Installation Guides > Installing Server > Installing UNICOM Intelligence Interviewer - Server > Installing UNICOM Intelligence Interviewer - Server > Single computer installation
 
Single computer installation
1 Log on as the Installing User.
2 Go to the folder that the installation program is in, and then double‑click setup.exe.
The UNICOM Intelligence Server Installer window opens.
3 Click Install UNICOM Intelligence Server.
The UNICOM Intelligence Server Setup wizard starts.
4 Click Next on the Welcome screen, and then follow the onscreen instructions. See also:
Select Features
Machine Settings
User and Group
DPM User Admin Details
Email Settings
Internet Information Services (IIS) Configuration
Choose Destination Location
File Management Folder
Choose the location of UNICOM Intelligence Interviewer - Server Project and Source files
During the installation process, some DOS windows open and close. This is expected behavior and can be ignored.
5 When the installation has finished, choose whether to restart your computer now or later and click Finish. If you want to run the post-installation steps immediately, you must restart your computer now.
6 To complete the installation, see Post-installation tasks for UNICOM Intelligence Interviewer - Server.
Select Features
Select the UNICOM Intelligence Interviewer - Server option and choose the appropriate services and utilities to be installed. Possible UNICOM Intelligence Interviewer - Server options are as follows:
Accessories Service. Installs the Accessories Service, including UNICOM Intelligence Interviewer - Server Admin.
Interview Service. Installs the Interview Service.
Web Service. Installs the Web Service.
Load Tool. Installs the UNICOM Intelligence Load Tool.
Note The services and utilities listed here are for use with the UNICOM Intelligence Interviewer - Server. You can also choose to install other UNICOM Intelligence Server applications.
Machine Configuration
Choose Single Machine Install.
Machine Settings
Enter a name for your UNICOM Intelligence site. The site name that you choose is displayed on the main UNICOM Intelligence Interviewer - Server Admin page and can be any name of your choice.
User and Group
Enter information about the user and group to use for running the UNICOM Intelligence Interviewer - Server services.
For each account, click Domain if it is a domain account and enter the domain name in the box. If the account is a workgroup account, click Workgroup.
In the Username, Password and Group boxes, enter the name and password of the Running User and the name of the UNICOM Intelligence Group. The names must be valid names for the domain or workgroup on which you will be installing.
Anonymous User
Enter the name and password of the Anonymous Access User that you created, and then click he type of user account: Domain or Workgroup.
Database Setup
Enter the name of the database server on which you want to create the UNICOM Intelligence Interviewer - Server Data database.
DPM User Admin Details
Enter a name and password for the UNICOM Intelligence Interviewer - Server Admin Administrator. You can also select whether or not to enable integrated Windows login. For more information on integrated Windows login, see Configuring for single sign-on.
This user name is only for accessing the Distributed Property Management (DPM) database to perform administrative tasks such as setting up UNICOM Intelligence Interviewer - Server Admin users and roles, and managing access to UNICOM Intelligence Interviewer - Server Admin files and applications. It exists only in DPM. To avoid possible conflicts with other user names, the name that you choose should not match any existing user names on your system.
Email Settings
Enter the name and port number of your Email SMTP server.
If you do not want to use the Email activity or do not have the required information at hand, click I want to configure my email settings later.
Internet Information Services (IIS) Configuration
If you already installed UNICOM Intelligence Interviewer - Server, the IIS configuration settings are automatically inherited, this step does not appear.
The installation program detects any websites available on the installation computer. To use a website other than the default for the UNICOM Intelligence applications, select it from the list.
The default file location for the website you have selected is displayed. If the installation program detects a folder called SPSSMR in the website folder structure, you are prompted to install the files in this folder instead. If you want to install the files to a different location, click Browse, and then choose the folder you want to use.
Note When selecting a non-default website location on a 64-bit server, you cannot select a web files location under C:\Program Files in the Internet Information Services (IIS) Configuration dialog. For example, if you defined a non-default website named myWebSite, and its local path is C:\Program Files\myWebSite, you must select a web files location that is not under C:\Program Files when you select myWebSite for the UNICOM Intelligence folders and applications (you can instead select the location C:\Program Files (x86)).
