Configuration

This module can connect and start different kinds of SAS sessions. It can connect to SAS on Unix, Mainframe, and Windows. It can connect to a local SAS session or remote session. Because of the wide range of connection types, there are a number of different access methods which are used to connect to different kinds of SAS sessions.

The current set of connection methods are as follows:

STDIO

This connection method is available on the Linux platform only. This method enables you to connect to SAS on the same host as your Python process.

SSH

This connection method (STDIO over SSH) is available from Linux or Windows (or Mac), but only to SAS on the Linux platform. This method can connect to SAS that is installed on a remote host, if you have passwordless SSH configured or, new in version V4.3.0, you can use sshpass to provide user/pw.

IOM

The Integrated Object Method (IOM) connection method (IOM using Java) supports SAS on any platform. This method can make a local Windows connection and it is also the way to connect to a SAS Workspace Server on any SAS platform from any client. This includes SAS Grid deployments too.

HTTP

This access method uses http[s] to connect to the Compute Service (a micro service) of a Viya installation. This does not connect to SAS 9.4 via http. The Compute Service will start a Compute Server using the SPRE image of MVA SAS that is installed in the Viya deployment. This is roughly equivalent to a Workspace server via IOM, but in Viya with no SAS 9.4.

Note

The COM access method is not fully supported nor as performant as the others. Please use IOM in place of this, unless you aren’t concerned with those issues.

COM

This connection method (IOM using COM) is for Windows clients connecting to a local or remote SAS 9.4 host. This method takes advantage of the IOM access method, but does not require a Java dependency. SAS Enterprise Guide or SAS Integration Technologies Client (a free download from SAS Support) is required to install the SAS COM library on your client system.

Though there are several connection methods available, a single configuration file can be used to enable all the connection methods. The sample config file contains instructions and examples, but this section goes into more detail to explain how to configure each type of connection.

Depending upon how you did your installation, the sample sascfg.py file may be in different locations on the file system:

  • In a regular pip install, it is under the site-packages directory in the Python installation.

  • If you cloned the repo or downloaded and extraced the repo to some directory and then installed, it will be in that directory and maybe also copied to site-packages.

If you are not sure where to look, then there is a very simple way to determine the location of your saspy installation.

After installing, start Python and import saspy. Then, simply submit saspy. Python will show you where it found the module (it will show the __init__.py file in that directory). It is the directory that is the module, so the sascfg.py file is in that directory, same as __init__.py.

# this is an example of a repo install on Windows:

C:\>python
Python 3.6.0 |Anaconda custom (64-bit)| (default, Dec 23 2016, 11:57:41) [MSC v.1900 64 bit (AMD64)] on win32
Type "help", "copyright", "credits" or "license" for more information.
>>> import saspy
>>> saspy
<module 'saspy' from 'C:\\ProgramData\\Anaconda3\\lib\\site-packages\\saspy\\__init__.py'>
>>>
So sascfg.py is: C:\ProgramData\Anaconda3\lib\site-packages\saspy\sascfg.py


# this is an example of a repo install on Linux:

Linux-1> python3.5
Python 3.5.1 (default, Jan 19 2016, 21:32:20)
[GCC 4.4.7 20120313 (Red Hat 4.4.7-16)] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import saspy
>>> saspy
<module 'saspy' from '/opt/tom/github/saspy/saspy/__init__.py'>
>>>
So sascfg.py is: /opt/tom/github/saspy/saspy/sascfg.py


# this is an example of a PyPi install on Linux into site-packages:

Linux-1> python3.5
Python 3.5.1 (default, Jan 19 2016, 21:32:20)
[GCC 4.4.7 20120313 (Red Hat 4.4.7-16)] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import saspy
>>> saspy
<module 'saspy' from '/usr/lib/python3.5/site-packages/saspy/__init__.py'>
>>>
So sascfg.py is: /usr/lib/python3.5/site-packages/saspy/sascfg.py

sascfg_personal.py

Originally, sascfg.py was the config file saspy used. But, since the saspy.cfg file is in the saspy repo, it can be updated on occasion and when you do an upgrade it will pull down the repo sascfg.py and replace the one you’ve in your installation. If you used that file for your configuration, then you would need to keep a copy elsewhere and then replace the new one with your copy after upgrading or pulling, if yours was replaced.

So, the sascfg.py file became the example file, and sascfg_personal.py is config file to edit and use. This file doesn’t exist in the repo, so it will never be overwritten when you upgrade or pull. saspy will always try to import sascfg_personal.py first, and only if that fails will it try to import sascfg.py (only for backward compatibility).

So copy sascfg.py to sascfg_personal.py and put all of your specific configuration into the _personal file. Note that the sascfg.py file has examples of all of the various kinds of connections you could use. You don’t need all of that in your _personal version; only the parts you need for your situation. The next section explains the minimum parts you would need.

Also note that this file does not have to live in the repo itself. It can be anywhere on the filesystem as long as that location is accessible to python. If the path is in the python search path, then you’re good. That includes being in the repo directory, of course, which is the most convenient (that’s where I have it!). If it’s location isn’t in the python path, you can use the cfgfile=’’ parm on the SASsession() method to point to it.

New in 3.1.6: You can now place a sascfg_personal.py configuration file in your home directory. The following path “~/.config/saspy/” will be searched for a sascfg_personal.py file.

The new search order will basically be the same as it has been, but with this new home config directory inserted after the current dir and before the rest of the python path. The following will be the order in which the config file will be found.

If you don’t specify cfgfile= on SASsession, then sascfg_personal.py will be found:

  1. saspy install directory (same place as the sascfg.py examples file in to repo)

  2. current dir (whatever that is; wherever you started python)

  3. ~/.config/saspy - the new directory being added in 3.1.5 (that works on windows too: think %HOMEPATH%\.config\saspy)

  4. the rest of the directories in the python path

  5. if not found, then sascfg.py in the saspy repo (only to support way, way, way back compatibility - don’t use this)

Note that once this has been imported it will be the one config file used for the python session, as it’s imported by name so it will be cached and that is what will be used even if imported again.

If you use the cfgfile= to specify a specific file, then that file will be used and no search path will matter. Note that in the case of cfgfile=, you can use different files for different SASsession()’s in the python session. Whatever file you specify for a given SASsession will be used as the config file for that session.

If the configuration file is in the search path described above, you can just create a session as follows:

sas = saspy.SASsession()

If, however, it is not in any of those directories, then you can use the cfgfile= parameter in your SASsession() invocation to specify its location:

sas = saspy.SASsession(cfgfile='/some/path/to/your/config/sascfg_personal.py')

The python search path can be found by looking at the PYTHONPATH environment variable (if it’s set), but more definitively by submitting the following:

import sys
sys.path

There are also some new convenience methods and attributes in 3.1.6 to help in the case where you have multiple sascfg_personal.py files.

First is the saspy.SAScfg attribute which will show you the sascfg_personal.py file that would be used if you submitted SASsession(). This is found and set when you import saspy.

