Does the developer edition of ASE include the security option?

I'm trying to evaluate the use of Kerberos for authenticating users for Sybase ASE. I have downloaded a copy of ASE developer's edition and installed it into an Open Solaris VM. Im having difficulty activating the Kerberos module.
Does the Deevelopers version include the Security and Directory Services option, and if not, is there a trial that I can use?
Downloaded ASE from : ASE 15.7 Developer's Edition - Sybase Inc
Security and Directory Services Option link: https://store.sap.com/sap/cpa/ui/resources/store/html/SolutionDetails.html?pid=0000012519&catID=&pcntry=US&sap-language=…
Thank you for your time

Chris,
Do you have the -k entry in your RUN_ase file?
$SYBASE/ASE-15_0/install/
example:
/redhead1/hansenr/ase/ASE-15_0/bin/dataserver \
-sredhead \
-kredhead@KRBLINUX \
-d/redhead1/hansenr/ase/data/master.dat \
-e/redhead1/hansenr/ase/ASE-15_0/install/redhead.log \
-c/redhead1/hansenr/ase/ASE-15_0/redhead.cfg \
-M/redhead1/hansenr/ase/ASE-15_0 \
-k would be set to the keytab entry / service principal name generated from the KDC
klist -k redhead.keytab
Keytab name: WRFILE:redhead.keytab
KVNO Principal
   2 redhead@KRBLINUX
Do you have the environment variables set?
KRB5_CONFIG=/redhead1/hansenr/krb/var/krb5kdc/krb5.conf
KRB5_KTNAME=/redhead1/hansenr/ase/redhead.keytab
setenv LD_LIBRARY_PATH /redhead1/hansenr/krb/lib:$LD_LIBRARY_PATH
Sure you've done this but, source SYBASE.csh as well.
For the libtcl.cfg file:
Do you have libgssapi_krb5.so in that directory? This is the native for Solaris sparc I believe.
You could also put the MIT build on that box to load the libraries.
The "secbase=@REALM", i'm assuming this was to hide your realm, if not, this needs to show what realm your KDC is using.
example:
[SECURITY]
csfkrb5=libsybskrb.so secbase=@KRBLINUX libgss=/redhead1/hansenr/krb/lib/libgssapi_krb5.so
Does your interfaces file have the secmech entry number should be the same for you as well?
example -
redhead
        master tcp ether redhead 4747
        query tcp ether redhead 4747
        secmech 1.3.6.1.4.1.897.4.6.6
Regards,
Ryan

Similar Messages

  • What exactly does the colaece option do in TOAD software

    Hi,
    What exactly does the colaece option do in TOAD software.
    Regards,
    MuruguPandian P

    Coalesce will take ADJACENT free space and coalesce it into one larger free chunk.
    A free extent in a dictionary-managed tablespace is made up of a collection of contiguous free blocks. When allocating new extents to a tablespace segment, the database uses the free extent closest in size to the required extent. In some cases, when segments are dropped, their extents are deallocated and marked as free, but adjacent free extents are not immediately recombined into larger free extents. The result is fragmentation that makes allocation of larger extents more difficult.
    You should often use the ALTER TABLESPACE ... COALESCE statement to manually coalesce any adjacent free extents. To Coalesce a tablespace give the following command
    SQL> alter tablespace ica coalesce;
    Source: http://www.oracle-dba-online.com/tablespaces_and_datafiles.htm
    Regards
    Asif Kabir

  • Why does the menu option change to "save as" after I select the print button?

    why does the menu option change to "save as" after I select the print button?

    >>The print command is selected in the File pull down menu, the print menu page pops up, I can then select my networked printer (which incidentally is confirmed to work with other software), the print command is in the bottom right hand corner and finally after depressing this print button a "save as" pop-up menu appears and then it only re-saves the file. Is this an issue with the pdf reader install?  

  • What does the revert option mean when you hook an ipod touch up to the to itunes

    what does the revert option mean when you hook an ipod touch up to the to itunes?

