Different cloning methods !!!

Hi Everyone ,
What are the different cloning methods available from 11i ? and what's the difference between every methods ?
Can anyone help me with above info.
Sorry if my question doesn't make sense..
Thanks
JP

Hi,
What are the different cloning methods available from 11i ? and what's the difference between every methods ?Please see (Note: 230672.1 - Cloning Oracle Applications Release 11i with Rapid Clone).
All 11i Rapid Clone documents can be found in (Note: 799735.1 - Rapid Clone Documentation Resources, Release 11i and 12).
Can anyone help me with above info.Read the document, and you should be able to get an answer (Single node to single node, single to multi, multi to single, RAC, refreshing database only, ..etc).
Thanks,
Hussein

Similar Messages

  • Container Managed Security on Tomcat - configuring different auth-methods

    I am trying to configure the container managed security on tomcat4. Or rather I am trying to add a further dimension to the configuration that already exists.
    At the moment the entire application uses LDAP authentication and I would like to separate an area that requires further authentication. That is to say I would like everyone using the web application to authenticate using the existing Form-Based LDAP authentication but I would like only certain users to be able to use the data upload facility (whose code is stored in it's own directory).
    This is the authentication bit of my web.xml:
      <security-constraint>
        <web-resource-collection>
          <web-resource-name>qmrae</web-resource-name>
          <url-pattern>*.do</url-pattern>
          <url-pattern>*.jsp</url-pattern>
        </web-resource-collection>
        <auth-constraint>
          <role-name>*</role-name>
        </auth-constraint>
      </security-constraint>
      <login-config>
        <auth-method>FORM</auth-method>
        <realm-name>Form-Based Authentication Area</realm-name>
        <form-login-config>
          <form-login-page>/login.jsp</form-login-page>
          <form-error-page>/loginError.jsp</form-error-page>
        </form-login-config>
      </login-config>My first hurdle is in understanding exactly how the application knows where to go for its authentication.
    I had guessed that the realm-name would map "areas" of my application to realm configuration defined in my application's context area in Tomcat's web.xml but this doesnt seem to be the case. In fact I have read conflicting explanations as to what the realm-name is for. One source has said that this is only used for BASIC authentication as a way of naming the resulting pop up window - many others say it maps the login-config to the web-resource-name. However the latter doesnt make sense because the authentication works in my application at the moment even though those values are completely different (and indeed are different in most of the examples i've read on the web). Furthermore I can find any other mention of the defined realm-name in any other file (which of course be because i'm looking in the wrong place).
    I was prepared to accept that the realm-name might not actually do anything and so I've been looking for examples of defining a different auth-method for different url-patterns but i've had no luck.
    I know a user can have one or more roles but I dont have access to the LDAP server to set these up and haven't found anything about defining different auth-methods other than one thread in this forum suggesting that is wasnt possible on AIS.
    This thread suggests that you can have more than one security-constraint but again i'm not sure about the auth methods and how you map an auth method to a security-constraint
    http://forum.java.sun.com/thread.jspa?forumID=33&threadID=320918
    To summarise my questions:
    1) What are the functions of the realm-name and web-resource-name? Are they related?
    2) Is it possible to configure different areas of an application to use different authentication methods? and if so, could you point me in the direction of relevant documentation
    3) If (2) is not possible and I have to assign a new role to the privileged LDAP users, is it enough to define a new security-constraint? Could you describe the behaviour I could expect for users that have authenticated once and try to access this super-security area, will they be shown another login form or will it just let them in because the container is already aware of their permissions.
    Many thanks for your attention,
    Rachel

    If you create your own Realm classes - look at JAAS - you can sort out your last login time, just wrap them around the DataSourceRealm.
    As far as 'remind' him is concerned - I'm guessing you mean provider a reminder for the password based on the user name. If you use form based authentication you can put what ever you like on the page.

  • Payment proposal picking up... different payment methods...