There is also a saspy.list_configs() method which shows you what sascfg_personal.py files are found in the search order listed above, in that order.

Here’s an example showing these (I have one in the saspy install dir, current dir and the new ~/.config/saspy dir):

tom> pwd
/u/sastpw
tom> python3.5
Python 3.5.6 (default, Nov 16 2018, 15:50:39)
[GCC 4.4.7 20120313 (Red Hat 4.4.7-23)] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> import sys
>>> sys.path
['', '/usr/lib64/python35.zip', '/usr/lib64/python3.5', '/usr/lib64/python3.5/plat-linux', '/usr/lib64/python3.5/lib-dynload', '/usr/lib64/python3.5/site-packages', '/usr/lib/python3.5/site-packages']
>>>
>>> import saspy
>>> saspy
<module 'saspy' from '/opt/tom/github/saspy/saspy/__init__.py'>
>>>
>>> saspy.SAScfg
'/opt/tom/github/saspy/saspy/sascfg_personal.py'
>>>
>>> saspy.list_configs()
['/opt/tom/github/saspy/saspy/sascfg_personal.py', '/u/sastpw/sascfg_personal.py', '/u/sastpw/.config/saspy/sascfg_personal.py']
>>>

sascfg_personal.py details

There are three main parts to this configuration file.

  1. SAS_config_names

  2. SAS_config_options # this dictionary isn’t required unless you want to change a default

  3. Configuration definitions

In reverse order, the configuration definitions are Python dictionaries. Each dictionary has the settings for one connection method (STDIO, SSH, IOM, and so on) to a SAS session. These values are defined in the following sections.

SAS_config_options now has a fourth option (as ov V4.3.2). This new, fourth, option is style and it’s for setting the ODS Style, overriding the default. There was already an attribute you can set for this on the SASsession object, HTML_style, but that couldn’t be set in a SAS_Kernel notebook, so I added it in the config for that case.

The first option lock_down restricts (or allows) an end users’ ability to override settings in the configuration definitions by passing them as parameters on the SASsession(). Each of the keys in the configuration definition can be passed in at run time on the SASsession(). If lock_down is set to True, any keys defined in the configuration definition cannot be overridden in SASsession(), Keys that are not specified in the Config Def, can be specified at run time on the SASsession(). If set to False, any config def key can be specified on the SASsession().

The second verbose controls the printing of some debug type messages. While the third, ‘prompt’ defines whether saspy can prompt the user if necessary. You would set this to False, if running a script in the background, where no input could be provided and if a prompt were to be issued, the process would hang waiting on input. Prompt= can also be provided on the SASsession() as a parameter, though not in the configuration definition, as most prompting that can happen has to do with, and happens prior to parsing, the configuration definition.

SAS_config_names is the list of configuration definition names to make available to an end user at connection time. Any configuration definitions that are not listed in SAS_config_names are simply inaccessible by an end user. You can add several configuration definitions in the file but not make them available by simply excluding the names from the list. Also note that these names can be anything you want. The names of the example configuration definitions we chosen to be self-documenting. There nothing special about ‘winlocal’, it could be named Bob. But then it wouldn’t be obvious that it’s for a WINdows install running a LOCAL copy of SAS.

So, your sascfg_personal.py file only need a few things in it; not everything in the example sascfg.py file. For example, if you had SAS installed on your Linux system, your sascfg_personal.py file may simply be the following:

SAS_config_names   = ['mycfg']

# this is actually optional, you only have to have it to change the defaults
#SAS_config_options = {'lock_down': False,
#                      'verbose'  : True,
#                      'prompt'   : True,
#                      'style'    : 'HTMLBlue'
#                     }

mycfg              = {'saspath'  : '/opt/sasinside/SASHome/SASFoundation/9.4/bin/sas_u8'
                     }

Choosing an Access Method

How do you know how to configure SASPy? Well, the first thing is to know is what SAS instance you are trying to connect to. Next is where are you connecting to it from - what client are you running SASPy on? These two answers will dictate which access method you will use and thus what your configuration definition will contain.

What kind of SAS deployment, and where?
    a. Stand-alone SAS 9 install
        i. On Linux
            1. Client Linux
                a. STDIO - if on same machine
                b. SSH (STDIO over SSH) if not the same machine. This works from Mac OS too.
            2. Client Windows
                a. prior to V3.6.3
                  -  Can't get there from here
                b. as of V3.6.3
                  - SSH (STDIO over SSH)!
        ii. On Windows
            1. Client Linux
                a. Can't get there from here
            2. Client Windows
                a. IOM or COM - on same machine. Can't get there if different machines
    b. Workspace server (this is SAS 9, and deployment on any platform is fine)
        i. Client Linux or Mac OS
            1. IOM - local or remote
        ii. Client Windows
            1. IOM or COM - local or remote
    c. SAS Viya install
        i. On Linux
            1. Client Linux
                a. HTTP - must have compute service configured and running (Viya V3.5 and V4)
                b. STDIO - over SSH if not the same machine (this was for Viya V3 before Compute Service existed, not for V4)
            2. Client Windows
                a. HTTP - must have compute service configured and running (Viya V3.5 and V4)
        ii. On Windows
            1. HTTP - must have compute service configured and running (Viya V3.5 and V4)

Now you can go to the access method specific configuration below to see what you’ll need for your configuration definition.There are also example configuration definitions in the example configuration file, sascfg.py, showing each of these different cases.

STDIO

This is the original access method. This works with Unix only, because SAS on Windows platforms does not support line-mode style connections (through stdin, stdout, stderr). This connection method is for a local connection to SAS that is installed on the same host as Python.

There are only four keys for this configuration definition dictionary:

saspath -

(Required) Path to SAS startup script

options -

SAS options to include in the start up command line. These must be a Python list.

encoding -

NOTE: as of saspy V2.4.2, you no longer need to set the encoding. SASpy will determine the SAS session encoding and map that to the Python encoding for you.

This is the Python encoding value that matches the SAS session encoding of the SAS session to which you are connecting. The Python encoding values can be found at encodings-and-unicode. The three most common SAS encodings, UTF8, LATIN1, and WLATIN1 are the default encodings for running SAS in Unicode, on Unix, and on Windows, respectively. Those map to Python encoding values: utf8, latin1, and windows-1252, respectively.

autoexec -

This is a string of SAS code that will be submitted upon establishing a connection. You can use this to preassign libraries you always want available, or whatever you want. Don’t confuse this with the autoexec option of SAS which specifies a sas program file to be run. That is different. This is a string of SAS code saspy will submit after the session is created, which would be after SAS already included any autoexec file if there was one.

lrecl -

An integer specifying the record length for transferring wide data sets from SAS to Data Frames.

display -

This is a new key to support Zeppelin (saspy V2.4.4). The values can be either ‘jupyter’ or ‘zeppelin’. The default when this is not specified is ‘jupyter’. Jupyter uses IPython to render HTML, which is how saspy has always worked. To support other Notebooks display methods, different display interface have to be added to saspy. If you want to run saspy in Zeppelin, set this in your configuration definition: ‘display’ : ‘zeppelin’,

Databricks: At some point since trying to support Databricks, they finally added support for IPython, which is how Jupyter renders HTML. Now the default (Jupyter) display value works as is on Databricks. In V5.4.4, I’ve changed the code path for display=’databricks’ to just use the default Jupyter path and that finally works on that platform. So, the following paragraph is now moot (leaving it here for context).

