Configure security-role and method permission for EJB 3.0 using Jdev 11g

The EJB 3.0 session bean created by Jdev 11g EJB wizard does not have ejb-jar.xml. Where and how can security-role and method permission for the EJB be configured?
For example,
<assembly-descriptor>
<security-role>
<role-name>managers</role-name>
</security-role>
<method-permission>
<role-name>managers</role-name>
<method>
<ejb-name>Employees</ejb-name>
<method-name>setSalary</method-name>
<method-params>
<method-param>java.lang.Long</method-param>
</method-params>
</method>
</method-permission>
</assembly-descriptor>

user516954,
By default annotations are used. However, you can create a new descriptor and that will take presidence over any declared annotation.
--Ric                                                                                                                                                                                                                                                                                                                               

Similar Messages

  • Security-role and security-role-assignment not working in WL7.0

    Hello all..
    Some EJB components that worked fine in WebLogic 6.1 no longer work in
    WL7.0. It has to do with the security-role and security-role-assignment
    descriptor elements no longer allowing anonymous users to be included in the
    authorization for a bean.
    For example, in WL6.1 placing these items in ejb-jar.xml:
    <assembly-descriptor>
    <security-role>
    <role-name>Employees</role-name>
    </security-role>
    <method-permission>
    <role-name>Employees</role-name>
    <method>
    <ejb-name>CustomerEJB</ejb-name>
    <method-name>*</method-name>
    </method>
    </method-permission>
    and mapping WebLogic default users to this role in weblogic-ejb-jar.xml:
    <security-role-assignment>
    <role-name>Employees</role-name>
    <principal-name>guest</principal-name>
    <principal-name>system</principal-name>
    </security-role-assignment>
    worked fine for clients creating their context using a simple
    InitialContext() constructor without specifying SECURITY_PRINCIPAL or
    SECURITY_CREDENTIALS. These users were basically "guest" to WebLogic, and
    the security-role-assignment element above told WebLogic that "guest" was in
    the Employees role for purposes of this EJB archive.
    Worked in WL6.1, no longer works in WL7.0. Client receives typical
    permission exception:
    java.rmi.AccessException: Security violation: insufficient permission to
    access method 'create'
    If I explicity connect as "system" things are fine, or I can create a new
    user in the default realm in WebLogic, put a matching <principal-name>
    element in the section above, and connect as that user. Note that if I leave
    off the <security-role> section completely, or set the required role name to
    "everyone", the anonymous access works fine. Apparently the anonymous user
    is a member of "everyone" behind the scenes even though "everyone" does not
    appear in the realm list of groups or roles.
    So, my question boils down to this: Is there a "magic" username in WL7 like
    "guest" was in WL6.1 that can be mapped to the required role name, or must
    every client connection use a true weblogic-created user with appropriate
    role assignments used to map it to the required role name.
    -Greg
    P.S. Note that none of the EJB examples provided with WL used
    <security-role>..
    Check out my WebLogic 6.1 Workbook for O'Reilly EJB Third Edition
    www.amazon.com/exec/obidos/ASIN/1931822468 or www.titan-books.com

    Below are the screen shots for PFCG:

  • Security roles and profiles

    Hello,
    Could you please provide information on "security roles and profiles "
    I would appreciate.
    Regards,
    Alex

    Roles give you authorization to specific area of the system. Use TC pfcg and you will see different setting for a role.
    In specific Role -> Authorization -> click on Display Authorization Data.
    Here all specific InfoArea, Cube, ODS, Reporting componets: display, execute and other security rules are defined.
    User Section: defines who has access to this role.
    Multiple authorization are combined to create an Authorization Profile. You defined a profile at TC su01 and under profile section.
    Hope that helps.
    thanks.
    Wond

  • Developing security Roles and profiles

    Hi Team,
    Can you guys let me know how to develop security roles and profiles. We are rolling out for a company in Japan, and the congif is completed. We are in the process of developing test cases ans also security roles and profiles for users? Can somebody guide and help me on this?
    Regards,