    Hi Experts
    we are testing in development phase, Payment proposal is picking up different payment methods even we entered only one payment method in the parameters.
    This should not be selected like this as per the business... process.
    Please let me know how to avoid this.
    Thanks
    Meenakshi

    Even though it will pick up the items from other payment methods. It will not pay, those items will be in the exception list. You can exclude these items though by going to 'Free Selection' tab during Parameters creation, and select the field name 'Payment method' , check box 'exclude value' and in the 'values' field enter the payment methods you want to exclude (One payment method in one row). You can exclude 6 payment methods this way.
    Thanks
    Ranjit

  • Different payment method for one invoice

    Hello everyone
    Is it possible to have multiple payment method for one invoice? As my client want to pay different payment method for one invoice.
    Could you please advise?
    Kind regards

    Yes. You can provided if you split the invoice amount into multiple payments under scheduled payments tab in invoice workbench.

  • This purchase could not be completed please select a different payment method

    I`ve bought a new BB as a present to my wife - Z3.
    I`ve registered for her new BB ID account - **Removed**@dunaeva.su
    And we can not purchase anything having the same problem using all of our cards - "this purchase could not be completed please select a different payment method",
    I`ve read a lot of forums and web pages and belive that our problem - ur sistem has flagged her account as potentially Fraudulent or Blocked.
    U shold unblock her and bring ur appoligise.
    Edit: Email removed. At no time should you provide any personal information to any other community member. Please review the Community Guidelines and Terms and Conditions of Use. for further information

    I apologize for the rudeness of my first post - i was really disappointed with the situation when i`m not able to provide to my wife fully equipped phone with all her contacts and sms (need some paid app). I`ll check up your recommendations and come back with a report or new questions.

  • Generating same SApScript output to different output methods

    Hi All,
    Can someone tell me whether it's possible to generate different out methods using the same SAPScript output. if so how to do it ??
    i.e : e-mail & printer or fax & printer.
    thanks in advance
    Dhanushka.

    Hi,
    Is there a BAPI to send the spool request as an e-mail or fax.
    About the sequence of events:
    Generating of the spool request is done using the open_form right. Once the form is closed get the spool id and send it by e-mail or fax ???.
    is this correct
    thanks & regards
    Dhanushka.

  • Different auth methods for Clientless & AnyConnect?

    The goal: To allow Clientless(portal) connections with only username/password authentication (LDAP in this case) while requiring two-factor (LDAP & Certificate) authentication for AnyConnect connections.
    The config: Since the auth methods are configured within connection profiles/tunnel groups, I am using two different profiles, one requiring only LDAP auth for use with clientless and one requiring both LDAP and client certificate authentication for AnyConnect. I have not enabled the option to allow users to choose their connection profile.
    The only way I have been able to get the AnyConnect client to use anything other than the "DefaultWEBVPNGroup" profile was to use a URL mapping for the AnyConnect tunnel group, a custom AnyConnect client profile (to specify the custom URL), and a DAP policy to deny AnyConnect connections on the "DefaultWEBVPNGroup" tunnel group.
    Resulting behavior: Web portal requires only username and password. Stand-alone AnyConnect connections require username/password & client certificate.
    The problem: Weblaunch (launching AnyConnect from the portal) installs the client, but throws an error and disconnects (see attached). Subsequent stand-alone AnyConnect connection attempts work fine.
    I assume this issue is related to the different tunnel groups using different authentication methods. If I disable the DAP policy, weblaunch works without erros, but it connects without requiring two-factor authentication.
    Does anyone know if what I am trying to do is possible and/or supported? I am open to alternative suggestions as well.
    Thanks,
    Aaron

    Sounds like you are 95% of the way there. You can definitely get this to work. Based on your description of the problem when trying to web launch AnyConnect, it sounds like you are not matching the correct tunnel group. As you stated, when using more specific connection profiles, you need to give users a means to identify which TG they want to connect to. This is typically achieved via a drop down selection box, group URL, or certificate attribute map. In your case, it sounds like you are using group URLs. With this approach, you will have two more specific URLs for your users to access. For web launch and standalone AnyConnect clients, they may access https://vpn.vpn.com/anyconnect while your clientless users may access https:/vpn.vpn.com/webvpn. The catch as you found is what happens when a user tries to go to the root https://vpn.vpn.com? In this case, the user will hit the default WebVPN TG. I would have to see your DAP policy to understand what policies you have implemented. If you take DAP out of the picture for a moment, a few quick workarounds to preventing AnyConnect users from being able to log into the default WebVPN group is to remove the corresponding tunneling protocol from the default group policy. Alternatively, you could set the simultaneous logins to 0 in the default group policy. You may also want to look into configuring group locking to prevent users from logging into a TG that they don't belong to. With respect to your certificate requirement, ASA 8.2.1 code allows you to configure client certificate authentication on a TG by TG basis. This is more flexible than 8.0 where this is enabled globally.

  • Different consolidation methods for one entity on one scenario

    Dear experts,
    How can I have different consolidation methods for one entity on one scenario?
    One entity is going from proportionate to equity method. We would like to check variations due to this change.
    Best regards,
    Benoit

    Hi Benoit,
    How's things?
    Managing the consolidation methods is based on the setup of your consolidation rules.
    However, the first place that you should look is the Ownership Management. Select the parent of the entity that you work to process. In the screen, you will be able to see the available methods and the ownership. All these settings are related with the consolidation rules available in your application.
    Regards,
    Thanos
    < spam signature link removed by moderator >

  • Need a Effective Design Pattern for Different Validation methods ???

    Hi All,
    I am having different validation methods with separate functions. I like to know the Best and Effective Design Pattern to do this.
    for example
    validateUserId()
    validatePassword()
    validateAuthentication()
    validateSession()
    validateConnection()
    .... etc......
    Can anybody help me to solve this?
    Thanks,
    J.Kathir

    Hi there - is this the kind of thing you wanted?.
    This structure has served me well. There is quite a lot to it and lots you need to infer but you should be able to work it out!
    It works for EJB & swing etc (I believe)..
    It doesn't use exceptions to return validation messages.
    It doesn't use lots of little objects. The code is very explicit & pretty simple.
    public class PersonValidator
    Person myData;
    public PersonValidator() {
    //personId will be 0 and we are in nsert mode
    myData = new Person();
    public PersonValidator(long personId) {
    //personId will have a value and we are in update mode
    myData = PersonDb.getPerson(personId);
    // =================================Single field validation
    // =================================For swing apps to call - not over network.
    // =================================Use validateData method
    public String validateDateOfBirth(String dataOfBirthStr) {
    String msg = "";
    msg = validateDateStr(dataOfBirthStr);
    if (!msg.equals("")) return msg;
    public String validateSurname(String surname) {
    String msg = "";
    if (surname.equals("")) return "surname must be entered";
    //=============================================Cross Validation
    public List crossValidateAndSave(boolean saveData) {
    String msg = "";
    List valerrs = new ArrayList();
    if (surname.equals("Collins") && dateOfBirth.compareTo("???")) {
    List.add("Candidate is lying about their age. Please enter a realistic Date of birth");
    if (valerrs.size() == 0) {
    if (saveData()) {
    personDb.saveData(myData);
    // =========================To validate across the netwrok this lets you
    // pass all the data in 1 go & receive multiple messages in reply.
    // AN EJB can delegate to this code or this code could be in the EJB.
    // @param stopAtFirstMessage flag allow efficiency if app ccan't handle multiple validation
    // erros at a time.
    // @param saveData flag allows validation without saving - allows for confirm message.
    // @param EditPersonGuiData - What the user types in. Numeric data & dates can be
    // in Strings. Using struts this could be the formBean.
    public List validateData(EditPersonGuiData inputData, boolean stopAtFirstMessage, boolean saveData) {
    String msg = "";
    List valerrs = new ArrayList();
    msg = validateDateOfBirth(inputData.dateOfBirth);
    if (!msg.equals("")) valerrs.add(msg);
    if (stopAtFirstMessage) return valerrs;
    valerrs = crossValidateAndSave()
    return valerrs;
    }

  • I keep getting redirected to this website whenever I enter in my payment info. I've tried different payment methods, nothing seems to work. I don't know what to do at this point. Anyone know what is wrong?