As of version 3.1.7, I added ‘databricks’, but it turns out their method for rendering html can only be executed from a cell in their notebook; meaning you have to type it in and pass it the string of html for it to render. I have an open issue with them.

m5dsbug -

This is a new key, as of version 3.1.9, to address a bug in the data step in the M5 maintenance release. This bug affects the code generated in the sasdata2dataframe method of this access method. It’s only is a problem if connected to SAS 9.4M5 and if the data set has multi-byte data. Setting this key to True will cause different code to be generated to work around this problem. See the description of V3.1.9 here for more info: https://github.com/sassoftware/saspy/releases/tag/v3.1.9

colorLOG -

boolean, default False, causes the SASLOG returned from the submit methods to be HTML instead of text (str) and to have ERROR:, WARNING: and NOTE: lines colorized like in other SAS UI’s.

default  = {'saspath': '/opt/sasinside/SASHome/SASFoundation/9.4/bin/sas_u8',
            'options' : ["-fullstimer", "-autoexec", "/user/tom/autoexec.sas"],
            'autoexec': "libname mylib 'some/library/to/pre-assign';"
            }

Note

The trigger to use the STDIO connection method is the absence of any trigger for the other access methods: not having 'ssh' or 'java' keys in the configuration definition.

SSH

aka: STDIO over SSH

NEW in V3.6.3, you can use this method from a Windows Client to connect to a stand alone SAS install on a remote Linux machine. Before that, it was only supported from a Linux client.

This is the remote version of the original connection method (STDIO). This also works with Unix SAS only, and it supports passwordless SSH to the Linux machine where SAS is installed. It is up to you to make sure that user accounts have passwordless SSH configured between the two systems. Starting in version 4.3.0, you can use sshpass on Linux to automate connecting with user/password as an option instead of a passwordless configuration.

If you don’t already have passwordless ssh set up, you need to generate rsa keys. Starting after version 2.2.9, you can specify an identity file (.pem file) instead by providing the file path on the identity key. Either of these provide passwordless access. If you have any trouble with this, you will find that adding -vvv to the command saspy trys to run (run that yourself from a shell with -vvv added) will provide significant diagnostics about how ssh is trying to authenticate. Something like the following:

/usr/bin/ssh -vvv hostname.to.connect.to

In addition to the keys for STDIO, there are two more keys to configure:

ssh -

(Required) The ssh command to run (Linux execv requires a fully qualified path. Even if the command is found in the PATH variable, it won’t be used. Enter the fully qualified path.)

host -

(Required) The host to connect to. Enter a resolvable host name or IP address.

ssh      = {'saspath' : '/opt/sasinside/SASHome/SASFoundation/9.4/bin/sas_u8',
            'ssh'     : '/usr/bin/ssh',
            'host'    : 'remote.linux.host',
            'options' : ["-fullstimer"]
           }

To accomodate alternative SSH configurations, you may also provide any of the following optional keys:

identity -

(Optional: string) The path to the identity file to use. A .pem file.

luser -

(Optional: string) New in V3.6.3 for Win support. Linux user name to use for the connection. This will generate ‘ssh -xyz user@linux.host.com’ instead of ‘ssh -xyz linux.host.com’ in case your windows userid isn’t the same as the Linux id on the SAS server (mine’s not); if it is, you don’t need this. You could use the identity option, above, too. Just another choice.

port -

(Optional: integer) The ssh port of the remote machine (equivalent to invoking ssh with the -p option). Obviously, 22 is the default

tunnel -

(Optional: integer) Certain methods of saspy require opening a local port and accepting a connection and data streamed from the SAS instance to saspy. If the remote SAS server would not be able to reach ports on your client machine due to a firewall or other security configuration, you may pass a port number to used for SAS to connect to on the remote side, which will be forwarded to the local side (using the -R ssh option) so that the remote SAS server can connect using this port.

rtunnel -

(Optional: integer) Certain methods of saspy require opening a remote port and allowing a connection to be made and data streamed to the SAS server from saspy; the Reverse of the tunnel case. In these cases, saspy needs to provide a port for the SAS server to use to accept a connection so data can be streamed to the SAs server. This is simply the reverse of the tunnel case, where SAS creates the socket and saspy connects. This will use the -L ssh option so that the saspy can connect to the remote SAS server on this port.

localhost -

This is a rarely needed options for providing the ip of the client machine (where SASPy/python is running). Normally this is resolved by gethostname() but in the case where the ip from that isn’t correct, you can override it by providing the ip here. The only case this has been seen is on a home network with no domains nor dns, such that a local machine name (‘MyPC’) ends up resolved to some arbitrary internet ip (i.e.: 128.64.32.16), not the actual local ip (i.e.: 10.0.0.10).

sshpass -

This is the fully qualified path of the sshpass command. the ssh key is still required, as ssh is still being executed and has to be in the full command. But this allows the use of user/pw connections instead of rsa keys.

sshpassparms -

This is a Python List containing the parms you want to use for sshpass. The three primary choices are to provide the password on the command line (it’s xxx’ed out when looking at the system processes), or from a file or from an environment variable. Check the main page on sshpass. ie: ‘sshpassparms’ : [‘-f’, ‘/file/with/pw/in/it’]

ssh      = {'saspath' : '/opt/sasinside/SASHome/SASFoundation/9.4/bin/sas_u8',
            'ssh'     : '/usr/bin/ssh',
            'host'    : 'remote.linux.host',
            'identity': '/usr/home/.ssh/alt_id.pem',
            'port'    : 9922,
            'tunnel'  : 9911,
            'rtunnel' : 9912
           }

Note

The 'ssh' key is the trigger to use the STDIO over SSH connection method.

IOM

aka: IOM using Java

This connection method opens many connectivity options. This method enables you to connect to any Workspace server on any supported platform. It requires Java 7 or higher to be installed on your Client machine (where you’re running SASPy)

This supports connecting to Workspace servers in a SAS/Grid deployment as well. This method, compared to STDIO over SSH, enables SAS Grid Manager to control the distribution of connections to the various grid nodes and integrates with monitoring and administration that SAS Grid Manager provides, as well as providing client side High Availability (HA) by supporting load balanced object spawners.

The IOM connection method also enables you to connect to SAS from a Windows client (STDIO was Linux only). The connection can be to a local SAS installation or a remote IOM Workspace server running on any platform, including MVS.

