Configuring the Business Management Server

This section provides instructions about how to configure the business management server. Typically deployed in the corporate network, the business management server hosts the Commerce Foundation software components, including the Commerce Server Core Systems Web services required to run Desktop Business Tools on client computers.

Note

You must have administrator permissions on the computer where you install Commerce Server 2009 R2 software. Log on to the operating system under a user account that has local administrator permissions.

To configure the business management server, follow these steps:

  1. Perform all pre-installation requirements:

    1. Install all prerequisite software. For more information, see Software Requirements for an Enterprise Commerce Deployment

    2. Enable Internet Information Services (IIS). For more information, see How to Enable IIS on the Business Management Server.

    3. Configure the network adapters.

    4. Join the business management server to the domain. For more information, see Windows Server 2008 Help.

    5. Install the Microsoft .NET Framework 3.5 with SP1.

    6. Enable clustering support.

  2. Install Commerce Server 2009 R2. The following table lists Commerce Server 2009 R2 software components required on the business management. For information about how to install Commerce Server 2009 R2, see Installation and Initial Configuration.

    Component

    Note

    Commerce Foundation Components

    Includes the Commerce Server Core Systems Web services required to run Desktop Business Tools on client computers.

    Staging (this component is available only with Commerce Server 2009 R2 Enterprise Edition)

    optional

    Direct Mailer service

    optional

  3. Configure Commerce Server 2009 R2. For information about how to configure Commerce Server 2009 R2, see Installation and Initial Configuration.

  4. Unpack the Commerce Server 2009 R2 site onto the Business Management server. For more information, see How to Unpack a Site on the Business Management Server.

  5. Perform secure deployment tasks:

    1. Set access permissions to help secure files and folders. For more information, see Setting File and Folder Access Permissions.

    2. Create application pools and make assignments to the IIS Worker Process group. For more information, see Working with Application Pools and Web Applications.

    3. Authorize users and groups to access the Web services. For more information, see Authorizing Users and Groups to Access Commerce Core Systems Web Services.

      Note

      You must grant service accounts access to the Commerce Server 2009 R2 databases for the Web services to be functional. This step is performed on the computers that are running SQL Server. For more information, see Granting Access to the Commerce Server Databases.

    4. Verify the installation of the Web services. For more information, see How to Verify Installation of the Commerce Server Web Services.

    5. Configure the keys for the profiles Web service. For more information, see How to Configure Encryption Keys for Profiles System Data.

  6. To support the Direct Mailer service, follow these steps:

    1. Install and configure the Simple Mail Transfer Protocol (SMTP) service that is provided by IIS. For more information, see How to Configure an SMTP Server for Direct Mailer.

    2. Grant the Marketing Web service access to the Direct Mailer service. For more information, see How to Grant the Marketing Web Service Access to the Direct Mailer Service.

    3. Grant the Marketing Web service access to the schedule tasks service. For more information, see How to Grant the Marketing Web Service Access to Schedule Tasks.

    4. (Optional) Configure the CommerceDirectMailer Authentication module to support sending personalized e-mail messages. For more information, see How to Configure the CommerceDirectMailer Authentication Module.

  7. Unpack the Data Warehouse resource. For more information, see How to Unpack the Data Warehouse Resource.

  8. (Optional) Specify additional authorization to help secure the Web application cache. For more information, see How to Authorize Members of a Security Group to Update the Cache.

In This Section