1C:Enterprise 8.3. Administrator Guide. Contents

1C:Enterprise 8.3. Administrator Guide. Contents


INTRODUCTION

STRUCTURE OF THE GUIDE

WHAT YOU NEED TO KNOW

THE BOOKS INCLUDED IN THE DOCUMENTATION

ABOUT 1C:ENTERPRISE 8

1C:DEVELOPER NETWORK

AGREED NOTATION

HARDWARE AND SOFTWARE REQUIREMENTS

1.1. THIN CLIENT

1.2. THICK CLIENT

1.3. WEB CLIENT

1.4. MOBILE PLATFORM

1.5. USE OF COMPUTER POWER SAVING MODES

1.6. SUPPORTED WEB SERVERS

1.7.1. For Windows

1.7.2. For Linux

1.8. LIMITATIONS

1C:ENTERPRISE INSTALLATION

2.1. GENERAL INFORMATION ON INSTALLATION PROCEDURE

2.2.1. Available Installers

2.2.2. General Information on Installer

2.2.2.2. Components Selection

2.2.2.3. Selecting Default Interface Language

2.2.2.4. 1C:Enterprise Server Installation

2.2.2.5. Installation Initialization

2.2.2.6. Security Driver Installation

2.2.2.7. Completion of the Installation

2.3. STANDARD 1C:ENTERPRISE INSTALLATION SCENARIOS

2.3.1. Windows

2.3.1.1. Thin and Thick Clients

2.3.1.2. Thin Client

2.3.1.3. Thin Client – Client/Server Operation Mode

2.3.1.4. Thick Client

2.3.1.5. Configuration Repository Server (TCP)

2.3.1.6. Configuration Repository Server (HTTP)

2.3.1.7. Enabling Web Client or Web Service Publication

2.3.1.8. Enabling Designer Use

2.3.1.9. Installation Using Windows Administration Tools

2.3.2. Linux

2.3.2.1. Thin and thick clients

2.3.2.2. Thin client

2.3.2.3. Configuration Repository Server Installation (TCP)

2.3.2.4. Configuration Repository Server (HTTP)

2.3.2.5. Web Client Operation

2.4. SYSTEM DEPLOYMENT RECOMMENDATIONS

2.5.1.1. OS authentication when using Apache web server

2.5.2.1. Specific Settings for Working in the File-Mode Infobase

2.5.2.2. Installing Fonts

2.5.2.3. OS authentication when Using Apache Web Server

2.6. COMPONENT REGISTRATION

INSTALLATION OF CONFIGURATIONS

3.1. GENERAL INFORMATION ON TEMPLATE DIRECTORIES

3.2. CONFIGURATION TEMPLATE INSTALLATION

3.3. CREATING AN INFOBASE BASED ON A TEMPLATE

SYSTEM COMPONENTS STARTUP

4.1. SYSTEM OPERATION MODES

4.2. CLIENT APPLICATION OR DESIGNER STARTUP

4.2.1. Launcher

4.2.1.1. Startup without Options

4.2.1.2. Startup with Infobase Specified

4.2.2. Interactive Launcher

4.2.2.1. Startup without Options

4.2.2.2. Startup with Options

4.2.3. Required Client of a Specific Version

4.2.4. Web Client

4.2.4.1. Interface Language and Regional Settings

4.2.4.2. POST Query Authentication

4.2.5.1. /IBName

4.2.5.2. /AppAutoCheckVersion

4.2.5.3. /AppAutoCheckMode

4.2.6. Infobase Connection Modes

4.2.7. Selecting an Infobase

4.2.8. User Authentication

4.2.9. Using Client Certificates

4.2.9.1. General Information

4.2.9.2. Secure connection schemes

4.2.9.3. Certificate sources and formats

4.3. SYSTEM RESTART

INFOBASE LIST MANAGEMENT

5.1.1. Adding a New Infobase

5.1.1.1. Creating File Infobase

5.1.1.2. Creating Client/Server Infobase

5.1.2. Adding an Existing Infobase

5.1.2.1. File mode

5.1.2.2. Client/Server Mode

5.1.2.3. Infobase Located on a Web Server

5.1.3. Infobase Startup Options

5.1.4. Certificate setup parameters

5.2. EDITING AN INFOBASE

5.3. DELETING AN INFOBASE FROM THE LIST

5.4. INFOBASES ORDER IN THE LIST

5.5. MAINTAINING A HIERARCHICAL INFOBASE LIST

5.5.1. Adding an Infobase Folder

5.5.2. Editing an Infobase Folder

5.5.3. Deleting an Infobase Folder

5.6. STARTUP WINDOW CUSTOMIZATION

5.7. THE LISTS OF COMMON INFOBASES

INFOBASE ADMINISTRATION

6.1. USER LIST MAINTENANCE

6.1.1. Adding a New User

6.1.2. Copying a User

6.1.3. Setting a Password

6.1.4. Deleting a User

6.1.5. Editing User Properties

6.1.6. Filtering

6.1.7. Types of Authentication

