Need info regarding Oracle UCM Accounts and Security Groups behaviour

Need information regarding Oracle UCM Accounts and Security Groups behaviour.
Oracle UCM version: 11.1.1.5.0
Steps:
1. Log in with "weblogic" user and created a content with id "content1"
2. Applied "@acc1(R)" and "TestGroup1" to the cotent created in step 1
3. Log out
4. Log in as "acc1user1", the user is not able to see the "content1"
5. Log out
6. Log in as "role1user1", the user is not able to see the "content1"
Account and Group information:
1. User "acc1user1" is part of "@acc1(R)"
2. User "role1user1" is part of "role1(R)" and is mapped to "TestGroup1" in UCM
Expected:
Both "acc1user1" and "role1user1" should be able to see "content1" as they have at least Read permission.
Please help me understand why the users are not able to see the content.

ACLs, like Accounts, are optional security setting which may add on some extra functionality to mandatory security groups. Likewise, the resulting permission is taken as an intersection of SG and ACLs.
But in the second part the number of set of users is huge (approx say 600)I don't get this completely. Does this mean that those "sets of users" (users who see the same data) are distinct and that there is 600 of such groups?
If you read thoroughly the manual I sent earlier, there is a recommendation that there should be maximum 50 security groups, and you should use accounts, should this number be exceeded. This means you could have all the documents in one security group (and have one common role with Read permission), but combine it with accounts. ACLs are not a good choice here - their performance and manageability is much worse than of accounts. ACLs are primarily used if you expect security settings to change during the lifetime (e.g. a project manager adds temporarily rights to access an item to another user, and revokes it when the user finishes his or her work).
Note that accounts as well as permissions of users within accounts can also be mapped externally (from LDAP/AD) and it usually follows some kind of org chart.
I'd feel more comfortable not to speak about users, security groups, roles, etc., but about some real-life objects and scenarios.

Similar Messages

  • Is there any way to access my old my verizon account to retrieve old text messages from my own old account from 8 months ago?  I am getting a divorce and I need info off of that account for my hearing to prove what he did.

    Is there any way to access my old my Verizon account to retrieve old text messages from my own old account from 8 months ago?  I am getting a divorce and I need info off of that account for my hearing to prove what he did.

    What do you mean by "when I brought the messages up back in March"?
    Were the messages on your phone? Simply because messages are on your phone does not mean they are still on Verizon's servers. You use internal phone memory to store messages on your phone. The messages do not stay on Verizon's servers until you delete them from your phone.
    On the other hand, if you still have your phone and have not reset it since you stopped using it, the texts may still be on your phone. Good luck.

  • How do I move all my files from one User Profile (account) into another? I needed to create a new account and want all of my files accessible in the new one.

    How do I move all my files from one User Profile (account) into another?
    I needed to create a new account and want all of my files accessible in the new one.

    ok, what you're learning right now is 101 unix, which is good. Unix is a good thing
    now: the way unix works, and macos (which uses unix underneath) the files and folders work like a hierarchy.
    the start of that tree is /
    so, if you were to do:
    cd /
    (cd means change directory)
    it will bring you at the highest branch of the file system.
    cd /Users
    will bring you to where all the users are.
    to see whats in /Users you can use your friend ls command
    ls means list files/directories
    so:
    cd /Users
    ls -la
    (the -la here means show all (even hidden) and long format (very verbose))  this flag is very optional.
    you will see
    fred
    user2
    for example.
    if you want to see the desktop of user2 you would change directory to it then list the files.
    for example:
    cd /Users/user2/Desktop
    Note that the files and directory are case sensitive, so, desktop is NOT the same as Desktop, or DESKTOP
    ls -la
    you should then be able to see everything in users2 desktop
    you could have done as well the same thing in smaller steps, for example:
    cd /
    cd Users
    cd user2
    cd Desktop
    this is the equivalent of cd /Users/user2/Desktop
    So, for your file, i don't know where it was, but know that if you log in as user2, it will directly put you in
    /Users/user2
    which most likely the file you had created from the other user was in /Users/user1
    if you copied all the files from /Users/original_user to /Users/secondUser
    most likely yes, all your mail, bookmarks etc would be copied over.
    so in your case.
    sudo chown -R seconduser:staff /Users/secondUser
    should work
    Remember that if you start a path with the character /  it means start from the root of the file system, at the highest top you can ever get.
    so
    cd /Users/fred
    is not the same as
    cd Users/fred
    unless you were in / already
    i know it may be confusing at first but it's actually very logical if you play with it.
    to simplify, think of it that / means C:\  on windows
    you can't go any higher than C:\  (in a way)
    if you're unsure which directory you're currently in, you can always type:
    pwd
    it will tell you where you are.
    for example:
    cd /
    pwd
    this shows  /
    cd Users
    pwd
    this now shows /Users
    cd /System/Library
    pwd will show /System/Library
    cd /
    cd /Users
    cd fred
    cd Library
    pwd will show /Users/fred/Library
    unix can look very scary but it's actually vital and very necessary to do tasks sometimes that would take for ever to do via the windows. This is good learning.
    so for the myfile you had created, i can't tell you where it is, at the time you created, if you can do a pwd command you'll know the path,
    ls -la  (this shows all the files where you are)
    if you see myfile in the list
    do a pwd
    whatever is return, the real location of the file would be:
    whatever pwd returned / myfile
    I hope that makes sense.