    I keep getting redirected to this website whenever I enter in my payment info. I've tried different payment methods, nothing seems to work. I don't know what to do at this point. Anyone know what is wrong?

    iTunes Store: Changing your payment information
    http://support.apple.com/kb/ht1918
    iTunes Store Accepted Forms of Payment
    http://support.apple.com/kb/HT5552
     Cheers, Tom

  • Recommended imaging/cloning method for Windows 8.1 system

    Can anyone recommend a reliable way to completely image/clone a windows 8.1 based system?
    I've tried 3 different methods with mixed success:
    1. My old faithful method uses EzGIG-III, but the BIOS setting for boot configuration needs to be changed to CMS because the tool is DOS based. The cloning operation takes forever (~12 hours for my machine with a 750GB HDD that only uses 200GB). I've tried it twice. The first time I got a boot error when booting the clone, but Windows managed to automatically repair the boot issue. The second time I had no errors at all.
    2. I've tried the free version of Macrium Refect three times. First time was from a bootable USB version and I don't recall any issue. Second time was from within Windows. When I swapped the drive and tried to boot the clone, the boot failed and I got a nasty error message about winload.efi missing. I did some Googling and found a command line procedure to rebuild the missing file, which seemed to work. Third time was also within Windows and everything worked ok (I'm using the resulting clone right now as a matter of fact). Nice thing is the cloning operation only took 2 1/2 hours (compared to 12 hours with EzGIG). Also, I had trouble cloning in the opposite direction - just couldn't get it to work.
    3. Third method is the System Image utility that's built into Windows 7/8/8.1. It failed right away claiming the destination location had insufficient space for the image even though the capacity was much greater than the source. I'm working through this right now and am hopeful to get it working. The down side of this method is that two separate operations are needed; one to create the image and a second one to restore it. Also, I wonder if the image will include non-windows partitions (as in Linux dual boot).
    I'd appreciate any positive stories about successful cloning / imaging.
    Solved!
    Go to Solution.

    I've tried the free version of Macrium Refect three times. First time was from a bootable USB version and I don't recall any issue. Second time was from within Windows. When I swapped the drive and tried to boot the clone, the boot failed and I got a nasty error message about winload.efi missing..
    I've had mixed results with cloning. But restoring from an image always works. If you want reliability, do it that way.
    Third method is the System Image utility that's built into Windows 7/8/8.1. It failed right away claiming the destination location had insufficient space for the image even though the capacity was much greater than the source.
    The down side of this method is that two separate operations are needed; one to create the image and a second one to restore it.
    Also, I wonder if the image will include non-windows partitions (as in Linux dual boot).
    1. That problem occurs because the perverse backup program wants to write to each partition on the drive being imaged. See this thread for the fix.
       Cant backup 8.1 using system image backup! Error 0x80780119
    2. As I said, I've found imaging to be more reliable than cloning. How often would you restore? We image all our computers daily (3am) and retain images for ten days.
    3. The image includes all the partitions on the disk - at least mine does.
    In case you want to use the built-in imaging program, I can give you a shortcut to it in Windows 8.1.
    -Jerry

  • I don't have a different payment method so now I have to close an account I've held for 5 years and lose all my content...... am I right?