Authentication:

The IOM protocol (SAS 9’s client/server interface protocol) supports different forms of authentication. This Access Method supports connecting to a Workspace Server on any host, as well as connecting to a Local SAS install of PC SAS on that same PC. There are 3 authentication mechanisms that are supported, for various configurations, and one mechanism which is not supported, as it requires a connection to the metadata server to acquire a Token for authenticating. user/pw and IWA are for Remote connections, while a Local Windows connection does authenticating based upon the user you’re logged into the PC as. SAS Token authentication is not supported.

Which authentication mechanism you use depends upon how the Workspace server was configured by your SAS admins.

  1. user/pw

    this is for providing your metadata credentials as user and password. SASPy has a number of ways for you to provide these. See below for more information on that.

  2. IWA (Integrated Windows Authentication)

    This configuration allows a client on Windows (doesn’t work with a Linux client) to be authenticated to a Workspace server (the server can be on any host for this) based upon who you are logged into your PC as. No credentials or other configuration is needed. It’s like single signon. It does require access to the sspiauth.dll by havnig the directory where that files lives, in the System PATH so that it can be found. See below for more info on that; namely the sspi key in the configuration definition.

  3. Local Windows

    Connecting to a Local SAS deployment (not a metadata server) from SASPy on the same PC also requires authentication, but like IWA, it does this for you based upon the user you’re logged in as. It does require access to the sspiauth.dll by having the directory where that files lives, in the PATH so that it can be found. You don’t need the sspi key, as this is the only authentication mechanism, so it happens by default.

  1. SAS Token

    SASPy does not connect to a Metadata server, so this form of authentication is not supported.

ATTN, log4j vulnerabilities found in Dec 2021

Update to this for SASPy V4.0.0: Replacing the versions with 2.17.1 and 2.12.4 now, as they are currently the latest fix versions.

There are a number of vulnerabilities in log4j and Apache provided new releases of log4j to address these. At the time of this writing (SASPy V3.7.8), 2.16.0 was the current newest release that fixed these, and 2.12.2 was added to address them in a version that still supports Java 7. But the current versions are now 2.17.1 and 2.12.4.

SASPy still provides support for Java 7 so both 2.12.4 and 2.17.1 are included in the SASPy deployment. SASPy configures the classpath by default and uses the 2.12.4 jars to maintain compatibility with Java 7. There is a new configuration definition key, ‘log4j’, that can be used to cause SASPy to use the 2.17.1 version instead. If there is another version you want to use, it can be done by providing the ‘classpath’ key to override the classpath SASPy would generate, specifying whichever log4j jar file you want to use (you have to provide the files themselves). Note that if doing this, you should use the same classpath as SASPy generates, just replacing the log4j jar files with the ones you want to use.

Also note that SASPy does NOT expose any of the log4j vulnerabilities because it doesn’t use log4j and doesn’t even initialize it in its Java process it spawns for the IOM client. So none of the various log4j vulnerabilities are exposed via the SASPy client.

ATTN, as of saspy version 3.3.3, the classpath is no longer required in your configuration file!

The 4 required IOM Java client jars are now included in the saspy repo, and they, along with the saspyiom.jar and the thirdparty CORBA jars will be automatically provided as the classpath by saspy. This is generally all that is needed. If you require the 3 encryption jars, shown below, they still need to be acquired from your SAS deployment, and then put in the saspy/java/iomclient directory of the saspy install (where the 4 included jars are) so they will be included in the classpath for you.

SAS IOM client Encryption Jars

Note

ATTN: SAS ODA Users!! SAS/On Demand for Academics (ODA) has recently upgraded their SAS server environment to use SAS 9.40M7! This means that the 3 encryption jars are now required in order to be able to connect; they use AES encryption, and even with Java 8, you can no longer connect without these jars in the deployment. Since you don’tnecessarily have a SAS deployment to get these jars from, you can download them from the following location. Download, unzip and then copy them to the java/iomclient directory of the SASPy deployment, as explained above. Encryption jar download: https://support.sas.com/downloads.

Note that for AES encryption, at least prior to SAS 9.4M7, Java 8 (release greater than 151), has the needed support in it, so if your workspace server is configured for AES, just having a current version of Java 8 or higher will allow it to work, without needing the 3 encryption jars. That doesn’t work w/ M7 however, so you would need the encryption jars when connecting to M7.

As noted inthe section above, you simply need to copy these 3 jars into the saspy/java/iomclient directory of the saspy install location (where the 4 included jars are) so they will be included in the classpath for you.

The 3 encryption jars, if needed, can be found in a SAS deployment in a location similar to, but not exactly the same as, the following. If you get any error about encryption, adding these 3 jars is the proper way to address it.

$SASHome/SASVersionedJarRepository/eclipse/plugins/sas.rutil_904600.0.0.20181017190000_v940m6/sas.rutil.jar
$SASHome/SASVersionedJarRepository/eclipse/plugins/sas.rutil.nls_904600.0.0.20181017190000_v940m6/sas.rutil.nls.jar
$SASHome/SASVersionedJarRepository/eclipse/plugins/sastpj.rutil_6.1.0.0_SAS_20121211183517/sastpj.rutil.jar

The .authinfo file (_authinfo on Windows)

The IOM and HTTP access methods have support for getting the required user/password from an authinfo file in the user’s home directory instead of prompting for it. On linux, the file is named .authinfo and on windows, it’s _authinfo. The format of the line in the authinfo file is as follows. The first value is the authkey value you specify for authkey. Next is the ‘user’ key followed by the value (the user id) and then ‘password’ key followed by its value (the user’s password). Note that there are permission rules for this file. On linux the file must have permissions of 600, only the user can read or write the file. On Windows, the file should be equally locked down to where only the owner can read and write it. Also, the encoding of this file should be UTF-8, or any encoding that has ASCII as it’s low order 7-bits if you only use those characters in the file. It’s read into Python as is, and thus is expected to be utf-8.

authkey user omr_user_id password omr_user_password

So, for a Configuration Definition that specifies the following authkey:

'authkey' : 'IOM_Prod_Grid1',

The authinfo file in the home directory for user Bob, with a password of BobsPW1 would have a line in it as follows:

IOM_Prod_Grid1 user Bob password BobsPW1

Remote

A remote connection is defined as a connection to any Workspace Server on any SAS platform from either a Unix or Windows client. This module does not connect to a SAS Metadata Server (OMR), but rather connects directly to an Object Spawner to get access to a Workspace Server. If you already access these with other SAS clients, like Enterprise Guide (EG), you may already be familiar with connecting to OMR, but not directly to the others by host/port. There is information in the Advanced topics section titled Using Proc Iomoperate to find Object Spawner hosts and Workspace Server ports to get values for the three keys defined below (iomhost, iomport, appserver).