    Hi,
    Use Tcode = PFCG -->then create any customized roles and profiles for any users on module based.
    user masters: USR01 to 09, UST04,
    profiles: USR10, USR11, UST10S, UST10C,
    authorisations: USR12, USR13, UST12.
    password exceptions USR40.
    History tables(may not be applicable but FYI): users: USH02, USH04,
    profiles: USH10, auths USH12.
    R/3 Security Tcodes
    End User Transaction Code  Menu Path   Purpose
    SU3  System > User Profile> Own Data  Set address/defaults/parameters
    SU53  System > Utilities > Display Authorization Check  Display last authority check that failed
    SU56  Tools --> Administration --> Monitor --> User Buffer  Display user buffer
    Role Administration Transaction Code  Menu Path   Purpose
    PFCG
    Tools --> Administration --> User Maintenance --> Roles  Maintain roles using the Profile Generator
    PFUD   Work on SAP check indicators and field values
    Select: Copy SAP check IDu2019s and field values
    Installation
    1. Initial Customer Tables Fill
    Upgrade
    2a. Preparation: Compare with SAP values
    2b. Reconcile affected transactions
    2c. Roles to be checked
    2d. Display changed transaction codes
    SU24
    Same as for SU25:
    Select: Change Check Indicators > Maintain Check Indicators>Maintain 
    Regards,
    Srini Nookala

  • The version of "Adobe Flash Player" on your system does not include the latest security updates and has been blocked. To continue using "Adobe Flash Player", download an updated version from Adobe's website.

    The version of “Adobe Flash Player” on your system does not include the latest security updates and has been blocked. To continue using “Adobe Flash Player”, download an updated version from Adobe’s website.

    You haven't actually asked a question, but as stated you should only download Flash Player directy from Adobe.
    Nor have you said what version of OS X and Safari you are running.
    You can check here:  http://www.adobe.com/products/flash/about/  to see which version you should install for your Mac and OS. Note that version 10,1,102,64 is the last version available to PPC Mac users*. The latest version,10.3 or later, is for Intel Macs only, as Adobe no longer support the PPC platform. Version 11.0.1.152 is for Lion.
    * Unhelpfully, if you want the last version for PPC Macs, you need to go here:  http://kb2.adobe.com/cps/142/tn_14266.html  and scroll down to 'Archived Versions/Older Archives'. Flash Player 10.1.102.64 is the one you download. More information here:  http://kb2.adobe.com/cps/838/cpsid_83808.html
    You should first uninstall any previous version of Flash Player, using the uninstaller from here (make sure you use the correct one!):
    http://kb2.adobe.com/cps/909/cpsid_90906.html
    and also that you follow the instructions closely, such as closing ALL applications first before installing. You must also carry out a permission repair after installing anything from Adobe.

  • I forgot my security answer and my backup account so i cant use my sgd30 in my account which was the blue card

    I forgot my security answer and my backup account so i cant use my sgd30 in my account which was the blue card

    Hello ejangeles1215,
    Thanks for the question. If you do not have access to your rescue email address, you'll need to contact iTunes Store support to reset the security questions:
    Note: The option to send an email to reset your security questions and answers will not be available if a rescue email address is not provided. You will need to contact iTunes Store support in order to do so.
    Rescue email address and how to reset Apple ID security questions
    http://support.apple.com/kb/HT5312
    Additional Information:
    Apple ID: Contacting Apple for help with Apple ID account security
    http://support.apple.com/kb/HT5699
    Thanks,
    Matt M.

  • When I try to watch any video clip I get this:   The version of "Adobe Flash Player" on your system does not include the latest security updates and has been blocked. To continue using "Adobe Flash Player", download an updated version from Adobe's we

    When I try to watch any video clip I get this:
    The version of “Adobe Flash Player” on your system does not include the latest security updates and has been blocked. To continue using “Adobe Flash Player”, download an updated version from Adobe’s website.
    I tried clicking on the Adobe Flash Player.  It said it accepted it but it did not make a difference.
    Can anyone help?
    Thank you!

    This did not work
    On Mon, Oct 27, 2014 at 8:59 PM, Apple Support Communities Updates <

  • I have recently changed jobs and previously registered for a CC plan using my previous email address - now inaccessible. I also no longer have my laptop. I am paying fees each month ut can't access my membership to change my email address. Help!

    I have recently changed jobs and previously registered for a CC plan using my previous email address - now inaccessible.
    I also no longer have my laptop.
    I am paying fees each month but can't access my membership to change my email address. Help!
    I am paying my CC subscription monthly but cannot stop payments or preferably, change my email address so I can access my plan and use it on another computer.
    I can't contactAdobe to sort this - there seems to be no way of making contact and no reference to this problem in the forums that I can find
    Help!

    This is an open forum, not Adobe support... You need Adobe support to cancel a subscription
    -start here https://forums.adobe.com/thread/1703848
    -or by telephone http://helpx.adobe.com/x-productkb/global/phone-support-orders.html
    --and two links which may provide more details, if the above links don't help you
    -http://helpx.adobe.com/x-productkb/policy-pricing/return-cancel-or-change-order.html
    -http://helpx.adobe.com/x-productkb/policy-pricing/cancel-membership-subscription.html

  • Method-permission in ejb-jar.xml

    Hi,
    Need understanding, whether <role-name> here is an "AND" or "OR" i.e to execute
    the method
    testmethod, the user has to be in both the roles or any one of the role. (Roles
    are mapped
    to groups in weblogic-ejb-jar.xml).
    <method-permission>
    <role-name>Master</role-name>
    <role-name>Supervisor</role-name>
    <method>
         <ejb-name>TEST</ejb-name>
         <method-name>testMethod</method-name>
    </method>
    </method-permission>
    An early response will be appreciated.

    Generally, in most of the descriptors(web.xml, ejb-jar.xml, weblogic.xml
    etc) the iterative element values are related by AND. Same is true for
    "role-name". Both roles "Master" & "Supervisor" will be allowed access to
    testMethod.
    - Santanu
    BEA Systems.
    "sanjay" <[email protected]> wrote in message
    news:3ecbac80$[email protected]..
    >
    Hi,
    Need understanding, whether <role-name> here is an "AND" or "OR" i.e toexecute
    the method
    testmethod, the user has to be in both the roles or any one of the role.(Roles
    are mapped
    to groups in weblogic-ejb-jar.xml).
    <method-permission>
    <role-name>Master</role-name>
    <role-name>Supervisor</role-name>
    <method>
    <ejb-name>TEST</ejb-name>
    <method-name>testMethod</method-name>
    </method>
    </method-permission>
    An early response will be appreciated.

