BW Implementation guidance

Dear Colleagues,
We are about to start new BW implementation project. This would be our first encounter with BW new implementation. So is there any link to site or material which provides details like implementation guidelines and how to start from start?
Regards
Pank

Hi Pank and welcome on board!
Take a look to BI Best Practice in https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/com.sap.km.cm.docs/library/unkown/sap best practices.htm !
Hope it helps!
Bye,
Roberto
(and please don't forget to assign points to the anserws...it's THE way to say thanks here...)

Similar Messages

  • Azure and WORM for compliance

    Does Azure support WORM capability to store legal health records when it is used an archive target?

    hi,
    I suggest you should read the
    Windows Azure HIPAA Implementation Guidance. This document was developed to assist customers who are interested in HIPAA and the HITECH Act to understand the relevant capabilities of Windows Azure. The intended audience includes privacy officers, security
    officers, compliance officers, and others in customer organizations responsible for HIPAA and HITECH Act implementation and compliance. The document covers some of the best practices for building HIPAA compliant applications, and details (http://www.windowsazure.com/en-us/support/trust-center/compliance/
    ). Also, the document included the encrypt/decrypt data policy.
    See the same thread (http://social.msdn.microsoft.com/Forums/windowsazure/en-US/bead4059-8946-465f-b5ac-c9ef70d0ba6b/azure-blob-storage-hipaa-compliance-question?forum=windowsazuredata
    Hope it helps.
    Regards,
    Will
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • Azure SQL DB - HIPAA Compliance...

    Is Azure SQL HIPAA compliant yet? if not, when will it be? we have a solution that utilizes Azure services heavily and Azure SQL is an important component of this solution. it is not ideal to not have it covered as well.
    also, if it is NOT currently HIPAA compliant, then what is the recommended approach to integrating SQL Server into an Azure solution? should we host SQL Server on-premise with a Service Bus connection to our cloud services, or host it within Virtual
    Machine(s) hosted in Azure? if we take that approach, how do we setup fail-over scenarios to ensure the VM solution is as reliable as on-premise?
    thanks in advance from your comments and advice.
    Ben

    Hello,
    1.Windows Azure
    announced in July 2012 that it's offering HIPAA BAA to customers and partners who need to build HIPAA compliant applications. But the BAA is not yet available for Windows Azure SQL Database.For more information, please review Windows Azure Trust Center
    compliance page and
    Windows Azure HIPAA Implementation Guidance document.
    2. Windows Azure provides high availability mechanisms, such as service healing for cloud services and failure recovery detection for the Virtual Machines. When running SQL Server in Windows Azure VMs, Windows Azure doesn't guarantee the desired HADR capabilities
    of SQL Server. But you can deploy high availability solution for your SQL Server databases in Windows Azure using AlwaysOn Availability Groups or database mirroring.
    Reference:High Availability and Disaster Recovery for SQL Server in Windows Azure Virtual Machines
    Regards,
    Fanny Liu
    If you have any feedback on our support, please click here.
    Fanny Liu
    TechNet Community Support

  • Guidance regarding oracle projects implementation

    Hi,
    Can you please explain the steps regarding implementation of oracle projects in an organization. what approach we will take. what all things are taking into consideration.
    any documents please share. plse send it to my mail - [email protected]
    Thanks in advance.

    Hi Experts,
    Same question here - is it possible to have some sample Buisness Process documentation, BR100, Functional specification , AS-TO-be or test cases, Tech Spect etc.. which is used for implementation of Oracle Projects in any Orgnization?
    If possible share the same on [email protected]
    Thanks :-)