The following keys are available for the configuration definition dictionary:

java -

(Required) The path to the Java executable to use. For Linux, use a fully qualifed path. On Windows, you might be able to simply enter java. If that is not successful, enter the fully qualified path.

iomhost -

(Required) The resolvable host name, or IP address to the IOM object spawner. New in 2.1.6; this can be a list of all the object spawners hosts if you have load balanced object spawners. This provides Grid HA (High Availability)

iomport -

(Required) The port that object spawner is listening on for workspace server connections (workspace server port - not object spawner port!).

log4j -

SASPy, as of V4.0.0 now uses V2.12.4 log4j (by default) to mitigate the vulnerabilities found in Dec 2021. V2.17.1 is also included in the deployment, but it doesn’t support Java 7. ‘2.12.4’ and ‘2.17.1’ are the 2 valid values for this key, to chose which version to use.

classpath -

(No longer Required) As of V3.3.3 this is no longer required. See instuctions above (ATTN, as of saspy version 3.3.3, the classpath is no longer required!) Note that you can still provide this and override the classpath SASPy generates, but that is not recommended under any normal circumstance.

authkey -

The keyword that starts a line in the authinfo file containing user and or password for this connection.

omruser -

(Discouraged) The user ID is required but if this field is left blank, the user is prompted for a user ID at runtime, unless it’s found in the authinfo file.

omrpw -

(Strongly discouraged) A password is required but if this field is left blank, the user is prompted for a password at runtime, unless it’s found in the authinfo file.

encoding -

NOTE: as of saspy V2.4.2, you no longer need to set the encoding. SASpy will determine the SAS session encoding and map that to the Python encoding for you. You can set this to eliminate the message, at connection time, about what encoding was determined.

This is the Python encoding value that matches the SAS session encoding of the IOM server to which you are connecting. The Python encoding values can be found at encodings-and-unicode. The three most common SAS encodings, UTF8, LATIN1, and WLATIN1 are the default encodings for running SAS in Unicode, on Unix, and on Windows, respectively. Those map to Python encoding values: utf8, latin1, and windows-1252, respectively.

timeout -

Timeout value for establishing connection to workspace server

appserver -

If you have more than one AppServer defined on OMR, and one object spawner is configured to start workspace servers from multiple Appservers, then you may need to pass the name of the physical workspace server (as defined in metadata) that you want to connect to, i.e.: ‘SASApp - Workspace Server’. Without this the Object spawner will only try the first one in the list of app servers it supports. Note that this needs to be the exact string that is the Name for this server in metadata. Generally the pattern follows: ‘{} - Workspace Server’.format(‘name you gave it’). The object spawner compares these strings as is, so spaces and case matter. If your object spawner only starts one workspace server, then there’s no chance of mixing up which one, and then this option isn’t needed.

sspi -

New in 2.17, there is support for IWA (Integrated Windows Authentication) from a Windows client to remote IOM server. This is only for when your Workspace server is configured to use IWA as the authentication method, which is not the default. This is simply a boolean, so to use it you specify ‘sspi’ : True. Also, to use this, you must have the path to the spiauth.dll file in your System Path variable, just like is required for Local IOM connections. See the second paragraph under Local IOM for more on the spiauth.dll file.

autoexec -

This is a string of SAS code that will be submitted upon establishing a connection. You can use this to preassign libraries you always want available, or whatever you want. Don’t confuse this with the autoexec option of SAS which specifies a sas program file to be run. That is different. This is a string of SAS code saspy will submit after the session is created, which would be after SAS already included any autoexec file if there was one.

javaparms -

The javaparms option allows you to specify Java command line options. These aren’t generally needed, but this does allows for a way to specify them if something was needed.

lrecl -

An integer specifying the record length for transferring wide data sets from SAS to Data Frames.

display -

This is a new key to support Zeppelin (saspy V2.4.4). The values can be either ‘jupyter’ or ‘zeppelin’. The default when this is not specified is ‘jupyter’. Jupyter uses IPython to render HTML, which is how saspy has always worked. To support other Notebooks display methods, different display interface have to be added to saspy. If you want to run saspy in Zeppelin, set this in your configuration definition: ‘display’ : ‘zeppelin’,

Databricks: At some point since trying to support Databricks, they finally added support for IPython, which is how Jupyter renders HTML. Now the default (Jupyter) display value works as is on Databricks. In V5.4.4, I’ve changed the code path for display=’databricks’ to just use the default Jupyter path and that finally works on that platform. So, the following paragraph is now moot (leaving it here for context).

As of version 3.1.7, I added ‘databricks’, but it turns out their method for rendering html can only be executed from a cell in their notebook; meaning you have to type it in and pass it the string of html for it to render. I have an open issue with them.

logbufsz -

see issue 266 for details on this. not needed normally

m5dsbug -

This is a new key, as of version 3.1.9, to address a bug in the data step in the M5 maintenance release. This bug affects the code generated in the sasdata2dataframe method of this access method. It’s only is a problem if connected to SAS 9.4M5 and if the data set has multi-byte data. Setting this key to True will cause different code to be generated to work around this problem. See the description of V3.1.9 here for more info: https://github.com/sassoftware/saspy/releases/tag/v3.1.9

colorLOG -

boolean, default False, causes the SASLOG returned from the submit methods to be HTML instead of text (str) and to have ERROR:, WARNING: and NOTE: lines colorized like in other SAS UI’s.

# Unix client and Unix IOM server  NEW 2.1.6 - with load balanced object spawners
iomlinux = {'java'      : '/usr/bin/java',
            'iomhost'   : ['linux.grid1.iom.host','linux.grid2.iom.host','linux.grid3.iom.host','linux.grid4.iom.host'],
            'iomport'   : 8591,
            'appserver' : 'SASApp Prod - Workspace Server'
            }

# Unix client and Windows IOM server
iomwin   = {'java'      : '/usr/bin/java',
            'iomhost'   : 'windows.iom.host',
            'iomport'   : 8591,
            'appserver' : 'SASApp Test - Workspace Server'
           }

# Windows client and Unix IOM server
winiomlinux = {'java'      : 'java',
               'iomhost'   : 'linux.iom.host',
               'iomport'   : 8591,
              }

# Windows client and Windows IOM server
winiomwin   = {'java'      : 'java',
               'iomhost'   : 'windows.iom.host',
               'iomport'   : 8591,
              }

# Windows client and with IWA to Remote IOM server
winiomIWA   = {'java'      : 'java',
               'iomhost'   : 'some.iom.host',
               'iomport'   : 8591,
               'sspi'      : True
              }

Local

A local connection is defined as a connection to SAS that is running on the same Windows machine. You only need the following configuration definition keys. (Do not specify any of the others).

There is one additional requirement. The sspiauth.dll file–also included in your SAS installation–must be in your system PATH environment variable, your java.library.path, or in the home directory of your Java client. You can search for this file in your SAS deployment, though it is likely in SASHome\SASFoundation\9.4\core\sasext.

