Adobe with User Access Control

I am trying to watch videos which use Flash Player and they
will play if I turn off my User Access Control however, as soon as
I turn it back on, the videos will not play; I do not want to keep
my User Access Control off - is there some solution to this? I was
able to use flash before without turning this off but I could not
tell you what happened other than I added Adobe Reader (registered
version) and an update to my computer.

quote:
Originally posted by:
brohdaw
I am trying to watch videos which use Flash Player and they
will play if I turn off my User Access Control however, as soon as
I turn it back on, the videos will not play; I do not want to keep
my User Access Control off - is there some solution to this? I was
able to use flash before without turning this off but I could not
tell you what happened other than I added Adobe Reader (registered
version) and an update to my computer.
Okay, I followed the steps for another posting...
http://www.adobe.com/cfusion/webforums/forum/messageview.cfm?forumid=15&catid=194&threadid =1415087&enterthread=y
However, this did not help the problem; I did everything
exactly the way it appears on these instructions however, one part
I had to do differently - where it states to place the
reset_fp10.cmd I also received an administrator error
message:
eExtracting to "C:\Program Files\Windows Resource Kits\Tools\"
Use Path: yes Overlay Files: no
Error: Access is denied.
Cannot create C:\Program Files\Windows Resource
Kits\Tools\reset_fp10.cmd.
Administrative privileges may be required
Therefore, I saved this file to documents and then moved it
to the C:\Program Files\Windows Resource Kits\Tools\ folder.
Everything else followed just the way the details explained they
would so I figured it should have worked.
My main thing is, this is my laptop and I'm the only user so
I should have Admin. privileges without any of this to begin with!
I check my user settings and it is set at "Administrator
Privileges." This is making no sense; I have had this computer
three years and I went through this one other time but I cannot
remember how I fixed it - this time I am being wise and saving
everything in a note however, that's only going to help if I ever
get this issue fixed.
Can anyone help?
also feel free to contact me by an alternate (but checked
more frequently)
[email protected]
Thank you,
Kerri

Similar Messages

  • File structure and Multi-user access/control

    Hi All
    Currently evaluating RH. Our plan is to use RH HTML with RoboServer and either SourceSafe or Team Foundation for source control. We will be producing the "printed" manual (PDF) and publishing online help (hopefully html via RH server) from the single source layout
    Given that we will edit content in RH's XHTML editor, I'm not clear on when we should create new files or the granularity of multi-user access. We have 17 apps and I plan to use a master project and merging (because we need to link to related topics in other apps).
    I'm really not sure what should constitute a file in RH. First off, is access controlled at the file level?
    I want to have multiple authors editing the same manual at the same time, so do I need to break the manual into multiple small files (currently it's a single word doc)?
    If I do break it into multiple files, what's the best approach: 1 file per topic (or is this a requirement)?
    Finally, when I come to generate the PDF, will the files be combined. (i.e. can I have different page-breaks than I have in the RH project)?
    Any pointers greatly appreciated
    Regards
    Mark

    Hi,
    First off, is access controlled at the file level?
    Not sure what you mean by that. In source control, you can check in/out ever file independent. Sometimes dependent files will be automatically checked out, for instance images used in the css when you check out the style sheet.
    I want to have multiple authors editing the same manual at the same time, so do I need to break the manual into multiple small files (currently it's a single word doc)?
    That be the idea. Anyway, it's not a good idea to have an entire RoboHelp project in a single topic. You probably want to cut up your contents into the small chunck: topics.
    If I do break it into multiple files, what's the best approach: 1 file per topic (or is this a requirement)?
    In RoboHelp a topic is a HTML file. RoboHelp doesn't force you to split up content into one or more topics. If you are creating help for the web, you want the information to be organized in relatively small chunck so users can quickly scan through it.
    Finally, when I come to generate the PDF, will the files be combined. (i.e. can I have different page-breaks than I have in the RH project)?
    Not sure what you mean by page breaks. As RoboHelp creates HTML files, there are no page breaks such as in paper manuals. When you create a PDF, you combine the topics you need into a single document.
    If a PDF is required for you, you may want to consider not using RoboHelp for your sources. A PDF created by RoboHelp is useful for internal use, but it never seems to get good enough to give to customers. Personally, when a PDF version of a manual is required, I create the manual in FrameMaker and link or import the book into RoboHelp. You can also link Word documents, so you may want to play around with that before deciding whether to use Word, RoboHelp or FrameMaker for your source.
    Greet,
    Willam

  • More than 1 user access control of vi via web browser

    Hi all,
    Currently I've a vi that need to share it with other PCs using web browser (eg: IE) I've tried using Web Publishing Tools and I noticed that only 1 pc at a time can grant access control of the vi. May I know is there any methods or other 3rd party software that could possibly able to give multiple PCs to control one vi simultaneously over the net using web browser? THANKS!!!...

    Hello,
    I’m not so sure that using VNC or remote desktop to have
    multiple users control LabVIEW is really in-line with our license policy.  I suppose if you built your program into an executable
    and had the VNC users access the exe program they wouldn't really be using the development
    environment so I suppose this would be ok…
    I found a tutorial which might help.  Check out: http://zone.ni.com/devzone/conceptd.nsf/webmain/bc79065d8b2e0d0886256c590072a454.
    Hopefully this will help out for now!  Let us know if you have questions-
    Travis M
    LabVIEW R&D
    National Instruments

  • Authenticate users & Access Control

    Hi All,
    (First apologies if this is not the correct forum)
    I'm hoping someone can give me a little help or advice on
    options available to me.
    Using flex2 I have built a fairly simple flash app that
    currrently has two panels,
    panel1- this presents data in a datagrid which connects to a
    mysql4.x db via amfphp1.9.
    panel2- this presents textinput boxes and a submit button
    (data is submited via php script to the myqsl db)
    NB: All my users authenticate via LDAP (novell edirectory)
    & there are two kinds of users (Teachers & Students)
    What I want to know is:
    1- can I allow my users to login to the flash app via their
    LDAP usernames? (if so how could I do this)
    2- can I assign different rights to the users? (e.g. When a
    teacher logs in they get access to view & input data, &
    when a student logs in the ONLY have access to view data)
    NB: I work in a school so I don't have the budget to buy CF,
    FDS. I also do not want to use the userbase in the mysql db, as
    this would then require me to maintain two userbases (e.g. LDAP
    & MySQL) hence twice the workload.
    Any help or suggestions to best approach this problem would
    be greatly appreciated.
    TIA
    Danny

    that was my instinct exactly, we do have an LDAP here however this application has a max of 3 users roughly with one as a supper-user, so im not sure if its worth using the LDAP API at present
    i am tempted to build and access control page initially, however we are all new to APEX here and were a little worried about security issues mainly because of the nature of the information we are holding this time.
    thanks for your thoughts on the matter
    Sol

  • User access control and WebStart

    I'm considering tools and utils for a new project and WebStart looks like it could suit our needs just perfect.
    Just one little question:
    If I have a system with multiple applications controlled by WebStart, is it possible to restrict user access?
    I need to be able to present different selections of applications to different types of users, is this possible to configure/code for WebStart?
    Thankful for pointers

    At what point do you want to treat different users
    differently (like allowing access to different apps)?
    Possible points could be:
    - at the webserver level (different download pages,
    that are access protected)
    - different Web Start application caches (as far
    as I understand under Win32 all users share
    one cache - but this seems subject to some
    property configuration in WebStart)
    - within the application (the app expecting different
    license keys, passwords or such)
    - within Web Start (Web Start utility asks for password,
    this could be achieved by writing a custom jnlp
    client - think openjnlp as example
    http://openjnlp.nanode.org/)
    I think the first two options are not useful, as
    users might get the application somewhere else
    and just copy it onto their box - this is also
    true for the last option.
    So I would put access control into the applications
    themselves.

  • Problem with users accessing sharepoint 2013 site collection

    I have an unbeliveable problem..
    I have a sp site with several site collections..
    I have around 15 users.. Everybody have access to the root site. Two users do not have access to site collections even though they are in EXACTLY same permission groups like other users who can access those site collections!
    I tried to delete them from all user groups in SP, then delete their user profiles in Central Administration, and delete them from Active Directory. After that I recreated their profiles in Active directory, readded them to Central Administration, and again
    added them to coresponding groups in SharePoint site collections. They again CAN NOT ACCESS site collections.
    What should I do.. This is incredible that 5 users with the same user privileges can access site collections, and 2 can not, even though they are all created in the same way..
    Regards,
    Srdjan

    Hello,
    Have you found a solution for this problem? I have the exact same problem with 2 users accessing a site collection (access denied). I found also this row on uls log:
    Access Denied. Exception: Attempted to perform an unauthorized operation., StackTrace:   at Microsoft.SharePoint.Utilities.SPUtility.HandleAccessDenied(Exception ex)     at Microsoft.Office.Project.PWA.PJBaseWebPartPage.OnPreInit(EventArgs
    e)     at System.Web.UI.Page.PerformPreInit()     at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint)     at System.Web.UI.Page.ProcessRequest(Boolean
    includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint)     at System.Web.UI.Page.ProcessRequest()     at System.Web.UI.Page.ProcessRequest(HttpContext context)     at System.Web.HttpApplication.CallHandlerExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute()    
    at System.Web.HttpApplication.ExecuteStep(IExecutionSt... 6955b79c-c42c-50fc-84f8-2b68f97002ea

  • Integrating with external access control system

    Hi,
    I am new at the network but have read a lot recently about the above subject as much as I could. However, I am a bit mixed up at something. I understand in order to update SAP HR module with employees time and attendance logs I need to interface with a certified PDC interface => (SAP ECC - PLANT DATA COLLECTION - TIME & ATTENDANCE AND EMPLOYEE EXPENDITURES (HR-PDC)
    I wish to develop a system that updates the the SAP HR with employee attendance logs. In addition I also wish enroll new employees into my access control system database by polling the SAP HR database.
    Now my question is if I use .NET connector:
    1. Does the connector it include functions that can help with the above requirements?
    2. Is the use of PDC interface here still a must?
    Thanks

    For time management with the help of transaction pt80 you can download the information about employees with the help of idoc. And there are some programs a.k.a connectors that link access control systems and SAP so that you do not hire the same employee in the access control problem. You hire the employee in SAP and SAP sends the information (HR Minimaster DATA) to the related program.
    It is also do the same thing for the employees who resign. I mean if an employee is fired or resigned from the company than it is sent to the related system.
    These can be found under PDC integrated systems. You can find information about the systems from Ecohub. http://ecohub.sap.com/
    I hope this answer will help.

  • Issue with users accessing video card and /dev/nvram

    Hello,
    I have Lenovo x60s and i can't access with normal user (group users) the file
    /dev/nvram
    ever I restart de computer have execute "chmod 777 /dev/nvram" for fallowing access for users
    and with users i can't use video i810 alone use vesa
    with root i can use driver i810 on xorg, why??
    I don't understand?!?!?!

