Chat now with support
Chat with Support

Toad Intelligence Central 5.3 - Deployment Guide

Welcome to Toad Intelligence Central Install Toad Intelligence Central License Toad Intelligence Central Connect to Toad Intelligence Central Add New Users and Groups Manage Users and Groups Email Notifications Misc Administrator Activities Manage Objects Manage Folders Object/Folder Manager Privileges Reports Health Check Dashboard Support Bundle Server Maintenance Upgrade Toad Intelligence Central Uninstall Toad Intelligence Central About Us

Server Email Settings

Before Intelligence Central can start sending email notifications, the email notifications service must be enabled on the Intelligence Central server. In addition, the SMTP mail server must be configured. Both of these actions can be performed by a user with the Administrator role.

A user with the Administrator role can also subscribe/unsubscribe individual users to the email notification service.

To enable email notifications and configure the SMTP mail server

  1. Select Administration | Server | Notifications.
  2. Select On in the Email notifications field.
  3. Click Configure SMTP Mail Server.
  4. In the Configure SMTP Mail Server dialog, enter the mail server host name.
  5. If your SMTP mail server supports TLS/SSL, select Use TLS/SSL. This will encrypt email communications between Intelligence Central and your SMTP mail server.
  6. If the SMTP server requires authentication, select the check box and enter credentials.
  7. From address—Enter an email address to use as the sender address in each email.
  8. Subject prefix—Enter a prefix to use at the beginning of the Subject line of each email.
  9. Click Send Test Email to test your email configuration.
  10. Click Save to save your settings and close the dialog.

To subscribe/unsubscribe users (server-level)

  • After enabling email notifications, you can specify which users are subscribed to email notifications.
    • To subscribe a user, make sure the user's name is listed in the Subscribers list. To specify which emails an individual user should receive, go to Administration | Users. See Specify User Email Subscriptions.
    • To unsubscribe a user, move the user to the Unsubscribed list.

Specify User Email Subscriptions

A user with the Administrator role can specify which types of email notifications each individual user can receive.

Any user can specify the email notification options for their own user account.

To change a user's email subscriptions

  1. Log in to the Web Console using a Web browser and select Administration | Users.
  2. Select a user name.
  3. Click Change subscription and then select which email notifications this user should receive. See Email Notifications for a description of each notification type.

Note: Email Notifications must be enabled on the Intelligence Central server before the Admin Digest can be sent. In addition, the user must be on the Subscribers list (Administration | Server | Notifications). See Server Email Notification Settings for more information.

Misc Administrator Activities

In addition to the other server-related activities described elsewhere in this document, users with the Administrator role can also perform the following:

Configure Session

By default the session time out value is 60 minutes and the remember me interval is 30 days (when remember me option is enabled , user do not need to input credential again when login Toad Intelligence Central Web Console during the remember me interval ).

To specify the value of session time out and remember me interval

  1. Use a web browser to log in to Intelligence Central as a user with the Administrator role
  2. Select Administration | Server | Settings
  3. In the Session section, input the value in the field Session Time Out and Remember me Interval

Configure New Group Creation

Admin users now can specify which user roles are allowed to create user groups. For more information about Roles, see User Roles.

  1. Use a web browser to log in to Intelligence Central as a user with the Administrator role
  2. Select Administration | Server | Permissions
  3. Select an option in New Group Creation

Download Audit Log

The Audit Log allows you to download a log of activity on Toad Intelligence Central for a specific time period.

The log is a simple spreadsheet and includes the following information:

  • Time of event
  • Type of event
  • Event description
  • Object name or database name, if applicable

To download the audit log

  1. From a web browser, log in to Toad Intelligence Central as a user with an Administrator role. For more information about the Administrator role, see User Roles.
  2. Click Administration | Server | Settings.
  3. In the Audit Log section, select a time period.
  4. Then click Prepare Download. This converts the log to a CSV file. The time to prepare the file for download depends on the time span selected and the usage volume during the time span.
  5. Track the preparation of the download on the web browser display.
  6. Intelligence Central displays a Success message when the object is ready to download. Click the link in the Success message to download the audit log. The location of the log file on download will be as per your web browser settings.

Enable User Experience Feedback

  1. You can influence the design of future versions of Toad Intelligence Central and help us improve its quality, reliability and performance.

  2. To enable/disable user experience feedback

    1. From a web browser, log in to Toad Intelligence Central as a user with the Administrator role. For more information about the Administrator role, see User Roles.
    2. Click Administration | Server | Settings.
    3. Select or clear the Provide anonymous user experience feedback to help improve Toad Intelligence Central option.
  3. Refer also to the Privacy Statement.

Manage Objects

Users with an Administrator role are automatically granted Manage privileges to all objects on Toad Intelligence Central. See User Roles for more information.

In addition to the following object-management activities, the Web interface provides object usage reports. See Data Object Usage Report for more information.

View Objects

In the Web interface, use the Home page to view the objects in Intelligence Central. You can also view a list of objects per user (or group) on the Users page (or Groups page).

Users can see only the objects that they own or that have been shared with them, with the exception of the Administrator. The Administrator can view all objects on Intelligence Central.

To view objects and object details

  1. From a web browser, log in to Intelligence Central.
  2. Click Home to show objects in their folder structure.
  3. Enter a partial text string in the Search text box to filter objects.
  4. Select an object to display details in the right pane.
  5. To view objects associated with a user, go to Administration | Users. Select a user to display a list of objects shared with the user and a list of objects published by the user.
  6. To view objects shared with a group, go to Administration | Groups and select a group.

View Objects by User or Group

When a user with an Administrator role generates a list of objects they see all objects on Toad Intelligence Central. When any other user generates a list of objects they see the objects for which they have Share or Manage rights. Another user may not see all the objects that the Administrator can see.

Show the objects owned by a particular user

From a web browser with log in to Intelligence Central, click Administration | Users and select the user. The objects owned by that user are listed in the Published Objects pane. Tabs show the number of objects that are Private (to that user) and Shared (with other Toad Intelligence Central users). Click the Private / Shared tabs to show / hide these objects.

Show the objects shared with a particular user

From a web browser with log in to Intelligence Central, click Administration | Users and select the user. The objects shared with that user are listed in the Shared Objects pane.

Show the objects shared with a particular group

From a web browser with log in to Intelligence Central, click Administration | Groups and select the group. Objects shared with that group are listed in the Shared Objects pane.

Move Objects and Folders

To move objects

On the Home page, you can drag-and-drop an object to move it to another folder. You can also relocate an object by selecting the destination folder in the selected object's Details pane. Users with the Administrator role or manage privileges to the object can move an object (between non-secured folders). An object cannot be moved if it is locked by another user.

Restrictions:

  • You cannot move rules out of the Common_Transformation_Repository.
  • You cannot sort or reorganize objects within a folder.
  • You cannot move an object to a folder where the name exists.
  • To move an object, you must have manage privileges to the object.
  • To move an object to a secured folder, you must have manage privileges to the object and to the secured folder.

To move folders

On the Home page, you can drag-and-drop a folder to move it. To move a folder, a user must have the Administrator role or manage privileges to all objects in the folder. A folder cannot be moved if an object in the folder is locked by another user.

Restrictions:

  • You cannot move the Common_Transformation_Repository or its sub-folders.
  • You cannot move the No folder assigned folder.
  • You cannot move a folder while a snapshot in the folder is refreshing.
  • You cannot move a secured folder into a non-secured folder.
  • You cannot move a non-secured folder into a secured folder.

See About Secured Folders for more information about secured folders.

Data Connectivity and Data Objects

Data connectivity functionality allows Toad Data Point users to publish data objects (views, snapshots, and datasets) to Intelligence Central. Data objects are published to Intelligence Central as a way to store and share data from remote data sources.

Note: A Toad Intelligence Central Data Connectivity license is required to enable data connectivity functionality in Intelligence Central. See License Toad Intelligence Central for more information.

ODBC Connectivity

When data is published from a remote data source by a Toad Data Point user, the connection information is stored on Intelligence Central. Intelligence Central uses ODBC connectivity to connect to relational database sources that have been defined by Toad Data Point.

Note: To connect to data sources using ODBC connectivity, supporting ODBC drivers and necessary client files must be installed on the Toad Intelligence Central server host. See Install Toad Data Point and ODBC Drivers for more information.

User Access to Remote Data Source - Authentication

When a Toad Data Point user publishes a data object to Intelligence Central, the object is associated with a particular data source connection. This data source connection in Intelligence Central must have a login ID (or authentication key) to use when connecting to the remote data source. This ID / authentication key is created when the object is published and can be either shared or personal. A shared ID / authentication key can be used by any user when accessing the remote source. A personal ID / authentication key requires that each user log in using their own personal login credentials when accessing the remote source.

Users can provide login credentials through the Web interface (Web server) for an object that requires authentication.

  1. From the Home page, select an object to display the Details pane.
  2. In the Details pane, click the data source link in the Source field to open the Alter Authentication dialog.

    For an object with a shared key applied, only users with Manage privileges to the object can open the Alter Authentication dialog through the data source link. For other users, the data source link is disabled.

See Alter Authentication for more information.

Authentication

The ability of any user, including a user with an Administrator role, to download an object where data is sourced from a remote data source is dependent on the authentication granted to that user. The Administrator role is not automatically granted authentication to view data sourced directly from remote data sources.

The following table describes the origin of data and the authentication requirements for the data objects in Intelligence Central.

Icon Object Description
Tables Tables are tables of data mapped from data source mappable objects. The data is sourced direct from the data source. Authentication is required to view the contents of the object.

Views

Views are saved SQL statements. When the SQL statement is executed, data is sourced direct from the data source.

Authentication is required to view the result set if the object was published with a personal key. Authentication is not required if published with a shared key.

Beginning with Intelligence Central 4.3, a view can have either a personal key or a shared key applied, but not both.

 

Snapshots

Snapshots are the result set of an executed SQL statement (View) or table. The data is stored on Toad Intelligence Central.

Authentication is not required to view the result set, as snapshots are published with a shared key.

Mappable Objects

Mappable objects are data source objects that can be potentially mapped to tables. Authentication is required to list mappable objects and map tables.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating