Authorization questions

So, this may be a dumb question and I have tried to find an answer to no avail. I am wanting to set up iTunes to use the same information for all three users on one iMac. I am hoping this will include the iTunes authorizations (which are limited to only 5 total).
Is this possible? What I don't want is to have one computer (with three users) use up over half of the authorizations on one machine. If it is possible, can anyone direct me to instructions on how to set it up? Right now iTunes set up for one of the users.
Thank you for any help you can provide.

OK, that clarifies, thank you.
The issue is that (I assume) each user has at least one device (e.g., iPhone).
Each device will count in the authorization count.  You can have up to five devices.  There is no way to avoid this, given the constraints of each user having at least one device.
Remember that music, movies, apps, etc. are protected items (i.e., generally not free).  You would not simply be able to share these items indiscriminately with other folks.

Similar Messages

  • TS1277 i cant remember my 2 authorization questions  answers and when when i click send to email it sends to an email adress thats not mine and now i cant use my $100 what should i do?

    i cant remember my authorization questions answers and when i click send to email it sends to a random email thats not even created but hotmail.
    what should i do???!

    You need to ask Apple to reset your security questions. To do this, click here and pick a method; if that page doesn't list one for your country or you're unable to call, fill out and submit this form.
    (126538)

  • Forgot my authorization questions how cani change them

    i got a new computer and i dont remember my itunes authorization questions, how can i change them?

    Click here and search the article for '2 out of 3'. Follow the instructions.
    (74000)

  • Complicated Authorization Question

    Complicated Authorization Question
    I had my itunes software on my laptop with the songs on a portable hard drive. The laptop was stolen, the portable hard drive was not. I installed itunes on the new laptop and pointed to the music on the portable hard drive and it is telling me I am not authorized to play certain songs although I have authorized the computer. Also when I try to snyc my iphone it is saying it is going to erase all the songs on the iphone and replace them. I have purchased songs on the phone that are not in my itunes.
    How do I resolve this?

    Have you tried to play one of the songs in iTunes? It should then ask you to authorize them.

  • Authorization question-Two users on one computer

    My wife and I are going to share a MacBook and all our iTunes purchases are shared under one iTunes account. 
    My questions are...Will iTunes need to be authorized twice? And do both user logins count towards the 5 authorizations?
    Thanks for any help.

    iTunes Store: About authorization and deauthorization - http://support.apple.com/kb/HT1420
    I'm not 100% positive about this but I believe authorization is for a whole machine.

  • Multiple Libraries - Authorization Question - For NON-iTune purchased music

    Please help! The questions come at the end.
    I have an extensive classical music iTunes library in AAC format that I ripped from CDs I've purchased over the past 20 years. NON of these were purchased from iTunes. (I have another library on my PC with other music, and I have purchased some iTunes songs for that library). I access one or the other by pressing Shift, etc. No problem.
    Both my son and I listen to classical music, and I wanted to share this library with him by moving my classical iTunes Library to his computer. (I copied the entire folder structure from my PC to his, nearly 50 GB worth). So he now has 2 libraries on his computer. One (the classical library) and his own iTunes library.
    He can access the classical library (hold down shift key, etc.), but gets a message to "AUTHORIZE THE FILE SOURCE" before listening to the music. So my questions:
    ++ Why does he need to authorize music from non-iTunes source? I'm not trying to illegally give him anything from iTunes. My family owns this classical CD collection.
    ++ If he does need to authorize the FILE SOURCE, I suppose he would use MY iTUNES account information to do so. Is this correct? Or should he use HIS account information?
    ++ And if he does use my account info, _will he retain his iTunes account setting for his other iTunes Library_? I.e., He would have a classical music library that's authorized by me (I guess my second computer?), and his regular library with his account information?
    This sounds more complicated than it is (maybe it IS more complicated than I think (sic).
    Any help greatly appreciated.

    I could be wrong, but if that's the exact message he's getting, it sounds more like a file permssions error in Windows rather than the typical iTunes authorization message which brings up an obvious request for an iTunes Store ID and password. I'd suggest he look at the Windows permissions for the folder and it's contents and see if perhaps he doesn't have the correct permissions to access that material.
    Hope this helps.

  • Authentication and Authorization question.

    Hi All,
    I require your help in getting validated my understanding on Authentication and Authorization. This is wrt to WebLogic Server and WebLogic Portal.
    Authentication.
    1. The custom authentication provider can authenticate(user and group) against any datastore(LDAP OR DB). The LoginModule is a kind of blockbox and it can return true/false depending on authentication.
    2. The end result of this process is true/false.
    Authorization.
    1. The custom authorization providers can authorize the authenticated user based on role. All these entities ie(user,group,role) can be either in LDAP OR DB.
    2. The end result of this process is true/false.
    Role mapping.
    1. The custom role mapper can put all the roles that a user belongs and returns all Role. This can happen agaist LDAP OR DB.
    2. The end result is list of roles for a user.
    Security policy configuration.
    Is it mandatory that a user/group/role should be existing in WebLogic Server LDAP server(OR Portal LDAP server) to create these policies and authorization rules. What i mean by is that can user,group,role can exist in application specific database and still can be used for creatiing security policies??
    Thanks,
    Prashanth Bhat.

    The Security Providers are useful/can be used for developing a standard j2ee application , which will be deployed as standard j2ee application.
    The DA means Delegated Administrator, which is way how portal components are restricted to different types of administrators.
    The VE means Visitor Entitlemens, which is way how portal components are restricted to end users.
    My question is whether thess(DAs and VEs) can also be put
    our datastore for access rights??
    Thanks,
    Prashanth Bhat.

  • Help! Authorization question

    OK, this might be a silly question, but I thought I'd give it a shot.
    I have iTunes installed on two computers. One doesn't have the internet hooked up and to listen to certain songs, it says I need to authorize them. So is there any way I can authorize these songs without being hooked up to the internet?

    You don't need to be connected to the internet in order to authorize the computer ( it's not the songs you are authorizing). Just play a few seconds of one of them.
    See this.
    About computer authorization.

  • Analysis Authorization questions

    How does Analysis Authorizations work in below cases
    1)Infoobject "A" set as Authorization relevant (In Bex explorer tab)
    2)Infoobject "B" which is ATTRIBUTE of infooobject "A" set as Authorization relevant
    3)Infoobject "A" and "B" both set as Authorization relevant
    How to design query in each of the cases above with or without authorization variables and what parameters to be set in the RSECADMIN for infoobject "A" and "B" in each case like ":", "*" and what would be the behaviour after setting the above behaviour .
    can any one give example above with demonstration please

    Hi John,
    please search first the forum and read the online documentation before posting these kind of questions. You should find more than enough information via the above mentioned channels. You save time and effort of your peers.
    To answer your questions briefly:
    1. 0COUNTRY is in the free characteristics (not in the drilldown) without any selections
    ==> You need the ':' value, since whenever you ommit a characteristic you basically see want to see the summary value (you summarize / accumulate over the specific characteristics). Nevertheless, as soon as you drilldown on the characteristic you need the specfic values of the drilldown.
    - or-
    2. 0COUNTRY is not used in the query.
    ==> You need ':', too.
      Cheers
        SAP NetWeaver BI Organisation

  • Authorization questions PFCG...

    Hi Guys
    A Couple of questions...
    We are upgrading from an older version of CRM without WEB UI to 7.0, we have composite roles on all our user, i.e. more than 1 role per user. As I have understood it you only have the possibility to assign on PFCG ROLE ID to a specific Business Role in the WEBGUI.
    I know how to set up the business roles etc, these questions are more "how did they intend it to work"...
    1. Overall Question, How should we use this PFCG role?  
    2. I have heard that you can leave it blank, what does this mean, that it the users authorization is as before i.e. as defined with the multiple composite roles stored directly on the user?
    3. How does this PFCG Role on the Business Role work together with the PFCG Roles you have on the users directly? What is the  meaning of the PFCG ROLE on the business role in relation to the ones on the user?
    4. Should we delete the roles on the users and add them directly on the business role, we might have a problem there as many users work as "SALESPRO" but they have different authorizations, some are more senior than others. Would we then have to have several busines roles (SALESPROJR,SALESPROSR etc) as we can only have 1:1 between business role and pfcg role id.
    5. What we would like to have basically is 2 or 3 Business roles that sets the layout and basic worksets, the authorization should behave as before per user not per business role. 
    Any relevant input on these questions will be greatly rewarded.
    /Jabba

    UGLY for some reason there are no line breaks... I will try to fix it so it is readable after lunch....
    Thanks,  Very Grateful for your comments but I think we have to be abit more specific. I will try to clarify
    I understand how the standard roles work together with the standard PFCG ROLE IDs assigned to them. However we already have a structure for our authorization roles that is on user level via su01 and each user has several composite roles. To merge these roles into one PFCG role and assign it to a business role is unrealistic, this will create too many business roles for the user as there can be only a 1:1 relation between a Business role and PFCG ROLE assigned to the business role.
    With that said I have been recommended to leave the PFCG ROLE id on the business role blank, this will lead to that the authorization on the user level kicks in.  
    However this raises some additional questions...
    1 The authorizations in our old CRM system could not possibly cover the authorizations in the WEB GUI as we don't have a   WEBGUI today so are there any special authorizations we need to setup for the WEBGUI itself. Example: Lets say that in the old CRM system the user had authorization to create a service order. If the user keeps this authorization on su01 do we need to add any additional authorizations on the user or to the business role so he can access the workset and trigger create service order from the WEBGUI?
    2 IF we had both a PFCG ROLE ID assigned to the Business Role and Composite roles directly on the user which one will actually be used? Will they both be used? What happens if the authorization on the Business role says "NO" and the authorization on su01 says "YES" Or is it really as it is stated above answer that if we specify a PFCG ROLE ID on the business role this will be used and nothing else?
    3  What about our own authorization objects, is there a way to scan these and see if they are valid for CRM 7.0? How should we go about verifying our old authorizations in the new 7.0 system? Is there a report you can run? I guess also that some authorizations are not valid anymore, or how does the authorizations per transaction work. I mean we have in our roles added certain transactions, people will no longer use CRMD_ORDER how does this translate to the webgui?
    4 We are using the salesorg structure today and the plan is based on what we know so far to assign business roles to the positions and not to assign a PFCG ROLE id at all to business role. Can anyone see any problems with this?
    5 What is UIU_COMP is that a new auth object? What new auth objects are delivered in webgui?
    Again thanks for any input on the above. Perhaps more people will be interested if we make this investigation thorough.
    BTW I found this post Re: Reg: Business Role but it still leaves some questions unanswered.
    Edited by: jabba hut on Nov 10, 2009 1:52 PM

  • (de)authorization questions

    I pretty much know the how's of authorization and deauthorization of computers within iTunes and the Music Store.
    What I don't know is why are we allowed to do the "deauthorize all" only once per year. And how is that year measured? It is a calendar year, 12 months since the last deauth, or what?
    Also, does anybody know the mechanism by which a computer is identified? Is it the MAC address on the NIC or some other hardware or maybe a software token? That's probably a closely guarded secret to keep people from forging said token. And that's too bad that people would do that. But I wondered if a computer with Boot Camp/Windows XP would consume another authorization if the OS X partition already had been authorized. I haven't tried it yet and that's why I'm asking.
    I'm really just curious about all that. I am trying to clean up my iTunes mess that's spread across about 4 computers and move it all to a centralized place.
    Bob
    MBP   Mac OS X (10.4.6)  

    the only thing that i'm sure of as an answer to any of these questions is that when u deautherize all once a yr the yr is measured from when u actually deauthorize.

  • HT1420 I forgot my authorization questions

    I am trying to purchase my first app on my new iPhone 5 but iTunes wants to authorize my account first. Problem is that I can not remember the answers to my two Security questions

    If you have a rescue email address (which is not the same thing as an alternate email address) set up on your account then the steps half-way down this page should let you reset them : http://support.apple.com/kb/HT5312
    If you don't have a rescue email address (you won't be able to add one until you can answer 2 of your questions) then you will need to contact iTunes Support / Apple to get the questions reset.
    Contacting Apple about account security : http://support.apple.com/kb/HT5699
    When they've been reset (and if you don't already have a rescue email address) you can then use the steps half-way down the HT5312 link above to add a rescue email address for potential future use

  • HT1420 Forgot answers to authorization questions

    I forgot my authorization answers to the two questions.  How do I find the answers?