    The problem with my video is with root i can play games 3D, with users i can't, my config video card on xorg:
    Section "Device"
    ### Available Driver options are:-
    ### Values: <i>: integer, <f>: float, <bool>: "True"/"False",
    ### <string>: "String", <freq>: "<f> Hz/kHz/MHz"
    ### [arg]: arg optional
    #Option "ShadowFB" # [<bool>]
    #Option "DefaultRefresh" # [<bool>]
    #Option "ModeSetClearScreen" # [<bool>]
    Identifier "Card0"
    Driver "vesa" ---->> Now I write "VESA", while I write i810 i can't execute "startx" with normal user
    VendorName "Intel Corporation"
    BoardName "Mobile 945GM/GMS, 943/940GML Express Integrated Graphics Controller"
    BusID "PCI:0:2:0"
    EndSection
    the /dev/nvram is device when i use especial keys of keyboard on my notebook,
    ever restart my pc the permissions change, I have execute "chmod 777 /dev/nvram" else i can't use with normal user.
    i think the udev always create this device on start and always create with the permission alone read and write for root, but I just find that the group is kmen and I add my user in the group.
    I restart system and verify the result.

  • Problem with user access level

    David,
    I have so far succesfully implementend your tutorial on users registering and having to validate their emailaddress (both part I and II).
    Part I: http://cookbooks.adobe.com/post_Registration_system_that_requires_the_user_to_vali-16646.h tml
    Part II: http://cookbooks.adobe.com/post_Registration_system_that_requires_the_user_to_vali-16649.h tml
    When creating a login form however, I don't get it to work based on the access level verified = y. The database is set up exactly as you described in the above tutorials.
    This is the HTML for the log in form (index.php):
    <form ACTION="<?php echo $loginFormAction; ?>" method="POST" id="logon">
    <label for="user">Username</label>
    <input type="text" id="user" name="username" />
    <br />
    <label for="pass">Password</label>
    <input type="password" id="pass" name="password" />
    <br />
    <label for="done"> </label>
    <input type="submit" value="Log On" />
    </form>
    Below the code that is found above the <html> tag in the index.php file:
    <?php require_once('../Connections/conn.php'); ?>
    <?php
    if (!function_exists("GetSQLValueString")) {
    function GetSQLValueString($theValue, $theType, $theDefinedValue = "", $theNotDefinedValue = "")
      if (PHP_VERSION < 6) {
        $theValue = get_magic_quotes_gpc() ? stripslashes($theValue) : $theValue;
      $theValue = function_exists("mysql_real_escape_string") ? mysql_real_escape_string($theValue) : mysql_escape_string($theValue);
      switch ($theType) {
        case "text":
          $theValue = ($theValue != "") ? "'" . $theValue . "'" : "NULL";
          break;   
        case "long":
        case "int":
          $theValue = ($theValue != "") ? intval($theValue) : "NULL";
          break;
        case "double":
          $theValue = ($theValue != "") ? doubleval($theValue) : "NULL";
          break;
        case "date":
          $theValue = ($theValue != "") ? "'" . $theValue . "'" : "NULL";
          break;
        case "defined":
          $theValue = ($theValue != "") ? $theDefinedValue : $theNotDefinedValue;
          break;
      return $theValue;
    ?>
    <?php
    // *** Validate request to login to this site.