If you add this to the system PATH environment variable, only list the path to the directory–do not include the file itself. For example:

C:\Program Files\SASHome\SASFoundation\9.4\core\sasext

An alternative to puting this directory in your PATH, is to add it at runtime. You can add this to your sascfg_personal.py file, or even submit it before importing saspy and trying to make a conection. Obviously, use the correct path for your system:

import os
os.environ["PATH"] += ";C:\\Program Files\\SASHome\\SASFoundation\\9.4\\core\\sasext"
java -

(Required) The path to the Java executable to use.

log4j -

SASPy, as of V4.0.0 now uses V2.12.4 log4j (by default) to mitigate the vulnerabilities found in Dec 2021. V2.17.1 is also included in the deployment, but it doesn’t support Java 7. ‘2.12.4’ and ‘2.17.1’ are the 2 valid values for this key, to chose which version to use.

classpath -

(No longer Required) As of V3.3.3 this is no longer required. See instuctions above (ATTN, as of saspy version 3.3.3, the classpath is no longer required!) Note that you can still provide this and override the classpath SASPy generates, but that is not recommended under any normal circumstance.

encoding -

NOTE: as of saspy V2.4.2, you no longer need to set the encoding. SASpy will determine the SAS session encoding and map that to the Python encoding for you.

This is the Python encoding value that matches the SAS session encoding of the IOM server to which you are connecting. The Python encoding values can be found at encodings-and-unicode. The three most common SAS encodings, UTF8, LATIN1, and WLATIN1 are the default encodings for running SAS in Unicode, on Unix, and on Windows, respectively. Those map to Python encoding values: utf8, latin1, and windows-1252, respectively.

autoexec -

This is a string of SAS code that will be submitted upon establishing a connection. You can use this to preassign libraries you always want available, or whatever you want. Don’t confuse this with the autoexec option of SAS which specifies a sas program file to be run. That is different. This is a string of SAS code saspy will submit after the session is created, which would be after SAS already included any autoexec file if there was one.

javaparms -

The javaparms option allows you to specify Java command line options. These aren’t generally needed, but this does allows for a way to specify them if something was needed.

lrecl -

An integer specifying the record length for transferring wide data sets from SAS to Data Frames.

display -

This is a new key to support Zeppelin (saspy V2.4.4). The values can be either ‘jupyter’ or ‘zeppelin’. The default when this is not specified is ‘jupyter’. Jupyter uses IPython to render HTML, which is how saspy has always worked. To support other Notebooks display methods, different display interface have to be added to saspy. If you want to run saspy in Zeppelin, set this in your configuration definition: ‘display’ : ‘zeppelin’,

Databricks: At some point since trying to support Databricks, they finally added support for IPython, which is how Jupyter renders HTML. Now the default (Jupyter) display value works as is on Databricks. In V5.4.4, I’ve changed the code path for display=’databricks’ to just use the default Jupyter path and that finally works on that platform. So, the following paragraph is now moot (leaving it here for context).

As of version 3.1.7, I added ‘databricks’, but it turns out their method for rendering html can only be executed from a cell in their notebook; meaning you have to type it in and pass it the string of html for it to render. I have an open issue with them.

logbufsz -

see issue 266 for details on this. not needed normally

m5dsbug -

This is a new key, as of version 3.1.9, to address a bug in the data step in the M5 maintenance release. This bug affects the code generated in the sasdata2dataframe method of this access method. It’s only is a problem if connected to SAS 9.4M5 and if the data set has multi-byte data. Setting this key to True will cause different code to be generated to work around this problem. See the description of V3.1.9 here for more info: https://github.com/sassoftware/saspy/releases/tag/v3.1.9

colorLOG -

boolean, default False, causes the SASLOG returned from the submit methods to be HTML instead of text (str) and to have ERROR:, WARNING: and NOTE: lines colorized like in other SAS UI’s.

# Windows client and Local Windows SAS Install
winlocal    = {'java'      : 'java',
              }

Remote to MVS SAS

Yes, you can even connect to a SAS server running on MVS (Mainframe SAS). There are a couple of requirements for this to work right. First, you need version 2.1.5 or higher of this module. There were a couple tweaks I needed to make to the IOM access method and those are in 2.1.5.

Also, you need to use the HFS file system for the WORK (and/or USER) library and you also need to set the default file system to HFS so temporary files used by this module use HFS instead of the native MVS file system. You can still access the native file system in the code you run, but for internal use, this module needs to access the HFS file system. To set the default file system (options filesystem=hfs;) you can either set it in the workspace severs config file, or you can submit the options statement from your python code after making a connection:

sas = saspy.SASsession()
ll  = sas.submit('options filesystem=hfs;')

Or better yet, use the autoexec configuration option so it’s always set and you don’t have to think about it!

IOM_MVS     = {'java'      : 'java',
               'autoexec'  : 'options filesystem=hfs;',
               ...
              }

The other thing is to set the encoding correctly for this to work. MVS is an EBCDIC system, not ASCII. For the most part, this is all handled in IOM for you, but for data transfer routines, transcoding is required. The default encoding on MVS is OPEN_ED-1047, although it can be set to any number of other EBCDIC encodings. The default Python encodings do not include the 1047 code page. I did find a ‘cp1047’ code page in a separate pip installable module which seems to match the OPEN_ED-1047 code page. So if you’re running with that encoding, you can install the cp1047 to use.

Note

Having the 'java' key is the trigger to use the IOM access method.

Note

When using the IOM access method ('java' key specified), the absence of the 'iomhost' key is the trigger to use a local Windows session instead of remote IOM (it is a different connection type).

HTTP

This is the access method for Viya. It does not connect to SAS 9.4. This access method accesses the Compute (micro) Service of a SAS Viya deployment. The Compute Service launches Compute Servers, which are MVA SAS sessions found in the SPRE deployment of the Viya installation. This is the equivalent of an IOM Workspace server, but in a Viya deployment. So, it is still connecting to MVA SAS and all of the methods behave the same as they would with any other saspy access method.

Authentication:

There are continuing to be new ways invented to authenticate to Viya. Originally it was user/pw like anything else. More recently, an SSO method was created. More recently than that is integration w/ Azure, providing the ability to pass an Azure token in, to get a Viya token. Actually, this method should allow any JWT Bearer Token to be passed in and used, assuming it’s configured to be valid in Viya. The various configuration keys are provided below, but I wanted to identify them here, as they are mutually exclusive. You use only one of the various means to authenticate.

  1. user/pw

    the keys for this are either ‘user’ and ‘pw’, or use ‘authkey’ to identify them from in an authinfo file.

  2. SSO

    The primary key in ‘authcode’ which is a onetime token acquired from a call to SASLogon, as a two factor authentication scheme. The ‘client_id’ and ‘client_secret’ are also required, although a special client_id has been created by default in Viya deployments for SASPy, and I will default to that unless you provide other client info that an administrator created and provided you to use.

  3. Azure JWT (actually, any JWT perhaps, in the future)

    ‘jwt’ is the key to provide that non-Viya Bearer Token, to then pass through to SASLogon to get the Viya Bearer Token to use. And these tokens, are just big long strings; thousands of bytes long strings of random characters (so you know you’re passing in the right thing).