    It means you changed some settings for how your iPod interacts with iTunes, you can either click Apply to confirm the changes, or Revert to undo them. This does not delete any content.

  • If an iPhone is outdated does the security issues effect it?

    I heard about Apple and their security issues and how they want everyone to update their iPhone and Apple TV's, which i have done. BUT My mom has an iPhone 4 and it dosent have enough space on it for updates. She doesnt even have iOS7. So does the security issue effect her sense her phone is outdated or is she good?

    Hi ijus5tin,
    If she has a lot of photos, have her import them to her computer or Mac, and once she has verified they are there, remove them from the device. Also, if she has a lot of text messages with videos, have her delete those - they take up a ton of room.
    Any movies, tv shows, etc. should also be removed.
    That will help free up some space.
    Cheers,
    GB

  • Does the 'Hotmail' option in IOS mail use SSL to connect to the hotmail servers?

    Just wondering, when selecting the 'Hotmail' option when setting up email on IOS mail, whether this automatically uses SSL to connect to the hotmail servers - it doesn't show any server settings when you view the account.

    Hi Drewscussions,
    Thanks for the reply - I'm just wondering about the security measures in place behind those predefined settings I.e. does it use an encrypted SSL link. I would like to ensure, as I often access emails off public wifi, that I have it set correctly to use an encrypted connection to my hotmail account.
    My emails have been working fine - it's more of a question about what security measures are in place in that preset mail option.
    Cheers

  • Newbie: How does the security manager work with EJB?

    Hi,
    I am new to J2EE and do not seem to grasp how the security manager (or J2EESecurityManager) works with EJB.
    My bean does security-senisitive stuff (like getting the Policy object) and must not do so unless I give it permission in the policy file. So far so good. But the permission will only work if I grant it to ALL code, like:
    grant {
    permission java.security.SecurityPermission "getPolicy";
    Beans do not seem to have a protection domain or code source/certificates attached to it. so I cannot say
    grant "/file/sw/ejb/myejb.jar" {
    permission java.security.SecurityPermission "getPolicy";
    Why is that (probably because beans run remote)? But more importantly, how DO I set permissions based on which bean it is?

    If I add that directory as the codebase to
    a grant statement any class loaded from there will
    have the specified permission.I thought so, too, and that is why I went digging for the code source of my bean (i.e. where is it deployed, from where is it loaded) but that source is NULL:
    Some program output:
    ==Has security manager: com.sun.enterprise.J2EESecurityManager
    ==Code source is ProtectionDomain (null <no certificates>)
    The code seems to have no code source (null) and no signatures (in fact, I also signed my code with the keytool but that certificate did not show here either).
    I am running this against the j2ee server 1.3 -- just experimenting, but it does not go so well. :-)

  • How Does The security-role Mapping Work?

              I am studying the security part of the deployment descriptor. I am confused about
              how the mapping works.
              Suppose we have
              <security-role>
              <role-name>manager</role-name>
              </security-role>
              and
              <security-role-ref>
              <role-name>FOO</role-name>
              <role-link>manager</role-link>
              </security-role-ref>
              My first question is when a client of the servlet supplies a name for authentication,
              the name supplied should be FOO or can be, say, John Smith?
              Then, according to the Servlet Specification, a security role is a logical grouping
              of users defined by the Application Developer
              or Assembler. When the application is deployed, roles are mapped by a Deployer
              to principals or groups in the runtime environment.
              My second question is how deployer maps the role, say, manager, to principals
              or groups in the runtime environment?
              Thanks in advance.
              