    if (!isset($_SESSION)) {
      session_start();
    $loginFormAction = $_SERVER['PHP_SELF'];
    if (isset($_GET['accesscheck'])) {
      $_SESSION['PrevUrl'] = $_GET['accesscheck'];
    if (isset($_POST['username'])) {
      $loginUsername=$_POST['username'];
      $password=$_POST['password'];
      $MM_fldUserAuthorization = "verified";
      $MM_redirectLoginSuccess = "overview.php";
      $MM_redirectLoginFailed = "index.php";
      $MM_redirecttoReferrer = false;
      mysql_select_db($database_conn, $conn);
      $LoginRS__query=sprintf("SELECT username, password, verified FROM users WHERE username=%s AND password=%s",
      GetSQLValueString($loginUsername, "text"), GetSQLValueString($password, "text"));
      $LoginRS = mysql_query($LoginRS__query, $conn) or die(mysql_error());
      $loginFoundUser = mysql_num_rows($LoginRS);
      if ($loginFoundUser) {
        $loginStrGroup  = mysql_result($LoginRS,0,'verified');
        //declare two session variables and assign them
        $_SESSION['MM_Username'] = $loginUsername;
        $_SESSION['MM_UserGroup'] = $loginStrGroup;          
        if (isset($_SESSION['PrevUrl']) && false) {
          $MM_redirectLoginSuccess = $_SESSION['PrevUrl'];    
        header("Location: " . $MM_redirectLoginSuccess );
      else {
        header("Location: ". $MM_redirectLoginFailed );
    ?>
    On the overview.php page, I applied the restrict access to page behaviour, which results in the following code:
    <?php require_once('../Connections/conn.php'); ?>
    <?php
    if (!isset($_SESSION)) {
      session_start();
    $MM_authorizedUsers = "y";
    $MM_donotCheckaccess = "false";
    // *** Restrict Access To Page: Grant or deny access to this page
    function isAuthorized($strUsers, $strGroups, $UserName, $UserGroup) {
      // For security, start by assuming the visitor is NOT authorized.
      $isValid = False;
      // When a visitor has logged into this site, the Session variable MM_Username set equal to their username.
      // Therefore, we know that a user is NOT logged in if that Session variable is blank.
      if (!empty($UserName)) {
        // Besides being logged in, you may restrict access to only certain users based on an ID established when they login.
        // Parse the strings into arrays.
        $arrUsers = Explode(",", $strUsers);
        $arrGroups = Explode(",", $strGroups);
        if (in_array($UserName, $arrUsers)) {
          $isValid = true;
        // Or, you may restrict access to only certain users based on their username.
        if (in_array($UserGroup, $arrGroups)) {
          $isValid = true;
        if (($strUsers == "") && false) {
          $isValid = true;
      return $isValid;
    $MM_restrictGoTo = "index.php";
    if (!((isset($_SESSION['MM_Username'])) && (isAuthorized("",$MM_authorizedUsers, $_SESSION['MM_Username'], $_SESSION['MM_UserGroup'])))) {  
      $MM_qsChar = "?";
      $MM_referrer = $_SERVER['PHP_SELF'];
      if (strpos($MM_restrictGoTo, "?")) $MM_qsChar = "&";
      if (isset($QUERY_STRING) && strlen($QUERY_STRING) > 0)
      $MM_referrer .= "?" . $QUERY_STRING;
      $MM_restrictGoTo = $MM_restrictGoTo. $MM_qsChar . "accesscheck=" . urlencode($MM_referrer);
      header("Location: ". $MM_restrictGoTo);
      exit;
    ?>
    Any idea/thoughts on what I'm not adding to the page in order to work?

