are required to enable SLD support.
Note
If you install SAPHOSTAGENT before Data Services,
the Data Services installer registers servers auto-
matically.
Solution Manager Diagnostics (SMD) Agent integration Download and install SMD Agent (DIAGNOSTICS.AGENT) on
all Data Services server hosts.
Administrator Guide
Integration with SAP and SAP Solution Manager PUBLIC 217
Support for... Required for Data Services
Parent topic: Integration with SAP and SAP Solution Manager [page 216]
Related Information
Administrator Guide
218 PUBLIC Integration with SAP and SAP Solution Manager
12 Data Services registration in the SLD
The SLDReg (System Landscape Directory data suppliers) registers the landscape systems, including SAP
Data Services, on the SLD server and keeps the information updated.
Management and business applications access the information stored in the SLD to perform tasks in a
collaborative computing environment.
SLDReg is installed when you install the SAPHOSTAGENT. After SLDReg is installed, you must create the
slddest.cfg and slddest.cfg.key files to enable SLDReg to connect to the SLD server.
The Data Services installer supplies the SLDReg for every installation of Data Services. SLDReg reports on the
following components:
Note
SAP NetWeaver has a built-in SLD-DS supplier that registers the NetWeaver application server as well as
hosted web applications and services. This SLD-DS is relevant for Data Services deployments that are
integrated in an SAP NetWeaver environment.
The Data Services installer stores the information required for registering Data Services in a configuration file.
This file contains information used by the SLDReg to connect to the Data Services database.
For information about how to configure the specific data supplier for WebSphere, see the SAP Web Application
Deployment Guide for Unix or SAP Web Application Deployment Guide for Windows.
Administrator Guide
Data Services registration in the SLD PUBLIC 219
13 Performance and availability monitoring
Monitor your job performance and system availability using tools in the SAP Solution Manager such as Solution
Manager Diagnostics Agent and alert monitoring.
SMD analyzes and monitors problematic components from incidents in your system landscape to help you
keep your systems running.
The SMD Agent sends local information to the SMD, including back-end server configurations and the location
of server log files. The SMD uses this information in its analysis of the complete system.
Note
Administrator Guide
220 PUBLIC Performance and availability monitoring
Component Information
Note
You must install the SMD Agent on each Job Server
machine manually.
NCS (Native Component Supportability) library Integrated in SMD to enable CA Introscope. The Data Serv-
ices installer automatically installs the NCS library on your
system.
SAP Operating System Collector (SAPOSCOL) The SAPOSCOL provides operating system data to SMD and
CA Introscope.
For more information about any of the SMD components, see the SAP Solution Manager documentation page
at https://help.sap.com/viewer/product/SAP_Solution_Manager/latest/en-US?task=discover_task.
Download any of the components from the SAP Service Marketplace at http://support.sap.com/swdc .
Related Information
Administrator Guide
Performance and availability monitoring PUBLIC 221
13.2 SMD Agent guidelines
The Solution Manager Diagnostics Agent (DIAGNOSTICS.AGENT) on your local system collects and sends
information to the SMD server.
The following are a few guidelines for using the SMD Agent:
• Install the SMD Agent before or after installing and deploying SAP Data Services. The installation order of
the monitored system and agent isn't critical.
• If the servers are deployed on a distributed system, install an SMD Agent on every machine hosting a
server.
Related Information
For the Solution Manager Diagnostics (SMD) to work properly, enable SMD by configuring the applicable files
and setting the correct options.
1. Enable the feature in the Data Services Server Manager for each Job Server from which you want
performance metrics.
2. If you see unexpected information in the metrics, edit the Native Component Supportability (NCS) Library
(ncs.conf) file, which controls the information sent to the SMD Agent.
Note
The ncs.conf library file is located in <LINK_DIR>\bin. The ncs.conf library file contains
descriptions of the options.
3. Configure the following SMD Agent files to provide information to the SAP Solution Manager server.
• SapAgentConfig.xml
• IntroscopeSapAgent.profile
The SMD Agent files are located in your SMD Agent installation location.