  • Hi everyone. i need to delete me itunes account and start a new one. this is get old pics, msg's etc of my old broken phone. anyone got a step by step ?

    hi everyone. i need to delete my itunes account and start a new one. i dropped my old phone and bought a new one as i could here finger tap noises but couldn't see anything. anyone have a step by step guide to deleting the account ?

    Why do you think you need to delete your iTunes account? Why don't you want to use it for the new phone?

  • Grant access to help desk users to add members to distribution and security groups

    Hello,
    I am trying to create a set of help desk users that has full access to add or remove members from distribution and security groups as well as update users.  We want it to bypass owner approval and essentially allow this group to add or remove members
    in the FIM Portal and flow it down to ADS.
    This obviously works fine if one is a member of the Administrators set, but we want a second tier of power users with limitied rights compared to FIM Admins.  We have added the help desk team to the  Security Group Users and Group Users set as
    well as MPR "Security group management: Users can read selected attributes of group resources".
    The help desk users can update users in the Portal with no issue.  The can search groups with no issue but when they try to add members to a group they get the error "Access Denied".
    Any help is greatly appreciated.
    Thanks!

    I'm having very similar problem - I have users with delegated right to modify group membership only. User can add someone to group and it works fine, but when the same user is trying to remove and user from a group (even if this is the same user
    which was added a minute ago) he gets Access Denied:
    The
    request included members which the requestor is not authorized
    to add and/or remove from this group."
    It is caused by default MPR:
    Group management workflow: Validate requestor on remove member
    Question is how this activity validates this request - any insight?

  • How to export "Managed by" field of Distribution and Security groups and import with new values? (Exchange 2010, AD 2003)

    My Active Directory environment is 2003 functional level and we have Exchange 2010.
    I am trying to find out the best way to do a mass edit for the "Managed by" values of our security and distribution groups.
    I know we can export the "managed by" field by csvde but I am not sure this is the correct way to do it. Also in the case that there are multiple users assigned to be managing a distribution group it only shows one value. Also powershell from Exchange
    2010 can be used with "get-distribution" but as our AD environment is 2003 is this correct also?
    Finally once the data is exported to csv can it be edited to then reimport and udpate the existing group managed by fields with new values?
    Not really sure that the best way to go about this is.
    Summary - We have 2003 AD with Exchange 2010 and I am trying to export a list of all our Distribution/Security groups showing the group name and managedby values so we can edit and update the
    existing managedby values with new ones. In some cases we have multiple users as the owners.
    Appreciate any advice on how this can be best achieved. Thank you.

    Hi,
    We can use the following command in Exchange 2010 to export "Managed by" field of Distribution and Security groups:
    Get-DistributionGroup | Select-object Name,@{label="ManagedBy";expression={[string]::join(“;”,$_.managedby)}},Primarysmtpaddress | Export-Csv
    C:\export.csv
    After you changed the Managed by field in export.csv and saved it as a new file named import.csv, we can run the following command to set with new value:
    Import-Csv C:\import.csv | Foreach-Object{ Set-DistributionGroup –Identity $_.Name –ManagedBy $_.ManagedBy}
    Hope it works.
    Thanks,
    Winnie Liang
    TechNet Community Support