    So it seems that a LOT of people have been having this problem. (Being...)
    Credit card being declined.
    I have had 2 different indicators from iTunes that something I have done is wrong.
    1. iTunes does not accept my security code.
         -This could be caused by the details held by my card's company/bank not having the corresponding details on file.
         This is not the case.
    2. It mentioned that because my account had been accessed from another source (my iPhone) I now had to re enter my details to continue making purchases (which includes updating apps on iPhone).
    So I re entered my details. Then a notification also came up telling me that I had an outstanding balance that had to be paid (honest mistake though I'd love to know how exactly anyone comes to owe iTunes) and that this particular payment source had been declined and I must enter valid details.
    Well thats weird, because this card IS valid.
    So here's how I see whats happened. I've tried to make a purchase. The payment was processed via my >>>DEBIT<<< MasterCard and was declined because I didn't have enough funds. This is fine. This happens all the time. Its cash. You go to pay for something, "you don't have enough, oh well you don't get the product". Except it would seem that iTunes has seen this as "Your credit card has declined, well, you must be some poor bloke who we may have some problem getting payment from so were going to put a hold on ALL future purchases you try to make on this card."
    Oh, that's okay! I'll just go to my wallet and get another one of my 1,000,000 other credit cards I have and just use that. That's right, I don't have one.
    It would have been fine if iTunes allowed you to just select "none" as a payment method because that way I could re-enter my card details (which now has money in it) and it would be processed just fine. But no. iTunes will no longer accept my card and my account and all of it's apps have been put on hold.
    My only choice seems to be to apply for a credit card for the sake of a 99c app. Brilliant.

    so now I have to close an account I've held for 5 years and lose all my content...... am I right?
    No.
    I suggest you contact iTunes support.
    -> http://www.apple.com/support/itunes/contact/
    and was declined because I didn't have enough funds. This is fine. This happens all the time. Its cash.
    I wouldn't say "this is fine" and it is not cash.
    In many places, attempting to use a debit card with no funds (even if you don't know there are no funds) is fraud and is illegal.

  • Why is image compression information different on method used

    The image size starting out is 72dpi resolution @ 1280x800px dimension.
    The final target output settings when using "Save For Web" in Photoshop should be:
    72dpi resolution @ 1280x800px dimension
    JPEG Quality:75 @ 246.7 Kilobytes.
    1. If I re-import the image that is supposed to be at 246.7 Kilobytes in Photoshop and click image size,
    it is telling me that the image is 2.93 Megabytes.
    2. When using Apple's "Preview" app and click the inspector it is telling me that the image is 253 KB (Kilobytes).
    3. When using Apple's "Quick look" feature, selecting the image then hit space bar, it is telling me that the image is 247 KB
    (rounded off) which is closer to the original final target output settings of 246.7 Kilobytes.
    4. Lastly, when I click Command i to get the image info, it is telling me it is 253 bytes or (254 KB on disk).
    Why is all the image info that is available so different and which method should I trust or use?

    Hi Choiceimport,
    Don't sweat the small stuff. The subtle differences between Preview, Quicklook, and Command-i are due to a variety of things such as how many sectors that program may be looking at to get all the data. Some programs over-reach the sector reading. One area where you'll really see this is if you saved your image and it's 253 kb but when you put that in an email client it might be (and I'm making this number up) 370 kb.
    The big issue is why is it so big in PS. To understand this, you have to remember that JPEG images are compressed in a Lossy format. There are two kinds of compression here, the lossy aspect (in that the format actually looses information (ergo lossy), so that the greater the compression, the more of the data is removed and tossed (forever, never to be returned), and the general compression algorithms of the format. Thus, the file has a 247 kb storage size (or thereabouts) but when expanded so it can be seen is 2.93 MB. This is how much PS has to deal with in regards to ram to work with the image but is not its storage size.
    And FWIW, I like to specifically call out "storage size" when referring to how big the document is on the hard drive as opposed to the size of the image which (to me) refers to the dimensions of the image (either MPXL or X pixels wide by Y pixels tall).

  • How can I charge shipping for two different products each with a different shipping method?

    I'm selling two different products, one is by priority shipping through USPS, the other is just a flat fee of $3.00.  Shipping options appear when either one is the only product in the shopping cart.  If there is one of each product, then no shipping is charged.  Is it possible to have two different products and two different methods of shipping in the shopping cart?
    www.antarcticempire.com  vintage teacups are priority mail   photo prints are $3 flat fee.
    Thank you for any help.