Splitting processes across application pools
The operating system places a 2 GB restriction on processes in IIS; to run larger processes, you can put UNICOM Intelligence Interviewer - Server Admin in its own application pool. To do this:
1 Click Advanced to open the Advanced IIS Configuration screen.
2 Set the process parameters for both the Interviewer Server Administration and Interviewer Server application pools:
Recycle process at fixed intervals (minutes): When this option is selected, processes will be recycled at the defined interval. Enter an interval value, measured in minutes.
Recycle process at specific times: When this option is selected, processes are recycled at specific times. Enter the times, separated by commas.
Shutdown idle processes: When this option is selected, idle processes are shutdown after the specified number of minutes. Enter the number of minutes.
3 Click Apply.
For more information about application pools, see the IIS documentation.
Notes
When the Interviewer Server Administration or Interviewer Server processes are recycled or shut down, anyone using Interviewer Server Administration or Interviewer Server activities at that time has to restart their session in order to continue working.
On initial installation, the Advanced IIS Configuration settings are stored in IIS. When modifying an existing installation, the settings are stored in the Windows registry.
The SPSSDimensionNetPool settings are stored at:
HKEY_LOCAL_MACHINE\Software\SPSS\DimensionNet\InstallOptions\WebPoolRecycleSpecTime
The SPSSmrInterviewPool settings are stored at:
HKEY_LOCAL_MACHINE\Software\SPSS\mrInterview\3\InstallOptions\WebPoolRecycleSpecTime
Choose Destination Location
Choose the folder in which you want to install UNICOM Intelligence Interviewer - Server. The default folder is:
[INSTALL_FOLDER]\IBM\SPSS\DataCollection\<version>\
File Management Folder
Choose the location of the File Management root folder (FMRoot). This is the folder in which the master copies of project files created using UNICOM Intelligence Interviewer - Server Admin or the Scriptwriter desktop activities will be stored, and it is from here that the interviewing computers will make local copies of these files.
The File Management root folder must be shared so that it is accessible by other computers. If you choose a folder on your current computer, the installation procedure creates the share for you. If you choose a folder with a UNC pathname (that is, one that starts \\computer_name\...), it is used as the shared folder.
Note You can create the File Management root folder on any computer as long as its share is visible to all computers running the Interviewing and Scriptwriter Services. The ideal location is a separate computer that acts as a file server rather than a computer running the Interviewing or Accessories service. This is because the File Management root folder is an integral part of most UNICOM Intelligence Interviewer and UNICOM Intelligence Interviewer - Server functionality, and needs to be available all the time that UNICOM Intelligence Interviewer - Server Admin is running. You must manually share the specified UNC directory:
1 Go to the specified UNC directory.
2 Right-click the directory, and then click Properties. Click the Sharing tab.
3 Select Share this folder, and then enter SPSSMR_FMROOT in the Share name field.
4 Click Permissions, and then select Full control for the Interviewer Server group.
5 Click OK.
6 Click the Security tab, add the UNICOM Intelligence Interviewer - Server group (only if it is not already present), and then select Full control for the UNICOM Intelligence Interviewer - Server group.
7 Click OK.
If you install UNICOM Intelligence Interviewer - Server Admin on a computer that is running the Interviewing or Accessories service and you restart that computer, UNICOM Intelligence Interviewer - Server Admin cannot be used by anyone on any other computer until the service computer has restarted.