    If you have a rescue email address (which is not the same thing as an alternate email address) set up on your account then you can try going to https://appleid.apple.com/ and click 'Manage your Apple ID' on the right-hand side of that page and log into your account. Then click on 'Password and Security' on the left-hand side of that page and on the right-hand side you might see an option to send security question reset info to your rescue email address.
    If you don't have a rescue email address then see if the instructions on this user tip helps : https://discussions.apple.com/docs/DOC-4551

  • Process Integrator authorization question

    Regarding the API that Process integrator exposes for both the client and server
    is there any authorization performed at the EJB and method level. I haven't found
    any documentation on this. For example, I log in as a non-admin user into Process
    Integrator and use the EJB Admin object to try and create a template definition,
    but I shouldn't have the permission to do this.

    I don't know much about WLPI, but I have forwarded this along internally and
    someone should be contacting you soon.
    Thanks,
    Michael
    Michael Girdley
    BEA Systems Inc
    "Hugo Penafiel" <[email protected]> wrote in message
    news:[email protected]..
    Hi,
    I'm not sure where to ask a Process Integrator question so I have
    decided to ask here. I have been asked to look at business
    process (workflow) automation. I have read the datasheet and your
    whitepaper on Process Integrator and my question at the moment
    is "How do we integrate Process Integrator with existing sets of
    EJB's? How does it tie together with WebLogic 5.1 (is it a bunch
    of EJB's deployed on top of the app server ala Commerce Server)?
    I'm looking for more technical answers so that I have some
    understanding in estimating how much work/effort it would take
    to use this product. I also know that this is your engine for your
    future Collaborate product, however, that product will not be
    available soon enough to tackle our customers current needs.
    Thanks for your patience in reading this long message and
    I would appreciate any answers including "forget about it until
    Collaborate goes to market!". I would like to give an honest
    technical reason to my manager about why we should
    consider using Process Integrator.
    Thanks again!
    Hugo
    408-861-5292
    marchFIRST
    Cupertino, CA 95014

  • De-Authorizing/Re-Authorization Question

    Hi Everyone.  Thanks for the help in advance.
    I recently discovered/remembered that my iTunes account is authorized on the limit of 5 machines.  Many of them are old/"dead" that I forgot to deauthorize.  I understand the only real option I have is to de-authorize all.  My question is, will de-authorizing all the computers using my apple ID and then reauthorizing the 2 I want effect iTunes match at all?  Also, does my iPhone (or other iOS devices) count against the 5 authorization limit?
    Thanks.

    click here for information.
    JGG

Maybe you are looking for

  • [SOLVED]dd not writing anything to disk with sync being used.

    I just want to post here to try and figure out what was going on here, I was trying to use dd to create a bootable arch usb. I've done similar things a half dozen times so I didn't think much of it. I unmounted the usb drive I wanted with umount /dev

  • Public & Private folder - Configuration

    Hi, I connected EP with DMS using DMS Connector for KM. But only Dynamic folder is showing in Portal. I am unable to upload or create any files in these folders.  In SAP help it is mentioned that this can be done with Public and Private folders.  Wha

  • Employee Attendance Related

    Hi I have two forms to mark employee attendance daily and employee Leave.Which employees are present marking attendance P into emp_attendance table. i have to keep record of the absent teacher who didn't inform and emplyee which are on leave.Which em

  • MobileMe instead of iCloud

    I have the latest Software on my MacBook Air (when I ask for Software actualization, it gives the the message that I have the newest), but it gives me MobileMe instead of iCloud in the "Systemeinstellungen" - wht do I have to do? I Have also the iPho

  • Trying to figure out how to get custom quiz concept to work

    OK so I've been trying to get this concept to work in CP4. I have simulation quiz questions that gives the user 2 attempts to answer the quiz. The one hitch is that if the user get the question wrong the first time it gives them an "incorrect try aga