6.1.7.1. Authentication with 1C:Enterprise Tools

6.1.7.2. Operating system authentication

6.1.7.3. OpenID Authentication

6.2. ACTIVE USERS

6.3. LOCKING USER SESSIONS

6.4. INFOBASE REGIONAL SETTINGS

6.5. INFOBASE OPTIONS

6.6. DUMPING AN INFOBASE TO A FILE

6.7. RESTORING AN INFOBASE FROM A FILE

6.8.1. File mode infobase

6.8.2. Mobile device

6.9. INFOBASE VERIFICATION AND REPAIR

6.10. RESETTING THE DISTRIBUTED INFOBASE MASTER NODE

6.11. DELETING DATA OF A DATA AREA OR INFOBASE

6.12. EVENT LOG

6.12.1. Event Log Options

6.12.2. Saving Event Log

6.13. TECHNOLOGICAL LOG

6.13.1. Technological Log Configuration File

6.13.2. Default Technological Log

6.13.3. Technological Log Structure

6.13.4.1. Windows

6.13.4.2. Linux

6.13.5. Sample Technological Log Customization Files

6.13.5.1. Technological Log Disabled

6.13.5.2. Full Technological Log

6.13.5.3. DBMS Calls

6.13.5.4. Administrator Actions and Errors

6.13.5.5. Errors and Lengthy Operations

6.14. REFERENCE INTEGRITY CONTROL

6.14.1. Major Concepts

6.14.2. Enabling Reference Integrity Control Mode

6.14.3. Direct Deletion of Objects

6.14.4. Marking for Deletion or Removing Deletion Mark

6.14.5. Specific Features of Using Objects Marked for Deletion

6.15. STANDARD FUNCTIONS

6.15.1. Active Users

6.15.2. Event Log

6.15.2.1. Viewing Event Log

6.15.2.2. Selecting Period

6.15.2.3. Filtering

6.15.3. Deleting Marked Objects

6.15.3.1. Selecting Deletion Option

6.15.3.2. Delete Completely

6.15.3.3. Delete Selectively

6.15.3.4. List of Not Deleted Objects

6.15.4. Finding References to Objects

6.15.5. Document Posting

6.15.5.1. Document Posting

6.15.5.2. Restore Sequences

6.15.6. Totals Management

6.15.6.1. Frequently Used Features

6.15.6.2. All Available Features

6.15.7. Full-text Search Management

WEB SERVERS' SETUP FOR 1C:ENTERPRISE

7.1. GENERAL REQUIREMENTS

7.2. GENERIC PUBLISHING PROCEDURE

7.2.1. Publication Dialog

7.2.1.1. Dialog Buttons

7.2.1.2. Main

7.2.1.3. Other

7.2.2. Webinst Utility

7.3. WEB CLIENT SUPPORT SETUP

7.3.1. Windows

7.3.1.1. Internet Information Services

7.3.1.2. Apache Version 2.0

7.3.1.3. Apache 2.2

7.3.1.4. Automatic Authentication Setup for Apache Web Server

7.3.2. For Linux OS

7.3.2.1. Apache Version 2.0

7.3.2.2. Apache Version 2.2

7.3.2.3. Automatic Authentication Setup for Apache Web Server

7.4. WEB SERVICES SUPPORT SETUP

7.4.1. Windows

7.4.1.1. Internet Information Services

7.4.1.2. Apache Version 2.0

7.4.1.3. Apache 2.2

7.4.2. Linux

7.4.2.1. Apache Version 2.0

7.4.2.2. Apache Version 2.2

7.4.3.1. Authentication

7.4.3.2. Using a Secure Channel

7.5.1. OpenID Settings

7.5.2. OpenID Provider Settings

7.5.3. Additional Interface for Using External Resources

7.6.1. Internet Information Services

7.6.2. Reverse Proxy

CONFIGURING WEB BROWSERS FOR WEB CLIENT OPERATION

8.1. GENERAL SETUP

8.2.1. Connection Setup

8.2.2. Automatic Authentication

8.3. MICROSOFT INTERNET EXPLORER

8.3.1. Connection Setup

8.4. GOOGLE CHROME

8.5. SAFARI

8.6. WEB CLIENT SPECIFIC FEATURES

PROTECTION FROM UNAUTHORIZED ACCESS: FEATURES AND SETUP

9.1. HASP4 PROTECTION SYSTEM

9.1.1. Dongles Marking

9.1.2. Protection from Unauthorized Access

9.1.3. Specific Features of Counting Client Licenses

9.1.3.1. File mode

9.1.3.2. Client/Server mode

9.1.3.3. Web Client

9.1.3.4. The Thin Client Working through the Web Server

9.1.3.5. The Local Key and the Web Client

9.1.3.6. COM Connection

9.1.3.7. Web Service

9.1.3.8. The Terminal Server

9.1.4. Obtaining a Server License

9.1.5.1. For Windows OS

9.1.5.2. For Linux

9.1.6.1. For Windows OS

9.1.6.2. For Linux OS

