Installing Desktop > Notes for installation
 
Notes for installation
This section contains special instructions and items to be aware of for this installation.
Workstation restart
For some products, the installation process automatically restarts your workstation without prompting you. Close any open programs, before starting an installation, to avoid losing work.
Windows Vista and 7
After installing in a Windows Vista, 7, or 8 environment, you may need to run the UNICOM Intelligence applications in Run as Administrator mode in order to work with the sample scripts that are supplied with the UNICOM Intelligence Developer Documentation Library. For more information, see the Microsoft TechNet article Configure Applications to Always Run as an Administrator:
http://technet.microsoft.com/en-us/magazine/ff431742.aspx
FIPS 140-2 compliance
UNICOM Intelligence applications use the FIPS 140-2 approved cryptographic provider(s); IBMJCEFIPS (certificate 376) and/or IBMJSSEFIPS (certificate 409) and/or IBM Crypto for C (ICC (certificate 384) for cryptography. The certificates are available from the NIST web site:
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp497.pdf
If your system is already configured for FIPS 140-2 compliance prior to installation, the installation process will not let you deselect the Configure for FIPS 140-2 Compliance option. If you no do not want the installed applications to be configured for FIPS 140-2 compliance, you must manually set a Windows System cryptography setting to disabled:
1 From the Windows Control Panel, select: Administrative Tools > Local Security Policy > Local Policies (in the left panel) > Security Options (in the left panel) System cryptography: Use FIPS compliant algorithms... (in the right panel).
2 Double-click the System cryptography: Use FIPS compliant algorithms... policy and select Disabled.
For new installations, the SHA-2 hash function algorithm is used regardless of whether or not Configure for FIPS 140-2 Compliance is enabled; for upgrade installations, the following rules apply:
If FIPS 140-2 is enabled, all existing user information from the previous version is upgraded in the following steps:
The original, encrypted user passwords are archived to a setup log file.
New user passwords are randomly assigned and saved to a setup log file. The log file is located at:
C:\Program Files\Common Files\IBM\SPSS\DataCollection\<version>\Installer\NewPassword.log
UNICOM Intelligence Interviewer - Server Admin administrators can supply users these new, temporary passwords in a manner that is in accordance with their business practices.
The MustChangePasswordAtNextLogin setting is enabled, which forces users to change their passwords at next login.
When upgrading on a server that is currently not configured for FIPS 140-2 compliance, you are presented with the option to reset user passwords:
If you choose to reset user passwords, the SHA-2 hash function algorithm is employed.
If you choose to not reset user passwords, the server will continue to use the MD5 hash function algorithm.
Keep the following points in mind when modifying an existing installation:
When changing Configure for FIPS 140-2 Compliance from enabled to disabled, the SHA-2 hash function algorithm will continue to be employed.
When changing Configure for FIPS 140-2 Compliance from disabled to enabled, the parameters outlined in the first bullet point are employed.
For more information about FIPS140‑2 compliance, see the National Institute of Standards and Technology website:
http://csrc.nist.gov/groups/STM/cmvp/standards.html#02
Note When FIPS 140-2 is configured for UNICOM Intelligence products, the applications adhere to the password protection security protocols that are defined on the UNICOM Intelligence Interviewer - Server Admin. For example, if the UNICOM Intelligence Interviewer - Server Admin is configured for MD5 security, the client-side applications will also use MD5 security for password protection, regardless of whether or not the Configure for FIPS 140-2 Compliance setting was selected during installation.
Logged installation
If you need to run a logged installation for troubleshooting purposes, see Running a logged installation.
Silent installation
If you need to run a “silent installation” from the command line, see Installing from the command line.
UNICOM Intelligence Developer Documentation Library (DDL)
The UNICOM Intelligence Developer Documentation Library is a collection of tools for developing your own applications and for modifying existing UNICOM Intelligenceproducts. For more information, see Installing the UNICOM Intelligence Developer Documentation Library.
UNICOM Intelligence Interviewer - Paper, Microsoft Word 2007 or above and Citrix virtualization client
When using Microsoft Office 2007 or above, the Paper automation APIs will not return a valid list of look groups until you manually enable the Paper and Paper - Scan Add-on menus via the Microsoft Word Add-ons menu.
See also
Installing UNICOM Intelligence Desktop