  • Need guidance for implementing perimeter authentication

    Hello,
    1.) I have a WLS and a WLI Server on different servers, both have access to the same Active Directory LDAP.
    2) I want the WLS application to authenticate a user via username/password, and then call the WLI JPD process (on the other server) as that user, WITHOUT having to re-authenticate the user (that was authenticated on the WLS).
    3.) It sounds like I need perimeter authentication, BUT do I need to customize an authentication and assertion provider, etc --OR is there someway of configuring Weblogic's default providers?
    Thanks for any and all help!
    Keith

    export is not a backup.Export is not a Physical backup but its a logical backup...:)
    I agree sybrand it is recommended not to rely on Export because it is inconsistent...but it is still valid if an user acciedentaly drops the tables or objects..
    Cheers
    Maran

  • Sharepoint (Public facing site) Project Guidance

    Hi friends ,
    This is my first sharepoint project (SP 2013) for which I have been asked to develop a public facing internet site.
    I do have a basic idea about certain concepts of sharepoint but still I'm looking for a guidance to how to go about with the project.
    Requirements :
    1. There are many modules. And each module has many courses. 
    ROLES : Anonymous Users : Read and download
        Content Authors : Add, Edit, Delete content.
        Approvers : Publish content
    Need to implement cross-site publishing model (correct me if I'm wrong).
    3. In one of the webpages of the website, there will be a table in the layout displayed as below: in which anonymous users can only read and download
    documents. The brochure icons should allow to download document when clicked. Only authors have the authority to do any editing of the content as mentioned earlier.
    Title                             
    Duration                                              
    Brochure
    --------------------------------------------MODULE 1------------------------------------
    Course 1
    Course 2
    --------------------------------------------MODULE 2------------------------------------
    Course 1
    --------------------------------------------MODULE 3------------------------------------
    Course 1
    Course 2
    Course 3
    4. Authors  should have an interface where they can input the dates for individual courses for the entire year like in a calendar control and
    display to anonymous users (only read) a  set of all the courses scheduled like below:
                Jan       Feb     Mar     
    Apr      May     June    July     Aug     Sep     Oct       Nov      Dec
                --------------------------------------------MODULE 1------------------------------------
    Course1 08-10                         02-04
    Course2                       05-09
    --------------------------------------------MODULE 2------------------------------------
    Course1 08-10                         02-04
    Course2                       05-09
    QUERIES :
    1. Based on my minimal knowledge, I suppose I should use document library for creating courses under specific modules.
    But how do I customize the look and feel of the library based on the layout mentioned.
    2. How to implement the calendar kind of functionality and how to combine all the scheduled courses together to be displayed in a webpage?
    3. should I first design the authoring and publishing sites, then create master pages and then go for creating all list and libraries? What should
    be the protocol for the above project?
    Guys, its my humble request to please help me out :( :( :(.....Thank you in advance. Sorry for such a long description. Spare me on this. Have a good
    day :)

    1. Since I want a column called brochure which should be an icon (for each course record) and which will invoke upload/download( for authors) and only download for anonymous users, is there a datatype that is supported  in custom list...because I couldn't
    find any. Or do I have to implement a document library app?
    Inder: Try Image content type. But on click it will download image and not whole course material. So my suggestion here is to create a calculated column to pull image and link download.
    2. I would be very grateful if you could  provide me with some useful links which might have a step by step procedure for implementing site architechture :
    a)cross site publishing model
    b) how to define the user permissions and content approval workflow for approvers
    c) Customizing style of the custom list through sharepoint designer
    Correct me if I'm wrong :
    The protocol should be :
    1. To plan site architechture which involves implementing cross site publishing model     Inder: Yes, if required
    2. Defining Lists and libraries ( I hope document library app is not required for the above specs..custom list should be fine) Inder : Yes
    3. Customizing the style of custom lists and calendar functionality through sharepoint designer. : Inder: Prefer using CSS and designer.
    4. Applying master pages and page layouts. : Inder Perfect. 3-4 can go together
    If this helped you resolve your issue, please mark it Answered