  4. SASLogon Authentication Token

    All of the previous authentication mechanisms are used to have SASPy acquire the Viya Auth Token. You can, actually, do all of that yourself via various Rest API’s. If you do that, then you can just pass in the Viya Auth Token, and even the refresh token too, and I’ll skip the auth process and just use your tokens; Bob’s your uncle, as they say. The key for this is ‘authtoken’, and optionally, ‘refreshtoken’.

Again, only use one of these and don’t mix using config keys from more than one for a given connection.

Authenticating to a Proxy server:

Support for having Viya behind a proxy server was added in version 4.5.0. The proxy key is used to provide the host and port. I had a request from a customer to add support for authenticating to the proxy server itself, before then authenticating to Viya. Support for this was added in version 5.2.0; for authenticating to the proxy via user/pw. There are new configuration definition keys to support this; proxy_authkey, proxy_user and proxy_pw. To use this you must specify proxy_authkey or proxy_user. Since normally this is not required, the only way to enable prompting for both user/pw is to provide proxy_authkey that isn’t actually in the authinfo file, then when not found, you will be prompted for user and pw. Alternately, if you provide proxy_user, but neither proxy_authkey nor proxy_pw, this will just prompt you for the proxy_pw.

SSL/TLS:

When Viya is configured to use TLS (HTTPS not HTTP), then the expectation is that the CA Certificate from the Viya deployment must match with those on the client side. The easy way is to make Viya use existing CA Certs that your site already has, then it all works and HTTPS can verify the certs and establish a trusted connection. All of this is Viya administration work, nothing an end user needs to deal with. However, if your site uses Certificates from Viya, then the Viya Certificate (a .pem file) must be downloaded and then the contents of that .pem file be appended to the existing default .pem certificate that your client machine already uses so that the HTTPS connection can Verify the certificate against theViya deployment. There’s some doc in the admin guide about this (https://go.documentation.sas.com/doc/en/sasadmincdc/default/calencryptmotion/n1xdqv1sezyrahn17erzcunxwix9.htm#p1umnmdi53qfjnn17wqb5aqb8ncx) but again, that’s not something an end user needs to read. It does mean that the Viya admin team should be able to get you the .pem file from Viya for you to save on your client machine. Since appending it to the default .pem file used by https on your machine is likely something you can’t do anyway (some sites have IT set all of this up so you don’t have to), there is a new configuration key cafile with which you can specify the full path to this .pem file and that will make https use that certificate to Verify that client certificate against Viya’s server certificate when making the connection. If the Certificate can’t be verified, or you don’t have this certificate, the default certificate can be used, just not verified, and will still provide TLS Encryption. The original certificates in older Viya deployments were just self-signed certificates and thus couldn’t be verified (thus the need for the verify key below to get rid of the message about that). If you set Verify to True, then if the certificate can’t be verified the connection fails. False just connects without trying to verify it. And the default is still to try but if it can’t be verified then connect unverified. In any case, Encryption is still enabled. The cafile key is new in release 5.1.0.

The keys for this configuration definition dictionary are:

url -

(Required if ip not specified) The URL to Viya, of the form ‘http[s]://host.identifier[:port]’. When this is specified, ip= will not be used, as the host’s ip is retrieved from the url. Also, ssl= is set based upon http or https and port= is also parsed from the url, if provided, else defaulted based upon the derived ssl= value. So neither ip, port nor ssl are needed when url= is used.

proxy -

(Optional) If your Viya deployment is behind a proxy server, provide host:port for the proxy, using this keyword.

ip -

[Deprecated] (Required if url not specified) The resolvable host name, or IP address to the Viya Compute Service

port -

[Deprecated] The port to use to connect to the Compute Service. This will default to either 80 or 443 based upon the ssl key.

ssl -

[Deprecated] (Optional) Boolean identifying whether to use HTTPS (ssl=True) or just HTTP. The default is True and will default to port 443 if the port is not specified. If set to False, it will default to port 80, if the port is not specified. Note that depending upon the version of python, certificate verification may or may not be required, later version are more strict. See the python doc for your version if this is a concern.

cafile -

specifies the location of the Viya CA Certificate your Viya admin provided from the Viya deployment so the client HTTPS connection can verify the CA against the Viya server. Not needed if that certificate has been incorporated into your default certificate used on your client machine.

verify -

(Optional) Also note that if Viya uses the default self-signed ssl certificates it ships with, you will not be able to verify them, but that can be fine, and you can still use an ssl connection. You can use set ‘verify’ : False, in your config to turn off verification for this case.

client_id -

[for SSO Viya configurations] client_id to use for authenticating to Viya (defaults to ‘SASPy’)

client_secret -

[for SSO Viya configurations] client_secret to use for authenticating to Viya (defaults to ‘’)

authcode -

[for SSO Viya configurations] one time authorization code acquired via the SASLogon oauth service where the url to get the code would be [url]/SASLogon/oauth/authorize?client_id=[client_id]&response_type=code so perhaps: https://SAS.Viya.sas.com/SASLogon/oauth/authorize?client_id=SASPy&response_type=code

authkey -

(Optional) The keyword that starts a line in the authinfo file containing user and or password for this connection. See the IOM using Java above for more info.

user -

(Discouraged) The user ID is required but if this field is left blank, the user is prompted for a user ID at runtime, unless it’s found in the authinfo file.

pw -

(Strongly discouraged) A password is required but if this field is left blank, the user is prompted for a password at runtime, unless it’s found in the authinfo file.

proxy_authkey -

(Optional) The keyword that starts a line in the authinfo file containing user and or password for authenticating to the provided proxy server.

proxy_user -

(Optional) The user ID for authenticating to the provided proxy server.

proxy_pw -

(Optional) The password for authenticating to the provided proxy server.

context -

The Compute Service has different Contexts that you can connect to. Think Appserver in IOM. if you don’t provide one here, saspy will query the Service upon connecting and get a list of available Contexts and prompt you for which one to use.

timeout -

(Optional) HTTPConnection timeout value, in seconds. Defaults to None. This is passed to HTTPConnection; it’s not part of the Viya API but rather the http.client API.

inactive -

(Optional) An integer specifying the Inactive Time Out in minutes for the Compute Session. This is a SAS Compute Service option and controls when the Compute Service self terminates based upon inactivity. The regular Compute Session default timeout is 15 minutes, but for SASPy, I default this to 120 minutes. So, you likely won’t need to provide this yourself. The Session is already explicitly terminated when your Python process ends or you issue endsas()

options -

(Optional) SAS options to include when connecting. These must be a Python list.

encoding -

(Ignored) Unlike the other access methods, the HTTP API to the Compute Service uses UTF-8 for all calls. So, no transcoding is necessary, nor done, on the Python side, so this option is not needed and ignored.

autoexec -

(Optional) This is a string of SAS code that will be submitted upon establishing a connection. You can use this to preassign libraries you always want available, or whatever you want. Don’t confuse this with the autoexec option of SAS which specifies a sas program file to be run. That is different. This is a string of SAS code saspy will submit after the session is created, which would be after SAS already included any autoexec file if there was one.

lrecl -

(Optional) An integer specifying the record length for transferring wide data sets from SAS to Data Frames.

display -

This is a new key to support Zeppelin (saspy V2.4.4). The values can be either ‘jupyter’ or ‘zeppelin’. The default when this is not specified is ‘jupyter’. Jupyter uses IPython to render HTML, which is how saspy has always worked. To support other Notebooks display methods, different display interface have to be added to saspy. If you want to run saspy in Zeppelin, set this in your configuration definition: ‘display’ : ‘zeppelin’,

Databricks: At some point since trying to support Databricks, they finally added support for IPython, which is how Jupyter renders HTML. Now the default (Jupyter) display value works as is on Databricks. In V5.4.4, I’ve changed the code path for display=’databricks’ to just use the default Jupyter path and that finally works on that platform. So, the following paragraph is now moot (leaving it here for context).