  • Need info regarding disk packs

    Greetings.
    There is a need to maintain different dev/production configurations (for different
    customers or different software releases) on the same Sun system (for
    example T5120/T5220 or similar) and have the ability to switch to a
    particular configuration. I came to know that there is something
    called "disk packs" available from Sun which is cluster of disks and
    we can selectively deploy multiple OS/Configs in one of more disks
    and activate the desired configuration whenever there is a need.
    Would you be please able to provide if you have any information in
    this regard or suggest us what solution would work best for this usecase.
    Thanks
    Anand

    ACLs, like Accounts, are optional security setting which may add on some extra functionality to mandatory security groups. Likewise, the resulting permission is taken as an intersection of SG and ACLs.
    But in the second part the number of set of users is huge (approx say 600)I don't get this completely. Does this mean that those "sets of users" (users who see the same data) are distinct and that there is 600 of such groups?
    If you read thoroughly the manual I sent earlier, there is a recommendation that there should be maximum 50 security groups, and you should use accounts, should this number be exceeded. This means you could have all the documents in one security group (and have one common role with Read permission), but combine it with accounts. ACLs are not a good choice here - their performance and manageability is much worse than of accounts. ACLs are primarily used if you expect security settings to change during the lifetime (e.g. a project manager adds temporarily rights to access an item to another user, and revokes it when the user finishes his or her work).
    Note that accounts as well as permissions of users within accounts can also be mapped externally (from LDAP/AD) and it usually follows some kind of org chart.
    I'd feel more comfortable not to speak about users, security groups, roles, etc., but about some real-life objects and scenarios.

  • Oracle Xellerate - Account and Password Expiry

    Hi All,
    I needed a quick help on how would Oracle Xellerate Identity Provisioning enforce account and password expiration policies. Please suggest me some good supporting links.
    Thanks and Regards
    Aditi

    You should be able to get this information from the Xellerate product documentation which gets created when you install the product.
    Thanks,
    Prashant

  • Oracle UCM 10gr3 and webcenter 11g, WCM Portlets

    Hi,
    I have installed Oracle UCM 10gR3, Site Studio 10gR4 and Webcenter 11g. Now my problem is how to get the WYSIWIG (WCM Portlet) created in UCM to be retrieved in webcenter spaces.
    My understanding after reading some articles is the only way i can communicate is through WSRP (CIS and CPS), if that is the case can u suggest what is the difference between them and which one is best one for a Intranet Application. Please also provide the example for the portlet and the steps to install them locally.
    i not asking to give all the answers at a time. Just share bit by bit even if u have some knowledge.
    Thanks,
    Pradeep.
    I am a Newbie!!!

    Hey Pradeep,
    You have lots of options for retrieving content from UCM in WebCenter besides CIS and by extension CPS. The best article on the subject can be found here (if you haven't already read it): http://blogs.oracle.com/fusionecm/2010/04/oracle_ucm_integration_with_we.html
    To more directly answer your questions the difference between CIS and CPS is that CIS is the lower level API that actually does the communication with UCM. It serializes your request across the socket and handles the response data that comes back packaging it up as easy to use objects. CPS leverages CIS as its backend to allow the portlets to communicate with UCM.
    For an intranet application you have lots of options. For document management I would recommend a combination of the Document Library taskflow along with a couple of the CPS portlets (my workflow assignments, etc). To retrieve content to display as part of an intranet "site" I would leverage the Content Presenter taskflow.
    If the content to be retrieved is Site Studio 10gr4 assets I would instead recommend that you roll your own simple content portlets. That is what we ended up doing at Fishbowl and have reused them to great affect implementing several intranet portals for different customers in a very short amount of time. More info here: http://www.fishbowlsolutions.com/StellentSolutions/OracleUCMStellentConsultingServices/Categories/OracleUCMStellentPortalTechnologies/index.htm
    Hope that helps,
    Andy Weaver - Senior Software Consultant
    Fishbowl Solutions < http://www.fishbowlsolutions.com?WT.mc_id=L_Oracle_Consulting_amw_OTN_WCF >

  • Need info regarding reducing Idocs

    Hi,
    Iam exteding ORDERS05 to ZORDERS05.
    I need to remove segment E1EDS01 from this ZORDERS05.
    i tried to reduce using BD53 tcode but it asks for reference message type and throws message saying not available in reduction pool.
    pls sugest