  • How to implement Force password change during authentication

    Description of problem
    Our client requires web applications to support its internal security policy beyond
    normal authentication. This includes:
    - force password change periodically. This should be performed at logon time.
    - maintain password history so that a new password would not repeat any of its
    previous 15 changes.
    We already have an authentication server that satisfy these requirements. However,
    we would also like to base our solution on WebLogic security framework so that
    we can leverage the benefit of the container-managed declarative security (e.g.
    we don't need to use our special cookie to check whether a user is authenticated
    for every web page in the application). So the best scenario for us is to wrap
    up this authentication server using WLS 7.0 authentication SSPI.
    My initial investigation of WLS 7.0 security framework (based on edocs and the
    sample customer security provider codes) convinced me that overall, this is achievable.
    However, I am still left with quite a few questions, which I would like to get
    your help.
    Questions:
    1. (web container) The J2EE-standard container-based authentication is to specify
    <login-config> element. My understanding is that only FORM based authentication
    is applicable. The specified form elements:
    <form method="post" action="j_security_check">
    <INPUT TYPE="TEXT" NAME="j_username">
    <INPUT TYPE= "password" NAME="j_password">
    </form>
    is adequate for authentication. However, if the authentication service provider
    indicates that password change is needed, what would be the most appropriate way
    within WebLogic for the authentication service provider to pass such a flag to
    the web container know so that our application can access it? I guess, a simpler
    question, would be, using the standard <login-config>, webapp knows only about
    authentication fails or succeeds. Can it possibly know more information provided
    by the authentication service provider right after authentication?
    2) If we don't use standard FORM-based authentication, we will code up our own
    authentication control, which could give us a lot more flexibility, but can we
    then bind our Subject obtained through our authentication control to the WebLogic
    Subject that is running the webapp.
    3) (Authentication service provider) Our design is for the custom LoginModule
    to delegate login calls to the authentication server, and throws more refined
    exceptions such as: FailedLoginException, PasswordExpiredException, UserAccountLockedException
    (all subclassed from LoginException). Another approach is to provide detailed
    information such as password expired in callbacks. Either way, when Authentication
    service provider returns, how our web application can access this refined flag
    of authentication result.
    4) Can our customer authentication service provider use DataSource defined in
    a weblogic server? I ask this question because DataSource itself is a protected
    resource of WebLogic. Will referencing it during authentication initiate another
    authentication cycle?
    Can anyone who has experienced similar requirements and worked solutions please
    give me a hint? I appreciate your guidance.
    regards
    Licheng

    "Licheng" == Licheng <[email protected]> writes:
    Licheng> Description of problem
    Licheng> Our client requires web applications to support its internal security policy beyond
    Licheng> normal authentication. This includes:
    Licheng> - force password change periodically. This should be performed at logon time.
    Licheng> - maintain password history so that a new password would not repeat any of its
    Licheng> previous 15 changes.
    Licheng> ..
    Licheng> We already have an authentication server that satisfy these requirements. However,
    Licheng> we would also like to base our solution on WebLogic security framework so that
    Licheng> we can leverage the benefit of the container-managed declarative security (e.g.
    Licheng> we don't need to use our special cookie to check whether a user is authenticated
    Licheng> for every web page in the application). So the best scenario for us is to wrap
    Licheng> up this authentication server using WLS 7.0 authentication SSPI.
    I believe it's impractical to fit the requirement of forcing a password change
    into the standard JAAS interface.
    I think the only practical way to do this is to implement a servlet filter that
    reads the persistent record of the logged-in user to check for a "force change
    password flag". If it finds this, the servlet filter will forward to a page to
    change your password. Note that the servlet filter may be hit again when
    trying to get to the change password page, so it needs to know to not do the
    check in that case.
    If you implement this, I would strongly urge you to softcode the "change
    password" page URL in your system configuration, and not hardcode it in the
    servlet filter.
    ===================================================================
    David M. Karr ; Java/J2EE/XML/Unix/C++
    [email protected] ; SCJP; SCWCD

  • Implementing SSO in OBIEE 11g

    Hi All,
    We have a requirement to implement custom SSO with OBIEE 11g.
    Is configuration of SSO in OBIEE 11g similar to that of OBIEE 10.1.3 ? (10g steps mentioned below)
    1. Changing Instanceconfig.xml
    2. Adding a user “Impersonate ” in Repository
    3. Adding Impersonate user Credentials to Credential Store using cryptotools
    4. Add Credential Store information to Instanceconfig .xml file
    Are there any additional configurations required to be related to weblogic integration with OBI?

