Installation Guides > Installing Desktop > Notes for installation
 
Notes for installation
Workstation restart
For some products, the installation process restarts your computer without prompting you. Before starting an installation, close any open programs, to avoid losing work.
Windows 10
After installing, you might need to run the UNICOM Intelligence applications in Run as Administrator mode in order to work with the sample scripts that are supplied with the UNICOM Intelligence Developer Documentation Library. Alternatively, you can copy the DDL sample files to a user folder before running them.
FIPS 140-2 compliance
UNICOM Intelligence applications use the FIPS 140-2 approved cryptographic provider(s); IBMJCEFIPS (certificate 376) and/or IBMJSSEFIPS (certificate 409) and/or IBM Crypto for C (ICC (certificate 384) for cryptography. The certificates are available from the NIST web site:
http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp497.pdf
If your system is already configured for FIPS 140-2 compliance prior to installation, the installation process will not let you de‑select the Configure for FIPS 140-2 Compliance option. If you no do not want the installed applications to be configured for FIPS 140-2 compliance, you must manually set a Windows System cryptography setting to disabled:
1 From the Windows Control Panel, select Administrative Tools > Local Security Policy > Local Policies > Security Options > System cryptography: Use FIPS compliant algorithms .
2 Double-click the System cryptography: Use FIPS compliant algorithms... policy and select Disabled.
For new installations, the SHA-2 hash function algorithm is used regardless of whether or not Configure for FIPS 140-2 Compliance is enabled; for upgrade installations, the following rules apply:
If FIPS 140-2 is enabled, all existing user information from the previous version is upgraded in the following steps:
The original, encrypted user passwords are archived to a setup log file.
New user passwords are randomly assigned and saved to this log file:
C:\Program Files\Common Files\IBM\SPSS\DataCollection\<version>\Installer\NewPassword.log
UNICOM Intelligence Interviewer - Server Admin administrators can supply users these new, temporary passwords in a manner that is in accordance with their business practices.
The MustChangePasswordAtNextLogin setting is enabled, which forces users to change their passwords at next login.
When upgrading on a server that is currently not configured for FIPS 140-2 compliance, you are presented with the option to reset user passwords:
If you choose to reset user passwords, the SHA-2 hash function algorithm is employed.
If you choose to not reset user passwords, the server will continue to use the MD5 hash function algorithm.
Keep the following points in mind when modifying an existing installation:
When changing Configure for FIPS 140-2 Compliance from enabled to disabled, the SHA-2 hash function algorithm will continue to be employed.
When changing Configure for FIPS 140-2 Compliance from disabled to enabled, the parameters outlined in the first bullet point are employed.
For more information about FIPS140‑2 compliance, see the National Institute of Standards and Technology website:
http://csrc.nist.gov/groups/STM/cmvp/standards.html#02
Note To install fix packs and interim fixes, you must log on with administrator privileges.
Logged installation
To run a logged installation for troubleshooting purposes, see Running a logged installation.
Silent installation
To run a silent installation from the command line, see Installing UNICOM Intelligence Desktop from the command line.
UNICOM Intelligence Developer Documentation Library (DDL)
The UNICOM Intelligence Developer Documentation Library is a collection of tools for developing your own applications and for modifying existing UNICOM Intelligence products. For more information, see Installing the UNICOM Intelligence Developer Documentation Library.
UNICOM Intelligence Interviewer - Paper, Microsoft Word 2007 or later and Citrix virtualization client
When using Microsoft Office 2007 or later, the Paper automation APIs return a valid list of look groups only if you enable the Paper and Paper - Scan Add-on menus by using the Microsoft Word Add-ons menu.