Summary

In this chapter, we’ve discussed how to extend BI functionality through the introduction of Reporting Services integration and PerformancePoint Server 2007. We’ve outlined the core functionality within each product and discussed authentication and security considerations, as well as best practices for integrating both products as part of an overall BI solution.

In both this chapter and Chapter 18, we discussed authentication requirements for creating connections to SQL Server 2005, specifically, using Kerberos to impersonate the user and delegation between servers in a distributed server environment. If you are in the process of designing your SharePoint Server 2007 deployment or upgrading your existing deployment to include BI solutions, such as Excel Services or Reporting Services integration, then ensure that you configure Web applications to use Kerberos as opposed to NTLM. Why? Apart from the authentication considerations discussed in this chapter and in Chapter 18, it is our firm belief that future Microsoft applications, especially those applications leveraging SQL Server, will require Kerberos by default. Making the shift now will help avoid issues later. We’ve included a list of references on Kerberos configuration—including configuration for Active Directory, SQL Server, and SharePoint Server 2007—on this book’s companion CD. See the document titled "BI References."

Second to authentication considerations, the other key consideration in planning and deploying BI solutions is the client-side dependencies, such as the PerformancePoint Excel add-in and Office 2003 or 2007. Why? Because you will need to consider (1) how you will roll out product-dependent add-ins to clients; (2) future product upgrades for both server and client-side; and (3) bandwidth and WAN for clients accessing back-end SQL data stores and client-side applications synchronizing data from a data store, such as the PerformancePoint Server 2007 Excel add-in.

Finally, we’ve suggested some possible scenarios from which you might choose to use one or more of the BI solutions and products discussed in both this chapter and in Chapter 18.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.114.221