Controlled Entity Security Access

Hi
Hope someone can provide a detailed solution to the following scenario:
Entity Dimension
Entity Total
  Entity 1
    Base 1.1
    Base 1.2
  Entity 2
    Base 2.1
What I'm looking to achieve is, User X should ONLY be able to see and submit data for Base 1.1, User Y should ONLY be able to see and submit data for Base 1.2, and User Z should be able to see Entity 1 (and it's children) and can submit commentary, but not change data.
I can manage the ability to provide commentary (via Profiles) and restrict changes to data (via data locking) - but I'm unable to find a solution to entity access.  I have tried playing around with Member Access Profile, no success - I must be missing a trick.
Any help is welcomed.
Thanks
Parminder

Solved the issue...security was not processing correctly

Similar Messages

  • Link does not work for-End-of-Sale and End-of-Life Announcement for the Cisco Secure Access Control System 5.4

    Link does not work for
    End-of-Sale and End-of-Life Announcement for the Cisco Secure Access Control System 5.4
    How do we get Cisco to fix?
    see attachment

    Give it a couple of days - it looks like they just sent out the notification before the notice was published on the public page.
    Once the ACS 5.4 EoS/EoL notice is published you should see it linked from this page.

  • Cisco Secure Access Control Server Solution Engine OR Cisco Secure Access Server ?

    Which product is really affected, the Cisco Secure Access Control Server Solution Engine which is a hardware applliance with software from 3.2 to 4.2 or the Cisco Secure Access Control Server Software appliance available for installing as a virtual machine into VMware ESX/ESXi 5.0 with 5.X software ?
    Thank you for clarifying
    Best regards
    Marco

    Hi Thomas,
    You can download ACS for windows 4.1 or 4.2 from the below listed link:
    http://www.cisco.com/cgi-bin/tablebuild.pl/acs-win-eval
    For ACS 5.x, please visit cisco.com
    Download software > Security  > Cisco Secure Access Control System 5.x  > Secure Access Control System Software
    HTH
    Regards,
    Jatin
    Plz rate helpful posts-

  • APO Security to control the users access

    Hi,
    Is there any possibility to control the users access by controlling through selection ID's or does it possible through any of the product lines (Characteristics)?
    My requirement is I have to control all the APO DP users in various levels of Product lines and the access has to be granted at specific product level. Right now I am trying do through selection ids, but I am looking for more effective way.
    Please help me with your views.
    Thank you in advance!
    Jegan

    Hi Jegan,
                  There are so many security objects in DP that you can try out and see if they meet your requirement.
    The way I understand your issue is to restrict user by certain products or BW characteristics.
    To control by Products, try the object  C_APO_PROD with activity APO_PROD (Product Identifier). You can select specific products here for each role and restrict by either display, change, execute, delete etc.
    If you want to restrict by BI characteristics, try  object S_RS_AUTH.
    Be careful with this as you are selecting BI objects, the system restricts them even if they are remote part of your work.
    If you have to restrict by specific product levels like all product lines, I am not sure how to do it but you can certainly try searching based on keyword "PROD".
    Please let us know if you discover something useful.

  • Cisco Secure Access Control Server for Windows 3.0

    I have to rebuild a server using Cisco Secure Access Control Server for Windows 3.0 ... I cannot locate this software under "download software" in cisco.com ..
    where can I download a copy for Cisco Secure Access Control Server for Windows 3.0 ?

    Hi,
    You can not download the ACS windows Solution engines softwares from the cisco.com > download pages as these s/w are not available there. You can only download patches and remote agent software.
    In order to get any ACS software/ upgrade assistance you need to open up a TAC case.
    Also, ACS 3.0 is not supported by Cisco anymore..getting support for this version or any 3.x is not possible.
    HTH
    Regards,
    JK

  • How do you control the security of the Acrobat tab in MS Office ribbons in Citrix

    To stay in licensing compliance, we control who has access to Adobe Acrobat by using Active Directory for our Citrix users. This works for the actual program, but how do I make it so the Acrobat tab, in Office programs, doesn't even show up for those who aren't in the security group (as of now, it shows up but they can't click on anything inside of it without getting errors). What about the options in the right click context menu? I don't want non-acrobat users to be able to see the option "Combine Files in Acrobat" when they right click on a file.