Administrator Guide
222 PUBLIC Performance and availability monitoring
Parent topic: Performance and availability monitoring [page 220]
Related Information
SAP Data Services supports performance monitoring through CA Introscope, which needs the NCS library
integration with Solution Manager Diagnostics.
The Data Services installer automatically installs the NCS library. However, before Data Services can monitor
Job Server performance, you need to enable NCS in the Job Server.
Related Information
Administrator Guide
Performance and availability monitoring PUBLIC 223
13.4.1 Enabling NCS library on Windows
Enable the NCS (Native Component Supportability) library on the Windows platform.
To enable NCS on the Job Server for Windows, perform the following steps:
1. Open the Data Services Server Manager from the Windows Start menu as an Administrator.
2. Open the NCS tab.
3. Select Enable instrumentation in NCS (Native Component Supportability) library.
4. Complete the remaining options.
For most situations, leave the options set to the default settings. The following table describes all of the
options in the NCS tab.
Option Description
Execution interval The time in seconds, between which the system sends the
CPU usage/process memory metrics to the CA Interscope
Enterprise Manager.
Execution time offset The execution time offset in seconds related to the set
Execution interval.
Example
If you set the execution settings as follows, the system
sends the CPU usage/process memory metrics to the
SMD agent at 3:30, 4:30, 5:30, and so on:
• Execution interval = 3600 (every 1 hour)
• Execution time offset = 1800 (every half hour)
If you set the Execution interval to less time than the de-
fault NCS library scheduler interval, the system bypasses
your setting in Execution time offset. The default NCS li-
brary scheduler interval is set in the datasending_interval
parameter.
Administrator Guide
224 PUBLIC Performance and availability monitoring
Option Description
The system enables the performance monitoring for the jobs run on this computer by the Data Services
Job Server.
Task overview: The Native Component Supportability (NCS) library [page 223]
Related Information
Enable the NCS (Native Component Supportability) library on the Unix or Linux platforms.
To enable NCS on the Job Server for Unix or Linux, perform the following steps:
Leave all of the other parameters in the Engine section set to the default values as follows:
• Wily_instrumentation=TRUE
• Wily_instrumentation_Level_Threshold=0
• Wily_instrumentation_Interval=0
• Wily_instrumentation_Offset=
• Wily_instrumentation_TraceLevel=3487
• Wily_instrumentation_App_Passport=
Task overview: The Native Component Supportability (NCS) library [page 223]
Related Information
Administrator Guide
Performance and availability monitoring PUBLIC 225
13.5 Heartbeat monitoring
Heartbeat monitoring, also known as availability monitoring, uses the SAP Solution Manager to monitor
whether a component, such as a Job Server or Access Server, is running.
With hearbeat monitoring, you can also view information about real-time services for Access Servers.
View each monitored Job Server or Access Server status from CA Introscope under the Status node. The
following are example values for heartbeat monitoring:
In addition, view the real-time service status for Access Servers. The following table describes each status
indicator.
0 not running
1 starting
2 started
3 shutting down
4 warning
5 error
9 disabled
Related Information
SAP Solution Manager provides alerts that enable you to view critical errors.
The SAP Data Services Job Servers send alerts when a job fails.
In CA Introscope Enterprise Manager, view the status for each monitored Job Server under the Status node. A
value of 1 indicates a job that ran in a specific Job Server repository has failed.
Administrator Guide
226 PUBLIC Performance and availability monitoring
Parent topic: Performance and availability monitoring [page 220]
Related Information
Administrator Guide
Performance and availability monitoring PUBLIC 227
14 Command line administration
SAP Data Services provides utilities that run from a command line on both Windows and Unix platforms.
Each utility has a special set of command-line options that control the behavior of the specific Data Services
component.
Note
Data Services components also use internal options, however the internal options aren't published because
they can't be modified.
In all command line topics, values shown in square brackets [ ] are optional.
Administrator Guide
228 PUBLIC Command line administration
14.1 Command line reference: License Manager
Use License Manager to view, add, and remove SAP Data Services product activation keycodes for SAP
solution portfolio software that require them.