  • Configuring the iPhone and your environment for wireless corporate email

    I'm posting this as a top level thread, because I'm certain that there are others out there, who like me, are trying to figure this out.
    Configuring the iPhone for Enterprise Use
    With Apple’s release of the iPhone, IT organizations are presented with an interesting challenge. Senior execs, gadget heads, and technoratti are all flocking to this device, heralded as the be all and end all of smartphone telecommunications technology. As these devices begin to flood into our organizations, we are met with the challenge to ‘make it work’.
    After much explaining that the iPhone is not intended for Enterprise integration, and many discussions surrounding the technical feasibility of bringing said devices into the fold, and being the resident Mac and Linux head with an iPhone in hand, I decided to embark on the mission of making one ‘work’. I succeeded in part, however it’s not the kind of ‘work’ that is going to be viable for most end users.
    First of all, it’s important to understand that the email client for the iPhone is a modified version of Mac’s Mail program. Not the best client in the world, but it does support Exchange integration. It also does external email sources, such as Yahoo and gMail, very well. For my interest though, I’m focusing on the Exchange integration functionality, as that is just about everyone’s corporate standard.
    Bringing this task to fruition requires some understanding about the limitations of the iPhone, as well as some of its current quirks. Wireless802.11x, EDGE, VPN and Mail are all components necessary to provide a serviceable solution for mobile email access, and each of these things has some peculiarities that don’t appear to be fully worked out by Apple at this time.
    For instance, within my organization, we have a secured wireless connectivity option available within our building; however, the SSID of this network is not broadcast, for the obvious reasons. SO, connecting the iPhone to it is a manual process of defining the network, and automatic reconnection seems to be very hit or miss, so it becomes far less of an option for any form of direct network access to your Exchange environment. (As an example, I had to redefine that network, on the iPhone, at least half a dozen times during this process.)
    The other components have equally quirky issues, and I will discuss the how’s to get around them below.
    In coordinating this into a cohesive plan however, I will break this into three sections;
    1. Wireless and EDGE connectivity
    2. VPN access to your network
    3. Connecting to Exchange
    So, without further ado;
    Wireless and EDGE Connectivity
    The wireless capabilities of the iPhone are, on the surface at least, excellent. It connects seamlessly to unsecured networks, offers the option of prompted or unprompted automatic connectivity, and is capable of 802.11G performance. Not bad for such a small package. However, it is very limited in the forms of secure network access it supports. These are, to quote Apple’s website; (and my iPhone)
    WEP Password
    WEP hex or ASCII
    WPA (personal)
    WPA2 (personal)
    Now, due to the obvious security problems in implementing WEP security, it’s likely that any network you run into is going to be WPA or WPA2. The iPhone ONLY supports the personal versions of these protocols, so be aware of this going into the situation. If you’re not connecting to your work or school wireless, and you’re entering the information correctly, then it’s probably because they have the Enterprise version of one of the protocols enabled. If that is the case, then you’re either hunting for unsecured hotspots, or else depending on EDGE.
    In my case, I did have access to a WPA2 (Personal) enabled wireless signal to connect to my internal network. I thought my problem was half solved! I defined the connection, the wireless capability of the phone worked perfectly, and I was connected. I was wrong. Apparently, and judging from the Mac forums I’m not alone in this, the iPhone does not do a very good job of RE-connecting to a secured wireless network. It does an even worse job, when this is coupled with the fact that it doesn’t do a very good job reconnecting to a wireless network with an unpublished SSID.
    After much fiddling and research into this, I determined that this simply was not the way to go, and I abandoned the idea. I wasn’t about to compromise my network security in order to get this silly phone working! So, that left me with either unsecured WiFi, or EDGE.
    Either one of these connects pretty seamlessly, and gives me a relatively decent Internet connection. There are some issues being reported of the iPhone swapping between EDGE and WiFi for not apparent reason, but that said, it can still be made to work.
    Now that I had this connection outside of my network, I obviously had to consider options for getting a secured connection into my network, which of course leads us to;
    VPN Access Into Your Network
    Being that this device was touted as the ‘real internet’ I was very excited to see if I could achieve this connection through my SSL VPN appliance. To make a long story short, I could not. Because Apple’s idea of the ‘Real Internet’ apparently does not include those wacky concepts like Java support, this proved to be impossible. My Apple cohorts will scream that it does support JavaScript, but we all know that that and 2 bucks will get you a small coffee at Starbucks… and not much more.
    (The iPhone also does not support Flash, but that’s a topic for another conversation. I know, how could they leave that out? I’m amazed too, but then Steve Jobs always has been a bit too arrogant for his own good… I mean what does he expect, we’re all going to rewrite everything into QuickTime??? Please.)
    Since that option didn’t work, I was left with the wide selection of two possibilities provided within the iPhone software. Either, a PPTP or L2TP VPN tunnel.
    We went ahead and configured a PPTP connection on one of our Cisco routers in order to test this. It didn’t work. I couldn’t connect to it. Tried and tried. Nada. SOOOO, we said OK, and configured a L2TP connection on one of our Cisco routers, with similar results.
    Figuring that this was something in the config, we called Cisco, and did the technical support dance with them for several days, trying one thing after another to get this connection to actually work. Nothing helped, and it never worked using either protocol. Then, I noticed an obscure article somewhere on some website that said something to the effect that getting one of these tunnels to work from the iPhone to Cisco was nigh on impossible.
    About the same time, my senior network guy said screw it, let’s put this on a Microsoft server. And so we did. Now, this is interesting in it’s own right, because configuring out of the box L2TP or PPTP on a Microsoft server results in a default authentication method of Windows Authentication. This does not work for the iPhone, because it has no idea what to do with the Windows security token it receives. So, you authenticate, and then are immediately dropped due to an inability to communicate with the PPP server.