9.1.6.3. Configuring HASP License Manager using a Configuration File

9.1.7. 1C:Enterprise Setup to Work with HASP License Manager

9.2. THE SOFTWARE LICENSING SYSTEM

9.2.1. License Versions

9.2.2. Protection from Unauthorized Access

9.2.3. Specific Features of the Client License Count

9.2.3.1. The File Mode

9.2.3.2. The Client/Server Mode

9.2.3.3. The Web Client

9.2.3.4. The Thin Client Working through a Web Server

9.2.3.5. Single-user Software License and the Web Client

9.2.3.6. The COM Connection

9.2.3.7. Web Services

9.2.3.8. The Terminal Server

9.2.4. Activating and Obtaining a Server License

9.2.5.1. General Rules

9.2.5.2. Recommendations regarding activation

9.2.6. Location of Software License Files

9.2.6.1. For Windows OS

9.2.6.2. For Linux OS

9.3.1. At client application start

9.3.2. At server start

9.3.3. If the license is not obtained

SYSTEM UPDATE

10.1. UPDATE

10.2. 1C:ENTERPRISE UPDATE BY MICROSOFT WINDOWS USERS WITHOUT ADMINISTRATIVE PRIVILEGES

UNINSTALL

11.1. DELETING AN INFOBASE

11.2. TECHNOLOGICAL PLATFORM UNINSTALL

ADMINISTRATION FOR MOBILE PLATFORMS

12.1.1. Starting a Mobile Application

12.1.2. Working with a List of Applications

12.1.2.1. Creating an Application

12.1.2.2. Starting an Application

12.1.2.3. Changing Application Properties

12.1.2.4. Deleting an Application

12.1.2.5. Updating an Application

12.2.1. Starting a Mobile Application

12.2.2. Working with a List of Applications

12.2.2.1. Creating an Application

12.2.2.2. Starting an Application

12.2.2.3. Changing Application Properties

12.2.2.5. Updating an Application

12.3. PREPARING THE INFRASTRUCTURE FOR EXCHANGE

12.4. BACKING UP

APPENDIX 1. INSTALLATION DIRECTORY STRUCTURE AND ROLES OF DIRECTORIES AND FILES

1.1. FOR WINDOWS OS

1.2. FOR LINUX

1.3. ROLES OF DIRECTORIES AND FILES

1.4. CONFIGURATION FILES: LOCATION AND SEARCH

1.4.1. For Windows OS

1.4.2. For Linux OS

APPENDIX 2. EVENT LOG ITEMS DESCRIPTION

APPENDIX 3. SERVICE FILES DESCRIPTION AND LOCATION

3.1. *.1CCR

3.2. *.MFT

3.3. *.V8I

3.4. 1CESCMN.CFG

3.5. 1CESTART.CFG

3.6. 1CV8WSRV.LST

3.7. 1CV8CLST.LST

3.8. ADMINSTALL.CFG

3.9. APPSRVRS.LST

3.10. COMCNTRCFG.XML

3.11. CONF.CFG

3.12. DEBUGCFG.XML

3.13. DEF.USR

3.14. DEFAULT.VRD

3.14.1. Item

3.14.1.1. Item

3.14.2. Item

3.14.3. Item

3.14.4. Item

3.14.4.1. Item

3.14.5. Item

3.14.5.1. Item

3.14.5.2. Item

3.14.5.3. Item

3.15. INETCFG.XML

3.16. LOCATION.CFG

3.17. LOGCFG.XML

3.17.1. Configuration File Structure

3.17.1.1. Item

3.17.1.2. Item

3.17.1.3. Item

3.17.1.4. Item

3.16.1.5. Item

3.17.1.6. Item

3.17.1.7. Item

3.17.1.8. item

3.17.1.9. item

3.17.2. Recording Contexts of Exceptions

3.17.3. Recording Interlocks

3.18. LOGUI.TXT

3.19. NETHASP.INI

3.19.1. [NH_COMMON] Section

3.19.2. [NH_IPX] Section

3.19.3. [NH_NETBIOS] Section

3.19.4. [NH_TCPIP] Section

3.20. NHSRV.INI

3.21. SRV1CV83

3.22. SWPUSER.INI

3.23. TESTCFG.XML

APPENDIX 4 VERIFICATION UTILITY CHDBFL

APPENDIX 5 ERRORS HANDLING

APPENDIX 6. INTERNET SERVICES FOR OBTAINING COMMON INFOBASE LISTS AND CLIENT APPLICATION DISTRIBUTION SETS

6.1. OBTAINING THE LIST OF COMMON INFOBASES

6.1.1. Obtaining a distribution set through a web service

6.1.1.1. Web service operation

6.1.1.2. Web service description

6.1.1.3. Example of implementation

6.2. OBTAINING A CLIENT APPLICATION DISTRIBUTION SET

6.2.1. Obtaining a distribution set through a web service

6.2.1.1. Web service operation

6.2.1.2. Web service description

6.2.1.3. Example of implementation

APPENDIX 7. COMPONENTS AND MATERIALS USED

Leave a Reply

Your email address will not be published.

 

1C:Enterprise Developer's Community