Answers Export method access control

Dear all,
Can we limit individual groups/users from exporting Answers query result with specific export methods? e.g. only allow group A or user A to print PDF only. He is not allowed to export to Excel / powerpoint / word / html ...etc
Is it possible ???
Thanks ~!

You can control the Download To links by not displaying them to the users. To do that please see the following link.
http://oraclebiblog.blogspot.com/2009/06/configuring-user-interface-behavior-in.html
Regards,
Bhavik

Similar Messages

  • Export of access control lists on gwia

    Hi, anyone know of a way of exporting the users associated with the various class of service groups in access control on the gwia ?
    i've had a search through the forum and haven't stumbled on anything so am open to (polite) suggestions !
    thanks

    Michael Bell wrote:
    > Sorry, not aware of any export function for GWAC.DB files.
    I don't know of any way either. That said, you can just "copy" or "move" a
    gwac.db file to another GWIA if your goal is just to duplicate the functionality
    elsewhere. So you get the one GWIA set up the way you want, and copy its
    gwac.db file to the second gwia, etc.
    Danita
    Novell Knowledge Partner
    Upgrading to GroupWise 2012?
    http://www.caledonia.net/gw12upg.html

  • Can't Add To Access Control List Airport Express

    We have both Airport Extreme (2) and Express Base Stations (3) to create a wireless network. On the Extremes I can click the Add button in Access Control in the Airport Admin Utility to add people to the list. On all the Express Base Staions I can edit or delete entries already on the list but can't add any new ones. I can export an Access Control List but not import one. The button is greyed out only the button works. I could add to the lists in the past and I'm not sure when it stopped working. The network structure and settings have not changed. Has anyone heard of this problem?
    Aiport Express   Mac OS X (10.4.8)  

    WDS is used on two Express units to relay the signal from the main base station but not on third one which is connected directly to the network via ethernet.
    On the internet connected Express the Airport Network setting is:
    Wireless Mode: Create a Wireless Network (Home Router)
    All base stations have the same name to allow roaming.
    Internet is connected using Ethernet.

  • Best authentication method for controlling access to wlan

    What is the best method for controlling access to a wlan with a 5508 wlan controller
    The requirments are
    -Needs to support all types of clients (Mac, PC, smartphones, tablets)
    -Clients need to be able to connect easily and without errors or installing certs or wireless profiles etc..
    -Secure
    This doesn't seem like alot to ask but I keep running into problems.
    What are people using?
    Thanks

    I can't find an errors in any area of the event viewer.
    Here is these files cat'd together.
    GeoTrustGlobalCA
    GeoTrustDVSSLCA
    corp-vs-ca2.########-export
    -----BEGIN CERTIFICATE-----
    MIIDVDCCAjygAwIBAgIDAjRWMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVT
    MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9i
    YWwgQ0EwHhcNMDIwNTIxMDQwMDAwWhcNMjIwNTIxMDQwMDAwWjBCMQswCQYDVQQG
    EwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEbMBkGA1UEAxMSR2VvVHJ1c3Qg
    R2xvYmFsIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2swYYzD9
    9BcjGlZ+W988bDjkcbd4kdS8odhM+KhDtgPpTSEHCIjaWC9mOSm9BXiLnTjoBbdq
    fnGk5sRgprDvgOSJKA+eJdbtg/OtppHHmMlCGDUUna2YRpIuT8rxh0PBFpVXLVDv
    iS2Aelet8u5fa9IAjbkU+BQVNdnARqN7csiRv8lVK83Qlz6cJmTM386DGXHKTubU
    1XupGc1V3sjs0l44U+VcT4wt/lAjNvxm5suOpDkZALeVAjmRCw7+OC7RHQWa9k0+
    bw8HHa8sHo9gOeL6NlMTOdReJivbPagUvTLrGAMoUgRx5aszPeE4uwc2hGKceeoW
    MPRfwCvocWvk+QIDAQABo1MwUTAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTA
    ephojYn7qwVkDBF9qn1luMrMTjAfBgNVHSMEGDAWgBTAephojYn7qwVkDBF9qn1l
    uMrMTjANBgkqhkiG9w0BAQUFAAOCAQEANeMpauUvXVSOKVCUn5kaFOSPeCpilKIn
    Z57QzxpeR+nBsqTP3UEaBU6bS+5Kb1VSsyShNwrrZHYqLizz/Tt1kL/6cdjHPTfS
    tQWVYrmm3ok9Nns4d0iXrKYgjy6myQzCsplFAMfOEVEiIuCl6rYVSAlk6l5PdPcF
    PseKUgzbFbS9bZvlxrFUaKnjaZC2mqUPuLk/IH2uSrW4nOQdtqvmlKXBx4Ot2/Un
    hw4EbNX/3aBd7YdStysVAq45pmp06drE57xNNB6pXE0zX5IJL4hmXXeXxx12E6nV
    5fEWCRE11azbJHFwLJhWC9kXtNHjUStedejV0NxPNO3CBWaAocvmMw==
    -----END CERTIFICATE-----
    -----BEGIN CERTIFICATE-----
    MIID+jCCAuKgAwIBAgIDAjbSMA0GCSqGSIb3DQEBBQUAMEIxCzAJBgNVBAYTAlVT
    MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMRswGQYDVQQDExJHZW9UcnVzdCBHbG9i
    YWwgQ0EwHhcNMTAwMjI2MjEzMjMxWhcNMjAwMjI1MjEzMjMxWjBhMQswCQYDVQQG
    EwJVUzEWMBQGA1UEChMNR2VvVHJ1c3QgSW5jLjEdMBsGA1UECxMURG9tYWluIFZh
    bGlkYXRlZCBTU0wxGzAZBgNVBAMTEkdlb1RydXN0IERWIFNTTCBDQTCCASIwDQYJ
    KoZIhvcNAQEBBQADggEPADCCAQoCggEBAKa7jnrNpJxiV9RRMEJ7ixqy0ogGrTs8
    KRMMMbxp+Z9alNoGuqwkBJ7O1KrESGAA+DSuoZOv3gR+zfhcIlINVlPrqZTP+3RE
    60OUpJd6QFc1tqRi2tVI+Hrx7JC1Xzn+Y3JwyBKF0KUuhhNAbOtsTdJU/V8+Jh9m
    cajAuIWe9fV1j9qRTonjynh0MF8VCpmnyoM6djVI0NyLGiJOhaRO+kltK3C+jgwh
    w2LMpNGtFmuae8tk/426QsMmqhV4aJzs9mvIDFcN5TgH02pXA50gDkvEe4GwKhz1
    SupKmEn+Als9AxSQKH6a9HjQMYRX5Uw4ekIR4vUoUQNLIBW7Ihq28BUCAwEAAaOB
    2TCB1jAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFIz02ZMKR7wAoErOS3VuoLaw
    sn78MB8GA1UdIwQYMBaAFMB6mGiNifurBWQMEX2qfWW4ysxOMBIGA1UdEwEB/wQI
    MAYBAf8CAQAwOgYDVR0fBDMwMTAvoC2gK4YpaHR0cDovL2NybC5nZW90cnVzdC5j
    b20vY3Jscy9ndGdsb2JhbC5jcmwwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzAB
    hhhodHRwOi8vb2NzcC5nZW90cnVzdC5jb20wDQYJKoZIhvcNAQEFBQADggEBADOR
    NxHbQPnejLICiHevYyHBrbAN+qB4VqOC/btJXxRtyNxflNoRZnwekcW22G1PqvK/
    ISh+UqKSeAhhaSH+LeyCGIT0043FiruKzF3mo7bMbq1vsw5h7onOEzRPSVX1ObuZ
    lvD16lo8nBa9AlPwKg5BbuvvnvdwNs2AKnbIh+PrI7OWLOYdlF8cpOLNJDErBjgy
    YWE5XIlMSB1CyWee0r9Y9/k3MbBn3Y0mNhp4GgkZPJMHcCrhfCn13mZXCxJeFu1e
    vTezMGnGkqX2Gdgd+DYSuUuVlZzQzmwwpxb79k1ktl8qFJymyFWOIPllByTMOAVM
    IIi0tWeUz12OYjf+xLQ=
    -----END CERTIFICATE-----
    -----BEGIN CERTIFICATE-----
    MIIFaDCCBFCgAwIBAgIDBo5UMA0GCSqGSIb3DQEBBQUAMGExCzAJBgNVBAYTAlVT
    MRYwFAYDVQQKEw1HZW9UcnVzdCBJbmMuMR0wGwYDVQQLExREb21haW4gVmFsaWRh
    dGVkIFNTTDEbMBkGA1UEAxMSR2VvVHJ1c3QgRFYgU1NMIENBMB4XDTEzMDQyNTA4
    NTEzNVoXDTE1MDQxNTA0NDcyOVowgdQxKTAnBgNVBAUTIHNZbkoyTG0tb2dGZnZC
    aFlodWRqWVZIMndEek43MGdOMRMwEQYDVQQLEwpHVDU3NDYxMTU1MTEwLwYDVQQL
    EyhTZWUgd3d3Lmdlb3RydXN0LmNvbS9yZXNvdXJjZXMvY3BzIChjKTEzMTcwNQYD
    VQQLEy5Eb21haW4gQ29udHJvbCBWYWxpZGF0ZWQgLSBRdWlja1NTTChSKSBQcmVt
    aXVtMSYwJAYDVQQDEx1jb3JwLXZzLWNhMi5wb3BtdWx0aW1lZGlhLmNvbTCCASIw
    DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM4jgpKBeo8rtM/zJIEyho3HppeU
    tZeK+wmLfPeBTJxr2UmQFOmcniQblgsHREAGyJR0KT5yrYzxx6wpZaqCUcZlxl1Z
    lUz5mfxHnL5Oc14sUnqwaJuxprXV5Rnclci6W6BMFjI4QoxXjQwSa+3A1enf+ZsO
    sXUojQbQx62MX8rINuQ+srgdDielK/mJqTAMt11x6+NqIpwlGAgOxKd7vjG6aKRf
    a2efvS/hK4Pi0ieWPGn1GXz/AlYpHQv0cppUr8huL/+2+9cEvd1sp8XN/ASN3YTm
    WWo//fVpbXIlzp8mU4Q7t8+7LglxFQabhl4eMBarMi8SnNuh2zYKQxJRPvsCAwEA
    AaOCAbMwggGvMB8GA1UdIwQYMBaAFIz02ZMKR7wAoErOS3VuoLawsn78MA4GA1Ud
    DwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwKAYDVR0R
    BCEwH4IdY29ycC12cy1jYTIucG9wbXVsdGltZWRpYS5jb20wQQYDVR0fBDowODA2
    oDSgMoYwaHR0cDovL2d0c3NsZHYtY3JsLmdlb3RydXN0LmNvbS9jcmxzL2d0c3Ns
    ZHYuY3JsMB0GA1UdDgQWBBSODVVgPunABo61x13N20tEP66egDAMBgNVHRMBAf8E
    AjAAMHUGCCsGAQUFBwEBBGkwZzAsBggrBgEFBQcwAYYgaHR0cDovL2d0c3NsZHYt
    b2NzcC5nZW90cnVzdC5jb20wNwYIKwYBBQUHMAKGK2h0dHA6Ly9ndHNzbGR2LWFp
    YS5nZW90cnVzdC5jb20vZ3Rzc2xkdi5jcnQwTAYDVR0gBEUwQzBBBgpghkgBhvhF
    AQc2MDMwMQYIKwYBBQUHAgEWJWh0dHA6Ly93d3cuZ2VvdHJ1c3QuY29tL3Jlc291
    cmNlcy9jcHMwDQYJKoZIhvcNAQEFBQADggEBAC2Kadfzc6X/3dI//J5SGR9fnCa7
    6NVl8SV5aAYAvmOdkZBiurIYa1eHYYaDUGmOO8awTOXTfc4QzX75QwBUmcZeZKdj
    ZMPiJlm7Bsz/3Q1eolxHCqkAiDZIEohoT0o8Spw6+Eq8KcPnhf+K5+rIzJnWBZ9P
    tmpS4SEtrGHIfj3+638eqTydxuOCZ0Be9EanVK0ERav25fTRgRoZ+yEDiFP/MjQd
    rAgW7SyLOjm4I6bTmzjugmXf2Axm2kFuoyyZdrvdrJ+GBku5F6DOufGdGu13j80S
    lp148qh7gCREWrCqn3pH14qPKeHwC47jAQ3+ikRDfB090h9HGRi/8+w7Tx4=
    -----END CERTIFICATE-----

