1C:Enterprise 8.3. Administrator Guide. Contents 1C:Enterprise 8.3. Administrator Guide. Contents INTRODUCTION STRUCTURE OF THE GUIDE WHAT YOU NEED TO KNOW THE BOOKS INCLUDED IN THE DOCUMENTATION ABOUT 1C:ENTERPRISE 8 1C:DEVELOPER NETWORK AGREED NOTATION HARDWARE AND SOFTWARE REQUIREMENTS 1.1. THIN CLIENT 1.2. THICK CLIENT 1.3. WEB CLIENT 1.4. MOBILE PLATFORM 1.5. USE OF COMPUTER POWER SAVING MODES 1.6. SUPPORTED WEB SERVERS 1.7.1. For Windows 1.7.2. For Linux 1.8. LIMITATIONS 1C:ENTERPRISE INSTALLATION 2.1. GENERAL INFORMATION ON INSTALLATION PROCEDURE 2.2.1. Available Installers 2.2.2. General Information on Installer 2.2.2.2. Components Selection 2.2.2.3. Selecting Default Interface Language 2.2.2.4. 1C:Enterprise Server Installation 2.2.2.5. Installation Initialization 2.2.2.6. Security Driver Installation 2.2.2.7. Completion of the Installation 2.3. STANDARD 1C:ENTERPRISE INSTALLATION SCENARIOS 2.3.1. Windows 2.3.1.1. Thin and Thick Clients 2.3.1.2. Thin Client 2.3.1.3. Thin Client – Client/Server Operation Mode 2.3.1.4. Thick Client 2.3.1.5. Configuration Repository Server (TCP) 2.3.1.6. Configuration Repository Server (HTTP) 2.3.1.7. Enabling Web Client or Web Service Publication 2.3.1.8. Enabling Designer Use 2.3.1.9. Installation Using Windows Administration Tools 2.3.2. Linux 2.3.2.1. Thin and thick clients 2.3.2.2. Thin client 2.3.2.3. Configuration Repository Server Installation (TCP) 2.3.2.4. Configuration Repository Server (HTTP) 2.3.2.5. Web Client Operation 2.4. SYSTEM DEPLOYMENT RECOMMENDATIONS 2.5.1.1. OS authentication when using Apache web server 2.5.2.1. Specific Settings for Working in the File-Mode Infobase 2.5.2.2. Installing Fonts 2.5.2.3. OS authentication when Using Apache Web Server 2.6. COMPONENT REGISTRATION INSTALLATION OF CONFIGURATIONS 3.1. GENERAL INFORMATION ON TEMPLATE DIRECTORIES 3.2. CONFIGURATION TEMPLATE INSTALLATION 3.3. CREATING AN INFOBASE BASED ON A TEMPLATE SYSTEM COMPONENTS STARTUP 4.1. SYSTEM OPERATION MODES 4.2. CLIENT APPLICATION OR DESIGNER STARTUP 4.2.1. Launcher 4.2.1.1. Startup without Options 4.2.1.2. Startup with Infobase Specified 4.2.2. Interactive Launcher 4.2.2.1. Startup without Options 4.2.2.2. Startup with Options 4.2.3. Required Client of a Specific Version 4.2.4. Web Client 4.2.4.1. Interface Language and Regional Settings 4.2.4.2. POST Query Authentication 4.2.5.1. /IBName 4.2.5.2. /AppAutoCheckVersion 4.2.5.3. /AppAutoCheckMode 4.2.6. Infobase Connection Modes 4.2.7. Selecting an Infobase 4.2.8. User Authentication 4.2.9. Using Client Certificates 4.2.9.1. General Information 4.2.9.2. Secure connection schemes 4.2.9.3. Certificate sources and formats 4.3. SYSTEM RESTART INFOBASE LIST MANAGEMENT 5.1.1. Adding a New Infobase 5.1.1.1. Creating File Infobase 5.1.1.2. Creating Client/Server Infobase 5.1.2. Adding an Existing Infobase 5.1.2.1. File mode 5.1.2.2. Client/Server Mode 5.1.2.3. Infobase Located on a Web Server 5.1.3. Infobase Startup Options 5.1.4. Certificate setup parameters 5.2. EDITING AN INFOBASE 5.3. DELETING AN INFOBASE FROM THE LIST 5.4. INFOBASES ORDER IN THE LIST 5.5. MAINTAINING A HIERARCHICAL INFOBASE LIST 5.5.1. Adding an Infobase Folder 5.5.2. Editing an Infobase Folder 5.5.3. Deleting an Infobase Folder 5.6. STARTUP WINDOW CUSTOMIZATION 5.7. THE LISTS OF COMMON INFOBASES INFOBASE ADMINISTRATION 6.1. USER LIST MAINTENANCE 6.1.1. Adding a New User 6.1.2. Copying a User 6.1.3. Setting a Password 6.1.4. Deleting a User 6.1.5. Editing User Properties 6.1.6. Filtering 