    Fortunately, we (as do most organizations) have a Radius server. We selected Radius authentication, configured both sides of the Radius authentication setup properly, and launched the PPTP tunnel…. AND…. EUREKA!!! The iPhone’s VPN software connected, authenticated, got an IP, and I was on the network! Well, no.
    After about 2 seconds, I realized that while I did indeed have a connection, I couldn’t do anything with it. Couldn’t even browse to an internal site via IP address. The connection was up, the connection was working, the connection was useless.
    So, we decided to give L2TP a shot. Configured it pretty much identically to the PPTP setup, used Radius, launched the iPhone client, and finally, after many days of screwing around, it worked. Now all I needed was to get my email working, so I started working on;
    Connecting to Exchange
    In the Mail program on the iPhone, the first time you launch it, you’re presented with the ability to configure an email source. However on subsequent or additional accounts, you must go under Settings, Mail to get to this functionality.
    Going into the Mail configuration, I selected an additional account, the account type is, of course, Exchange. The configuration components are pretty obvious, however some things of note are;
    Do NOT include your domain information in the User Name field
    For all Host Names, use the fully qualified domain name of the server, or else IP
    You WILL need to have SMTP enabled somewhere in order to send email
    Anyway, I set all this up, and nothing happened. It said that my server was not responding. Did a little research, and it turns out that the only way to connect to Exchange is through an IMAP4 connection, and just in case you didn’t know, IMAP4 is disabled by default, so you have to enable and configure it.
    Went onto the Exchange server, set the service to Auto, Started the listener, and finally, at long last, EUREKA! I finally had Corporate email on my iPhone, connecting securely, and not sending anything plain text anywhere. Hooray!
    Now for the problems with this solution;
    First of all, it depends upon VPN access into your environment, something that you may or may not be comfortable with. One good thing is that the iPhone does prompt for password to reconnect, and will tie the continuity of the VPN connection into the general phone lock security, such that an inability to provide the appropriate access code to a locked phone results in the VPN not being accessible.
    The VPN of course is dependant upon a reliable network connection. I’ve noticed that it’s somewhat graceful in switching between WiFi and EDGE, however it’s not totally graceful, and you can experience some hinky things, like being able to send and not receive, or the mail client saying ‘Connecting’ for about 5 minutes before it figures things out.
    The best cure for this is to simply stop and restart the VPN connection. Note that when you reconnect, the first attempt will prompt you for a numeric password, this is meaningless unless you have the device lock turned on. Just enter anything. (I think this is another bug) THEN it will re-prompt you for your real VPN password.
    This solution for email delivery is obviously dependant upon the VPN connection being active. I’ve noticed that at times the iPhone will disconnect the VPN (probably when service switching) and not bother to mention it. When that happens, of course the VPN must be restarted.
    For the lazy, this is an inconvenient solution because while it would appear that the iPhone will cache the VPN password, in fact it will not. That means that each re-launch requires that you re-enter your password. Not terrible for me, but I could see it being very tedious for the average corporate user.
    The OSX Mail client has several little deficiencies, which may or may not impact your use of the device in this manner. For instance, if you have subfolders defined for your inbox, and server side rules to move mail into them, then you will not see any synchronization of that mail until you actually select the subfolder. Also, since there is such poor management of attachments and downloads, moving anything around via email on this device is nigh on impossible.
    EDGE access to your corporate email, via a VPN, is a bit sloooooow. It works, it’s certainly fast enough for my purposes, but it’s not the slick quick access that we’ve all become accustomed to with Blackberry and Good devices. The lack of 3G support becomes a very noticeable shortcoming here.
    (Why Apply didn’t simply partner with Good Technologies to crank out a client for this thing, I’ll never understand, but I guess you can refer to my comment above about certain people’s arrogance.)
    The biggest problem of all of course is that it’s simply klugey. I hate klugey. But, with the capabilities at this device’s disposal, and given Apple’s ambitious, if a bit idiotic, stance that no third party will develop software for the iPhone, then this is about as good as it’s going to get for now.
    It is my understanding that overseas there is some initiative underway to provide a more seamless Visto or Synchronica integration for enterprise email. However, given Apple’s unbelievably restrictive agreement with ATT regarding this device and the OTA necessity of delivering the client, I seriously doubt if we’ll see this in the near future in the US.
    But I digress, so…
    In Conclusion
    This solution is not for the faint of heart, it doesn’t work all that well, and it has way too many moving parts that are subject to failure. However, I would say that this solution is serviceable for the corporate technology professional who needs email, and really, REALLY wants the other features of the iPhone. (ie, phone whores such as me.) It requires patience, it requires an understanding that this is not a 100% thing, and there definitely needs to be a prebuilt expectation that this device will not serve your email in anything approaching the manner to which you’ve become accustomed.
    As long as all of that is okay though, then go right ahead, set it up, and enjoy!
    The Short Version;
    (I put this at the end because I want everyone to feel my pain!)
    Wireless:
    Use unsecured wireless or EDGE. Secured wireless may be serviceable as long as the SSID is broadcast, but there are known issues with this.
    VPN:
    L2TP, shared secret, running on Microsoft server, with Radius. (May work elsewhere, but doesn’t seem to run on Cisco at all) Accounts enabled for external access.
    Exchange:
    Configure IMAP4 Virtual Server on your Exchange environment, ensure that you have some SMTP resource for outbound email, use fully qualified domain names for all servers (or IP) in the mail config and do not include any domain prefix or suffix for user accounts.
    The BIG Disclaimer at the End
    Please note that all of this is provided ‘as is’. It worked for me, and I hope it works for you. To my knowledge, it’s not endorsed by Apple, and I’m not in the business of providing support for this thing. If it breaks something, if it doesn’t work, or if you simply don’t like it or me, I don’t care. However, if you have a question, and I’m not busy, and I feel like answering, I may lend a hand. You can email me at
    Matthew dot Yotko at mac dot com
    Don’t be surprised or offended if I don’t answer. Also, understand that I don’t check this address every day… Maybe a couple times a week.
    Macbook Pro   Mac OS X (10.4.10)   iphone