    You can use the Menu Editor extension to rearrange menu items - https://addons.mozilla.org/firefox/addon/menu-editor

  • Securing access

    I have pressed an old G3 iMac (which was simply gathering dust) into service as a server for a small business. This Mac serves an intranet site as well as access to files which people in this business can share and modify either while in the office itself or remotely (at least on the Mac side). I downloaded and installed SharePoints to restrict access to a certain section on this Mac when accessed either in the office or remotely. My next step is to provide remote access to PC users and those running OS 9 with the same ease as those running on OS X in the office, bearing in mind security. What would be an ideal solution?
    Roland
    G4 466    

    Why?  It isn't going to matter.  You can remove public and anybody can still call the code using reflection (accessibility doesn't matter there).  You can obfuscate and any disassembler can still get back the code.  You aren't really
    protecting your code from anything but you are adding more work.
    If you have a design where you don't want something to be directly callable outside the assembly then you can mark it internal.  You can use the InternalsVisibleTo attribute to identify assemblies that will be able to call your internal members. 
    But you really should only do this in the rare cases where it makes sense (aka unit testing).  Accessibility is for controlling visibility, not access so use it as such.
    Michael Taylor
    http://blogs.msmvps.com/p3net

  • Security Access on Period Dimension

    Hi,
    my system version is 9.3.1. I have a Planning application and i want manage security for the Period dimension.
    I was able to define Security access for other standard dimension like Account or Entity but can't understand why it doesn't work with Period.
    My Period dimension is quite common (Month-Quarter-TotalYear) and i have implemented Dynamic Time Series on it.
    Have you ever implemented Security access on Period Dimension?If yes, how?
    Thanks in advance.
    Stefano

    I assume that setting the start period and end period on the scenario is not adequate for your needs? (this will restrict access to periods for a given scenario as long as you are using web input forms or smart view).
    - Jake

  • How can I revert back to the default config on Secure Access Server 5.3?

    We recently purchased new Secure Access Control Servers version 5.1 and have upgraded to version  5.3 with current patches.  Several people have configured one of the appliances and we would like to revert back to the original config with no NDGs or Devices or any other variables configured.  Is this possible?

    While looking up a command in the CLI reference, I also found the command to reset the acs to factory default.  It is "acs reset-config".  This resets the acs portion only, not the linux appliance, so your IP addresses, DNS, etc. are retained.  It does clear out the license for the ACS, so if you use this make sure you have the license file.  You will also have to go through the initial password setup again.

  • Mounted drives security access rights

    Hi!
    I am troubleshooting mounted volume security access issues on Server 2012 R2 and created a test folder "test adm_fla", and mounted a small disk to it to test adding permissions. See image below: (taken from the Security tab on the folder "test
    adm_fla")
    On the other hand, if I look at the Properties of the mounted volume (from the General tab on the test adm_fla folder) and the Security tab, this is what I see:
    Why are not the TendSign permissions I set manually listed here? I thought they would be "linked"/added automatically somehow
    The issue is actually that, according to the customer, manual TendSign... permissions we have specified as inhereted on all folders, suddenly get removed, and we don't know why. These TendSign volumes are replicated to another server.
    Has anybody had this issue before?

    Hi,
    The mounted volume is placed in an empty folder of the host NTFS volume. The empty folder inherits permissions from the Root volume. But the explicit permissions on the mounted volume don’t propagate across the root volume.
    For more detailed information about the permissions on root volume, mounted volume, mounted volume link folders, you could refer to the article below:
    NTFS Volume Mount Points & List folder permissions
    https://jthys.wordpress.com/2010/09/04/microsoft-volume-mount-points-list-folder-permissions/
    Please Note: Microsoft is providing this information as a convenience to you. The sites are not controlled by Microsoft. Microsoft cannot make any representations regarding the quality, safety, or suitability of any software or information found there.
    Best Regards,
    Mandy
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact [email protected]

  • Providing un-secured access to a web report.

    Hello Experts,
    We have been sending out 'Load Status' emails on a daily basis for various BW loads. Recently we discontinued this process and set up a report based on one of the statistics cube. We got out the link for this web-report to all the users in our daily load status distribution list.
    The problem now is that when you click on the link, it pops out a window asking for the log-on information to our production system. But it looks like a few of the users do not have access to the production system and are hence unable to access this web-report.
    Is there any way to allow un-secured access to this particular web-report to all users i.e.without a screen asking for log-on information?Is it possible to set up a generic user id for this report that allows all the users to access this report without actually giving them access to our production system?
    Thanks
    Arvind

    Arvind,
    What is your BI system version ?
    if it is 3.x - then the URL will have a link to your server followed by a Question mark "?" and then some parameters.
    The value till the ? mark is the Web service for the same - you can make this Anonymous in SICF but then this would mean that all queries can be accessed through this URL ...
    else create an RFC enabled function module based on RRW3_Query_View_data and then use this for your query and expose the same as a web service and make it anonymous ... or have a BSP page to do the same....

  • How do I use airport extreme to control individual device access?

    I don't understand how I can control individual device access to the web using my AirPort Extreme.
    I set up the network on a PC (for technical reasons) but hoping to control access of individual devices (including a Mac but also iPods and iPads) to the web using an iPad (although can use the PC if necessary).  I have downloaded AirPort Utility on the PC and an iPad but can't work out what to do next.
    Can anyone please provide some instructions or point me in the right direction?

    The AE has no controls except timed access to wireless.. is that what you are after??