    ACLs, like Accounts, are optional security setting which may add on some extra functionality to mandatory security groups. Likewise, the resulting permission is taken as an intersection of SG and ACLs.
    But in the second part the number of set of users is huge (approx say 600)I don't get this completely. Does this mean that those "sets of users" (users who see the same data) are distinct and that there is 600 of such groups?
    If you read thoroughly the manual I sent earlier, there is a recommendation that there should be maximum 50 security groups, and you should use accounts, should this number be exceeded. This means you could have all the documents in one security group (and have one common role with Read permission), but combine it with accounts. ACLs are not a good choice here - their performance and manageability is much worse than of accounts. ACLs are primarily used if you expect security settings to change during the lifetime (e.g. a project manager adds temporarily rights to access an item to another user, and revokes it when the user finishes his or her work).
    Note that accounts as well as permissions of users within accounts can also be mapped externally (from LDAP/AD) and it usually follows some kind of org chart.
    I'd feel more comfortable not to speak about users, security groups, roles, etc., but about some real-life objects and scenarios.

  • Need info regarding Crash

    I have few questions regarding Siebel Crash. Some might be silly but still wanted to have some insight !!
    Whenever there is a crash during some user transaction in UI,
    1. Is there a possibility FDR and Crash.txt is generated but NO Component Log file is generated???
    2. All the crash related entities - enterprise log file, core dump files, component log files, FDRs, crash.txt will be created ALWAYS???
    3. Which can be used to trace the USER ID/LOGIN ID for which crash occurred???
    Regards,
    John Wesly J.

    ACLs, like Accounts, are optional security setting which may add on some extra functionality to mandatory security groups. Likewise, the resulting permission is taken as an intersection of SG and ACLs.
    But in the second part the number of set of users is huge (approx say 600)I don't get this completely. Does this mean that those "sets of users" (users who see the same data) are distinct and that there is 600 of such groups?
    If you read thoroughly the manual I sent earlier, there is a recommendation that there should be maximum 50 security groups, and you should use accounts, should this number be exceeded. This means you could have all the documents in one security group (and have one common role with Read permission), but combine it with accounts. ACLs are not a good choice here - their performance and manageability is much worse than of accounts. ACLs are primarily used if you expect security settings to change during the lifetime (e.g. a project manager adds temporarily rights to access an item to another user, and revokes it when the user finishes his or her work).
    Note that accounts as well as permissions of users within accounts can also be mapped externally (from LDAP/AD) and it usually follows some kind of org chart.
    I'd feel more comfortable not to speak about users, security groups, roles, etc., but about some real-life objects and scenarios.

  • We need to delete some student accounts and then have them rejoin. How do we do this?

    After signing up, we realized that our students had to get a confirmation email. And we don't allow them to receive external email. So after allowing it, we need to delete their accounts and start over. How do we delete the account?

    The answer is not simple. First, are these images in the Camera Roll or the Photos app? Next, do you have Photo Stream enabled? Also, do you back up your phone to your computer or to iCloud, or to both?
    If you have Photo Stream enabled then the images have already been distributed to anyone who is subscribed. Nothing that I can think of that you can do about that. The rest of this post assumes that Photo Stream was never turned on.
    If the images are in your Camera Roll you can delete them from the Camera app. The won't go anywhere, however, they will still be in your backups.
    If you back up to your computer using iTunes you can go to iTunes Preferences, Devices tab, and delete your backups. After deleting all of them, and also after you have deleted the images from the Camera Roll, do a new backup.
    After deleting the backups do a Secure Delete of deleted files on your computer. On a Mac you can do this with Disk Utility; have it erase deleted files. On Windows you need to get a 3rd party "shredder" app.
    If you back up to iCloud on the phone go to Settings/iCloud - Storage & backup - Manage Storage. Tap on each backup and delete it.
    If you have photos in the Photos app that are NOT in the Camera Roll album you need to connect your phone to iTunes, click on the Photos tab, uncheck all of them that you don't want (or uncheck Sync Photos if you want all of them gone), then sync.
    Then repeat all of the steps above.

