The
Launch
credentials (or
Multiuser credentials)
setting is available on the
Options tab for
a standard workspace server that uses SAS token authentication, the
stored process server, and the pooled workspace server.
Choosing a Launch Credential
Note: In the preceding display,
the values within parentheses indicate the authentication domain of
the credential. These values aren't part of the service account ID.
For example, the selected account ID is
WIN\sassrv
,
not
WIN\sassrv (DefaultAuth)
.
You should carefully
select each server's launch credential for these reasons:
-
Not all of the choices are viable
without additional configuration.
-
Each server retrieves SAS data
from the operating system under the host identity of its designated
launch credential. Anyone who can use a particular server can potentially
access all of the data that is available to that server's launch credential.
The following list explains
the choices in the launch credential list:
prevents proper functioning
of the server. If the
Multiuser credentials or
Launch
credentials drop-down list is present and enabled on
the
Options tab for a server
, that server is not functional when
(None) is
selected.
can introduce the following
complications:
-
On Windows, using the spawner's
host identity as a launch credential causes launched processes to
run with restricted access. For example, even if the spawner runs
under the local system account, the host identity of the launched
process isn't a member of Windows groups such as Administrators and
Power Users. The downgrade is necessary in order to avoid security
exposures. The downgrade can interfere with legitimate operation of
the server.
Note: In the initial configuration,
a spawner on Windows runs as a service under the local system account.
You can reconfigure the spawner to run under some other account.
-
In the standard configuration,
the spawner's SAS identity (PUBLIC) can't launch a pooled workspace
server or a stored process server. As a PUBLIC-only identity, the
spawner lacks the necessary grant of the ReadMetadata permission on
the server definition.
Note: One solution is to create
an individual SAS identity for the spawner account. For example, create
a user definition named SPAWNER and store the user ID of the spawner
account as a login on the
Accounts tab of
that user definition. In the initial configuration, all registered
users (SASUSERS) have ReadMetadata permission for server definitions.
If you narrow access, you might have to add a grant of ReadMetadata
permission on the server's
Authorization tab
for the SPAWNER user.
Note: Ensure that the server's
launch credential has any necessary host access to the SAS Web Report
Studio query cache library (wrstemp) and distribution library (wrsdist).
See Configuring SAS Web Report Studio in SAS Intelligence Platform: Web Application Administration Guide.
A listed login (for example,
WIN\sassrv)
or a login that you access by selecting
More logins
is the standard choice.
In order to successfully function as a launch credential, a login
must meet all of the following criteria:
-
The login that must be visible
to the spawner. All of the logins on the
Accounts tab
of the SAS General Servers group are visible to the spawner.
Note: The SAS Trusted User is a
member of the SAS General Servers group. The spawner uses the SAS
Trusted User to gather the metadata information needed to launch servers.
-
The login must include the user
ID and password for an account that is known to server's host. It
doesn't matter which authentication domain the login is in.
Note: If the server is on Windows,
the user ID in the login must be in a qualified format (for example,
WIN\serviceID).
-
The login must be owned by a SAS
identity that has the ReadMetadata permission for the server definition.
In the standard configuration, this requirement is met because the
SAS General Servers group, like all other registered identities, has
ReadMetadata permission for all server definitions. However, if you
choose to limit ReadMetadata permission on a server definition, you
must preserve access for the SAS General Servers group.
-
The login must reference an account
that has host layer access to any SAS data that it retrieves.
-
If the server is on Windows, the
login must reference an account that has the
Log on as
a batch job privilege.
Note: The login should reference
a service account. This login shouldn't correspond to a real person.
Note: Ensure that the server's
launch credential has any necessary host access to the SAS Web Report
Studio query cache and distribution libraries.
The preceding discussion
assumes that your deployment uses the standard predefined metadata
groups and users. You can choose to configure variations (for example,
create a group other than the SAS General Servers group to hold logins
for launch credentials). In general, such variations aren't recommended
because they unnecessarily increase complexity and reduce consistency.