    What sort of SSO setup are you looking to implement? The security model in 11g is much more complex and unfortunatelly it's all in Weblogic. I don't think that was a good idea but Oracle it's obviously pushing to use all of its products into OBIEE.
    On the positive side OBIEE 11g now supports configuring authentication and SSO with Active Directory and Windows Native Authentication using Kerberos (the next generation authentication protocol after NTLM). This SSO solution is sometimes called "silent SSO" as does not require domain authenticated users to login to OBIEE and it's completely transparent. In view it's the "real and proper" SSO solution as it's server side and it's unspoofable. Oracle Support Note ID 1274953.1 provides guidance on how to do that. The configuration process is complex but it provides a way to use Windows Native Authentication out-of-the-box in OBIEE 11g without having to rely on custom/3er party components or any additional license costs.

  • ASA 5505 Best Practice Guidance Requested

    I am hoping to tap into the vast wealth of knowledge on this board in order to gain some "best practice" guidance to assist me with the overall setup using the ASA 5505 for a small business client.  I'm fairly new to the ASA 5505 so any help would be most appreciated!
    My current client configuration is as follows:
    a) business internet service (cable) with a fixed IP address
    b) a Netgear N600 Wireless Dual Band router (currently setup as gateway and used for internet/WiFi access)
    c) a Cisco SG-500-28 switch
    d) one server running Windows Small Business Server 2011 Standard (primary Domain Controller)
         (This server is currently the DNS and DHCP server)
    e) one server running Windows Server 2008 R2 (secondary Domain Controller)
    f) approximately eight Windows 7 clients (connected via SG-500-28 switch)
    g) approximately six printers connected via internal network (connected via SG-500-28 switch)
    All the servers, clients, and printers are connected to the SG-500-28 switch.
    The ISP provides the cable modem for the internet service.
    The physical cable for internet is connected to the cable modem.
    From the cable modem, a CAT 6 ethernet cable is connected to the internet (WAN) port of the Netgear N600 router.
    A Cat 6 ethernet cable is connected from Port 1 of the local ethernet (LAN) port on the N600 router to the SG-500-28 switch.
    cable modem -> WAN router port
    LAN router port -> SG-500-28
    The ASA 5505 will be setup with an "LAN" (inside) interface and a "WAN" (outside) interface.  Port e0/0 on the ASA 5505 will be used for the outside interface and the remaining ports will be used for the inside interface.
    So my basic question is, given the information above of our setup, where should the ASA 5505 be "inserted" to maximize its performance?  Also, based on the answer to the previous question, can you provide some insight as to how the ethernet cables should be connected to achieve this?
    Another concern I have is what device will be used as the default gateway.  Currently, the Netgear N600 is set as the default gateway on both Windows servers.  In your recommended best practice solution, does the ASA 5505 become the default gateway or does the router remain the default gateway?