6.1.7. Types of Authentication 6.1.7.1. Authentication with 1C:Enterprise Tools 6.1.7.2. Operating system authentication 6.1.7.3. OpenID Authentication 6.2. ACTIVE USERS 6.3. LOCKING USER SESSIONS 6.4. INFOBASE REGIONAL SETTINGS 6.5. INFOBASE OPTIONS 6.6. DUMPING AN INFOBASE TO A FILE 6.7. RESTORING AN INFOBASE FROM A FILE 6.8.1. File mode infobase 6.8.2. Mobile device 6.9. INFOBASE VERIFICATION AND REPAIR 6.10. RESETTING THE DISTRIBUTED INFOBASE MASTER NODE 6.11. DELETING DATA OF A DATA AREA OR INFOBASE 6.12. EVENT LOG 6.12.1. Event Log Options 6.12.2. Saving Event Log 6.13. TECHNOLOGICAL LOG 6.13.1. Technological Log Configuration File 6.13.2. Default Technological Log 6.13.3. Technological Log Structure 6.13.4.1. Windows 6.13.4.2. Linux 6.13.5. Sample Technological Log Customization Files 6.13.5.1. Technological Log Disabled 6.13.5.2. Full Technological Log 6.13.5.3. DBMS Calls 6.13.5.4. Administrator Actions and Errors 6.13.5.5. Errors and Lengthy Operations 6.14. REFERENCE INTEGRITY CONTROL 6.14.1. Major Concepts 6.14.2. Enabling Reference Integrity Control Mode 6.14.3. Direct Deletion of Objects 6.14.4. Marking for Deletion or Removing Deletion Mark 6.14.5. Specific Features of Using Objects Marked for Deletion 6.15. STANDARD FUNCTIONS 6.15.1. Active Users 6.15.2. Event Log 6.15.2.1. Viewing Event Log 6.15.2.2. Selecting Period 6.15.2.3. Filtering 6.15.3. Deleting Marked Objects 6.15.3.1. Selecting Deletion Option 6.15.3.2. Delete Completely 6.15.3.3. Delete Selectively 6.15.3.4. List of Not Deleted Objects 6.15.4. Finding References to Objects 6.15.5. Document Posting 6.15.5.1. Document Posting 6.15.5.2. Restore Sequences 6.15.6. Totals Management 6.15.6.1. Frequently Used Features 6.15.6.2. All Available Features 6.15.7. Full-text Search Management WEB SERVERS' SETUP FOR 1C:ENTERPRISE 7.1. GENERAL REQUIREMENTS 7.2. GENERIC PUBLISHING PROCEDURE 7.2.1. Publication Dialog 7.2.1.1. Dialog Buttons 7.2.1.2. Main 7.2.1.3. Other 7.2.2. Webinst Utility 7.3. WEB CLIENT SUPPORT SETUP 7.3.1. Windows 7.3.1.1. Internet Information Services 7.3.1.2. Apache Version 2.0 7.3.1.3. Apache 2.2 7.3.1.4. Automatic Authentication Setup for Apache Web Server 7.3.2. For Linux OS 7.3.2.1. Apache Version 2.0 7.3.2.2. Apache Version 2.2 7.3.2.3. Automatic Authentication Setup for Apache Web Server 7.4. WEB SERVICES SUPPORT SETUP 7.4.1. Windows 7.4.1.1. Internet Information Services 7.4.1.2. Apache Version 2.0 7.4.1.3. Apache 2.2 7.4.2. Linux 7.4.2.1. Apache Version 2.0 7.4.2.2. Apache Version 2.2 7.4.3.1. Authentication 7.4.3.2. Using a Secure Channel 7.5.1. OpenID Settings 7.5.2. OpenID Provider Settings 7.5.3. Additional Interface for Using External Resources 7.6.1. Internet Information Services 7.6.2. Reverse Proxy CONFIGURING WEB BROWSERS FOR WEB CLIENT OPERATION 8.1. GENERAL SETUP 8.2.1. Connection Setup 8.2.2. Automatic Authentication 8.3. MICROSOFT INTERNET EXPLORER 8.3.1. Connection Setup 8.4. GOOGLE CHROME 8.5. SAFARI 8.6. WEB CLIENT SPECIFIC FEATURES PROTECTION FROM UNAUTHORIZED ACCESS: FEATURES AND SETUP 9.1. HASP4 PROTECTION SYSTEM 9.1.1. Dongles Marking 9.1.2. Protection from Unauthorized Access 9.1.3. Specific Features of Counting Client Licenses 9.1.3.1. File mode 9.1.3.2. Client/Server mode 9.1.3.3. Web Client 9.1.3.4. The Thin Client Working through the Web Server 9.1.3.5. The Local Key and the Web Client 9.1.3.6. COM Connection 9.1.3.7. Web Service 9.1.3.8. The Terminal Server 9.1.4. Obtaining a Server License 9.1.5.1. For Windows OS 9.1.5.2. For Linux 9.1.6.1. For Windows OS 9.1.6.2. For Linux OS 9.1.6.3. Configuring HASP License Manager using a Configuration File 9.1.7. 