    Thanks, now I understand why the wifi keeps dropping. On my personal wireless network, it also seems the distance from the access point is not good compared to my laptop. At work our network & exchange teams don't seem to have the desire to struggle with this "toy" until customers start forcing its adoption. I am using OWA and it works fine over EDGE. I will share your posting with them.
    Thank you again.
    Dell   Windows XP Pro

  • Roles and Authorization strategy for SAP BIBO

    Hello All,
    We are doing an implementation where Source is a Oracle, SAP BI warehouse and BO XI3.1 as reporting solution.
    Our customer has asked for the authorization strategy that will be implemented in SAP BI. Currently the users belong to different companies or plants or countries
    Current structure is like,
    User 1 belongs to Plant1 of Country1
    User 2 belongs to Plant2 of Country2
    user 3 belongs to Plant3 of Country1 etc..     
    We have more than 500 users who will use the reports. The user belonging to a particular plant should only see the plant data/Country data he belongs to.
    As I understand, we need to create the roles in BW and these roles to be imported into BO to use for the row and column level security.
    The options we considered are,
    1. Use Bex queries in BW to with ABAP code in CMOD to identify the user belongs to Plant  1, 2 or 3 and provide necessary authorizations.
    2. Create user groups based on the country or company they belong to and create as many roles as required. This will however impact the maintenance of so many roles in the BI system.
    We are also forced to avoid Bex queries in BW and hence,  trying to connect Multiproviders directly in BO universe.
    How should we go forward in designing the authorization concept? Any better ideas?
    Thanks and Regards,
    Srinivas