  • HSS Export of Essbase project server Access Control info

    I have successfully used the import/export utility with HSS 9.3.1 to export and import the provisioning information for our HSS setup,
    but I want to be able to export & import the Access control information as well for an Essbase 9.3.1 server and the filters and calcs etc that the groups can use that I have provisioned with the tool.
    Does anyone know how to do this as I am pulling my hair out (the little I have)
    Regards
    John

    Hi,
    HSS the central hub for all provisioning well maybe not entirely true, it is my understanding that the information you are after is still held in the essbase security file and the hss export utility doesn't go down to this level.
    I think you will have to use another method to get this information, maybe maxl, essbase advanced security manager utility or just export the sec file.
    Cheers
    John
    http://john-goodwin.blogspot.com/

  • Importing a pkg with rely on server storage and roles for access control

    Hi we run std 2008 r2.  I'm reading documentation on prot levels during pkg import to catalog at
    https://msdn.microsoft.com/en-us/library/ms141747(v=sql.105).aspx but unfortunately the definition of prot level "rely on server storage and roles for access control"
    isn't clear.  They used the prot level name to define it which didn't help me.
    This option looks appealing but it isn't clear why I need to enter a pswd when choosing this option.  Will my peers need to know that pswd when they export?  Will the sql agent job need to present that pswd when running?  If I just keep current
    prot level "encrypt with user" will the agent job be able to run it?  I'm sure it (agent) isn't running with my creds now.  Also, how can I tell what prot level it was deployed with last?  I rt clicked on the pkg in the catalog
    and don't see anything obvious about that.  I already understand that on export prot level is changed to encrypt with user. 
    I'm going to look at the sql agen job right now to see what creds it runs with.

    First thing to understand is that protection level is used for determining how package (dtsx) file have to be protected. Once package is deployed in server and executed from agent, the conventional way is to use method of configurations or parameters if
    2012 to get required connection etc values and execute using it. It never uses the values that were set during the design time. So it doesnt matter what protection level was so far as its based on config
    However if you're planning to export existing package to your system and do modification thats where protection level comes to play. If its set to any of ENcryptSensitive... type value then you'll to provide the value (either a passowrd or your userkey which
    it takes automatically from login info) to see the sensitive info (connection info,passwords etc) The package will still open and so far as you manually type in missing values you will be able to execute the package. If protection level is set to one of ENcrptAll
    then you will have no way to open package itself unless you provide password/ have correct userkey.
    The rely on server storage option uses sql server security context itself ie it doesnt do any encryption within package by itself but will assume values based on sqlserver security. This is used when you store package itself in SQLServer itself (MSDB)
    Please Mark This As Answer if it solved your issue
    Please Vote This As Helpful if it helps to solve your issue
    Visakh
    My Wiki User Page
    My MSDN Page
    My Personal Blog
    My Facebook Page

  • Error GRC Access Control 10.0

    We have a problem when execute the next steps in GRC Access Control 10.0
    SPRO-->Governance, Risk and Compliance>Access Control--> Access Risk Analysis--> Batch RisK Analysis
    We applied the next note, but problem is the same.
    1563583 - SYSTEM_NO_TASK_STORAGE dump on AIX
    Category          
    ABAP Programming Error
    Runtime Errors    
    ASSERTION_FAILED
    ABAP Program      
    CL_GRRM_DASHBOARD_MENU_AUTH===CP
    Application Component  GRC-RM
    Date and Time     
    13.03.2013 11:50:04
    |Short text                                                                                   
    |
    |
    The ASSERT condition was violated.                                                       
    |
    |What happened?                                                                               
    |
    |
    In the running application program, the ASSERT statement recognized a                    
    |
    |
    situation that should not have occurred.                                                 
    |
    |
    The runtime error was triggered for one of these reasons:                                
    |
    |
    - For the checkpoint group specified with the ASSERT statement, the                      
    |

    activation mode is set to "abort".                                                     
    |
    |
    - Via a system variant, the activation mode is globally set to "abort"                   
    |

    for checkpoint groups in this system.                                                  
    |
    |
    - The activation mode is set to "abort" on program level.                                
    |
    |
    - The ASSERT statement is not assigned to any checkpoint group.                          
    |
    |What can you do?                                                                             
    |
    |
    Note down which actions and inputs caused the error.                                     
    |
    |                                                                                             
    |
    |                                                                                             
    |
    |
    To process the problem further, contact you SAP system                                   
    |
    |
    administrator.                                                                           
    |
    |                                                                                             
    |
    |
    Using Transaction ST22 for ABAP Dump Analysis, you can look                              
    |
    |
    at and manage termination messages, and you can also                                     
    |
    |
    keep them for a long time.                                                               
    |
    |Error analysis                                                                               
    |
    |
    The following checkpoint group was used: "No checkpoint group specified"                 
    |
    |                                                                                             
    |
    |
    If in the ASSERT statement the addition FIELDS was used, you can find                    
    |
    |
    the content of the first 8 specified fields in the following overview:                   
    |
    |
    " (not used) "                                                                           
    |
    |
    " (not used) "                                                                           
    |
    |
    " (not used) "                                                                           
    |
    |
    " (not used) "                                                                           
    |
    |
    " (not used) "                                                                           
    |
    |
    " (not used) "                                                                           
    |
    |
    " (not used) "                                                                           
    |
    |
    " (not used) "                                                                           
    |
    |How to correct the error                                                                     
    |
    |
    Probably the only way to eliminate the error is to correct the program.                  
    |
    |
    |
    |                                                                                             
    |
    |
    If the error occures in a non-modified SAP program, you may be able to                   
    |
    |
    find an interim solution in an SAP Note.                                                 
    |
    |
    If you have access to SAP Notes, carry out a search with the following                   
    |
    |
    keywords:                                                                                
    |
    |                                                                                             
    |
    |
    "ASSERTION_FAILED" " "                                                                   
    |
    |
    "CL_GRRM_DASHBOARD_MENU_AUTH===CP" or "CL_GRRM_DASHBOARD_MENU_AUTH===CM001"              
    |
    |
    "IF_GRFN_MENU_ITEM_AUTH~IS_AUTHORIZED"                                                   
    |
    |                                                                                             
    |
    |
    If you cannot solve the problem yourself and want to send an error                       
    |
    |
    notification to SAP, include the following information:                                  
    |
    |                                                                                             
    |
    |
    1. The description of the current problem (short dump)                                   
    |
    |                                                                                             
    |
    |  
    To save the description, choose "System->List->Save->Local File                       
    |
    |
    (Unconverted)".                                                                          
    |
    |                                                                                             
    |
    |
    2. Corresponding system log                                                              
    |
    |                                                                                             
    |
    |  
    Display the system log by calling transaction SM21.                                   
    |
    |  
    Restrict the time interval to 10 minutes before and five minutes                      
    |
    |
    after the short dump. Then choose "System->List->Save->Local File                        
    |
    |
    (Unconverted)".                                                                          
    |
    |                                                                                             
    |
    |
    3. If the problem occurs in a problem of your own or a modified SAP                      
    |
    |
    program: The source code of the program                                                  
    |
    |  
    In the editor, choose "Utilities->More                                                
    |
    |
    Utilities->Upload/Download->Download".                                                   
    |
    |                                                                                             
    |
    |
    4. Details about the conditions under which the error occurred or which                  
    |
    |
    actions and input led to the error.                                                      
    |
    |                                                                                             
    |
    |                                                                                             
    |
    |System environment                                                                           
    |
    |
    SAP Release..... 702                                                                     
    |
    |
    SAP Basis Level. 0012                                                                    
    |
    |                                                                                             
    |
    |
    Application server... "KIO13701"                                                         
    |
    |
    Network address...... "172.20.1.137"                                                     
    |
    |
    Operating system..... "AIX"                                                              
    |
    |
    Release.............. "7.1"                                                              
    |
    |
    Hardware type........ "00F6C78E4C00"                                                     
    |
    |
    Character length.... 16 Bits                                                             
    |
    |
    Pointer length....... 64 Bits                                                            
    |
    |
    Work process number.. 10                                                                 
    |
    |
    Shortdump setting.... "full"                                                             
    |
    |                                                                                             
    |
    |
    Database server... "KIO13701"                                                            
    |
    |
    Database type..... "DB6"                                                                 
    |
    |
    Database name..... "DGR"                                                                 
    |
    |
    Database user ID.. "SAPDGR"                                                              
    |
    |                                                                                             
    |
    |
    Terminal.......... "192.168.0.5"                                                         
    |
    |                                                                                             
    |
    |
    Char.set.... "C"                                                                         
    |
    |                                                                                             
    |
    |
    SAP kernel....... 720                                                                    
    |
    |
    created (date)... "Jul 8 2012 19:43:01"                                                  
    |
    |
    create on........ "AIX 2 5 00092901D600"                                                 
    |
    |
    Database version. "DB6_81 "                                                              
    |
    |                                                                                             
    |
    |
    Patch level. 300                                                                         
    |
    |
    Patch text.. " "                                                                         
    |
    |                                                                                             
    |
    |
    Database............. "DB6 08.02.*, DB6 09.*, DB6 10.*"                                  
    |
    |
    SAP database version. 720                                                                
    |
    |
    Operating system..... "AIX 2 5, AIX 3 5, AIX 1 6, AIX 1 7"                               
    |
    |                                                                                             
    |
    |
    Memory consumption                                                                       
    |
    |
    Roll.... 0                                                                               
    |
    |
    EM...... 8379584                                                                         
    |
    |
    Heap.... 0                                                                               
    |
    |
    Page.... 16384                                                                           
    |
    |
    MM Used. 6205712                                                                         
    |
    |
    MM Free. 2170976                                                                         
    |
    |User and Transaction                                                                         
    |
    |
    Client.............. 100                                                                 
    |
    |
    User................ "LVELASCO"                                                          
    |
    |
    Language key........ "E"                                                                 
    |
    |
    Transaction......... " "                                                                 
    |
    |
    Transaction ID...... "51400164B1F00C40E1008000AC140189"                                  
    |
    |                                                                                             
    |
    |
    EPP Whole Context ID.... "5140015EB1F00C40E1008000AC140189"                              
    |
    |
    EPP Connection ID....... "5140F9B0B19C1150E1008000AC140189"                              
    |
    |
    EPP Caller Counter...... 1                                                               
    |
    |                                                                                             
    |
    |
    Program............. "CL_GRRM_DASHBOARD_MENU_AUTH===CP"                                  
    |
    |
    Screen.............. "SAPMHTTP 0010"                                                     
    |
    |
    Screen Line......... 2                                                                   
    |
    |
    Debugger Active..... "none"                                                              
    |
    |Server-Side Connection Information                                                           
    |
    |
    Information on Caller of "HTTPS" Connection:                                             
    |
    |
    Plug-in Type.......... "HTTPS"                                                           
    |
    |
    Caller IP............. "192.168.0.5"                                                     
    |
    |
    Caller Port........... 44300                                                             
    |
    |
    Universal Resource ID. "/sap/bc/webdynpro/sap/grfn_service_map"                          
    |
    |                                                                                             
    |
    |
    Program............. "CL_GRRM_DASHBOARD_MENU_AUTH===CP"                                  
    |
    |
    Screen.............. "SAPMHTTP 0010"                                                     
    |
    |
    Screen Line......... 2                                                                   
    |
    |                                                                                             
    |
    |
    Information on Caller ofr "HTTPS" Connection:                                            
    |
    |
    Plug-in Type.......... "HTTPS"                                                           
    |
    |
    Caller IP............. "192.168.0.5"                                                     
    |
    |
    Caller Port........... 44300                                                             
    |
    |
    Universal Resource Id. "/sap/bc/webdynpro/sap/grfn_service_map"                          
    |
    |Information on where terminated                                                              
    |
    |
    Termination occurred in the ABAP program "CL_GRRM_DASHBOARD_MENU_AUTH===CP" -            
    |
    |
    in "IF_GRFN_MENU_ITEM_AUTH~IS_AUTHORIZED".                                              
    |
    |
    The main program was "SAPMHTTP ".                                                        
    |
    |                                                                                             
    |
    |
    In the source code you have the termination point in line 59                             
    |
    |
    of the (Include) program "CL_GRRM_DASHBOARD_MENU_AUTH===CM001".                          
    |
    |Source Code Extract (Source code has changed)                                                
    |
    |Line |SourceCde                                                                              
    |
    |   29|   
    lv_dashboard = lv_value.                                                       
    |
    |   30|                                                                                       
    |
    |   31|   
    TRANSLATE lv_dashboard TO UPPER CASE.                                          
    |
    |   32|                                                                                       
    |
    |   33|   
    CASE lv_dashboard.                                                             
    |
    |   34|     
    WHEN 'HEATMAP'.                                                              
    |
    |   35|       
    lv_report = 'GRRM_HEATMAP'.                                                
    |
    |   36|                                                                                       
    |
    |   37|     
    WHEN 'LOSS_OVERVIEW' OR 'LOSS_STRUCTURE' OR 'OB_LOSS_OVERVIEW' OR 'OB_LOSS_STRUCTU|
    |   38|       
    lv_report = 'GRRM_LOSS_ANALYSIS'.                                          
    |
    |   39|                                                                                       
    |
    |   40|     
    WHEN 'OVERVIEW'.                                                             
    |
    |   41|       
    lv_report = 'GRRM_OVERVIEW'.                                               
    |
    |   42|                                                                                       
    |
    |   43|     
    WHEN OTHERS.                                                                 
    |
    |   44|       
    ASSERT 1 = 2.                                                              
    |
    |   45|                                                                                       
    |
    |   46|   
    ENDCASE.                                                                       
    |
    |   47|                                                                                       
    |
    |   48|   
    EXIT.                                                                          
    |
    |   49|                                                                                       
    |
    |   50| 
    ENDLOOP.                                                                         
    |
    |   51|                                                                                       
    |
    |   52|
    WHEN 'GRRM_LOSS_MATRIX' OR 'GRRM_LOSS_MATRIX_NEW'.                                 
    |
    |   53| 
    lv_report = 'GRRM_LOSS_ANALYSIS'.                                                
    |
    |   54|                                                                                       
    |
    |   55|
    WHEN 'GRRM_HEATMAP_REPORT'.                                                        
    |
    |   56| 
    lv_report = 'GRRM_HEATMAP'.                                                      
    |
    |   57|                                                                                       
    |
    |   58|
    WHEN OTHERS.                                                                       
    |
    |>>>>>| 
    ASSERT 1 = 2.                                                                    
    |
    |   60|                                                                                       
    |
    |   61|  ENDCASE.                                                                             
    |
    |   62|                                                                                       
    |
    |   63|  TRY.                                                                                 
    |
    |   64| 
    lv_regulation_id = cl_grfn_api_regulation=>if_grfn_api_regulation~get_regulation_id( i|
    |   65|                                                                                       
    |
    |   66| 
    ev_authorized = cl_grfn_util_rep_auth=>has_rep_auth(                             
    |
    |   67|   
    io_session  
    = io_session                                                  
    |
    |   68|   
    iv_regulation_id = lv_regulation_id                                            
    |
    |   69|   
    iv_report   
    = lv_report                                                   
    |
    |   70|   
    iv_activity 
    = grfn0_c_activity-print                                      
    |
    |   71| 
    |
    |   72|                                                                                       
    |
    |   73|
    CATCH cx_grfn_exception.                                                           
    |
    |   74| 
    ev_authorized = abap_false.                                                      
    |
    |   75|                                                                                       
    |
    |   76|  ENDTRY.                                                                              
    |
    |   77|                                                                                       
    |
    |   78|ENDMETHOD.                                                                             
    |
    |Contents of system fields                                                                    
    |
    |Name
    |Val.                                                                                
    |
    |SY-SUBRC|4                                                                                   
    |
    |SY-INDEX|2                                                                                   
    |
    |SY-TABIX|1                                                                                   
    |
    |SY-DBCNT|1                                                                                   
    |
    |SY-FDPOS|0                                                                                   
    |
    |SY-LSIND|0                                                                                   
    |
    |SY-PAGNO|0                                                                                   
    |
    |SY-LINNO|1                                                                                   
    |
    |SY-COLNO|1                                                                                   
    |
    |SY-PFKEY|                                                                                    
    |
    |SY-UCOMM|                                                                                    
    |
    |SY-TITLE|HTTP Control                                                                        
    |
    |SY-MSGTY|                                                                                    
    |
    |SY-MSGID|                                                                                    
    |
    |SY-MSGNO|000                                                                                 
    |
    |SY-MSGV1|                                                                                    
    |
    |SY-MSGV2|                                                                                    
    |
    |SY-MSGV3|                                                                                    
    |
    |SY-MSGV4|                                                                                    
    |
    |SY-MODNO|0                                                                                   
    |
    |SY-DATUM|20130313                                                                            
    |
    |SY-UZEIT|115004                                                                              
    |
    |SY-XPROG|SAPCNVE                                                                             
    |
    |SY-XFORM|CONVERSION_EXIT                                                                     
    |
    |Active Calls/Events                                                                          
    |
    |No.   Ty.     
    Program                        
    Include                        
    Line   |

    Name                                                                                   
    |
    |   34 METHOD  
    CL_GRRM_DASHBOARD_MENU_AUTH===CP
    CL_GRRM_DASHBOARD_MENU_AUTH===CM001
    59  |

    CL_GRRM_DASHBOARD_MENU_AUTH=>IF_GRFN_MENU_ITEM_AUTH~IS_AUTHORIZED                      
    |
    |   33 METHOD  
    CL_GRFN_API_MENU_ITEM_ELA=====CP
    CL_GRFN_API_MENU_ITEM_ELA=====CM001   126  |

    CL_GRFN_API_MENU_ITEM_ELA=>IF_GRFN_MENU_AUTH~ITEM_AUTH                                 
    |
    |   32 METHOD  
    CL_GRFN_API_MENU==============CP
    CL_GRFN_API_MENU==============CM003
    34  |

    CL_GRFN_API_MENU=>IF_GRFN_MENU_AUTH~ITEM_AUTH                                          
    |
    |   31 METHOD  
    CL_GRFN_LAUNCHPAD_UIBB========CP
    CL_GRFN_LAUNCHPAD_UIBB========CM006
    60  |

    CL_GRFN_LAUNCHPAD_UIBB=>IF_FPM_GUIBB_LAUNCHPAD~MODIFY                                  
    |
    |   30 METHOD  
    CL_FPM_LAUNCHPAD_UIBB_ASSIST==CP
    CL_FPM_LAUNCHPAD_UIBB_ASSIST==CM001
    76  |

    CL_FPM_LAUNCHPAD_UIBB_ASSIST=>INIT_FEEDER                                              
    |
    |   29 METHOD  
    /1BCWDY/T2POSMRSKMLY9L6LJP5Z==CP
    /1BCWDY/B_T2POSBAR6C8HPR0XTR4P   
    410  |

    CL_COMPONENTCONTROLLER_CTR=>WDDOINIT                                                   
    |

    Web Dynpro Component     
    FPM_LAUNCHPAD_UIBB                                       
    |

    Controller               
    COMPONENTCONTROLLER                                      
    |
    |   28 METHOD  
    /1BCWDY/T2POSMRSKMLY9L6LJP5Z==CP
    /1BCWDY/B_T2POSBAR6C8HPR0XTR4P   
    181  |

    CLF_COMPONENTCONTROLLER_CTR=>IF_WDR_COMPONENT_DELEGATE~WD_DO_INIT                      
    |

    Web Dynpro Component     
    FPM_LAUNCHPAD_UIBB                                       
    |

    Controller               
    COMPONENTCONTROLLER                                      
    |
    |   27 METHOD  
    CL_WDR_DELEGATING_COMPONENT===CP
    CL_WDR_DELEGATING_COMPONENT===CM004
    9  |

    CL_WDR_DELEGATING_COMPONENT=>DO_INIT                                                   
    |
    |   26 METHOD  
    CL_WDR_CONTROLLER=============CP
    CL_WDR_CONTROLLER=============CM00V
    3  |

    CL_WDR_CONTROLLER=>INIT_CONTROLLER                                                     
    |
    |   25 METHOD  
    CL_WDR_COMPONENT==============CP
    CL_WDR_COMPONENT==============CM019
    24  |

    CL_WDR_COMPONENT=>INIT_CONTROLLER                                                      
    |
    |   24 METHOD  
    CL_WDR_CONTROLLER=============CP
    CL_WDR_CONTROLLER=============CM002
    7  |

    CL_WDR_CONTROLLER=>INIT                                                                
    |
    |   23 METHOD  
    CL_WDR_CLIENT_COMPONENT=======CP
    CL_WDR_CLIENT_COMPONENT=======CM00E
    24  |

    CL_WDR_CLIENT_COMPONENT=>INIT                                                          
    |
    |   22 METHOD  
    CL_WDR_CLIENT_COMPONENT=======CP
    CL_WDR_CLIENT_COMPONENT=======CM00A
    42  |

    CL_WDR_CLIENT_COMPONENT=>IF_WDR_COMPONENT_FACTORY~CREATE_COMPONENT                     
    |
    |   21 METHOD  
    CL_WDR_COMPONENT_USAGE========CP
    CL_WDR_COMPONENT_USAGE========CM009
    67  |

    CL_WDR_COMPONENT_USAGE=>IF_WD_COMPONENT_USAGE~CREATE_COMPONENT                         
    |
    |   20 METHOD  
    CL_FPM_COMPONENT_MANAGER======CP
    CL_FPM_COMPONENT_MANAGER======CM003
    81  |

    CL_FPM_COMPONENT_MANAGER=>ADD_COMPONENT                                                
    |
    |   19 METHOD  
    CL_FPM_COMPONENT_MANAGER======CP
    CL_FPM_COMPONENT_MANAGER======CM004
    19  |

    CL_FPM_COMPONENT_MANAGER=>ATTACH_COMPONENT_TO_USAGE                                    
    |
    |   18 METHOD  
    CL_FPM========================CP
    CL_FPM========================CM005
    89  |

    CL_FPM=>PROCESS_EVENT                                                                  
    |
    |   17 METHOD  
    CL_FPM========================CP
    CL_FPM========================CM00C
    34  |

    CL_FPM=>RUN_EVENT_LOOP                                                                 
    |
    |   16 METHOD  
    CL_FPM========================CP
    CL_FPM========================CM002
    5  |

    CL_FPM=>IF_FPM~RAISE_EVENT                                                             
    |
    |   15 METHOD  
    CL_FPM========================CP
    CL_FPM========================CM003
    11  |
    |

    Hi Alberto,
    The below Notes should resolve!
    1428775
    1744179
    Hope this helps,
    Luciana