  • Creating Historical based Security Access Type

    I am trying to create a Security Access Type for PPLJOB that will look at the Reg_Region of an employee and if the historical rows of JOB contain the reg_region, use the employee in a Data Permission for Security. I want to know if anyone has tried this before and how the SQLID for Where needed to be coded. I created a SQLID with the following statement which didn't pull any employees:
    PA.EMPLID = JOB.EMPLID AND PA.EMPL_RCD = JOB.EMPL_RCD AND JOB.EFFDT = (SELECT MAX(EFFDT) FROM PS_JOB JOB2 WHERE JOB.EMPLID = JOB2.EMPLID AND JOB.EMPL_RCD = JOB2.EMPL_RCD AND JOB2.EFFDT <= %CurrentDateIn) AND JOB.EFFSEQ = (SELECT MAX(EFFSEQ) FROM PS_JOB JOB3 WHERE JOB.EMPLID = JOB3.EMPLID AND JOB.EMPL_RCD = JOB3.EMPL_RCD AND JOB.EFFDT = JOB3.EFFDT) AND JR.EMPLID = JOB.EMPLID AND JR.EMPL_RCD = JOB.EMPL_RCD AND JR.EFFDT = JOB.EFFDT AND JR.EFFSEQ = JOB.EFFSEQ AND JOB.REG_REGION <> %Bind(SCRTY_KEY1) AND EXISTS (SELECT 'X' FROM PS_JOB JOB4 WHERE JOB.EMPLID = JOB4.EMPLID AND JOB.EMPL_RCD = JOB4.EMPL_RCD AND JOB4.EFFDT < JOB.EFFDT AND JOB4.REG_REGION = %Bind(SCRTY_KEY1))

    Thank you for the feedback Carl. Again, I am new to this, so please be patient with me. I am not sure what you mean about adding the parameter to the record selection formula. I have drug the parameter field into the report so that it will prompt for parameters before running, but I do not think that is what you are talking about. Please advise.
    To your question about the Submit Date field in the report, when I open up the report and I point at the field for Submit Date the popup shows HPD_Help_Desk.Submit_Date (DateTime). That being the case, I think the answer to your question is that the data type of the data being returned is DateTime. Thanks again for the assistance.

  • Problem with Cisco Secure Access Server 3.0

    Hi All,
    Please what is my problem? I use Cisco Secure Access Server Version 3.0 for Windows 2000/NT Servers to authenticate users on our wireless network. I however wish to assign monthly time limits to each user after which he/she will no longer have access until next month or the timer is reset. I tried this with the "User Usage Quota" under User setup. I set the Server to "Limit user to X hours of online time per Month" and enabled the "Use these settings" and also checked the box by the side of the option. I saved and restarted my server. Unfortunetly the settings did not work for all the users whose quotas I set.
    What Am I doing wrong. Please assist.
    Chafe

    Do you have your AP's sending accounting data? If not, ACS has no way of knowing how long they've been online?
    You can utilize your ACS logging to see what your accounting looks like to confirm whether you are receiving accounting packets or not?
    HTH
    Jeff

  • Controlling Entity Posting Order to Avoid Constraint Violations

    Hi all,
    I am using Jdeveloper 11.1.1.2.
    I want to create a row in a master table, then when I commit, I want automatically creating a Row in its detail table.
    I am following the instructions of the paragraph 38.8 Controlling Entity Posting Order to Avoid Constraint Violations of the manual.
    I have a problem when I write:
    myTable.setNumberField(NumberField);
    compiling, I have this error: myTable.setNumberField(Number) cannot invoke myTable.setNumberField(oracle.jbo.domain.Number) in myTableEOImpl
    I have created myTableEOImpl.java automatically, using the java tab in myTableEO
    How can I solve it?
    Andrea

    Hi,
    you must make sure that data types passed to an Oracle ADF BC Number field are pf type oracle.jbo.domain.Number. Often developers forget to import this class and use Java lang Number instead
    Frank

Maybe you are looking for

  • Magnetic media

    What transaction is used to generate a magnetic media file, I used B1B2, but it is for Canada. These files are SSA files and where are they saved in the system. I can view them in the Tax Reporter but If I run for many employees, these files needs to

  • Loop though folder in the order of filename

    Is there a way in ssis using for each loop container to loop through all the files in the order of file names. for example if I have 1.txt 2.txt 3.txt 4.txt I want to process 1.txt then 2.txt and so on instead of processing 1. txt then 4.txt and then

  • Best practice for calc measures

    Hi, I read in one of the olap blog from experts which says that best practice for creating the calc measures is to have them in a seperate cube. My question is that suppose I have two cubes in a AW of different dimensionality. Both the cubes has some

  • Numbers 3.2 has changed too much, it doesn't work with my project anymore. How do I revert back to the previous version I was using?

    Numbers 3.2 has changed too much, it doesn't work with my project anymore. 1) The sheet panels used to be on the left hand side and easily reviewable and searchable, but now they are on the top and it's harder to find a specific folder without scroll

  • Can i start a photo slideshow directly on detail view?

    Hi all, Im working on my website right now, and am trying to make a photo page where the album is displayed directly with the detail view (with the small thumbnails on top), is this possible? I tried Cyclosaurus' way, but i still dont see anything ha