    There are two ways which we can implement this kind of authorization based on my knowledge.
    1. Data Security purely at BW
    If the data is secured based on roles and users, there is no  need of additional authorization from BO side except at report and folder level if you go for SAP Authentication.
    Once you use SAP authenication and enable single sign on option in universe connection, the SAP users can access data based on their profile set at BW.
    2. Data Security from BO
    Let's assume that, if nothing is set at BW and every thing to be take care from BO.
    Then you could create one multiple provider for each plant / country. Create one connection for each multiprovider
    Create restrictions (Tools--> Manage Access Restrictions) for each plant/country. There you can change connection names.
    So you would need to create many restrictions for different permutations and combinations.
    I never tries this option with Multiprovider. But It worked well with NON-SAP data.
    Hope this helps!
    Regards
    Gowtham

  • security-role and auth-constraint

    Hi Everybody,
    I want to know the relation between the <role-name> tags defined under <security-role> tag and the <auth-constraint> tag (defined for web-resource-collection).
    Assuming that tomcat is being used, should the <role-name> of <security-role> map to a role defined for tomcat and then the <role-name> of <auth-constraint> map to the <role-name> of <security-role>.
    Or how does it all work ? How are these two <role-name> tags related ?
    Thanks in advance for your time.
    Vikas

    in <security-role> you define the roles, in <auth-contraint> you tell which role is allowed to use the protected resource

  • Need Users and ACL permission for KM Reports

    Hello Experts,
    Need you help for one requirement , in which i need to provide a list of users with ACL permission of each report from KM. There is huge amount of reports so it is quite time consuming to get each report open & to check the ACL and user from KM.
    It there is any thing , so that i can get the list of user with the ACL permission for each reports?
    Any help will be appreciated with points.
    Regards
    AK

    Hi AK,
        I misunderstood your query,if you just want to check the permission of all reports then you can use the default permission report available in the content Administration->KM Content->toolbox->reports->permission report.
    http://help.sap.com/saphelp_nw04/helpdata/en/fe/5290412facac5fe10000000a1550b0/frameset.htm
    If you could not find the report contact basis team to do the configuration
    http://help.sap.com/saphelp_nw04/helpdata/en/07/dad131443b314988eeece94506f861/frameset.htm
    Naga

  • Configuration of zprintprogram and z script for F-58

    hi
    i have created zprintprogram and z script for F-58
    then how i can configure this
    regards

    Hi ,
    check in SPRO
    search for Payment method in SPRO , or check table  T042Z
    regards
    Prabhu

  • Configuration in Solman and Satellite system for Support message creation ?

    Hi ,
    I want to send a support message to solman from the ( help menu -> create support message )
    of my satellite system.
    any one tell me the settings that i have to make in both the sattelite system and the solman  for sending a support message.

    Hi,
    the necessary steps are described in Solution Manager IMG documentation.
    Also you can find that information in the web blogs in this forum.
    In a nutshell:
    - activate Service Desk in Solution Manager (incl. BC-Sets)
    - maintain System Landscape, RFCs and iBase
    - create key users (business partners)
    - maintain number ranges
    - assign roles
    - maintain table BCOS_CUST in satellite system
    You should just follow the corresponding customizing steps in tx: SPRO.
    /cheers

Maybe you are looking for

  • How to use macro's functionality in a programe...?

    hi, i am siva, i am new to abap, i am not having clarity on how to use macro in a programe, please send me any source code of a programe which contain functionality of macros..? and explain functionality of macros...? i any of u know answer.. please

  • Budget Control for Balance Sheet Accounts

    Hi All, How can we manage budgets for Balance sheet Accounts such as Fixed Assets, IT Infrastructure, Capital Work in progress etc., Thanks, Srikanth

  • C510 prints blank pages.

    brand new printer and cartridges which did work but not now. can hear the cartridges doing their job but no ink on the paper

  • 1/n Fractional octave VI

    Using the 1/n Fractional Octave Vi. The user manual says the averaging is continuous for exponentional averaging. It seems to be continuous no matter what the setting is, linear, peak, etc. Trying to get it to stop averaging so I can write the data t

  • IDS Sensor 4.1 doesn't capture events.

    My IDS Sensor 4.1 stops capturing events after some time. I don't know if maybe it is because there are a lot of VLANs in SPAN and the IDS doesn't support all this traffic. Am i wrong? Here is the show ver output:> # sh ver Application Partition: Cis