01.05.2013 Views

MicroStrategy Mobile Design and Administration Guide

MicroStrategy Mobile Design and Administration Guide

MicroStrategy Mobile Design and Administration Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Mobile</strong> <strong>Design</strong> <strong>and</strong> <strong>Administration</strong> <strong>Guide</strong> Administering <strong>MicroStrategy</strong> <strong>Mobile</strong> 3<br />

provider such as Tivoli or SiteMinder, you must choose Basic <strong>and</strong><br />

enter your credentials for the trusted authentication provider.<br />

If<br />

you are using HTML forms for trusted authentication with<br />

the iPhone or iPad, you can choose Anonymous, Basic, or<br />

Windows as the default <strong>Mobile</strong> Server authentication mode.<br />

b For basic or Windows authentication, in the Login field, type the user<br />

name. To use basic authentication with a trusted authentication<br />

provider, type your trusted authentication provider login.<br />

c For basic or Windows authentication, in the Password field, type the<br />

password for the login. To use basic authentication with a trusted<br />

authentication provider, type your trusted authentication provider<br />

password.<br />

d For basic or Windows authentication, you can override login<br />

credentials that users may have specified on their mobile devices. To<br />

do this, select the Overwrite user-specified credentials when<br />

applying configuration check box.<br />

3 Click Configure New <strong>Mobile</strong> Server.<br />

4 In the <strong>Mobile</strong> Server name field, type the fully qualified host name of<br />

this machine. This is the <strong>Mobile</strong> Server that the application will connect<br />

to.<br />

For<br />

iPhone, iPad, or BlackBerry, if you are using trusted<br />

authentication, in this field, type the URL that is monitored by<br />

your trusted authentication provider. For example, if you are using<br />

Tivoli for trusted authentication, type http://<br />

tivoli_machine:port/junctionName/. For additional<br />

information on trusted authentication, see the System<br />

<strong>Administration</strong> <strong>Guide</strong>.<br />

5 If mobile clients must use a different name to access the <strong>Mobile</strong> Server,<br />

select the <strong>Mobile</strong> clients access this server using the following<br />

external name check box, <strong>and</strong> type the name in the field. For example,<br />

type the externally accessible name of a load balancer in<br />

machine-name.domain.com format.<br />

6 In the <strong>Mobile</strong> Server port field, type the port number that is used by<br />

<strong>Mobile</strong> Server on this machine.<br />

7 In the <strong>Mobile</strong> Server path field, type the path to the <strong>MicroStrategy</strong><br />

<strong>Mobile</strong> Server files on this machine.<br />

© 2012 <strong>MicroStrategy</strong>, Inc. Deploying <strong>and</strong> configuring the <strong>MicroStrategy</strong> <strong>Mobile</strong> application 141

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!