    David,
    Thank you for that insight, I figured it would be something like that and when I woke up this morning, it all made sense. I changed somthing from the tutorial (part I) you wrote and now it works fine.
    I had trouble with the validation link in the email that is sent automatically. In your tutorial, section "generating and sending the validation email", you write:
    $message .= urlencode($_POST['username']);
    $message .= '&amp;t=';
    $message .= urlencode($token);
    When using the code like this, it wouldn't set the verified column to y. However, when I changed the middle $message to
    $message .= '&t=';
    it updated the verified column to y. The URL that displayed from the original code displayed the & sign as &amp; in the URL itself.
    Next to that, whenever I try to add something to the e-mail, the validation link becomes not clickable anymore.
    As the login problem concerns, encrypting indeed did the trick.
    if (isset($_POST['username'])) {
      $loginUsername=$_POST['username'];
      $password=sha1($_POST['password']);
    Putting the $_POST['password'] between brackets, adding sha1 in front of it. It works just fine now.
    Hopefully no further problems on this anymore! Thanks a lot for your insights!
    EDIT: I can't mark this thread as answered anymore?

  • User access control

    We need to control access to certain application functionality in our system.
    We are currently using the application users' role(s) to decide whether access is granted to for instance view products with a value greater than £100.
    The role which allows access is therefore hardcoded within the application.
    With an increase of users and also restricted functionality access within the database, the number of roles and its complexity is growing. We need to replace it with something else.
    Does anyone have any suggestions?

    This forum is meant for discussions about OTN content/site and services.
    Questions about Oracle products and technologies will NOT be answered in this forum. Please post your product or technology related questions in the appropriate product or technology forums, which are monitored by Oracle product managers.
    Product forums:
    http://forums.oracle.com/forums/index.jsp?cat=9
    Technology forums:
    http://forums.oracle.com/forums/index.jsp?cat=10
    As a general guideline, please first search the forum to see if your question is already answered. You will find answers for the most frequently asked questions by simply searching the forum. This will help you to find the answer right away and will save time for all of us.

  • SitePage content with HTML access controll possible?

    Hello community,
    I created a SitePage with HTML content as Intranet. And within this content, you have some links to the sub-sites.
    Now, I want to control the links for the users. If has "User A" access to the sub-site, present the link and if not, show another text.
    Is this possible? Or is there another way?
    Thanks in advance.

    As of my knowledge, free flow web(html) content dont have permission or audience target attribute with it. Navigation, library, list, item does has those feature. 
    When We have same requirement, we displayed all links and let SharePoint authenticate where user dont have access. We keep it simple.
    Regards Sudip Misra [email protected] +1-412-237-5435 Pittsburgh, PA

  • Multi-user access control

    User #1 opens a PDF on a server and starts making changes.  User #2 opens the same file and starts making changes.  User #2 for example can create sticky notes and make lots of comments.  When User #2 tries to save his changes he's denied as User #1 opened the file first.  Is there a way (like with MS office) that User #2 will be warned when opening the file that his version is read-only?
    Thanks!

    Sorry, no.
    Acrobat/Reader do not have their own file locking system (as Office does), so they have no idea that another user is accessing the document until they send the operating system a 'save' instruction, and get an error saying it's not allowed.

  • How do we check user access control in Apex

    Hi All,
    In my application we have three different roles like
    1 = Write/Edit
    2 = Write/Edit/Export
    3 = View Only
    Based on the roles i have dsiplay the show and hide few things. How do achieve this property in apex?
    Thanks,
    Anoo..

    Always include the following information when asking a question
    Full APEX version
    Full DB/version/edition/host OS
    Web server architecture (EPG, OHS or APEX listener/host OS)
    Browser(s) and version(s) used
    Theme
    Template(s)
    Region/item type(s)
    And always search on oracle documentation and apex forum before posting a question
    Anoo wrote:
    Hi All,
    In my application we have three different roles like
    1 = Write/Edit
    2 = Write/Edit/Export
    3 = View Only
    Based on the roles i have dsiplay the show and hide few things. How do achieve this property in apex?
    Thanks,
    Anoo..You can create 3 different authorizations for each one above, and use the authorization in the region,page, item level etc..
    http://docs.oracle.com/cd/E23903_01/doc/doc.41/e21674/sec_authorization.htm#HTMDB25782

  • Create user menus in hierarical tree with access control

    Hi All,
    I am facing problem in populating user menus in hirarical against user access control.
    I have table of menus in which i populate data as:
    Menu
    - Sub Menu 1
    -- Form 1
    -- Form 2
    -- Form 3
    - Sub Menu 2
    -- Form 4
    -- Form 5
    -- Form 6
    Now I have created hierarical query as:
    SELECT -1, LEVEL, menu_name, NULL, id
    FROM menu_opt
    START WITH parent_id IS NULL
    CONNECT BY PRIOR menu_id = parent_id
    and menu_id in
    (3, 4);
    Note: where menu_id 3 = Form 1, Menu_id 4 = Form 2.
    If I allow only menu ID 3 and 4 (not parents menus) then Hierarchy should be completed from top to bottom. What change i have to made to achieve my target?
    Thankx
    Qasim Javaid

