Post-Installation Steps
After the installation of the JasperReports server, perform the following tasks:
cminder140
After the installation of the JasperReports server, perform the following tasks:
Increase the Tomcat Heap Size
Increase the Tomcat heap size to improve the performance of the JasperReports server.
Follow these steps:
- Log in to the JasperReports server.
- Opencatalina.batfile which is located in the <Tomcat>/bin folder.
- Add the following text afterset JAVA_OPTS=%JAVA_OPTS% %LOGGING_CONFIG%.Set JAVA_OPTS=%JAVA_OPTS% -Xms1024m -Xmx2048m -XX:PermSize=32mset JAVA_OPTS=%JAVA_OPTS% -XX:MaxPermSize=512m -Xss2m -XX:+UseConcMarkSweepGC Set JAVA_OPTS=%JAVA_OPTS% -XX:+CMSClassUnloadingEnabled
- Save the file.
- Start Tomcat.
Token Based Authentication
Configure token based authentication between the
Privileged Access Manager Server Control
enterprise management server and the JasperReports reporting server.Follow these steps:
[
Privileged Access Manager Server Control
]- In thePrivileged Access Manager Server Controlmounted drive, navigate to the \ReportPackages folder.
- CopyKeystore_Generator.zipfile to a temporary location and unzip the file. The unzipped file contains these folders: classes, keystore, and libs.
- Run the following command to generatepim.jksfile in the keystore folder.Windows:java -cp libs/*;classes GenerateKeyLinux:java -cp libs/*:classes GenerateKey
- Copy thepim.jksandpim.propertiesfiles from the keystore folder to the following location:<JBoss_home>\server\default\deploy\IdentityMinder.ear\config\com\netegrity\config\keys
- Restart JBoss.
[JasperReports Reporting Server]
Copy the
pim.jks
and pim.properties
files from the keystore folder to the following location on the JasperReports reporting server: %Tomcat Folder%/webapps/webappname(ex-jasperserver-pro)/WEB-INF/config
Note:
Create the config folder, if not exists.Enable SSL Communication
Enable a secure SSL connection between the JasperReports Server and the Enterprise Management Server. By default, the JasperReports reporting server uses HTTP for communication.
Follow these steps:
[JasperReports Server]
- Log in to the JasperReports reporting server.
- Open a command prompt and run the following command to generate a key pair and a self-signed certificate:keytool -genkey -alias <alias_name> -keyalg <key_alogrithm> -keystore <Full path of the keystore_file_name>-genkeyGenerates a key pair.-aliasSpecifies a character string that uniquely identifies a key pair within a keystore.-keyalgSpecifies the algorithm to generate a key pair.Default:RSA-KeystoreSpecifies the keystore file to store the key pair and the self-signed certificate.Example: Generate a key pair and a self-signed certificateThe following keytool command generates a key pair using the RSA key generation algorithm and stores in the keystore file “jasper.keystore” with alias name “tomcat”. A self-signed certificate is also generated and stored in the keystore file.keytool -genkey -alias tomcat -keyalg RSA -keystore C:/apache-tomcat-7.0.68/jasper.keystoreThe keytool utility starts.
- Enter keystore password.
- Provide information for the following questions:
- What is your first and last name?
- What is the name of your organization unit?
- What is the name of your organization?
- What is the name of your city or locality?
- What is the name of your state or province?
- What is the two-letter country code for this unit?Note:Ensure that the first name and last name is the host name of the JasperReports Server. The tool creates CN name with the same host name, which is validated while communicating from Enterprise Management Server to the JasperReports Server.
- Type the key password for the alias.Note:The keystore and the key alias password must be same.
- A keystore is created with a key pair and a self-signed certificate, and stored in the home directory of the current user.
- Open the server.xml file and add the following text. You can locate this file at <InstDir>\<tomcat_version>\conf.<Connector protocol="org.apache.coyote.http11.Http11NioProtocol" port="8443" maxThreads="200" scheme="https" secure="true" SSLEnabled="true" keystoreFile="C:/apache-tomcat-7.0.68/jasper.keystore" keystorePass="changeit" clientAuth="false" sslProtocol="TLS"/>Note:Ensure that the keystore path and password are correct as provided in step2 and step 3 respectively.
- Restart the tomcat server.
[Enterprise Management Server]
- Log in to the Enterprise Management Server.
- Open a Web browser, and download the self-signed certificate which was generated in the JasperReports Server.
- Navigate to the JDK installed directory. For example: C:\jdk1.8.0\jdk1.8.0_74\jre\lib\security
- Open a command prompt and run the following command using administrator. This command imports the self-signed certificate into the Enterprise Management Server.keytool -import -alias <alias_name> -keystore cacerts -file <fullPath of the Self_Signed_Certificate.cer>-importSpecifies that the keytool utility reads the self-signed certificate and stores into the keystore.-aliasSpecifies the alias name that is assigned to the self-signed certificate that is imported into the keystore.-fileSpecifies the full pathname of the self-signed certificate.The keytool utility starts.
- Enter the keystore password:The self-signed certificate is added to the keystore.
- Restart JBoss.
Update the License File in the JasperReports Server
Update the existing license file in the JasperReports Server with the
Privileged Access Manager Server Control
license. The Privileged Access Manager Server Control
license is available in the JasperReports Server ISO.Follow these steps:
- Log in to the JasperReports Server.
- Navigate to the following directory: <TOMCAT_INSTALLED_DIR>/webapps/jasperserver-pro
- Replace the existing JasperReports server license file with the license file available in the JasperReports Server ISO.
- Restart tomcat.