As of version 3.1.7, I added ‘databricks’, but it turns out their method for rendering html can only be executed from a cell in their notebook; meaning you have to type it in and pass it the string of html for it to render. I have an open issue with them.

authtoken -

The SASLogon authorization token to use instead of acquiring one via user/pw or authcode or jwt. Normally SASPy calls SASLogon to authenticate and get this token. But, if you do that yourself, you can just pass it in. These tokens, for reference, are very long strings of random characters; just so you know that you’re using the right thing :)

refreshtoken -

If you are providing the Authtoken yourself you should also have access to the Refreshtoken, acquired when you got the Authtoken from SASLogon. Provide that token so SASPy can refresh your access token before it expires.

jwt -

A JWT bearer token that can be used to acquire a SASLogon authorization token. This would be something like an Azure token, where Azure and Viya have been set up to allow the JWT to be used to get a SASLogon token. These tokens, for reference, are very long strings of random characters; just so you know that you’re using the right thing :)

colorLOG -

boolean, default False, causes the SASLOG returned from the submit methods to be HTML instead of text (str) and to have ERROR:, WARNING: and NOTE: lines colorized like in other SAS UI’s.

httpsviya = {'url'     : 'https://viya.deployment.sas.com',
             'context' : 'Data Mining compute context'
             'authkey' : 'viya_user-pw',
             'options' : ["fullstimer", "memsize=1G"]
             }

Note

Having the 'url' (or 'ip') key is the trigger to use the HTTP access method.

COM

aka: IOM using COM

New in 3.1.0, this user contributed access method uses Windows COM to connect to the SAS IOM provider. It is similar to the other IOM access method, but there is no Java dependency. Connections from Windows clients to local and remote SAS 9.4 hosts are supported.

Note

Please note that because this Access Method is user contributed and uses 3rd party modules to perform most of its functionality, I can’t fully support all of the functionality and performance characteristics in this access method that I provide in the other access methods I wrote. There have been lots of improvements since this was contributed, many of which I couldn’t factor into this method. The IOM access method is the preferred, fully supported method, but you can use this if it does what you need from it.

SAS Enterprise Guide or SAS Integration Technologies Client (a free download from SAS support) is required to install the SAS COM library on your client system.

The COM access method requires a Python module that saspy, in general, does not; pypiwin32 If you do not have this already installed before trying to use the COM access method, you will likely see an error similar to this when trying to establish a connection. Just install that modules to solve this.

>>> sas=saspy.SASsession()
Traceback (most recent call last):
  File "<stdin>", line 1, in <module>
  File "/opt/tom/github/saspy/saspy/sasbase.py", line 360, in __init__
    self._io = SASSessionCOM(sascfgname=self.sascfg.name, sb=self, **kwargs)
  File "/opt/tom/github/saspy/saspy/sasiocom.py", line 197, in __init__
    self.pid = self._startsas()
  File "/opt/tom/gi thub/saspy/saspy/sasiocom.py", line 212, in _startsas
    factory = dynamic.Dispatch('SASObjectManager.ObjectFactoryMulti2')
NameError: name 'dynamic' is not defined
>>>

To connect to a remote SAS server, you must specify the IOM host name and port number. The Class Identifier is also required, but is a constant which will be prpvided on your behalf (starting in V3.1.4). The Class Identifier is a 32-character GUID that indicates the type of SAS server to connect to; in this case Workspace Server.

proc iomoperate;
    list types;
run;
SAS Workspace Server
    Short type name  : Workspace
    Class identifier : 440196d4-90f0-11d0-9f41-00a024bb830c  /* this is a constant that doesn't change */

To connect to a local SAS instance, do not specify the iomhost paramter. Local connections do not require a host, port, class_id. Any specified port or class_id parameters will be ignored. Likewise, and provided username or password values are ignored on local connections.

iomhost -

The resolvable host name, or IP address to the IOM object spawner. Only required for remote connections. Don’t specify for local connections.

iomport -

The port that object spawner is listening on for workspace server connections (workspace server port - not object spawner port!). Only required for remote connections. Don’t specify for local connections.

class_id -

This value turns out to be a constant which hasn’t changed in years and probably never will. So, you shouldn’t need to specify this. The value of ‘440196d4-90f0-11d0-9f41-00a024bb830c’ will be used by default. Though you can specify it explitly here to override the default; but you should never need to. The IOM workspace server class identfier. Use PROC IOMOPERATE to identify the correct value for your configuration.

provider -

(Required) The SAS IOM Data Provider is an OLE DB data provider that supports access to SAS data sets that are managed by SAS Integrated Object Model (IOM) servers. The ‘sas.iomprovider’ provider is recommended.

authkey -

The keyword that starts a line in the authinfo file containing user and or password for this connection. See the IOM using Java above for more info.

omruser -

(Discouraged) The user ID is required but if this field is left blank, the user is prompted for a user ID at runtime, unless it’s found in the authinfo file.

omrpw -

(Strongly discouraged) A password is required but if this field is left blank, the user is prompted for a password at runtime, unless it’s found in the authinfo file.

encoding -

NOTE: as of saspy V2.4.2, you no longer need to set the encoding. SASpy will determine the SAS session encoding and map that to the Python encoding for you.

This is the Python encoding value that matches the SAS session encoding of the IOM server to which you are connecting. The Python encoding values can be found at encodings-and-unicode. The three most common SAS encodings, UTF8, LATIN1, and WLATIN1 are the default encodings for running SAS in Unicode, on Unix, and on Windows, respectively. Those map to Python encoding values: utf8, latin1, and windows-1252, respectively.

colorLOG -

boolean, default False, causes the SASLOG returned from the submit methods to be HTML instead of text (str) and to have ERROR:, WARNING: and NOTE: lines colorized like in other SAS UI’s.

iomcom = {'iomhost': 'mynode.mycompany.org',
    'iomport': 8591,
    'provider': 'sas.iomprovider',
    'encoding': 'windows-1252'}

Note

Having the 'provider' key is the trigger to use the COM (IOM using COM) access method.

Note

When using the COM access method ('provider' key specified), the absence of the 'iomhost' key is the trigger to use a local Windows session instead of remote IOM (it is a different connection type).