    And my final area of concern is with DHCP.  As I stated earlier, I am running DHCP on Windows Small Business Server 2011 Standard.  Most of the examples I have studied for the ASA 5505 utilize its DHCP functionality.  I also have done some research on the "dhcprelay server" command.  So I'm not quite sure which is the best way to go. First off, does the "dhcprelay server" even work with SBS 2011?  And secondly, if it does work, is the best practice to use the "dhcprelay" command or to let the ASA 5505 perform the DHCP server role?
    All input/guidance/suggestions with these issues would be greatly appreciated!  I want to implement the ASA 5505 firewall solution following "best practices" recommendations in order to maximize its functionality and minimize the time to implement.
    FYI, the information (from the "show version" command) for the ASA 5505 is shown below:
    Cisco Adaptive Security Appliance Software Version 8.4(7)
    Device Manager Version 7.1(5)100
    Compiled on Fri 30-Aug-13 19:48 by builders
    System image file is "disk0:/asa847-k8.bin"
    Config file at boot was "startup-config"
    ciscoasa up 2 days 9 hours
    Hardware:   ASA5505, 512 MB RAM, CPU Geode 500 MHz
    Internal ATA Compact Flash, 128MB
    BIOS Flash M50FW016 @ 0xfff00000, 2048KB
    Encryption hardware device : Cisco ASA-5505 on-board accelerator (revision 0x0)
                                 Boot microcode   : CN1000-MC-BOOT-2.00
                                 SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.03
                                 IPSec microcode  : CNlite-MC-IPSECm-MAIN-2.06
                                 Number of accelerators: 1
    0: Int: Internal-Data0/0    : address is a493.4c99.8c0b, irq 11
    1: Ext: Ethernet0/0         : address is a493.4c99.8c03, irq 255
    2: Ext: Ethernet0/1         : address is a493.4c99.8c04, irq 255
    3: Ext: Ethernet0/2         : address is a493.4c99.8c05, irq 255
    4: Ext: Ethernet0/3         : address is a493.4c99.8c06, irq 255
    5: Ext: Ethernet0/4         : address is a493.4c99.8c07, irq 255
    6: Ext: Ethernet0/5         : address is a493.4c99.8c08, irq 255
    7: Ext: Ethernet0/6         : address is a493.4c99.8c09, irq 255
    8: Ext: Ethernet0/7         : address is a493.4c99.8c0a, irq 255
    9: Int: Internal-Data0/1    : address is 0000.0003.0002, irq 255
    10: Int: Not used            : irq 255
    11: Int: Not used            : irq 255
    Licensed features for this platform:
    Maximum Physical Interfaces       : 8              perpetual
    VLANs                             : 3              DMZ Restricted
    Dual ISPs                         : Disabled       perpetual
    VLAN Trunk Ports                  : 0              perpetual
    Inside Hosts                      : 10             perpetual
    Failover                          : Disabled       perpetual
    VPN-DES                           : Enabled        perpetual
    VPN-3DES-AES                      : Enabled        perpetual
    AnyConnect Premium Peers          : 2              perpetual
    AnyConnect Essentials             : Disabled       perpetual
    Other VPN Peers                   : 10             perpetual
    Total VPN Peers                   : 12             perpetual
    Shared License                    : Disabled       perpetual
    AnyConnect for Mobile             : Disabled       perpetual
    AnyConnect for Cisco VPN Phone    : Disabled       perpetual
    Advanced Endpoint Assessment      : Disabled       perpetual
    UC Phone Proxy Sessions           : 2              perpetual
    Total UC Proxy Sessions           : 2              perpetual
    Botnet Traffic Filter             : Disabled       perpetual
    Intercompany Media Engine         : Disabled       perpetual
    This platform has a Base license.