  • Issue while enabling Access Control for a Coherence server node

    Hi
    Im trying to enable access control for a Coherence server node, using the default Keystore login method shipped with Coherence. When i start the server i get the error "java.security.AccessControlException: Unsufficient rights to perform the operation". Please see below for the sequence of steps I've followed to enable access control. I just need to be enable Authentication (not authorization) at this stage
    1. I have added the following entry in the Coherence Operational override file
    <security-config>
              <enabled system-property="tangosol.coherence.security">true</enabled>
              <login-module-name>Coherence</login-module-name>
              <access-controller>
                   <class-name>com.tangosol.net.security.DefaultController</class-name>
                   <init-params>
                        <init-param id="1">
                             <param-type>java.io.File</param-type>
                             <param-value>keystore.jks</param-value>
                        </init-param>
                        <init-param id="2">
                             <param-type>java.io.File</param-type>
                             <param-value>permissions.xml</param-value>
                        </init-param>
                   </init-params>
              </access-controller>
              <callback-handler>
                   <class-name>com.sun.security.auth.callback.TextCallbackHandler</class-name>
              </callback-handler>
         </security-config>
    2. The following is the entry in the Permissions.xml
    <?xml version='1.0'?>
    <permissions>
    <grant>
    <principal>
    <class>javax.security.auth.x500.X500Principal</class>
    <name>CN=admin,OU=Coherence,O=Oracle,C=US</name>
    </principal>
    <permission>
    <target>*</target>
    <action>all</action>
    </permission>
    </grant>
    </permissions>
    3. The following is the content of the Login configuration file "Coherence_Login.conf"
    Coherence {
    com.tangosol.security.KeystoreLogin required
    keyStorePath="keystore.jks";
    4. The following is the command line tag for starting the server
    java -server -showversion -Djava.security.auth.login.config=Coherence_Login.conf -Xms%memory% -Xmx%memory% -Dtangosol.coherence.cacheconfig=PROXY-cache-config.xml -Dtangosol.coherence.override=FOL-coherence-override.xml -Dcom.sun.management.jmxremote.port=6789 -Dcom.sun.management.jmxremote.authenticate=false -Dtangosol.coherence.security=true -cp "%coherence_home%\lib\coherence.jar" com.tangosol.net.DefaultCacheServer %1
    Following is the output on the Console when running the command. It asks for a username and password for the JKS store (If i provide the wrong password, it gives a different error, which shows that it is able to authenticate aganst the Keystore). After i put in the password, it throws the error as shown below "java.security.AccessControlException: Unsufficient rights to perform the operation"
    D:\Coherence\FOL_CacheServer>fol-cache-server
    java version "1.6.0_20"
    Java(TM) SE Runtime Environment (build 1.6.0_20-b02)
    Java HotSpot(TM) 64-Bit Server VM (build 16.3-b01, mixed mode)
    Username:admin
    Password:
    Exception in thread "main" java.security.AccessControlException: Unsufficient ri
    ghts to perform the operation
    at com.tangosol.net.security.DefaultController.checkPermission(DefaultCo
    ntroller.java:153)
    at com.tangosol.coherence.component.net.security.Standard.checkPermissio
    n(Standard.CDB:32)
    at com.tangosol.coherence.component.net.Security.checkPermission(Securit
    y.CDB:11)
    at com.tangosol.coherence.component.util.SafeCluster.ensureService(SafeC
    luster.CDB:6)
    at com.tangosol.coherence.component.net.management.Connector.startServic
    e(Connector.CDB:20)
    at com.tangosol.coherence.component.net.management.gateway.Remote.regist
    erLocalModel(Remote.CDB:10)
    at com.tangosol.coherence.component.net.management.gateway.Local.registe
    rLocalModel(Local.CDB:10)
    at com.tangosol.coherence.component.net.management.Gateway.register(Gate
    way.CDB:6)
    at com.tangosol.coherence.component.util.SafeCluster.ensureRunningCluste
    r(SafeCluster.CDB:46)
    at com.tangosol.coherence.component.util.SafeCluster.start(SafeCluster.C
    DB:2)
    at com.tangosol.net.CacheFactory.ensureCluster(CacheFactory.java:998)
    at com.tangosol.net.DefaultConfigurableCacheFactory.ensureServiceInterna
    l(DefaultConfigurableCacheFactory.java:923)
    at com.tangosol.net.DefaultConfigurableCacheFactory.ensureService(Defaul
    tConfigurableCacheFactory.java:892)
    at com.tangosol.net.DefaultCacheServer.startServices(DefaultCacheServer.
    java:81)
    at com.tangosol.net.DefaultCacheServer.intialStartServices(DefaultCacheS
    erver.java:250)
    at com.tangosol.net.DefaultCacheServer.startAndMonitor(DefaultCacheServe
    r.java:55)
    at com.tangosol.net.DefaultCacheServer.main(DefaultCacheServer.java:197)

    Did you create the weblogic domain with the Oracle Webcenter Spaces option selected? This should install the relevant libraries into the domain that you will need to deploy your application. My experience is based off WC 11.1.1.0. If you haven't, you can extend your domain by re-running the Domain Config Wizard again (WLS_HOME/common/bin/config.sh)
    Cappa

  • Access control exception only on Linux/Debian not on Windows!?

    We have a rmi server application with a webstart rmi swing client that we have been running successfully on Windows. The client is downloaded and running without any problems on Windows platforms (W2003, Win2K, WinXP). The client webstart jar is signed and all permissions is set in the jnlp file.
    As soon as we setup a server on linux/debian sarge we get these access control exceptions when the server tries to send events back to the client. It complains on
    file permssions not being set on the server jar file and the strange thing is that the path separator is backslash on linux?
    I've tried the following:
    1) java.policy. Added All permssions to the server jar file and/or bin the folder.
    2) Running without any security manager, i.e., System.setSecurityManager(null)
    3) Explicitly setting the policy on the server. Policy.setPolicy(...)
    4) Explicitly setting a policy on the client. URL policyUrl = Thread.currentThread().getContextClassLoader().getResource("server.policy");
    5) Building the server and client on debian
    I'm at my wits end... I've searched these forums and it seems that this is might be a common problem but I've not found a solution yet.
    Our system works 100% on Windows without any problems, it's only on linux/debian that we get these access control problems.
    2005-sep-19 09:39:19 se.xxx.xxx.admin.AdminManager change
    ERROR: java.security.AccessControlException: access denied (java.io.FilePermission \\usr\local\XXX\bin\server.jar read)
    java.security.AccessControlContext.checkPermission(Unknown Source)
    java.security.AccessController.checkPermission(Unknown Source)
    java.lang.SecurityManager.checkPermission(Unknown Source)
    java.lang.SecurityManager.checkRead(Unknown Source)
    java.io.File.exists(Unknown Source)
    sun.net.www.protocol.file.Handler.openConnection(Unknown Source)
    sun.net.www.protocol.file.Handler.openConnection(Unknown Source)
    java.net.URL.openConnection(Unknown Source)
    sun.rmi.server.LoaderHandler.addPermissionsForURLs(Unknown Source)
    sun.rmi.server.LoaderHandler.access$300(Unknown Source)
    sun.rmi.server.LoaderHandler$Loader.<init>(Unknown Source)
    sun.rmi.server.LoaderHandler$Loader.<init>(Unknown Source)
    sun.rmi.server.LoaderHandler$1.run(Unknown Source)
    java.security.AccessController.doPrivileged(Native Method)
    sun.rmi.server.LoaderHandler.lookupLoader(Unknown Source)
    sun.rmi.server.LoaderHandler.loadClass(Unknown Source)
    sun.rmi.server.LoaderHandler.loadClass(Unknown Source)
    java.rmi.server.RMIClassLoader$2.loadClass(Unknown Source)
    java.rmi.server.RMIClassLoader.loadClass(Unknown Source)
    sun.rmi.server.MarshalInputStream.resolveClass(Unknown Source)
    java.io.ObjectInputStream.readNonProxyDesc(Unknown Source)
    java.io.ObjectInputStream.readClassDesc(Unknown Source)
    java.io.ObjectInputStream.readOrdinaryObject(Unknown Source)
    java.io.ObjectInputStream.readObject0(Unknown Source)
    java.io.ObjectInputStream.readObject(Unknown Source)
    sun.rmi.server.UnicastRef.unmarshalValue(Unknown Source)
    sun.rmi.server.UnicastServerRef.dispatch(Unknown Source)
    sun.rmi.transport.Transport$1.run(Unknown Source)
    java.security.AccessController.doPrivileged(Native Method)
    sun.rmi.transport.Transport.serviceCall(Unknown Source)
    sun.rmi.transport.tcp.TCPTransport.handleMessages(Unknown Source)
    sun.rmi.transport.tcp.TCPTransport$ConnectionHandler.run(Unknown Source)
    java.lang.Thread.run(Unknown Source)
    sun.rmi.transport.StreamRemoteCall.exceptionReceivedFromServer(Unknown Source)
    sun.rmi.transport.StreamRemoteCall.executeCall(Unknown Source)
    sun.rmi.server.UnicastRef.invoke(Unknown Source)
    se.xxx.xxx.client.XXXApplication_Stub.notify(Unknown Source)
    )

    I have two suggestions. The first is that you didn't indicate the permissions of the file and the directories above it along with the user you're running the program as. In Unix it is easier to get an access issue as you're probably not running as root. In a traditional Windows environment everything runs with admin permission allowing access to anything. While the error comes from the security manager it has nothing to do with traditional J2SE security - it may be an O/S level thing.
    But the second suggestion touches on the other question you have - why is this showing up as backslashes? Is there perhaps an issue with the JNLP file? Is there any code that should be using System.getProperty( "file.separator") and is instead just using the backslash?