1C:Enterprise Setup to Work with HASP License Manager 9.2. THE SOFTWARE LICENSING SYSTEM 9.2.1. License Versions 9.2.2. Protection from Unauthorized Access 9.2.3. Specific Features of the Client License Count 9.2.3.1. The File Mode 9.2.3.2. The Client/Server Mode 9.2.3.3. The Web Client 9.2.3.4. The Thin Client Working through a Web Server 9.2.3.5. Single-user Software License and the Web Client 9.2.3.6. The COM Connection 9.2.3.7. Web Services 9.2.3.8. The Terminal Server 9.2.4. Activating and Obtaining a Server License 9.2.5.1. General Rules 9.2.5.2. Recommendations regarding activation 9.2.6. Location of Software License Files 9.2.6.1. For Windows OS 9.2.6.2. For Linux OS 9.3.1. At client application start 9.3.2. At server start 9.3.3. If the license is not obtained SYSTEM UPDATE 10.1. UPDATE 10.2. 1C:ENTERPRISE UPDATE BY MICROSOFT WINDOWS USERS WITHOUT ADMINISTRATIVE PRIVILEGES UNINSTALL 11.1. DELETING AN INFOBASE 11.2. TECHNOLOGICAL PLATFORM UNINSTALL ADMINISTRATION FOR MOBILE PLATFORMS 12.1.1. Starting a Mobile Application 12.1.2. Working with a List of Applications 12.1.2.1. Creating an Application 12.1.2.2. Starting an Application 12.1.2.3. Changing Application Properties 12.1.2.4. Deleting an Application 12.1.2.5. Updating an Application 12.2.1. Starting a Mobile Application 12.2.2. Working with a List of Applications 12.2.2.1. Creating an Application 12.2.2.2. Starting an Application 12.2.2.3. Changing Application Properties 12.2.2.5. Updating an Application 12.3. PREPARING THE INFRASTRUCTURE FOR EXCHANGE 12.4. BACKING UP APPENDIX 1. INSTALLATION DIRECTORY STRUCTURE AND ROLES OF DIRECTORIES AND FILES 1.1. FOR WINDOWS OS 1.2. FOR LINUX 1.3. ROLES OF DIRECTORIES AND FILES 1.4. CONFIGURATION FILES: LOCATION AND SEARCH 1.4.1. For Windows OS 1.4.2. For Linux OS APPENDIX 2. EVENT LOG ITEMS DESCRIPTION APPENDIX 3. SERVICE FILES DESCRIPTION AND LOCATION 3.1. *.1CCR 3.2. *.MFT 3.3. *.V8I 3.4. 1CESCMN.CFG 3.5. 1CESTART.CFG 3.6. 1CV8WSRV.LST 3.7. 1CV8CLST.LST 3.8. ADMINSTALL.CFG 3.9. APPSRVRS.LST 3.10. COMCNTRCFG.XML 3.11. CONF.CFG 3.12. DEBUGCFG.XML 3.13. DEF.USR 3.14. DEFAULT.VRD 3.14.1. Item 3.14.1.1. Item 3.14.2. Item 3.14.3. Item 3.14.4. Item 3.14.4.1. Item 3.14.5. Item 3.14.5.1. Item 3.14.5.2. Item 3.14.5.3. Item 3.15. INETCFG.XML 3.16. LOCATION.CFG 3.17. LOGCFG.XML 3.17.1. Configuration File Structure 3.17.1.1. Item 3.17.1.2. Item 3.17.1.3. Item 3.17.1.4. Item 3.16.1.5. Item 3.17.1.6. Item 3.17.1.7. Item 3.17.1.8. item 3.17.1.9. item 3.17.2. Recording Contexts of Exceptions 3.17.3. Recording Interlocks 3.18. LOGUI.TXT 3.19. NETHASP.INI 3.19.1. [NH_COMMON] Section 3.19.2. [NH_IPX] Section 3.19.3. [NH_NETBIOS] Section 3.19.4. [NH_TCPIP] Section 3.20. NHSRV.INI 3.21. SRV1CV83 3.22. SWPUSER.INI 3.23. TESTCFG.XML APPENDIX 4 VERIFICATION UTILITY CHDBFL APPENDIX 5 ERRORS HANDLING APPENDIX 6. INTERNET SERVICES FOR OBTAINING COMMON INFOBASE LISTS AND CLIENT APPLICATION DISTRIBUTION SETS 6.1. OBTAINING THE LIST OF COMMON INFOBASES 6.1.1. Obtaining a distribution set through a web service 6.1.1.1. Web service operation 6.1.1.2. Web service description 6.1.1.3. Example of implementation 6.2. OBTAINING A CLIENT APPLICATION DISTRIBUTION SET 6.2.1. Obtaining a distribution set through a web service 6.2.1.1. Web service operation 6.2.1.2. Web service description 6.2.1.3. Example of implementation APPENDIX 7. COMPONENTS AND MATERIALS USED