    Hey Jon,
    Again, many thanks for the info!
    I guess I left that minor detail out concerning the Guest network.  I have a second Netgear router that I am using for Guest netowrk access.  It is plugged in to one of the LAN network ports on the first Netgear router.
    The second Netgear (Guest) router is setup on a different subnet and I am letting the router hand out IP addresses using DHCP.
    Basic setup is the 192.168.1.x is the internal network and 192.168.11.x is the Guest network.  As far as the SBS 2011 server, it knows nothing about the Guest network in terms of the DHCP addresses it hands out.
    Your assumption about the Guest network is correct, I only want to allow guest access to the internet and no access to anything internal.  I like your idea of using the restricted DMZ feature of the ASA for the Guest network.  (I don't know how to do it, but I like it!)  Perhaps you could share more of your knowledge on this?
    One final thing, the (internal) Netgear router setup does provide the option for a separate Guest network, however it all hinges on the router being the DHCP server.  This is what led me to the second (Guest) Netgear router because I wanted the (internal) Netgear router NOT to use DHCP.  Instead I wanted SBS 2011 to be the DHCP server.  That's what led to the idea of a second (Guest) router with DHCP enabled.
    The other factor in all this is SBS 2011.  Not sure what experience you've had with the Small Business Server OS's but they tend to get a little wonky if some of the server roles are disabled.  For instance, this is a small busines with a total of about 20 devices including servers, workstations and printers.  Early on I thought, "nah, I don't need this IPv6 stuff," so I found an article on how to disable it and did so.  The server performance almost immediately took a nose dive.  Rebooting the server went from a 5 minute process to a 20 minute process.  And this was after I followed the steps of an MSDN article on disabling IPv6 on SBS 2011!  Well, long story short, I enabled IPv6 again and the two preceeding issues cleared right up.  So, since SBS 2011 by "default" wants DHCP setup I want to try my best to accomodate it.  So, again, your opinion/experiece related to this is a tremendous help!
    Thanks!

  • Unable to locate the LMS's API Implementation-Error in Content Player

    Dear Guys,
    when I am playing the content in content player of Authering environment we get the following error "Unable to locate the LMS's API Implementation" ,
    Should any API be implemented explicitly?
    How can we resolve this error?
    Regards,
    Shamila.

    Hi Shamila!
    As I mentioned, you need to consult your content developer to debug this issue. In the course content(i.e. flash file) there are references to the SCORM API. These when imported in to AE loose the reference. For instance, if you have something like this .. parent.api.<some scrom function> and the parent (window or frame) has the SCORM API. This reference might be getting broken when the course package is imported in to AE. The content developer need to make changes in the code to ensure the reference to the API is changed.
    Please let me know if you require further guidance on this.
    Regards,
    Ravi Sekhar

  • HRMS Budgeting in 11.5.10.2 -- Guidance Please

    Hello,
    Does anyone have any guidance / overview / set-up documentation or information regarding the new 11.5.10 HRMS Budgeting functionality?
    Need to implement from new for a client. They have no existing budgets to convert.
    Thank you,
    Peter.

    Hi,
    Based on your country legislation you have to follow the instruction of application setup rules. Once you complete the setup you can apply required patches if any comes after the version you have installed. Best to check at Metalink for latest patches.
    To meet local legislation you have to keep up-to-date your application always.
    Thanks
    Ajit

  • Design guidance: Site workflow for sharepoint online 2013 app store product

    CONTEXT:
    I am in the early design stage for a potential Office 365 Application Store application.
    My initial target customer is small businesses with under 100 employees.
    I will use a structured data store: Initial implementation should be local (lists or Access DB), but potentially scale up to an Azure database.
    My assumption is that the customer would already be Office 365 (2013) E3 customers and this product would be an add on.
    I like workflows because they are user-friendly: I would prefer to leverage the standard SharePoint workflows rather than reinvent the wheel, but I can implement my own workflow with a custom application if I need to.
    I am OK using C#, Access, JavaScript, JQuery, HTML, SQL... whatever gives the best solution. I prefer C#.
    I prefer a Visual Studio solution that I can manage in a source code repository.
    QUESTIONS/GUIDANCE:
    Can a standard SharePoint "Site Workflow" be part of a product delivered via an Office Application Store app?
    Can a Site Workflow work with an external Azure data connection? Can it work with a local Access database?
    Can I start with a SharePoint list, and easily migrate to an Azure database later?
    Or should I forget the standard site workflow completely and just build a C# application?
    Thanks for any guidance.