  • War file and access control with WebLogic

    I am trying to put some access control on different files in my war-file, but just can't get it to work... It seems like all roles defined in weblogic.properties gives the user access to all files in the war. I just don't understand the connections between the security realm, the weblogicURL.policy file and the web.xml file... If I do not specify a weblogic.security.URLAclFile, no access control is done at all.
    This is how my weblogic.properties file looks like:
    weblogic.security.URLAclFile=e:\\weblogic\\weblogicURL.policy
    weblogic.password.koko=kokokoko
    weblogic.password.arnebelinda=arne1234
    weblogic.security.group.ppuseradmins=arnebelinda
    and my weblogicURL.policy:
    deny Principal weblogic.security.acl.GroupImpl "everyone" {
    Permission weblogic.security.acl.URLAcl "weblogic.url", "/admin/-";
    and finally, my web.xml-file:
    <!DOCTYPE web-app PUBLIC "-//Sun Microsystems, Inc.//DTD Web Application 2.2//EN"
    "http://java.sun.com/j2ee/dtds/web-app_2_2.dtd">
    <web-app>
         <session-config>
              <session-timeout>30</session-timeout>
         </session-config>
         <welcome-file-list>
              <welcome-file>index.jsp</welcome-file>
         </welcome-file-list>
         <security-constraint>
              <web-resource-collection>
                   <web-resource-name>admin</web-resource-name>
                   <url-pattern>index.jsp</url-pattern>          </web-resource-collection>
              <auth-constraint>
                   <role-name>ppuseradmins</role-name>
              </auth-constraint>
         </security-constraint>
         <login-config>
              <auth-method>BASIC</auth-method>
              <realm-name>WebLogic Server</realm-name>
         </login-config>
         <security-role>
              <role-name>ppuseradmins</role-name>
         </security-role>
    </web-app>
    it does not matter which user is part of the ppuseradmins group. The user koko is not a member, but is given access to my whole .war anyway (after submitting correct username/password). Omitting the <realm-name> does not seem to work either; the default realm is not used, instead null is used.
    Does anybody have a clue? I would really appreciate it!
    I am using WebLogic 5.1 sp 9
    best regards,
    PJ

    In you pocily file entry, you have specified "/admin/-"
    However, in the <security-constraint> element in web.xml, your <url-pattern> is not set to /admin
    Could that be the problem ?

  • War file and access control

              I am trying to put some access control on different files in my war-file, but just
              can't get it to work... It seems like all roles defined in weblogic.properties
              gives the user access to all files in the war. I just don't understand the connections
              between the security realm, the weblogicURL.policy file and the web.xml file...
              If I do not specify a weblogic.security.URLAclFile, no access control is done
              at all.
              This is how my weblogic.properties file looks like:
              weblogic.security.URLAclFile=e:\\weblogic\\weblogicURL.policy
              weblogic.password.koko=kokokoko
              weblogic.password.arnebelinda=arne1234
              weblogic.security.group.ppuseradmins=arnebelinda
              and my weblogicURL.policy:
              deny Principal weblogic.security.acl.GroupImpl "everyone" {
              Permission weblogic.security.acl.URLAcl "weblogic.url", "/admin/-";
              and finally, my web.xml-file:
              <!DOCTYPE web-app PUBLIC "-//Sun Microsystems, Inc.//DTD Web Application 2.2//EN"
              "http://java.sun.com/j2ee/dtds/web-app_2_2.dtd">
              <web-app>
              <session-config>
              <session-timeout>30</session-timeout>
              </session-config>
              <welcome-file-list>
              <welcome-file>index.jsp</welcome-file>
              </welcome-file-list>
              <security-constraint>
              <web-resource-collection>
              <web-resource-name>admin</web-resource-name>
              <url-pattern>index.jsp</url-pattern> </web-resource-collection>
              <auth-constraint>
              <role-name>ppuseradmins</role-name>
              </auth-constraint>
              </security-constraint>
              <login-config>
              <auth-method>BASIC</auth-method>
              <realm-name>WebLogic Server</realm-name>
              </login-config>
              <security-role>
              <role-name>ppuseradmins</role-name>
              </security-role>
              </web-app>
              it does not matter which user is part of the ppuseradmins group. The user koko
              is not a member, but is given access to my whole .war anyway (after submitting
              correct username/password). Omitting the <realm-name> does not seem to work either;
              the default realm is not used, instead null is used.
              Does anybody have a clue? I would really appreciate it!
              I am using WebLogic 5.1 sp 9
              best regards,
              PJ
              

    In you pocily file entry, you have specified "/admin/-"
    However, in the <security-constraint> element in web.xml, your <url-pattern> is not set to /admin
    Could that be the problem ?

  • ADF UIX Role Based Access Control Implementation

    Hi,
    Can anybody suggest a detailed example or tutorials of how to implement a role based access control for my ADF UIX application.
    The application users can be dymanically added to specific roles (admin, Secretary, Guest). Based on the roles, they should be allowed to access only certain links or ADF entity/view operations. Can this be implemented in a centralized way.
    Can this be done using JAZN or JAAS. If so, Please provide me references to simple tutorial on how to do this.
    Thanks a lot.
    Sathya

    Brenden,
    I think you are following a valid approach. The default security in J2EE and JAAS (JAZN) is to configure roles and users in either static files (jazn-data.xml) or the Oracle Internet Directory and then use either jazn admin APIs or the OID APIs to programmatically access users, groups and Permissions (your role_functions are Permissions in a JAAS context).
    If you modelled your security infrastructure in OID than the database, an administrator would be able to use the Delegated Administration Service (DAS), as web based console in Oracle Application Server. To configure security this way, you would have two options:
    1. Use J2EE declarative security and configure all you .do access points in web.xml and constrain it by a role name (which is a user group name in OID). The benefit of this approach is that you can get Struts actions working dirctly with it because Struts actions have a roles attribute.
    The disadvantage is that you can't dynamically create new roles because they have to be mapped in web.xml
    2. Use JAAS and check Permissions on individual URLs. This allows you to perform finer grained and flexible access control, but also requires changes to Struts. Unlike the approach of subclassing the DataActionForward class, I would subclass the Struts RequestProcessor and change the processRoles method to evaluate JAAS permissions.
    The disadvantage of this approach is that it requires coding that should be done carefully not to lock you in to your own implementation of Struts so that you couldn't easily upgrade to newer versions.
    1 - 2 have the benefit of that the policies can be used by all applications in an enterprise that use Oracle Application Server and e.g. SSO.
    Your approach - as said - is valid and I think many customers will look for the database first when looking at implementing security (so would I).
    Two links that you might be interested in to read are:
    http://sourceforge.net/projects/jguard/ --> an open source JAAS based security framework that stores the user, roles and permissions in database tables similar to your approach
    http://www.oracle.com/technology/products/jdev/collateral/papers/10g/adfstrutsj2eesec.pdf --> a whitepaper I've written about J2EE security for Web applications written with Struts and JavaServer pages. You may not be able to use all of it, but its a good source of information.
    Frank

  • How to add access control to a WebService in Weblogic

    Hello experts,
    I developed a Web Service and I deployed it on Weblogic: it reads a SOAP request and, according to the input, it performs some actions.
    Now we would need to implement an access control on it, we read some information in the documentation we find on google, but none of these was exhaustive: did anyone of you implemented already an access control policy?
    And how did you do?
    Thank you

    Hello Arunkumar,
    my JDev is 11.1.1.5.0.
    I checked the documentation, but it's not clear for me in which of those scenarios we are: we have an Oracle Service Bus that needs to contact an application, but we don't want to grant a direct access to it.
    So the bus is calling the web service that it's triggering the events on the application.
    Everything works fine, but we need now to put at least an access control method, in order to avoid that a simple call from SoapUI may triggers the operations on our Web Service.

  • Query: Best practice SAN switch (network) access control rules?

    Dear SAN experts,
    Are there generic SAN (MDS) switch access control rules that should always be applied within the SAN environment?
    I have a specific interest in network-based access control rules/CLI-commands with respect to traffic flowing through the switch rather than switch management traffic (controls for traffic flowing to the switch).
    Presumably one would want to provide SAN switch demarcation between initiators and targets using VSAN, Zoning (and LUN Zoning for fine grained access control and defense in depth with storage device LUN masking), IP ACL, Read-Only Zone (or LUN).
    In a LAN environment controlled by a (gateway) firewall, there are (best practice) generic firewall access control rules that should be instantiated regardless of enterprise network IP range, TCP services, topology etc.
    For example, the blocking of malformed TCP flags or the blocking of inbound and outbound IP ranges outlined in RFC 3330 (and RFC 1918).
    These firewall access control rules can be deployed regardless of the IP range or TCP service traffic used within the enterprise. Of course there are firewall access control rules that should also be implemented as best practice that require specific IP addresses and ports that suit the network in which they are deployed. For example, rate limiting as a DoS preventative, may require knowledge of server IP and port number of the hosted service that is being DoS protected.
    So my question is, are there generic best practice SAN switch (network) access control rules that should also be instantiated?
    regards,
    Will.

    Hi William,
    That's a pretty wide net you're casting there, but i'll do my best to give you some insight in the matter.
    Speaking pure fibre channel, your only real way of controlling which nodes can access which other nodes is Zones.
    for zones there are a few best practices:
    * Default Zone: Don't use it. unless you're running Ficon.
    * Single Initiator zones: One host, many storage targets. Don't put 2 initiators in one zone or they'll try logging into each other which at best will give you a performance hit, at worst will bring down your systems.
    * Don't mix zoning types:  You can zone on wwn, on port, and Cisco NX-OS will give you a plethora of other options, like on device alias or LUN Zoning. Don't use different types of these in one zone.
    * Device alias zoning is definately recommended with Enhanced Zoning and Enhanced DA enabled, since it will make replacing hba's a heck of a lot less painful in your fabric.
    * LUN zoning is being deprecated, so avoid. You can achieve the same effect on any modern array by doing lun masking.
    * Read-Only exists, but again any modern array should be able to make a lun read-only.
    * QoS on Zoning: Isn't really an ACL method, more of a congestion control.
    VSANs are a way to separate your physical fabric into several logical fabrics.  There's one huge distinction here with VLANs, that is that as a rule of thumb, you should put things that you want to talk to each other in the same VSANs. There's no such concept as a broadcast domain the way it exists in Ethernet in FC, so VSANs don't serve as isolation for that. Routing on Fibre Channel (IVR or Inter-VSAN Routing) is possible, but quickly becomes a pain if you use it a lot/structurally. Keep IVR for exceptions, use VSANs for logical units of hosts and storage that belong to each other.  A good example would be to put each of 2 remote datacenters in their own VSAN, create a third VSAN for the ports on the array that provide replication between DC and use IVR to make management hosts have inband access to all arrays.
    When using IVR, maintain a manual and minimal topology. IVR tends to become very complex very fast and auto topology isn't helping this.
    Traditional IP acls (permit this proto to that dest on such a port and deny other combinations) are very rare on management interfaces, since they're usually connected to already separated segments. Same goes for Fibre Channel over IP links (that connect to ethernet interfaces in your storage switch).
    They are quite logical to use  and work just the same on an MDS as on a traditional Ethernetswitch when you want to use IP over FC (not to be confused with FC over IP). But then you'll logically use your switch as an L2/L3 device.
    I'm personally not an IP guy, but here's a quite good guide to setting up IP services in a FC fabric:
    http://www.cisco.com/en/US/partner/docs/switches/datacenter/mds9000/sw/4_1/configuration/guides/cli_4_1/ipsvc.html
    To protect your san from devices that are 'slow-draining' and can cause congestion, I highly recommend enabling slow-drain policy monitors, as described in this document:
    http://www.cisco.com/en/US/partner/docs/switches/datacenter/mds9000/sw/5_0/configuration/guides/int/nxos/intf.html#wp1743661
    That's a very brief summary of the most important access-control-related Best Practices that come to mind.  If any of this isn't clear to you or you require more detail, let me know. HTH!

  • Any best practice to apply role based access control?

    Hi,
    I am starting to apply the access permissions for new users as being set by admin. I am choosing Role Based Access Control for this task.
    Can you please share the best practices or any built-in feature in JSF to achieve my goal?
    Regards,
    Faysi

    Hi,
    The macro pattern is my work. I've received a lot of help from forums as this one and from the Java developers community in general and I am very happy to help others and share my work.
    Regarding the architect responsibility of defining the pages according to the roles that have access to them : there is the enterprise.software infrastructure.facade
    java package.
    Here I implemented the Facade GoF software design pattern in the GroupsAndRolesAccessFacade java class. Thus, this is the only class the developer uses in order to define groups and roles of users and to define their access as per page.
    This is according to Java EE 6 tutorial, section VII Security, page 471.
    A group, role or user is created with an Identity Management application or by a custom application.
    Pages of the application and their sections are defined or modified together with the group, role or user who has access to them.
    For this u can use the createActiveGroup and createActiveRole methods of the GroupsAndRolesAccessFacade class.
    I've been in situations where end users very strict about the functionality of the application.
    If you try to abstract web development, u can think of writing to database, reading from database and modifying the database as actions.
    Each of these actions should have suggester, approver and implementor.
    Thus u can't call the createActiveGroup method for example, without calling first the requestActiveGroupCreationHelper and then the approveOrDeclineActiveGroupCreationHelper method.
    After the pages a group has access to have been defined with the createActiveGroup method, a developer can find out the pages and their sections a group has access to by calling the getMinimumInformationAboutGroup method.
    Further more, if the application is very strict, that is if every action which envolves writing to the database must be recorded, this concept of suggester, approver and implementor is available throught the recordActiveGroupAction method.
    For example, there is a web shop, its managers can change the prices of the products, but the boss will want to know who had the dared to lower prices.
    This action of lowering prices, is an action of modifying the information in the database and u can save in the database who suggested it, who approved it and who implemented it.
    Now that I write about the functionality of the macro pattern, I realise that some methods should have more proper names and I haven't had time to write documentation in the API, but this will be a complete when I add the web pages for the architect to use for defining access control and for the end users to view who and what is doing with their application.

Maybe you are looking for

  • [JS] CS3 pageRange conversions & validation

    Hi there Is there an easy way to convert page range string to absolute page numbers (especially when it contains characters or Roman numerals). We use a custom rubber stamp on the back of our draft pages during the proofing process. I'd like to creat

  • My application doesn't start when I run the domain as windows service

    I am using weblogic 10.3.2 and i created a domain called rec_domain and i have AdminServer also i deployed application called myApplication to the rec_domain then i created windows service to run the server as a windows service The Script for Setting

  • Sync Palm desktop to Address Book

    Can I sync contacts from my palm desktop into address book

  • Amarok and an Ipod

    I finally got fed up with the slow scrolling on itunes and am trying to learn how to use amarok. One question: Can I get amarok to import an audio CD into the ipod format? Will it look up the CD track info on the web? Are itunes files smaller than MP

  • Unlock files and folders in TC

    I use TC as a regular ext. HD. No TM. So, I locked some folders and files, now I can't unlock them. Info options doesn't work. What may I do?