Use License Manager only in command-line mode. For more information about managing stored license
keys in the CMC, see the Business Intelligence Platform Administrator Guide at https://help.sap.com/viewer/
2e167338c1b24da9b2a94e68efd79c42/latest/en-US/468a356e6e041014910aba7db0e91070.html.
License Manager enables you to manage your product activation keycodes—the alphanumeric codes that are
referred to each time that you run certain software.
Note
License Manager accesses keycodes on the local system only; you can't access the keycodes from a
remote system. When updating keycodes, change the codes on all SAP Data Services computers by
launching License Manager on each computer, including Designer and Job Server computers.
Note
If you use a Windows operating system, you can't add or remove license keycodes unless you have
Administrator privileges. If you have nonadministrator privileges, only the -v and --view parameters are
available for use.
Syntax
Note
Parameter Description
Keycode: 00000-0000000-0000000-0000
Trial Option: Yes
Expired: No
Days Remaining: 54
Administrator Guide
Command line administration PUBLIC 229
Parameter Description
-a or --add <keycode> Adds the specified license keycode, and displays the stored keycodes. Returns status
messages for the following conditions:
-r or --remove Removes the specified product activation keycode, and displays the stored keycodes.
<keycode> [-l If <location> is specified, the removal is restricted to that node. Returns status mes-
<location>] sages for the following conditions:
Related Information
Start License Manager from a terminal, and use commands to set your license keys.
Before you use License Manager on UNIX platforms, set the environment variable BOE_REGISTRYHOME.
If you've already configured the SAP Data Services environment by running the al_env.sh script, the
BOE_REGISTRYHOME variable is already set. However, if it isn't set, manually add BOE_REGISTRYHOME to
your .profile, .login, or .cshrc file:
Administrator Guide
230 PUBLIC Command line administration
• If you use Bourne shell, add product entries to your .profile or .login file:
• If you use C shell (Berkeley), add product entries to your .cshrc file:
1. Open a terminal.
2. Open License Manager by entering a command such as the following:
$ cd $LINK_DIR/bin
$ ./LicenseManager
3. Use the commands and syntax in Command line reference: License Manager [page 229] to set your license
key.
Use the Connection Manager after you install SAP Data Services on Unix, to configure ODBC databases and
ODBC drivers for repositories, sources, and targets.
The Connection Manager is a command-line utility. However, a graphical user interface (GUI) is available.
Note
To use the graphical user interface for Connection Manager, you must install the GTK+2 library. The GTK+2
is a free multi-platform toolkit that creates user interfaces. For more information about obtaining and
installing GTK+2, see https://www.gtk.org/ .
To use DSConnectionManager.sh from the command line, use the -c parameter which must be the first
parameter.
If an error occurs when using the Connection Manager, use the -d option to show details in the log
For example:
$LINK_DIR/bin/DSConnectionManager.sh -c -d
Note
For Windows installations, use the ODBC Administrator (Driver Selector) to configure ODBC databases and
drivers for repositories, sources, and targets.
Administrator Guide
Command line administration PUBLIC 231
Related Information
Use the command-line version of the Data Services Repository Manager to create or update repositories on
Windows platforms.
The following table contains an alphabetical list of descriptions for all of the commands in the Repository
Manager.
Option Description
Administrator Guide
232 PUBLIC Command line administration
Option Description
The following table lists all valid key-value pairs and the applicable database type for -encryption_parameters.
• DB2
• HANA
• Microsoft_SQL_Server
• MySQL
• Oracle
• SQL_Anywhere
• Sybase
Administrator Guide
Command line administration PUBLIC 233
Option Description
• Microsoft_SQL_Server_Azure_PaaS
• Microsoft_SQL_Server_Azure_VM
• If you don't include -s, enter the DSN (TNS for Oracle)
name for <Server>.
• If you include -s (to indicate server-based connection),
enter the database server hostname or IP address for
<Server>.