Updating the registry after moving FMROOT
If you change the location of the FMROOT in DPM Explorer post installation, you must also update the associated registry entries to match the DPM Explorer values. If the environment is a cluster environment, you must update the registry entries on all clustered accessory servers, UNICOM Intelligence Survey Tabulation servers and UNICOM Intelligence Reporter servers. The mapping of DPM properties and registry entries is as follows:
DPM property
Registry entry
FileMgt_RootFolderLocalPath
HKEY_LOCAL_MACHINE\Software\SPSS\DimensionNet \ InstallOptions\FMRoot_Local
and
HKEY_LOCAL_MACHINE\Software\SPSS\mrInterview \3 \InstallOptions\FMRoot_Local
FileMgt_RootFolderUNC
HKEY_LOCAL_MACHINE\Software\SPSS\DimensionNet \InstallOptions \FMRoot_UNC
and
HKEY_LOCAL_MACHINE\Software\SPSS\mrInterview\3 \InstallOptions\FMRoot_UNC
Choose the location of UNICOM Intelligence Interviewer - Server Project and Source files
Specify the folder that you want to create for storing the project and source files that the Interview Services use for running interviews. When a scriptwriter activates a project, the activation program copies the questionnaire file and the templates into the Projects folder so that they are available for interviewing. The default project folder is:
[INSTALL_FOLDER]\IBM\SPSS\DataCollection\7\Interviewer\
FIPS 140-2 Compliance
Select whether or not the installation will be configured for FIPS 140-2 compliance. FIPS 140-2 is a U.S. government computer security standard used to accredit cryptographic modules. For more information, see the National Institute of Standards and Technology website:
http://csrc.nist.gov/groups/STM/cmvp/standards.html#02
When configuring for FIPS 140-2 compliance in the Windows Server 2008 environment, you must first install a Microsoft hotfix. If you do not install the hotfix, errors might occur when using the UNICOM Intelligence Interviewer - Server Admin User Administration activity. For more information, see the Microsoft support article “FIX: You cannot run an ASP.NET 3.5-based application that uses a ScriptManager control”:
http://support.microsoft.com/kb/981119
Configure for FIPS 140-2 Compliance
When in FIPS 140-2 mode, UNICOM Intelligence applications use the FIPS 140-2 approved cryptographic provider(s); IBMJCEFIPS (certificate 376) and/or IBMJSSEFIPS (certificate 409) and/or IBM Crypto for C (ICC (certificate 384) for cryptography. The certificates are available from the NIST website:
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp497.pdf
If your system is already configured for FIPS 140-2 compliance prior to installation, the installation process will not let you de‑select the Configure for FIPS 140-2 Compliance option. If you no do not want the installed applications to be configured for FIPS 140-2 compliance, you must manually set a Windows System cryptography setting to disabled:
1 From the Windows Control panel, select: Administrative Tools > Local Security Policy > Local Policies (in the left panel) > Security Options (in the left panel) > System cryptography: Use FIPS compliant algorithms (in the right panel).
2 Double-click the System cryptography: Use FIPS compliant algorithms policy, and then click Disabled.
For new installations, the SHA-2 hash function algorithm is used regardless of whether or not Configure for FIPS 140-2 Compliance is enabled; for upgrade installations, the following rules apply:
If FIPS 140-2 is enabled, all existing user information from the previous version is upgraded in the following steps:
The original, encrypted user passwords are archived to a setup log file.
New user passwords are randomly assigned and saved to a setup log file. The log file is:
C:\Program Files\Common Files\IBM\SPSS\DataCollection\7\Installer\NewPassword.log
Administrators can supply users these new, temporary passwords in a manner that is in accordance with their business practices.
The MustChangePasswordAtNextLogin setting is enabled, which forces users to change their passwords at next login.
When upgrading on a server that is currently not configured for FIPS 140-2 compliance, you are presented with the option to reset user passwords:
If you choose to reset user passwords, the SHA-2 hash function algorithm is employed.
If you choose to not reset user passwords, the server continues to use the MD5 hash function algorithm.
Keep the following points in mind when modifying an existing installation:
When changing Configure for FIPS 140-2 Compliance from enabled to disabled, the SHA-2 hash function algorithm will continue to be employed.
When changing Configure for FIPS 140-2 Compliance from disabled to enabled, the parameters outlined in the first bullet point are employed.
For more information regarding FIPS 140-2 compliance, see the National Institute of Standards and Technology website.
Note When FIPS 140-2 is configured for UNICOM Intelligence products, the applications adhere to the password protection security protocols that are defined on the UNICOM Intelligence Interviewer - Server. For example, if the UNICOM Intelligence Interviewer - Server is configured for MD5 security, the client-side applications also use MD5 security for password protection, regardless of whether or not the Configure for FIPS 140-2 Compliance setting was selected during installation.
Start Copying Files
This page lists the services you have chosen to install and the name of the database server you have chosen to use. If these settings are correct, click Next. If not, click Back, and then go back through the pages to make the necessary changes.
After the program has installed, see Post-installation tasks for UNICOM Intelligence Interviewer - Server.
See
Installing UNICOM Intelligence Interviewer - Server