Preview

Implementing Active Directory Single Sign-On with Business Objects XI

Powerful Essays
Open Document
Open Document
1330 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Implementing Active Directory Single Sign-On with Business Objects XI
Business Objects XI
Implementing Active Directory Single Sign-On with Business Objects XI

Overview
The purpose of this document is to demonstrate the steps to follow to configure Business Objects XI for use with Active Directory SSO. Authored by Ashish Gupta, Business Objects Customer Support

Contents
INTRODUCTION ............................................................................................ 2 CONFIGURE ACTIVE DIRECTORY ON WINDOWS 2003 SERVER AS PRIMARY DOMAIN CONTROLLER................................................................................. 2 INSTALL AND CONFIGURE BUSINESS OBJECTS XI TO AUTHENTICATE AGAINST ACTIVE DIRECTORY ..................................................................................... 5 FINDING MORE INFORMATION ..................................................................... 12

23-Feb-2006 1:59:00 PM

Copyright © 2006 Business Objects. All rights reserved.

Page 1

Introduction
Configuration of Business Objects XI with Active Directory is a two-step process: 1) Configure Active Directory on a Windows 2003 Server and make it a Primary Domain Controller. 2) Install and Configure Business Objects XI to authenticate against Active Directory created in Step 1.

Configure Active Directory on Windows 2003 Server as Primary Domain Controller
Launch the “Manage Your Server” option from the Start Menu.

23-Feb-2006 1:59:00 PM

Copyright © 2006 Business Objects. All rights reserved.

Page 2

AD-SSO_BOXI.pdf

Click on “Add or remove a role.” The following screen appears:

23-Feb-2006 1:59:00 PM

Copyright © 2006 Business Objects. All rights reserved.

Page 3

AD-SSO_BOXI.pdf

Click Next. This will bring up a list of roles available for this server:

The screen shot above is taken from a server where AD is already installed. This would be set to “No” in an environment where AD is not installed. Highlight “Domain Controller (Active Directory)” and click Next. This will initiate a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Bibliography: Coney, S. (2010, January 24). Manage Active Directory Replication. Retrieved from Stuart Coney: http://stuartconey.com/wp/?p=532…

    • 670 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Lab Report

    • 567 Words
    • 3 Pages

    “This server is not yet running as a domain controller. Run the Acitve Dirrectory Domain Services Instalation Wizzard (dcpromo.exe)”…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    AD FSMO Role Research

    • 414 Words
    • 2 Pages

    To find which roles a DC currently hold you can use the ntdsutil. From the start menu, key roles and press enter, key connections press enter, key connect to server and server name and domain press enter, key quit and press enter, key select operation target press enter, key list roles for connected server and press enter and quit.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Complete a notepad file that will successfully install all of the roles mentioned. Save the file using the…

    • 235 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    This connection should be using Remote Desktop, but I could not establish a connection with server AD.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This lab walks the student through the steps required to define Active Directory Group Policy Objects (GPO) as well as to deploy GPOs to domain computers. It also demonstrates how to use MBSA to profile a Windows system. Group…

    • 952 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Once, everything has been set up, it will require an authorization to set the applications. With the application authorizations means that users who are in the sales domain, will have to access to Sales and so on. It will also require that the users will additional rights have access to correct those domains and applications. After this has been developed and the authorization has been approved, it will require by inputting information for a different user. After, it will require to click “+” which is beside the domain and provide the listing of folders and from the folders will be named. Click on the folder “user” while clicking the action button directly above this, pick the…

    • 282 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    practitioner to set and enforce key security policies at the Active Directory Forrest, Domain, and…

    • 3838 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1330 Week 5 Essay Assignment Active Directory Developing a backup strategy for Active Directory requires planning and preparation. There are two options to choose from within Windows Server 2008. The first option is the Graphical User Interface (GUI) requires you to install the Windows Server Backup feature from the Server Manager console. The second option is the Command Line Interface (CLI) which requires you to install Windows PowerShell. I prefer using the GUI Server Manager console. This allows one to backup critical volumes such as the system volume, boot volume; volumes that host the SYSVOL share, Active Directory (AD) database Ntds.dit and log files. The backup schedule would run each night starting at midnight. By scheduling a backup plan to run after business hours, you reduce the risk of interfering with day to day business. I would schedule a full backup to run on Sundays with incremental backups Monday thru Saturday. I would also backup System State data after major configuration changes. This would allow restoring changes if needed. Windows Server Backup does not allow for a single file to be backed up. The volume hosting the file must be backed up. Restoring Active Directory (AD) using normal replication provides fault tolerance. If one domain controller fails and requires a fresh OS installation, AD can be reinstalled using the dcpromo tool. Next you would allow replication from other domain controllers to repopulate the AD database. When a single domain controller needs to be restored, I would use the wbadmin utility to perform a nonauthoritive restore of AD. This would restore the domain controller to a state before the backup. In the event of an administrative error such as deleting multiple users from a OU, an authoritative restore would be performed using the Ntdsutil utility. This would correct administrative errors that have been replicated to all domain controllers in the domain.…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Introduction: a) What is SAP Business Objects? b) Origin of Business Objects, History and its acquisition by SAP. c) Introduction and Understanding of various BO applications and commonly used terminology. d) Basic introduction of competitors of BO in the global market and how BO fares amongst them. e) BO earlier versions and it s comparison with the BO XI R 3.1 version. SAP BO Central Management Console a) What is CMC and how we can manage security with it? b) What is CCM? c) Creation of folders, groups, users, categories, events, schedules, recurring schedules, access levels, profiles etc. d) Hands on: Going through everything discussed, via examples.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The purpose of this policy is to describe what steps must be taken to ensure that users connecting to the corporate network are authenticated in an appropriate manner, in compliance with company standards, and are given the least amount of access required to perform their job function. This policy specifies what constitutes appropriate use of network accounts and authentication standards.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Following document is prepared as a part of User interface. This document provides the information to design and execute campaigns using SAS Campaign Studio for Campaign Management Automation project for THE ORGANIZATION…

    • 1459 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Business objects

    • 3321 Words
    • 19 Pages

    Marc Daniau joined Business Objects in 1992 as project consultant in France. He moved to the…

    • 3321 Words
    • 19 Pages
    Powerful Essays