• SQLServer (default)
• Windows
• Azure_AD_Password
• local
• central
• profiler
Administrator Guide
234 PUBLIC Command line administration
Option Description
Example
Example
Example
Related Information
Administrator Guide
Command line administration PUBLIC 235
14.4 Command line: Repository Manager (Unix)
Use the Repository Manager executable file, repoman, to create or update repositories from the command line
on Unix platforms.
Specify parameters using a command prompt. ./repoman must be the first command.
The following table contains an alphabetical list of descriptions for each code in the Repository Manager.
Code Description
• Microsoft_SQL_Server_Azure_PaaS
• Microsoft_SQL_Server_Azure_VM
Administrator Guide
236 PUBLIC Command line administration
Code Description
The following table lists all valid key-value pairs and the applicable database type for -encryption_parameters.
• DB2
• HANA
• Microsoft_SQL_Server
• MySQL
• Oracle
• SQL_Anywhere
• Sybase (SAP ASE)
Administrator Guide
Command line administration PUBLIC 237
Code Description
• If you don't include -s, enter the DSN (TNS for Oracle)
name for <Server>.
• If you include -s (to indicate server name connection),
enter the database server hostname or IP address for
<Server>.
-t Repository type:
• local
• central
• profiler
Example
Administrator Guide
238 PUBLIC Command line administration
-NDB2 -s -Srepo_server
-Qrepo_central -c
-tcentral -d
Where:
-U User name sa
-P Password sa
-c Create repository
-d Show details
Related Information
Use the console-based SAP Data Services Server Manager, svrcfg, on Unix or Linux to create, edit, or delete
Job Servers and Access Servers after installation.
Administrator Guide
Command line administration PUBLIC 239
• Adding run-time resources
• Starting Data Services services
• Stopping Data Services services
Common parameters
svrcfg supports one common parameter, -T, in combination with task characters for all operations. The
following table lists the characters to use in combination with -T for each task.
Parameter Task
Note
-TSTART and -TSTOP don't require additional parameters.
Example
To start Data Services services: svrcfg -TSTART
Output
When you use svrcfg to perform tasks from the command line, the Server Manager directs output to the
stdout console. The last line of the output indicates whether the task execution succeeded or failed. Possible
statuses include the following:
• Success
• Failure
Administrator Guide
240 PUBLIC Command line administration
Add runtime resources in Unix or Linux using the -TR parameter along with other special parameters,
in svrcfg.
Related Information
Add an Access Server in Unix or Linux using the -TAS parameter, along with other special parameters, in
svrcfg.
The following table describes the additional Access Server-specific parameters to use with -TAS.
Note
Parameter Description
Administrator Guide
Command line administration PUBLIC 241
Example
The following string creates and enables an Access Server on port 4000: svrcfg -TAS -A/home/bods/
AStest -O4000 -E
Related Information
Add a Job Server in Unix or Linux using the -TJS parameter, along with other special parameters, in svrcfg.
The following table contains an alphabetical list of additional Job Server-specific parameters to use with -TJS.
Note
Parameter Description
Administrator Guide
242 PUBLIC Command line administration
Parameter Description
Note
This parameter is required only for repositories on Syb-
ase.
• DB2
• HANA
• Microsoft_SQL_Server
• MySQL
• Oracle
• SQL_Anywhere
• SYBASE
• Microsoft_SQL_Server_Azure_PaaS
• Microsoft_SQL_Server_Azure_VM
Administrator Guide
Command line administration PUBLIC 243
Parameter Description
The following table lists all valid key-value pairs and the applicable database type for -encryption_parameters.
Administrator Guide
244 PUBLIC Command line administration
Parameter Description
-X509KeyStore Specifies the path and file name for the x509.pse key store
file, which contains the X.509 certificate and the SSL certifi-
cate.
Example
Related Information
Administrator Guide
Command line administration PUBLIC 245
14.5.3 Command line: Adding runtime resources (Unix or
Linux)
Add runtime resources in Unix or Linux using the -TR parameter along with other special parameters, in
svrcfg.