  • Info required : Oracle Clusterware 11g and Veritas (SFRAC) storage

    Hello,
    One of my requirement is to Install Oracle clusterware 11g on top of Veritas Cluster. That is because we are using Veritas Storage.
    OS : Solaris 10
    Please share any iinformation on this regard.
    Thanks,
    Kam

    Hi Kamalesh,
    thanks, sorry, if I was not clear enough in my answer.
    The reason, I pointed you to the Veritas documentation, was to say that IF there is a certain patch to be applied dependent of the Veritas SFRAC version you use, either for Oracle or for Veritas, this should be described in the Veritas documentation (as well as the respective certification note(s) provided in My Oracle Support -> Certification, as you can only use a certified combination of SFRAC and Oracle RAC on the same system). The Veritas documentation will also describe the installation and configuration of the stack.
    The main issues I have seen with such systems is mainly the configuration: The Veritas SFRAC and Oracle Clusterware need to integrate (the skgxn is the point of integration), which would result in a default misscount for Oracle Clusterware of 600 seconds (instead of the typical 30 seconds in an Oracle Only Stack). You can check the misscount and skgxn used in the cssd log. It will mention so during startup.
    If the installation of the two cluster solutions is performed the right way (as described in the documentation linked), then this integration will happen during the installation of Oracle Clusterware, which is important, as it is very hard to enable it later and you will most likely have to re-install Oracle Clusterware. So, preparation is important here.
    Once you installed the stack, you should be fine regarding patches, as Oracle would recommend the same patches for such a stack as for any other. Veritas might have additional recommendations, though. The same applies when thinking about rolling patches. Those are probably not possible due to dependencies on the underlying vendor cluster solution in such cases (exceptions might apply and you need to ask Veritas). Oracle Clusterware and the rest of the stack would remain to be rolling upgradeable as documented for cases, in which no vendor cluster is used.
    As you can see, running such a configuration is more complex. You need to think about two layers and you need to ask two vendors any time you are in doubt of a procedure to be sure again. This may influence the stability of the system. Commonwealth Bank of Australia therefore decided 3 years ago to move away from having Veritas as the underlying cluster solution under Oracle Clusterware and use the Oracle Only Stack.
    Now, I know that you have the necessity to use Veritas due to the storage management and other Oracle customers made this point before. However, with Oracle Grid Infrastructure 11g Rel. 2 and the newly introduced ACFS cluster file system, more and more of them realize that Veritas does not provide them with enough benefits to not only pay for something that does not even make the stack easier.
    Hope that helps (this time) - at least a bit. Thanks,
    Markus

  • HT4436 How can I change my Icloud account's name? Do I need to delete the old account and create a new one? And all this without loosing my data...

    I want to create a new email address/additional cloud account and move all my data to the new acccount. How can I do it?

    Go to Settings>iCloud and turn all data that is syncing with iCloud (contacts, calendars, etc.) to Off.  When prompted choose to keep the data on the iPhone.  After everything is turned off, scroll to the bottom and tap Delete Account.  Next, set up a new iCloud account using a different Apple ID and turn iCloud data syncing for contacts, etc. back to On.  When prompted, choose Merge.  This will upload the data to this new account.
    This will not move your photo stream, however.  If you have photos in photo stream that you haven't backed up anywhere else you will need to save these before deleting the account.  If your computer is syncing with your iCloud account, your can photo stream photos directly to your computer.  If not, open your photo stream album on your iPhone in the thumbnail view, tap Edit, tap all the photos to select them, tap the share arrow button, then tap Save to Camera Roll.  Once in the camera roll you can import them to your computer.

  • NEED INFO REGARDING WORKFLOW MAILER &MAPI

    HI,
    Need information
    our workflow mailer is configured with LOTUS NOTES now we wanna to
    move to OUTLOOK and we use IMAP4 protocol now we wanna to
    replace this with MAPI.
    So please let me know how to configure in OUTLOOK and also
    MAPI is a oracle certificated protocol and how to configure it.
    Thanks in Advance,
    Vandana

    Please see these docs.
    What Mail Server Types Can Be Used To Configure The Workflow Java Mailer In R11i and R12.+ [ID 943578.1]
    A System Administrators' Guide: Oracle Applications 11i Workflow [ID 139745.1]
    WF 2.x: Configuring the Notification Mailer v 2.0.3 - 2.6.2 (not OAM) - MAPI [ID 104197.1]
    Thanks,
    Hussein

Maybe you are looking for