    Thank you for posting.
    There is no out of the box solution to add more than 1 shipping option in the shopping cart. However, there is a work around for this, bit complex but achievable. You need to use multi-lingual site to do so. If you need more info on how to achieve this, please log a ticket and mention this forum post in it.
    Cheers,
    Aishvarya Raj Rastogi

  • Several different equals methods

    Hi,
    I want to compare two different sets with eachother. The Set contains objects with a number of strings and Integers, and some of these need to be equal in order to find a match between the two different Sets. This differs from the "natural order" or the actual equal-value for the two objects, so I don�t want to implement Comparable and use the equals method directly in my Objects since I do not wat to mess with the "truth".
    I tried to used Comparator, but the equals(Object obj) method only provides one of the two objects I need to compare, and the compare(Object obj1, Object obj2) is good, but should I use it to compare two objects from two DIFFERENT Collections. It seems the compare method is mostly used for sorting, and I don�t care about sorting at this point.
    Set<MyObject> set1;
    Set<MyObject> set2;
    //compare all the objects in set 1 to all objects in set2 AND, if there is a match do:
    myObjectFromSet1.setACertainValue(myObjectFromSet2.getACertainValue);The "ACertainValue" is of course not included in the comparison, since in set1, all the "ACertainValues" are empty, but I need to pick the value from its "equal" object from set2.

    I compare them field by field in my object - strings
    and Integers - (except for one field : position).
    All must match to call them "equal". Then I want to
    set that field (position) in the set that doesn�'t
    have that info yet and pick the value from the other
    set (where there is ONE corresponding Object
    available only). After this the two objects from each
    set are "really equal".
    There might be objects available without a match, but
    those I will handle seperately.
    Thanks for taking you time, it is really appriciated.No problem. I think I understand what you mean, here's yet another little demo:import java.util.*;
    public class Main {
        public static void main(String[] args) {
            MyObject[] array1 = {new MyObject(1, "A", new Integer(11)),
                                 new MyObject(2, "B", new Integer(22)),
                                 new MyObject(3, "C", new Integer(33))};
            Set<MyObject> set1 = new HashSet<MyObject>(Arrays.asList(array1));
            MyObject[] array2 = {new MyObject(1, "A"),
                                 new MyObject(2, "B"),
                                 new MyObject(3, "C")};
            Set<MyObject> set2 = new HashSet<MyObject>(Arrays.asList(array2));
            System.out.println("Before\nset1 : "+set1);
            System.out.println("set2 : "+set2);
            List<MyObject> list1 = new ArrayList<MyObject>(set1);
            for(MyObject mo2 : set2) {
                int index = list1.indexOf(mo2);
                if(index != -1) {
                    MyObject mo1 = list1.get(index);
                    if(mo2.position == null) {
                        mo2.position = mo1.position;
                    } else {
                        mo1.position = mo2.position;
            System.out.println("\nAfter\nset1 : "+set1);
            System.out.println("set2 : "+set2);
    class MyObject {
        protected Integer id, position;
        protected String str;
        public MyObject(int id, String str) {
            this(id, str, null);
        public MyObject(int id, String str, Integer position) {
            this.id = id;
            this.str = str;
            this.position = position;
        public boolean equals(Object o) {
            MyObject that = (MyObject)o;
            return this.id == that.id && this.str.equals(that.str);
        public int hashCode() {
            return (31*this.id) ^ (37*this.str.hashCode());
        public String toString() {
            return "{id="+this.id+", str="+this.str+", position="+this.position+"}";
    }Produces the following output:Before
    set1 : [{id=3, str=C, position=33}, {id=2, str=B, position=22}, {id=1, str=A, position=11}]
    set2 : [{id=3, str=C, position=null}, {id=2, str=B, position=null}, {id=1, str=A, position=null}]
    After
    set1 : [{id=3, str=C, position=33}, {id=2, str=B, position=22}, {id=1, str=A, position=11}]
    set2 : [{id=3, str=C, position=33}, {id=2, str=B, position=22}, {id=1, str=A, position=11}]

Maybe you are looking for