The following table describes the additional runtime resource-specific parameters to use with the -TR
parameter.
Note
Parameter Description
Example
Related Information
Administrator Guide
246 PUBLIC Command line administration
14.6 Command line: Server Manager (Windows)
Use the SAP Data Services Server Manager executable, AWServerConfig.exe, on Windows to create, edit, or
delete Job Servers and Access Servers after installation
In addition, AWServerConfig.exe also supports command-line parameters for the following tasks:
Note
Data Services installs AWServerConfig.exe as a Windows service. Therefore, you can't start or stop the
Data Services services using AWServerConfig.exe. Instead, use the standard net command to start and
stop the Data Services services.
Example
To start the Data Services services: net start "SAP Data Services"
To stop the Data Services services: net stop "SAP Data Services"
Related Information
Administrator Guide
Command line administration PUBLIC 247
The Native Component Supportability (NCS) library [page 223]
Add an Access Server in Windows using the -n parameter and other special parameters.
The following table describes the special Access Server-specific parameters to use with -n.
Note
Parameter Description
Replace <port> with the desired port number. The port number may have a
value between 1024 and 49151, and must be unique and not in use.
-E Indicates that the Access Server should be enabled. If not specified, the Access
Server is created but not enabled.
Example
The following string creates and enables an Access Server on port : AWServerConfig.exe -n
-RC:\DataServices\AccessServer -A4000 -E
Related Information
Add a Job Server in Windows using the -n parameter along with other special parameters.
The following table describes the other Job Server-specific parameters to use with -n.
Administrator Guide
248 PUBLIC Command line administration
Note
Parameter Description
Administrator Guide
Command line administration PUBLIC 249
Parameter Description
The following table lists all valid key-value pairs and the applicable database type for -encryption_parameters.
Note
This parameter is applicable only for repositories on Mi-
crosoft SQL Server.
Administrator Guide
250 PUBLIC Command line administration
Parameter Description
• DB2
• Microsoft_SQL_Server
Use -dbSubType<DatabaseSubType> to specify
an Azure database. Values include:
• Microsoft_SQL_Server_Azure_PaaS
• Microsoft_SQL_Server_Azure_VM
• MySQL
• Oracle
• SQL_Anywhere
• Sybase
Note
This parameter is required only for repositories on Syb-
ase and Microsoft SQL Server.
Administrator Guide
Command line administration PUBLIC 251
Parameter Description
Example
The following string adds a Job Server with an Oracle repository: AWServerConfig.exe -n
-JNewJobServer -P3500 -Uuser -Wpass -NOracle -SORCLPROD
Related Information
Add runtime resources in Windows using the -n parameter along with other special parameters.
The following table describes the other runtime resource-specific parameters to use with -n.
Note
Parameter Description
Replace <from_port> with the desired port number. The port number may have
a value between 1025 and 32766, and must be unique and not in use.
Administrator Guide
252 PUBLIC Command line administration
Parameter Description
Replace <to_port> with the desired port number. The port number may have a
value between 1026 and 32767, and must be unique and not in use. The ending
port value must be greater than the starting port value.
Example
The following string adds a pageable cache resource on ports 2000-2550: AWServerConfig.exe -n
-C"%LINK_DIR%\log\Pcache" -PF2000 -PT2550
Related Information
Use AL_Encrypt to encrypt a password with an encryption key or a passphrase, and also to return the base64
encoding of any text.
Returning the base64 encoding can be useful to modify a command line that contains global variable or
substitution variable data, which must be encoded in base64 form.
Syntax
Note
Administrator Guide
Command line administration PUBLIC 253
Where
Parameter Description
-k <key string> Specifies the encryption key for encrypting the password.
<text to encode> Returns the base64 encoding of any following text when you
run AL_Encrypt with no parameters. The text can be in
quotation marks or not.
Related Information
Administrator Guide
254 PUBLIC Command line administration
14.8 al_engine
al_engine is a core Data Services process that is responsible for executing jobs, importing repository objects,
exporting repository objects, and so on.