    Hi,
    Sorry, it's very unclear what you want to do.
    Whenever you have a problem, please post CREATE TABLE and INSERT statements for a little sample data, and the results you want from that sample data.
    Say which version of Oracle you're using, e.g. 11.2.0.2.0. This is always important, but especially so with CONNECT BY queries, because every version since Oracle 7 has had significant improvements in this area.
    See the forum FAQ {message:id=9360002}
    If you can show the problem using commonly available tables (such as scott.emp or hr.employees, both of which contain trees) then you don't need to post any sample data; just the results you want and an explanation of how you get those results.
    For example, I think you're asking something like this:
    "I want to show the hierarchy in scott.emp, but I only want to show certain nodes and their descendants. For example, if I ask for 'MILLER' and 'SCOTT', I would want to see
    {code}
    ` EMPNO ENAME
    7876 ADAMS
    7788 SCOTT
    7934 MILLER
    {code}
    (order doesn't matter). ADAMS is included because ADAMS is a child of SCOTT."
    Here's one way to do that:
    SELECT DISTINCT
         empno, ename
    FROM     scott.emp
    START WITH     ename     IN ('MILLER', 'SCOTT')
    CONNECT BY     mgr     = PRIOR empno
    ;This query should work in any version of Oracle.

  • Creating SOD matrix with the help of Access control default ruleset

    I am creating the SOD matrix for the existing roles of CRM and HR modules.  As I am the security consultant therefore does not have the functional knowledge about the conflicts for CRM and HR transactions. My question is can I use the function/actions/risks conflicts provided with the Access control 5.3 default ruleset.  We are not using Access control for these systems, so I want to know whether I can take the help of AC 5.3 default risks to create the SOD matrix based on it.
    For e.g, like H001 default HR risk, I would make sure not to assign PA30(maintain HR data) with the PA03/PA04(maintain personal control record) as this will result in the providing conflict "Modify payroll master data and then process payroll". 
    Once I have the SOD list based upon AC 5.3, I can consult the Business approver/auditor to verify and modify as per the business requirement.
    Maybe I am thinking the wrong way, please provide your inputs so I can work on it.  Any help appreciated.
    Thanks,
    Sanjay Desai

    The most important thing to keep in mind is that you need to build a rule set that reflects the customers real business risk!
    What you build there will influence the way the customer will be able to continue work, assign access and perform control activities. The input HAS to come from the business!
    You can use the SAP standard risk definitions as a starting point for discussions, and the HR functions are an excellent building block to identify the transactions and necessary authorization objects that allow users to perform the actions.
    But the real challenge is to identify the risks as perceived/accepted by the business!
    Frank.

Maybe you are looking for

  • External monitor resolution setting is not saved

    I use an external monitor as an extended desktop for my macbook pro. The problem is that whenever I turn on the mbp, the resolution of the external monitor reverts back to the default resolution. Is there any way to set the resolution of the external

  • MBP Periodically blacks out with a faint "hardware" sound

    For the last couple of days, my (approximately 2.5-year-old) MBP's screen has been blacking out periodically. When it blacks at, it does so for 2-5 seconds, and is accompanied by a very quite, and I mean the faintest - I don't know what else to call

  • Transaction to check authorization objects that failed

    I am trying to test a report, but I get an authorization error when running a standard function. I have already used a transaction which shows what authorization object failed if you call this transaction right after you got the error. Does anybody k

  • Transparent Fill for Dropdown Box

    I've made a javascript to change the fill color of a drop down box depending on what is selected. Everything is working as expected except that I can't find how to fill it with a transparent/no fill color. I've found very discouraging info about bein

  • Need Days in 2010 instead of Hours

    Rule X935 is giving error when Calling Time Units in variable Key I got the solution  When rule x935 was going to start its calling time units via XEINCH How to transfer that to WTUNT , Wage type units. Please let me know