There are various ways to reset the Admin Tool Repository password.
In OBIEE 10g, follow the following steps to reset the password using NSQConfig.INI file.
You can find this file at:ORACLE_INSTANCE/config/OracleBIServerComponent/coreapplication_obisn
Make a backup copy of the file before editing.
- Stop the BI Server service
- Close Administration Tool, if opened. (Then only the changes are affecting to the Administration Tool)
- Open the NQSConfig.INI file in a text editor.
- Go to Security part and find AUTHENTICATION_TYPE = BYPASS_NQS;
- Uncomment (remove #) this part.
- Save the changes you have made.
- Open Administration Tool, then rpd which needs password reset, in offline mode
- Give any password, it accepts.
- Now go to Manage > Security.
- Change password.
- Save the changes to repository.
- Revert back the changes in NQSConfig.INI.
- Start BI Server and open repository with new password.
But unlike OBIEE 10g, OBIEE 11g provides some easy and built-in processes to get the repository passwords.
- Open your Enterprise Manager.
- Navigate to Weblogic Domain > bifoundation domain > security > Credentials.
- Expand oracle.bi.enterprise
This is the key map which stores all the repository passwords that are deployed.Now from the above mappings, we can retrieve any repository passwords.
- Open command prompt.
- cd <obiee_home>\oracle_common\common\bin
- Run wlst scrpt: <OBIEE_HOME>\oracle_common\common\bin>wlst.cmd
- Connect to weblogic domain with the command:
connect(“<weblogic_AdminUser>”,”<weblogic_AdminUser_Password>”,”<Adminserver_Hostname>:<Admin_Portno>”)
e.g.
wls:/offline> connect("weblogic","admin123","localhost:7001")
Connecting to t3://localhost:7001 with userid weblogic …
Successfully connected to Admin Server ‘AdminServer’ that belongs to domain ‘bifoundation_domain’ - Run listCred() command to get the password of SampleAppLite_BI0001 repository
wls:/bifoundation_domain/serverConfig> listCred("oracle.bi.enterprise","repository.SampleAppLite_BI0001")
[Name : tempvalue, Description : null, expiry Date : null]
PASSWORD:Admin123 - This is it. The password is in front of you...... :-)
No comments:
Post a Comment