    Hi,
    First my question is what type of SharePoint Apps you are talking about? SharePoint Hosted, AutoHosted or Provider Hosted apps? For AutoHosted and Provider Hosted apps you have more control - as the apps will be running outside SharePoint and then you can
    run yourworkflow outside SharePoint. Still your app will be able to access SharePoint data using REST API and you have full control of which technology you would like to use your app (C#, asp.net etc.). With SharePoint Hosted apps, your app will be running
    inside SharePoint and you will have limited capabilities to customize - only JS will be allowed in SharePoint hosted apps. You can still use workflow but you can't use external data - unless it's configured through BCS. So my suggestion would be, if are looking
    for an add-ons like solution think about non-SharePoint hosted apps. However if you are thinking of limited capabilities, then think about SharePoint hosted apps.
    Thanks,
    Sohel Rana
    http://ranaictiu-technicalblog.blogspot.com

  • How to implement this scenerio in the workflow - More details given Inside?

    We are implementing a simple PO release workflow in ECC 5.0. The workflow just has a decision step and a release step. We have implemented the workflow in our system and it seems to be working fine.
    Problem Statement:
        The client has many Purchase Order Administrators or Purchasing clerks who needs to approve the PO. But the client does not have many user logins or license to have more users in SAP. So they are checking if it is possible to have the workflow in SAP but to execute the workflow from outside SAP by using one user login.
    To be more specific, Here is what they are asking.
    1). They want that SAP must send a work item to their lotus notes inbox with a URL link in the email.
    2). The user will open the email from Lotus notes and then click on the URL link which might be something similar to the decision work item. The user will select YES or NO which is similar to clicking approve or reject
    3). Once the user has made a decision by clicking on the URL in the email they want that the PO should be released in SAP with a common user ID say WF-BATCH.
    4). We cannot use Extended notification as we would like to have only one user WF-BATCH for approval but send emails to all the Purchasing clerks. I believe that the extended notifications can only send emails to the id configured in the user master. Since the client wants to have only one user in SAP but many PO approvers  outside SAP.
    My questions:
    1). Can we configure extended notifications in workflow such that the system sends emails to different purchasing clerks in their lotus notes inbox? If yes then how can I configure that?
    2). If it is not possible then how do we achieve the requirement from outside SAP but still have the workflow?
    3). If we need to implement some external bespoke solutions then what all things would be involved? Any guidance on how this scenario can be achieved and what issues we may have?
    4). How can we trigger a workitem from outside SAP but still make it work as if it would have been triggered from SAP. Can we call some RFC FM to trigger the workitem and force a single user id?
    Any suggestions are welcome. Thanks in advance.
    any idea guys?
    Edited by: Workflow  learner on Jul 28, 2008 11:22 AM

    Well, apart from the obvious licensing issues which you should definitely discuss with your account manager, that's going to fail any audit. The 'signature' on the approval is the user's login, so if approvals are done by a common userid you will need to put a new authentication mechanism in place.
    The two major issues are:
    Forwarding - how do you control someone forwarding it to someone else to approve?
    Traceability - how can you prove who really approved it?
    This is not a small project. Much of this depends on your internal infrastructure, you will need to get Basis, Security, Networks, and Mail people involved, we cannot really help you much at this point.
    Sorry it's not the answer you want to hear.
    Good luck,
    Mike

