Chat now with support
Chat with Support

Toad Intelligence Central 4.3 - Deployment Guide

Enable User Experience Feedback

You can influence the design of future versions of Toad Intelligence Central and help us improve its quality, reliability and performance.

To enable/disable user experience feedback

  1. From a web browser, log in to Toad Intelligence Central as a user with the Administrator role. For more information about the Administrator role, see User Roles.
  2. Click Administration | Server | Logging.
  3. Select or clear the Provide anonymous user experience feedback to help improve Toad Intelligence Central option.

Refer also to the Privacy Statement.

Manage Objects

Users with an Administrator role are automatically granted Manage privileges to all objects on Toad Intelligence Central. See User Roles for more information.

In addition to the following object-management activities, the Web interface provides object usage reports. See View and Download Reports for more information.

View Objects

In the Web interface, use the Home page to view the objects in Intelligence Central. You can also view a list of objects per user (or group) on the Users page (or Groups page).

Users can see only the objects that they own or that have been shared with them, with the exception of the Administrator. The Administrator can view all objects on Intelligence Central.

To view objects and object details

  1. From a web browser, log in to Intelligence Central.
  2. Click Home to show objects in their folder structure.
  3. Enter a partial text string in the Search text box to filter objects.
  4. Select an object to display details in the right pane.
  5. To view objects associated with a user, go to Administration | Users. Select a user to display a list of objects shared with the user and a list of objects published by the user.
  6. To view objects shared with a group, go to Administration | Groups and select a group.

View Objects by User or Group

When a user with an Administrator role generates a list of objects they see all objects on Toad Intelligence Central. When any other user generates a list of objects they see the objects for which they have Share or Manage rights. Another user may not see all the objects that the Administrator can see.

Show the objects owned by a particular user

From a web browser with log in to Intelligence Central, click Administration | Users and select the user. The objects owned by that user are listed in the Published Objects pane. Tabs show the number of objects that are Private (to that user) and Shared (with other Toad Intelligence Central users). Click the Private / Shared tabs to show / hide these objects.

Show the objects shared with a particular user

From a web browser with log in to Intelligence Central, click Administration | Users and select the user. The objects shared with that user are listed in the Shared Objects pane.

Show the objects shared with a particular group

From a web browser with log in to Intelligence Central, click Administration | Groups and select the group. Objects shared with that group are listed in the Shared Objects pane.

Move Objects and Folders

To move objects

On the Home page, you can drag-and-drop an object to move it to another folder. Only users with the Administrator role can move an object (unless the object is locked by another user).

Restrictions:

  • You cannot move objects into or out of the Common_Transformation_Repository.
  • You cannot sort or reorganize objects in a folder.
  • You cannot move an object to a folder where the name exists.

To move folders

On the Home page, you can drag-and-drop a folder to move it. Only users with the Administrator role can move folders (unless an object in the folder is locked by another user).

Restrictions:

  • You cannot move the Common_Transformation_Repository or its sub-folders.
  • You cannot move the No folder assigned folder.
  • You cannot move a folder while a snapshot in the folder is refreshing.

Data Connectivity and Data Objects

Data connectivity functionality allows Toad Data Point users to publish data objects (views, snapshots, and datasets) to Intelligence Central. Data objects are published to Intelligence Central as a way to store and share data from remote data sources.

Note: A Toad Intelligence Central Data Connectivity license is required to enable data connectivity functionality in Intelligence Central. See License Toad Intelligence Central for more information.

ODBC Connectivity

When data is published from a remote data source by a Toad Data Point user, the connection information is stored on Intelligence Central. Intelligence Central uses ODBC connectivity to connect to relational database sources that have been defined by Toad Data Point.

Note: To connect to data sources using ODBC connectivity, supporting ODBC drivers and necessary client files must be installed on the Toad Intelligence Central server host. See Install Toad Data Point and ODBC Drivers for more information.

User Access to Remote Data Source - Authentication

When a Toad Data Point user publishes a data object to Intelligence Central, the object is associated with a particular data source connection. This data source connection in Intelligence Central must have a login ID (or authentication key) to use when connecting to the remote data source. This ID / authentication key is created when the object is published and can be either shared or personal. A shared ID / authentication key can be used by any user when accessing the remote source. A personal ID / authentication key requires that each user log in using their own personal login credentials when accessing the remote source.

Users can provide login credentials through the Web interface (Web server) for an object that requires authentication.

  1. From the Home page, select an object to display the Details pane.
  2. In the Details pane, click the data source link in the Source field to open the Alter Authentication dialog.

    For an object with a shared key applied, only users with Manage privileges to the object can open the Alter Authentication dialog through the data source link. For other users, the data source link is disabled.

See Alter Authentication for more information.

Authentication

The ability of any user, including a user with an Administrator role, to download an object where data is sourced from a remote data source is dependent on the authentication granted to that user. The Administrator role is not automatically granted authentication to view data sourced directly from remote data sources.

The following table describes the origin of data and the authentication requirements for the data objects in Intelligence Central.

Icon Object Description
Tables Tables are tables of data mapped from data source mappable objects. The data is sourced direct from the data source. Authentication is required to view the contents of the object.

Views

Views are saved SQL statements. When the SQL statement is executed, data is sourced direct from the data source.

Authentication is required to view the result set if the object was published with a personal key. Authentication is not required if published with a shared key.

Beginning with Intelligence Central 4.3, a view can have either a personal key or a shared key applied, but not both.

 

Snapshots

Snapshots are the result set of an executed SQL statement (View) or table. The data is stored on Toad Intelligence Central.

Authentication is not required to view the result set, as snapshots are published with a shared key.

Mappable Objects

Mappable objects are data source objects that can be potentially mapped to tables. Authentication is required to list mappable objects and map tables.

Automation Scripts

Prerequisites for Automation Script Execution

If the Automation Script scheduled to execute on the Toad Intelligence Central server includes an instruction to send an email, then in order for that email to be sent the Toad Intelligence Central server must have access to an email SMTP port.

If the Automation Script scheduled to execute on the Toad Intelligence Central server includes an instruction to run a macro in an Excel spreadsheet, then Microsoft Excel must be installed on the Toad Intelligence Central host computer for the macro to successfully execute.

Change Account Used for Script Execution

Automation scripts execute in Intelligence Central under a user account. Users with the Administrator role can change the account under which a script executes.

  1. From the Home page, select an Automation script to display the Details pane.
  2. In the Details pane, click Credentials to open the Alter Credentials dialog. See Alter Automation Script Credentials for more information.

 

Alter Script Credentials

An Automation script running in Intelligence Central runs under a specified user account. Initially, this run account is specified at the time the script is published. After the script is published, you can use the Alter Credentials dialog to perform the following tasks:

  • Change the account under which the script runs
  • Change the password for the current run account

Only users with the Administrator role or with Manage privileges to the Automation script can change the account under which the script runs.

Alter Automation script user account

  1. In the Web interface, click Home.
  2. Select an Automation script to display object details.
  3. In the Details pane, click Credentials to open the Alter Credentials dialog. Select one of the following:
    • Specify user to execute automation script—Select to specify a Windows user account. Then enter account credentials.
    • Use default user to execute automation script—Select to use the default user account, which is the account under which the Toad Intelligence Central App Server is currently running.

      For best results when using the default user (App Server) account to run scripts, give this account all the necessary permissions to successfully execute the scripts. Normally, the Intelligence Central App Server uses the server's Local System user account.

    To limit the script run time, enter a maximum run time in Script execution limit.

  4. If you want to change the password for the current run account (if Windows user account), enter the new password and click Save. This action updates the password for each script that runs under this user account.

 

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating