You are on page 1of 46

Aspen Local Security

Installation Guide
Version Number: V8.4
November 2013
Copyright (c) 2000 2013 by Aspen Technology, Inc. All rights reserved.

aspenONE, Aspen Framework Server, Aspen InfoPlus.21, Aspen Local Security (ALS) Server, and the aspen leaf
logo are trademarks or registered trademarks of Aspen Technology, Inc., Burlington, MA.

All other brand and product names are trademarks or registered trademarks of their respective companies.

This manual is intended as a guide to using AspenTech's software. This documentation contains AspenTech
proprietary and confidential information and may not be disclosed, used, or copied without the prior consent of
AspenTech or as set forth in the applicable license agreement. Users are solely responsible for the proper use of
the software and the application of the results obtained.

Although AspenTech has tested the software and reviewed the documentation, the sole warranty for the software
may be found in the applicable license agreement between AspenTech and the user. ASPENTECH MAKES NO
WARRANTY OR REPRESENTATION, EITHER EXPRESSED OR IMPLIED, WITH RESPECT TO THIS
DOCUMENTATION, ITS QUALITY, PERFORMANCE, MERCHANTABILITY, OR FITNESS FOR A PARTICULAR
PURPOSE.

Aspen Technology, Inc.


200 Wheeler Rd.
Burlington, MA 01803-5501
USA
Phone: (781) 221-6400
Website: http://www.aspentech.com
Contents
1 Introduction .........................................................................................................1
Related Documentation .....................................................................................1
Technical Support ............................................................................................1

2 Overview ..............................................................................................................3
21CFR11 Compliance Information ......................................................................3
Aspen Local Security Overview...........................................................................3
ALS Server Architecture ..........................................................................3
Backward Compatibility...........................................................................4
aspenONE Overview .........................................................................................4
Packaging .......................................................................................................4
Organization of DVDs........................................................................................5
Accessing aspenONE Documentation ..................................................................5
Installation Overview ........................................................................................6
System Requirements.......................................................................................6
Hardware Requirements..........................................................................6
Software Requirements...........................................................................7
User Requirements .................................................................................7
Pre-Installation Checklist...................................................................................7
Checking the Service Pack Version ...........................................................8
Checking Installation Account Privileges ....................................................8
Licensing...............................................................................................8

3 Installing Aspen Local Security ............................................................................9


Overview.........................................................................................................9
Before You Install.............................................................................................9
Aspen Local Security Server Installation..............................................................9
AFW Security - Configure Data Source .................................................... 15
AFW Security Service Account................................................................ 16
After You Install ............................................................................................. 17

4 Securing the AFWDB Database ...........................................................................19


Securing AFWDB.MDB with a password ............................................................. 19
Securing AFWDB.MDB using the System.mdw file .............................................. 20
Configuring the AFW Security Data Source ........................................................ 22

5 Configuring Aspen Local Security .......................................................................25


Starting the AFW Security Manager .................................................................. 25
Creating a New Role ....................................................................................... 26
Creating the Administrator role .............................................................. 26
Importing an Application ................................................................................. 28
Setting Permissions .............................................................................. 29

Contents i
6 Upgrading Aspen Local Security Server ..............................................................31
Before You Upgrade........................................................................................ 31
Upgrading the ALS Server ............................................................................... 31

7 Removing Aspen Local Security Server...............................................................33


Before You Remove ........................................................................................ 33
Removing Aspen Local Security Server ............................................................. 33

8 Reinstalling Aspen Local Security Server............................................................35


Overview....................................................................................................... 35
Before You Reinstall the ALS Server ................................................................. 35
Reinstalling the ALS Server ............................................................................. 35
After You Reinstall.......................................................................................... 36

9 Troubleshooting .................................................................................................37
Problems You May Encounter ........................................................................... 37
Local Security Console Access to pfwauthz.asp ........................................ 37
pfwauthz.asp access to afwdb.mdb......................................................... 38
Confirming the Default Web Site ............................................................ 38
Confirming Location of the Local Security Server ...................................... 38
Confirming Location of the ODBC Data Source for afwdb.mdb .................... 39
Use Server ADSI .................................................................................. 41
Verifying Anonymous User Access Permissions......................................... 42
ASP.NET Registration............................................................................ 42

ii Contents
1 Introduction

This manual describes how to install Aspen Local Security (ALS) Server on
machines running Microsoft Windows Server 2008 R2 SP1, Microsoft
Windows Server 2012, and Microsoft Windows 7 SP1.

Note: For the latest information on the installation and use of the ALS server,
please refer to the Aspen Local Security Release Notes.

Related Documentation
In addition to this document, a number of other documents are provided to
help users learn and use the Aspen Local Security, including:
Aspen Framework Server Installation Guide
Aspen InfoPlus.21 Family Installation Guide

Technical Support
AspenTech customers with a valid license and software maintenance
agreement can register to access the online AspenTech Support Center at:
http://support.aspentech.com.
This Web support site allows you to:
Access current product documentation
Search for tech tips, solutions and frequently asked questions (FAQs)
Search for and download application examples
Search for and download service packs and product updates
Submit and track technical issues
Send suggestions
Report product defects
Review lists of known deficiencies and defects
Registered users can also subscribe to our Technical Support
e-Bulletins. These e-Bulletins are used to alert users to important technical
support information such as:
Technical advisories

1 Introduction 1
Product updates and releases
Customer support is also available by phone, fax, and email. The most up-to-
date contact information is available at the AspenTech Support Center at
http://support.aspentech.com.

2 1 Introduction
2 Overview

This chapter provides an overview of the Aspen Local Security, the installation
process, and the installation requirements. It covers the following topics:
21CFR11 Compliance Information
Aspen Local Security Overview
aspenONE Overview
Installation Overview
System Requirements
Pre-Installation Checklist

21CFR11 Compliance
Information
If you are operating under 21CFR11 conditions, refer to Aspen 21CFR11
documentation to help provide 21CFR11 compliance.
While AspenTech solutions alone do not ensure compliance with 21CFR11,
when combined with standard operating procedures, training, and proper
implementation, they provide a solid foundation which enables manufacturers
to comply with 21CFR11 regulations.

Aspen Local Security Overview


The Aspen Local Security (ALS) Server provides role-based security for
AspenTech point solutions. Authenticated users are granted permission based
on their job function or role membership. Authorization is offered through
AspenTech's Business Process Explorer (BPE) COM interfaces.

ALS Server Architecture


The Aspen Local Security Server is based on Microsofts Windows Distributed
internet Applications Architecture. The technologies used to build the ALS
components include:
Component model and services: COM and COM+

2 Overview 3
HTTP server: IIS (for Windows Server 2008 R2 SP1/Server 2012/Windows
7.
Database: Microsoft Access
Data exchange: XML

Backward Compatibility
Aspen Local Security V8.4 is fully compatible with Local Security client
components versions V8.0, V7.3, V7.2, V7.1, 2006.5, 2006, and 2004.2.

aspenONE Overview
aspenONE is the comprehensive set of software solutions and professional
services provided by AspenTech; these are designed to help process
companies achieve their operational excellence objectives.
AspenTech releases its products on a single set of DVDs that are designed to
ease the installation of aspenONE products and/or modules. To achieve this
goal, all AspenTech products and modules use one installation procedure that
will guide you through your installation regardless of the products or modules
being installed.

Note: More information on aspenONE solutions, as well as the aspenONE


Licensing Model, can be found in the aspenONE Deployment Guide.

Packaging
Included in your package from AspenTech, you will find the following items
that you will need prior to installation:
A packing slip listing the version of the media that you have received and
indicating whether or not a dongle and/or CD containing the license file is
included in the shipment.
Package of DVDs (see Organization of DVDsbelow).
If a license file is included, a dongle or separate CD (instructions on SLM
License File Installation are included on the CD).

Notes:
Before you begin installation, you will want to print copies of the
Installation Guides for products that will be installed. Those guides are
included on the Aspen Engineering and Aspen Manufacturing and Supply
Chain DVDs in your package.
An invoice noting which products you are licensed for is sent separately
from the software shipment.

4 2 Overview
Organization of DVDs
aspenONE delivers AspenTechs Process Modeling, Exchanger Design and
Rating, Economic Evaluation, Energy and Flare Analysis, Process Development
and Operations Support, Plant Operations, Process Control and Supply Chain
Management products and documentation in a single set of easy-to-use
DVDs.
The DVDs are organized in the following way:
DVD 1, Aspen Engineering includes 32-bit versions of Aspen
Administration components (Aspen SLM, Aspen SLM tools, ALC Auto
Upload Tool), Aspen PIMS and all Aspen Engineering products and 64-bit
version of Aspen Basic Engineering.
DVD 2, Aspen Manufacturing and Supply Chain includes 32-bit
versions of Aspen Administration components (Aspen SLM, Aspen
Security, Aspen SLM tools, and aspenONE Diagnostics, ALC Auto Upload
Tool), Aspen Manufacturing products (Information Management, Batch,
Production Management, and Advanced Process Control), Aspen Petroleum
Supply Chain products, Aspen Chemical Supply Chain products, and
aspenONE Infrastructure products. This DVD also includes Aspen
Inventory Management and Operations Scheduling (IMOS) and 64-bit
versions of Aspen Reporting Framework and Aspen Role-Based
Visualization.

Notes:
You do not need to insert DVDs in any particular order. Inserting any of
them will start the installation procedure and you will be automatically
prompted to insert the next appropriate DVD to continue with your
installation.
Some products previously available on CD-ROM or DVD are not included
on the aspenONE DVD product discs. If you do not find a product included
on the aspenONE DVD product discs, please contact AspenTech Support at
http://support.aspentech.com.
Third-party products that AspenTech delivers without any modification of
the software are delivered in their original packages.

Accessing aspenONE
Documentation
aspenONE V8.4 includes new ways to access documentation associated with
the aspenONE products. Documentation is now available directly from the
applications. This ensures that you can always find the most current version
of the document that you are looking for.
Documentation can be found in the following ways:
Installation Guides and Release Notes can be found by clicking the
corresponding link on the first page of the Installation Browser.
Context-sensitive help can be accessed by:
o Clicking the Help button on an application dialog box

2 Overview 5
o Pressing F1
o Clicking the application Help menu and selecting Help
Additional documents in PDF format can be accessed by:
o Clicking the Online Documentation link on the products Start page
or Start tab or selecting Documentation from the products Help
menu. This will open the Online Documentation Center from which you
can view and/or download the product-specific documents.
o Logging onto the AspenTech Customer Support site and browsing the
Documentation page.
o Downloading all of the available documentation from the Customer
website by downloading the zip file that contains the documentation.

Note: The aspenONE Documentation DVD is no longer included in the DVD


package.

Installation Overview
The AspenTech software solutions are organized and distributed in suites of
Applications/Products and a set of Integration Products software. You can
have licensed a single AspenTech product or a full suite of solutions.
The AspenTech Master Install system manages the installation of either a
single product or an integrated suite of AspenTech solutions on Microsoft
Windows-based platforms.
This manual addresses the installation of the Aspen Local Security Server.
You can install Aspen Local Security concurrently with other products on the
same disc.

System Requirements
This section provides the hardware, software, and user requirements for the
Aspen Local Security Server.

Hardware Requirements
The following table lists the minimum and recommended hardware
requirements for running the ALS server:
Resource Minimum Recommended
Requirements

Physical 128 MB 256 MB


Memory

Hard Disk 150 MB 200 MB


Space

6 2 Overview
Software Requirements
Before you install the Aspen Local Security Server, you must install Microsoft
.NET Framework 4.0 or 4.5, Microsoft .NET Framework 3.5 SP1, and Internet
Information Services with World Wide Web Service, ASP, and ASP.NET
enabled. The installer will verify the availability of these features before
proceeding with the install.
You must have one of the following Operating Systems: Windows 8
Professional x64, Windows 8 Enterprise x64, Windows 7 Enterprise SP1 x86,
Windows 7 Enterprise SP1 x64, Windows 7 Professional SP1 x86, or Windows
7 Professional SP1 x64.

Note: Windows XP is no longer supported.


You must also have one of the following installed: Microsoft Windows
Server 2008 R2 SP1, Microsoft Windows Server 2012, or Microsoft
Windows 7 SP1.

User Requirements
Installing the Aspen Local Security Server requires Administrator privileges.

Pre-Installation Checklist
Before installing the Aspen Local Security Server, review the following
checklist to ensure a smooth installation.
Verify that all system requirements are met (see
System Requirements on page 6).
Run the appropriate scanning and defragmentation
programs to correct any existing disk problems.
Check which service pack (SP) is installed. For
instructions, see the following section on Checking the
Service Pack Version.
Verify that all additional required software has been
installed.
Verify that the installation account has local
Administrator privileges. For instructions, see the
following section on Checking Installation Account
Privileges.
Verify that Aspen License Manager (SLM) licensing is
available. For more information, see the following section
on Licensing.
Disable any anti-virus software running on your PC so
that the installation program can copy files to the system
area and modify the Windows Registry.
After you complete the installation, enable the anti-virus

2 Overview 7
software.

Checking the Service Pack Version


On the desktop, click Start | Settings | Control Panel and double-click
System. The General tab of System Properties dialog box displays the
installed version and any service pack.

Checking Installation Account Privileges


When installing Aspen Local Security Server, you must use an account with
local Administrator privileges.

Note: Do not change the default privileges on the folders that are created by
the installation process. If you change these privileges, your installation may
not work correctly.

To verify Administrator privileges:


1 From Control Panels Administrative Tools, click Computer
Management.
2 In the System Tools tree, expand the Local Users and Groups folder.
3 In the tree view, click Groups to show its details.
4 In the details pane, double-click Administrators.
The Administrators Properties dialog box appears.
You must be a member of this group to perform the installation.

Licensing
Aspen products are licensed by the Aspen License Manager. The License
Manager serves licenses to programs running on a single computer or on a
network of computers.
It is strongly recommended that the Aspen License Manager Server be
installed before the Aspen Local Security Server.

8 2 Overview
3 Installing Aspen Local
Security

This chapter describes installing Aspen Local Security Server for the first
time.

Overview
This chapter covers the following topics:
Pre-installation requirements
Instructions to install Aspen Local Security
Post installation configuration instructions

Before You Install


Before you begin the installation:
Review the pre-installation checklist in Chapter 2.
Determine the following:
o Names of the server computers that will be involved
o Administrator Login IDs
o Passwords that will be used
Make sure that the account used to install the Aspen Local Security Server
has Administrator privileges.

Aspen Local Security Server


Installation
Each Application/Product Software disc is self-contained and includes the
AspenTech Master Installer. A setup program prompts you for information
required to install Aspen products.

3 Installing Aspen Local Security 9


Note: You must follow the computer restarting instructions at the end of each
product installation.

To install the Aspen Local Security Server:


1 Log on to the network using the account name and password for an
account in the Administrators group of the target computer.
2 Insert the installation disc into the disc drive.
Note: If the installation does not start automatically, click Start | Run,
and in the Run dialog box, type <drive>:\setup (where <drive> is the
drive letter assigned to your disc drive), and then click OK.

AspenTech Installation Browser

10 3 Installing Aspen Local Security


License Terms and Conditions

Install Type

Note: Select Custom Install.

3 Installing Aspen Local Security 11


Product Selection

File Location

12 3 Installing Aspen Local Security


Specify Licensing and Security

Product Configuration

Note: If this page is not available, please refer to the AFW Security
Service Account section on page 16.

3 Installing Aspen Local Security 13


Verify Your Installation

Installation Progress

14 3 Installing Aspen Local Security


Note: After you reboot the system, you must configure the AFW data source.
Log on to the network, using the same username and password that you used
to install the ALS server and related products. Click Start | All Programs |
AspenTech | Aspen Security | Data Source Configuration Tool.

AFW Security - Configure Data Source

1 On the AFW Security - Configure Data Source dialog box, select MS


Access as the database.

3 Installing Aspen Local Security 15


Note: The SQL Server and Oracle options are not applicable to Aspen Local
Security.
2 Do not type a value in the Database Password field unless you have
defined a password for the database in Access.
3 Verify that the DataBase/Schema is AFWDB.
4 Type a valid Login ID.
5 Do not type a value in the Password and Confirm Password fields
unless you have set the password in Microsoft Access for this login ID.
6 Click the Test Connection button.
If the test is successful, the following message appears: The Connection
was tested successfully.
If the data source configuration is successful, the following message
appears: The Data Source was configured successfully.
7 Click OK to close the dialog box.
The installation of the Aspen Local Security Server is complete.

AFW Security Service Account


The AFW Security Client Service must be run under a user account which has
privileges to read groups and user objects from the Active Directory. In some
scenarios, this user account is shared among other AspenTech applications,
which may require a high privileged user account.
This service account can be changed in the Services, as shown below.

16 3 Installing Aspen Local Security


After You Install
After the Aspen Local Security Server is installed, you must secure the
AFWDB database if you want to restrict access to the database file. For more
information, see Chapter 5, Configuring Aspen Local Security for your
system.

3 Installing Aspen Local Security 17


18 3 Installing Aspen Local Security
4 Securing the AFWDB
Database

The AFWDB database is a Microsoft Access database that contains all of the
Aspen Framework security information, such as roles. There are two ways to
set up security on an Access database:
Secure AFWDB.MDB with a password.
For instructions, see Securing AFWDB.MDB with a password.
Secure AFWDB.MDB using the system.mdw file. This method allows you to
set levels of security to the database.
For instructions, see Securing AFWDB.MDB using the System.mdw
file.

Securing AFWDB.MDB with a


password
The password you use to secure the AFWDB database must match the
password typed on the AFW Security Configure Data Source dialog box.
If the passwords do not match, the AFW Security Manager will not have
access to the security information.

To secure the AFWDB database:


1 Start Microsoft Access.
2 On the menu bar, click Open.
The Open dialog box appears.
3 On the Open dialog box, browse to the following location:
\Program Files\AspenTech\Local Security\Access97\
4 Select the AFWDB.mdb file.
5 Click the arrow next to the Open button and select Open Exclusive.

4 Securing the AFWDB Database 19


Note: You may see the Microsoft Office Access dialog box if the current
Microsoft Access version is higher than the AFWDB.mdb file. Follow the
instructions on the dialog box to convert the Access Database to the
current version.
6 On the menu bar, click Tools | Security | Set Database Password.
The Set Database Password dialog box appears.

7 Type the Password and Verify the password typed.


Important: The password you type here must match the password typed
on the AFW Security - Configure Data Source dialog box on page 15 to
enable the Local Security Server component to access the security data.
8 Click OK.
9 Close the AFWDB database, but do not exit MS Access.
10 Re-open the AFWDB database.
If security is properly set, the Password Required dialog box appears.

11 Type the database password and click OK to confirm that security is


properly set.
12 Close the database and exit Access.
13 Go to Configuring the AFW Security Data Source.

Securing AFWDB.MDB using the


System.mdw file
Using the System.mdw file, you can set different levels of security in the
database.

To use the System.mdw file:


1 Start Microsoft Access.
2 On the menu bar, click Security | User and Group Accounts.

20 4 Securing the AFWDB Database


The User and Group Accounts dialog box appears.
3 Click the Change Logon Password tab.

The Old Password field is blank.


4 Type the New Password and Verify the new password.
5 Click Apply, and then click OK.
6 Exit Access.
7 Access the ODBC Data Source Administrator.
For 32 bit machines, click Start | Settings | Control Panel |
Administrative Tools | Data Sources (ODBC).
For 64 bit machines, launch odbcad32.exe from
C:\Windows\SysWOW64.
The ODBC Data Source Administrator dialog box appears.
8 Click the System DSN tab.
9 Select the afwdb system data source and click the Configure button.

4 Securing the AFWDB Database 21


The ODBC Microsoft Access Setup dialog box appears.

8 In the System Database panel, select Database.


9 Click the System Database button.
The Select System Database dialog box appears.
10 Locate and select the system.mdw file.
Note: The default location is C:\Documents and Settings\<current
user>\Application Data\Microsoft\Access. You need to copy the
system.mdw file to a directory location with read/write access to all
users. If you are copying files from one folder to another, Windows may
automatically remove permissions for all users to the newly copied file.
Make that you double check the permissions in this case. The read/write
permission is required for both system.mdw and the database file
afwdb.mdb.
11 Click OK.
12 On the ODBC Microsoft Access Setup dialog box, click OK.
13 On the ODBC Data Source Administrator dialog box click OK.

Configuring the AFW Security


Data Source
You must set the login password required to access the Aspen Framework
database that contains the security information.

To set the login password:


1 On the desktop, click Start | Programs | AspenTech | Data Source
Configuration Tool.
The AFW Security - Configure Data Source dialog box appears.

22 4 Securing the AFWDB Database


2 Select MS Access.
3 Verify that DataBase/Schema is AFWDB.
4 Perform the tasks listed in the following table:
For this
security type Do this

Password For the Database Password, type the


same password you used to secure
AFWDB.MDB (see page 19).

system.md Type the following information:


w file
Field Contents

Login ID Admin
Password For the Password, type
the same password as the
one you set for the
system.mdw file (see
page 20).
Confirm Re-type the Password.
Password
System Click to locate and
Database select the system.mdw
file.
5 Click the Test Connection button.
If the test is successful, the following message appears: The Connection
was tested successfully.

4 Securing the AFWDB Database 23


If the data source configuration is successful, the following message
appears: The Data Source was configured successfully.
6 Click OK to close the dialog box.
7 Go to Chapter 5, Configuring Aspen Local Security.

24 4 Securing the AFWDB Database


5 Configuring Aspen Local
Security

To configure Aspen Local Security:


1 Start the AFW Security Manager and log on to the system.
2 Create and configure an administrator role.
3 Import applications to be secured under ALS.
4 Configure permissions for each role.

Starting the AFW Security


Manager
To start the AFW Security Manager:
1 On the machine where Aspen Local Security Server is installed, click Start
| All Programs | AspenTech | AFW Security Manager.
The AFW Security Manager logon dialog box appears.

2 Select the Use Operating System Logon User check box.


When this option is selected, your previous login will be used for logging
into the AFW Security Manager.

5 Configuring Aspen Local Security 25


3 Click OK.
Alternatively, you can use the Security Web Console to configure security.
You can launch this web console from Start | Programs | AspenTech |
Aspen Security | Server Console.

Creating a New Role


A role is a logical grouping of users. Rather than assign permissions to each
individual user, Aspen Framework assigns permissions to roles and places
users within those roles.
Groups of users can also be assigned to a role by using the Windows groups
feature. If you add a group to a role, then users can be added to or removed
from a role by adding them to or removing them from the group.
Use the AFW Security Manager console to create new roles.

The left panel contains a tree view of the AFW Security Manager
components.
The right panel displays the details of the selected item in the tree.

Note: For instructions on defining security roles, see your application


installation manual.

Creating the Administrator role


The first role you create is Administrator. After you specify its members,
you set the privileges for this role and its members to log into AFW Security
Manager.

26 5 Configuring Aspen Local Security


To create the Administrator role:
1 On the desktop, click Start | Programs | AspenTech | AFW Security
Manager.
The AFW Security Manager console appears.
2 In the tree view, expand the AFW Security Manager, if necessary, and
then right-click Roles and click New | Role on its shortcut menu.
3 On the New Role dialog box, type the name of the new role, for example,
Administrator. Then click OK.
The Role appears in the Details panel.
4 In the Details panel, right-click the Administrator role and choose
Properties from its shortcut menu.
The Administrator Properties dialog box appears.

5 On the Administrator Properties dialog box, click the Members tab.


6 Click the Add button.
The Trusted Domain Users and Groups dialog box appears.

5 Configuring Aspen Local Security 27


This dialog box enables you to add user/group members to a role.
7 Select the desired user or group name in the list and click the Add button.
8 When you finish adding role members, click OK.
Repeat this procedure to create other roles. For instructions on defining
security roles, see your application installation manual.

Importing an Application
To import an application to be secured by ALS:
1 Display the AFW Security Manager console window.
2 In the tree view right-click Application, and then click All Tasks |
Import Application on its shortcut menu.
3 Locate the product folder for XML file defining application. For example,
the XML file defining the AFW Security Manager is called AFWSnapin.xml
and stored in \AspenTech\BPE folder.

28 5 Configuring Aspen Local Security


4 Repeat this procedure to import the .xml file for any other installed
application that you want secured under ALS, such as Process Explorer.

Setting Permissions
After you import the .xml files for the installed products, set permissions to
enable the Administrator role and all of its members to log on to the AFW
Security Manager.

To set permission for the Administrator role to log into the


AFW Security Manager:
1 In the tree view of AFW Security Manager console, expand AFW Security
Manager | Applications | Aspen Framework and select Security
Manager.
2 In the Details panel, right-click the AfwSnap-in securable object, and
select Properties from its shortcut menu.

5 Configuring Aspen Local Security 29


3 On the AfwSnap-in Properties dialog box, select the Open check box
for the Administrator role.

4 Click OK.
This grants permission to all members of the Administrator role to log into
the AFW Security Manager.

30 5 Configuring Aspen Local Security


6 Upgrading Aspen Local
Security Server

This chapter describes upgrading the Aspen Local Security Server.

Before You Upgrade


Before you upgrade:
Copy the afwdb.mdb file to a folder in a safe location outside the
AspenTech installation directory tree. All of the data contained in the
database can be propagated to the new version.
Confirm the system requirements as specified on page 6.
Ensure that the Aspen License Manager is installed and running.

Upgrading the ALS Server


Upgrade products or components by inserting the aspenONE DVD. The
presence of AspenTech software installed with this Master Installer system is
automatically detected. Click Upgrade or repair existing products.
Follow the step-by-step procedures in Chapter 3.

6 Upgrading Aspen Local Security Server 31


32 6 Upgrading Aspen Local Security Server
7 Removing Aspen Local
Security Server

This chapter explains how to uninstall the Aspen Local Security Server
software.

Before You Remove


Before removing the ALS server, close the application and all subcomponent
programs that are running.

Removing Aspen Local Security


Server
To remove the ALS Server software using the AspenTech
Uninstall Utility:
1 Click Start | Programs | AspenTech | Uninstall AspenTech
Software.
The AspenTech Uninstaller Select Products dialog box appears.
2 Select the Aspen Local Security check box.
3 Click the Uninstall button.

7 Removing Aspen Local Security Server 33


34 7 Removing Aspen Local Security Server
8 Reinstalling Aspen Local
Security Server

This chapter describes reinstalling Aspen Local Security Server.

Overview
You reinstall the Aspen Local Security Server from the Aspen Manufacturing
Suite installation disc. When you insert the disc into the drive, the Master
Installer:
Automatically detects the presence of the installed AspenTech software
Provides an option to Install/Reinstall AspenTech software

Before You Reinstall the ALS


Server
Before you reinstall the ALS Server software:
Copy the afwdb.mdb file to a folder in a safe location outside the
AspenTech installation directory tree. All of the data contained in the
database can be propagated to the reinstalled software.
Remove the software from the computer. To uninstall the ALS server, see
Chapter 7, Removing Aspen Local Security Server.

Reinstalling the ALS Server


After you uninstall the ALS server, you can reinstall it.

To reinstall the ALS server:


1 Insert the installation disc into the DVD-ROM drive.

8 Reinstalling Aspen Local Security Server 35


2 Click Upgrade or repair existing products.
3 Follow the step-by-step instructions in Chapter 3, Installing Aspen
Local Security.

After You Reinstall


After the Aspen Local Security Server is installed, you must:
Secure the AFWDB database if you want to restrict access to the database
file.
For more information, see Chapter 4, Securing the AFWDB Database.
Configure Aspen Local Security for your system.
For more information, see Chapter 5, Configuring Aspen Local Security.

36 8 Reinstalling Aspen Local Security Server


9 Troubleshooting

Problems You May Encounter


You may encounter the following problems when using Local Security:
A problem with the Local Security Console accessing the pfwauthz.asp
page.
A problem with the pfwauthz.asp page accessing the afwdb.mdb
database file.
A new dynamic diagnostic utility, SSTest, is available for solving known
security server configuration problems. SSTest is an HTML application that
performs a set of progressive tests on the role-based security client/server
interface, and provides possible solutions to problems. You can download this
utility from the AspenTech Customer Support Knowledge Base at:
http://support.aspentech.com/.

Local Security Console Access to


pfwauthz.asp
Use this checklist to confirm that the Local Security
console can access the pfwauthz.asp page:
Confirm that the physical location of the asp page is:
<DriveLetter>:\inetpub\wwwroot\Aspentech\AFW\Security\pfw
authz.asp
Confirm that AspenTech is a default web site.
For instructions, see Confirming the Default Web Site on
page 38.
Confirm that the Personal Web Server is running.
Confirm the location of the Local Security server on the client and server
machines.
For instructions, see Confirming Location of the Local Security
Server.

9 Troubleshooting 37
pfwauthz.asp access to afwdb.mdb
Use this checklist to confirm that pfwauthz.asp can access
the afwdb.mdb file:
Confirm that the ODBC data source for the afwdb.mdb file is pointing to
the correct location.
Confirm that the ALS Data Source is properly configured. For instructions,
see AFW Security - Configure Data Source.
For more information, see the Aspen Framework Installation Guide.

Confirming the Default Web Site


To confirm that AspenTech is a default web site:
1 From Control Panel | Administrative Tools, start Internet
Information Services (IIS) Manager.
2 Click Internet Information Services | {Computer Name} | [Web
Sites] | Default Web Site and confirm that AspenTech is listed under
Default Web Site.
For example:

Confirming Location of the Local Security


Server
1 On the server machine and on each client machine, go to:
<DriveLetter>:\Program Files\Aspentech\BPE.
2 Double-click afwtools.exe.

38 9 Troubleshooting
The AFW Tools dialog box appears.

3 The URL should point to:


http://<ComputerName>/Aspentech/AFW/Security
/pfwauthz.asp.
where ComputerName is the name of the machine where the Local
Security server is running.

Confirming Location of the ODBC Data


Source for afwdb.mdb
To confirm that the ODBC data source for the afwdb.mdb
file is pointing to the correct location:
1 On the desktop, click Start | Settings | Control Panel.
2 Double-click the Data Sources (ODBC) icon.
The ODBC Data Source Administrator dialog box appears.

9 Troubleshooting 39
3 Click the System DSN tab.

4 Select afwdb and click the Configure button.


The ODBC Microsoft Access Setup dialog box appears.

5 In the Database pane, click the Select button.


The Select Database dialog box appears.

40 9 Troubleshooting
6 Make sure that the Database Name is AFWDB.mdb.

Use Server ADSI


If the "UseServerADSI" registry key (accessible through AFW Tools) is set to
1 on a client machine, the AFW Security Client service on the client machine
will delegate the action of looking up group membership to the Local Security
Server. It is set to 0 by default.

9 Troubleshooting 41
Verifying Anonymous User Access
Permissions
To allow other clients to anonymously access the Local
Security Server, the Anonymous User must have:
Changed NTFS privileges on the folder containing the AFWDB database to
support Microsoft database journaling
Read and Executed NTFS privileges on the BPE folder containing the
security DLLs
Read access on the web folder containing the pfwauthz.asp file

ASP.NET Registration
Installation by default installs .NET 1.1,ASP.NET and enables ASP.NET so that
for applications like Security web Console can run without the need for any
manual configuration steps. If the Installation fails to register ASP.NET, it will
show up a message to register it manually. The following command should be
executed from the command line:
C:\WINNT\Microsoft.NET\Framework\v1.1.4322> aspnet_regiis.exe -i
enable
-i - Install this version of ASP.NET and update scriptmaps at the IIS
metabase root and for all scriptmaps below the root. Existing scriptmaps
of lower version are upgraded to this version.
-enable - When -enable is specified with -i or -ir, ASP.NET will also be
enabled in the IIS security console (IIS 6.0 or later).

42 9 Troubleshooting

You might also like