  • Implementing DOM Interface with existing Java classes

    I had planned on using some tree-like Java classes as a Document Object Model, which would give me access to all sorts of XML and DOM tools like parsers and XSLT transformers. Initially, I thought all that would be neccessary is to implement all the DOM Interfaces in org.w3c.dom and then I would have a set of classes that conformed to DOM Level 1. It was my understanding that interfaces such as DOMImplementation and Document would interface with various XML tools, allowing creation of a class that implements Document and then Document would have its various factory methods that know how to create the various DOM nodes such as Element, Attr, Text, NamedNodeMap, NodeList, etc.
    The problem I'm seeing now is that the JAXP specification (which is what the latest Xerces and Xalan tools conform to) has something called a DocumentBuilder and DocumentBuilderFactory that appear to be necessary to tell the framework what type of class to instantiate that implements the Document DOM interface. Those appear to have a lot of methods that deal with parsing of XML documents and I didn't really want to write or even subclass any existing Parsers in order to get the functionality of traversing and transforming a set of classes that implement the DOM interface.
    Am I missing something here? Is it possible to plug in any (set of classes for) DOMImplementation and get them to work with the various DOM and XML tools out there?
    Is there an easier way to allow parts of an application access to internal data structures but have the more generic tools or APIs, such as XSL transformers, access that same set of classes as a DOM with the generic DOM interface methods?
    Can someone provide me with some guidance here? I'm in the process of finalizing some design on a system and need to know if this is possible or if I need to alter my design.
    Thanks.

    If I understand you correctly, I think I am working on a similar issue. I am unhappy with the methods given by the DOM for retrieving data from the XML file and for building a file. Our software has a bunch of code that uses these classes and it is extremely ugly. My solution was to create a facade on top of the DOM model. Essentially I have some simple classes that store all the pertinent info (for me) about the XML structure. Essentially that is the element or attribute name, its values and in the case of the element, it's children. This makes it easier for me to build and retreive the data. What I then built was a loader class and a builder class. The loader takes an XML file and parses it in using the DOM classes and builds a structure using my classes and returns the root element. The builder takes a root element and creates a DOM object out of it. This frees me of having to code around the DOM classes all over the place and makes it simple to upgrade our XML code if the DOM changes or a better DOM is released. I am using factories to facilitate this and allow me to have loaders for specific types of XML documents so that I can have a class for each which further simplifies the XML related tasks of other developers on my team.

  • Can I implement the functionality of a Schmitt trigger in LabVIEW?

    I am reading in a waveform file using the Read Waveform From File.vi.  I would like some guidance as to how to implement a Schmitt trigger using LabVIEW blocks to massage the incoming waveform into a new waveform that resembles a digital data stream.
    For example:
    When the amplitude of the incoming waveform goes over 0.7, the output is 1 and is latched until the amplitude falls below -0.7.
    Once the amplitude of the incoming waveform falls below -0.7, the output is 0 and is latched until the amplitude exceeds 0.7.

    Thanks again for the quick response.
    I am having trouble with the autoindexing: I keep getting data values of 0.
    I have attached a VI that I quickly threw together to show what I am doing.
    Please tell me if my method/reasoning is incorrect.
    Attachments:
    test1.vi ‏25 KB

Maybe you are looking for

  • How to set runtime parameter for the entire system

    Hi, I have a problem with setting runtime parameters in jre v1.6.0_07. I have an XP computer with multiple users and to use the application eavery user must set the runtime parameter once by going to java control panel -> Java -> Java applet runtime

  • How to select a different language dictionary?

    I'm using Pages 2.0.2 and I'm writing a document in Spanish. The default spell check is English, so I go to Edit -> Spell -> Spelling (as suggested by the help), but alas! there is no dictionary option! In other programs that use the Mac OS X spellin

  • Standard Asynchronous ES for Quality Management interface

    Hi, Synchronous standard ES is available for Quality Management interfaces under ES bundle.  Could you please suggest if there is any standard Asynchronous ES available for above QM interfaces like Inspection plan, Inspection results and Usage Decisi

  • How do I download the Pixel Bender plug-in for CS5?

    Everywhere I go on the Adobe site, I see links that say "click here to download Pixel Bender plug-in for CS5," but when I click on the link, it takes me to this page: http://www.adobe.com/devnet/pixelbender.html That page has "archived" downloads for

  • IPhone 5 turned off, and will not turn back on.

    My iPhone 5s turned off (battery life was approximately 30%).  I can not turn it back on, even after trying to charge.  The phone will not show that the battery is charging.  Tried plugging in to computer to attempt charging and sync, but iTunes does