Common options
Example
The following example shows an Oracle repository with a server-based connection and SSL/TLS protocol:
The following table contains an alphabetical list of descriptions of all codes for the al_engine.
Parameter Description
Example
-authMethodAzure_AD_Password
• Microsoft_SQL_Server_Azure_PaaS
• Microsoft_SQL_Server_Azure_VM
Administrator Guide
Command line administration PUBLIC 255
Parameter Description
Example
-Kversion"MySQL 5.1"
• Oracle
• Microsoft_SQL_Server
• DB2
• MySQL
• Sybase
• HANA
• SQL_Anywhere
Administrator Guide
256 PUBLIC Command line administration
Parameter Description
-X509KeyStore Specifies the path and file name for the x509.pse key store
file, which contains the X.509 certificate and the SSL certifi-
cate.
Related Information
al_engine imports and exports repository information in the internal scripting languages of SAP Data
Services: XML and ATL.
The following table describes the export and import options that al_engine supports.
Remember
Note
Administrator Guide
Command line administration PUBLIC 257
Parameter Description
Restriction
You must transcode the passphrase to the UTF8 charac-
ter set before encoding it into base64.
Example
-XKversion“MySQL 5.1”
Administrator Guide
258 PUBLIC Command line administration
Parameter Description
Note
When you export objects, you must specify a passphrase with either the -passphrase parameter or
the -epassphrase parameter. When you import objects, the passphrase is optional. However, if you
don’t specify a passphrase, or the specified passphrase is incorrect, the software removes any encrypted
passwords in the imported objects.
Specify the lean XML format using [L] when you use any of the -XX parameters.
The lean XML format excludes all non-executable elements from the exported XML to improve readability.
Example
The exact arrangement of transforms in a data flow in the Designer workspace area isn't maintained on
export when you use [L] with an -XX parameter. However, when imported back into the software, Data
Services arranges the data flows automatically.
Example
To export all data flows in lean XML format, use the following string:
The following table lists the possible values for the object type (<ObjectType>) codes and the related object
types.
Administrator Guide
Command line administration PUBLIC 259
Code Object type
B COBOL Copybooks
C Custom functions
D data flows
E Excel workbooks
J Jobs
P Projects
p System profiles
S Datastores
T Idocs
W work flows
Administrator Guide
260 PUBLIC Command line administration
Important Disclaimers and Legal Information
Hyperlinks
Some links are classified by an icon and/or a mouseover text. These links provide additional information.
About the icons:
• Links with the icon : You are entering a Web site that is not hosted by SAP. By using such links, you agree (unless expressly stated otherwise in your
agreements with SAP) to this:
• The content of the linked-to site is not SAP documentation. You may not infer any product claims against SAP based on this information.
• SAP does not agree or disagree with the content on the linked-to site, nor does SAP warrant the availability and correctness. SAP shall not be liable for any
damages caused by the use of such content unless damages have been caused by SAP's gross negligence or willful misconduct.
• Links with the icon : You are leaving the documentation for that particular SAP product or service and are entering an SAP-hosted Web site. By using
such links, you agree that (unless expressly stated otherwise in your agreements with SAP) you may not infer any product claims against SAP based on this
information.
Example Code
Any software coding and/or code snippets are examples. They are not for productive use. The example code is only intended to better explain and visualize the syntax
and phrasing rules. SAP does not warrant the correctness and completeness of the example code. SAP shall not be liable for errors or damages caused by the use of
example code unless damages have been caused by SAP's gross negligence or willful misconduct.
Bias-Free Language
SAP supports a culture of diversity and inclusion. Whenever possible, we use unbiased language in our documentation to refer to people of all cultures, ethnicities,
genders, and abilities.
Administrator Guide
Important Disclaimers and Legal Information PUBLIC 261
www.sap.com/contactsap
SAP and other SAP products and services mentioned herein as well as
their respective logos are trademarks or registered trademarks of SAP
SE (or an SAP affiliate company) in Germany and other countries. All
other product and service names mentioned are the trademarks of their
respective companies.