              Thanks a lot, Udit.
              "Udit Singh" <[email protected]> wrote:
              >
              >Hello,
              >The role-name is mapped to principals or gruops based on the security-role-assignment
              >entrires in weblogic.xml. Let us say you have a role-name FOO and you
              >want to
              >assing this role to users John and Mark. You need to make this entry
              >in weblogic.xml-
              ><security_role_assignment>
              > <role-name>FOO</role-name>
              > <principal-name>John</principal-name>
              > <principal-name>Mark</principal-name>
              > </security_role_assignment>
              >
              >so now actually the user need to supply John or Mark as user name at
              >the time
              >of authentication . Hope it helps.
              >
              >Udit
              >
              >
              >"[email protected]" entrance wrote:
              >>
              >>I am studying the security part of the deployment descriptor. I am confused
              >>about
              >>how the mapping works.
              >>Suppose we have
              >><security-role>
              >><role-name>manager</role-name>
              >></security-role>
              >>
              >>and
              >>
              >><security-role-ref>
              >><role-name>FOO</role-name>
              >><role-link>manager</role-link>
              >></security-role-ref>
              >>
              >>My first question is when a client of the servlet supplies a name for
              >>authentication,
              >>the name supplied should be FOO or can be, say, John Smith?
              >>
              >>Then, according to the Servlet Specification, a security role is a logical
              >>grouping
              >>of users defined by the Application Developer
              >>or Assembler. When the application is deployed, roles are mapped by
              >a
              >>Deployer
              >>to principals or groups in the runtime environment.
              >>
              >>My second question is how deployer maps the role, say, manager, to principals
              >>or groups in the runtime environment?
              >>
              >>Thanks in advance.
              >>
              >>
              >>
              >
              

  • What does the "copy" option do in "camera roll"?

    Forgive me, I know this is probably a stupid question, but I'm really puzzled--with iOS 7 in Camera Roll, when you select a photo and tap the little box-up-arrow icon at the lower left side, you get about two dozen options, "Message", "Mail", "iCloud", etc. on the first line, and "Copy", "Slideshow", "AirPlay", etc. on the second line. I understand the first line options, but I don't understand what the "Copy" option is supposed to do. I'm assuming when you tap it the picture is copied into a buffer so you could then paste it into something, like preferably a spot on the camera roll in order to create a duplicate of the photo. That's exactly what I'd like to do, but there's no obvious way to paste it anywhere at all.  So what am I overlooking here?
    Thank you,
    Jenna

    She knows that.  She was asking how to duplicate.
    The only thing I can think of is pulling it into another app and doing it a "Save As" on it.  Perhaps photoshop express might do the trick.
    - JC

  • Why does the security code for my home network not work with my hp6500?

    I have a HPOfficejet 6500A Plus and am running windows 7 on a Dell desktop.  I've tried to get my printer to connect to a home network and every time I type in the password it won't connect...it fails the security.   I've always used the direct printer cable to connect one of my desktops to the computer and am trying to get the wireless featur to work...it won't. 

    Hi,
    Please refer the link below and download HP Print and Scan Dr utility which will be able to help in installing printer and checking for correct security key.
    http://h10025.www1.hp.com/ewfrf/wc/document?docname=c02271484&tmp_task=useCategory&cc=us&dlc=en&lc=e...
    Although I am an HP employee, I am speaking for myself and not for HP.
    --Say "Thanks" by clicking the Kudos Star in the post that helped you.
    --Please mark the post that solves your problem as "Accepted Solution"

  • Why does the "security pattern" (ie "connect the dots") appear every time I power on the phone (Droid Razor)?

    Even with the Wi-Fi hot spot turned OFF, the security pattern comes up every time i power on my Android phone. This has been happening only since i installed the FoxFi on my phone.

    Which version of Firefox and which version of Android do you have?
    Did you set up Sync?

  • When I attempt to erase my hard drive, I am unable to select the "security options" tab?

    I wish to erase my hard drive and for the contents of the hard drive to be unrecoverable. In order to do this, I have done some research and I believe there is a tab called "security options" when I go into "Disk Utility" and click "Macintosh HD." This tab is indeed there for me, however, I am unable to click it. What I mean by this is basically when an option is there but you simply cannot click it because... well, yeah, that's exactly my problem! I don't know why I'm unable to click it.
    Thanks in advance!
    Message was edited by: RyanValmont

    Do a backup. Boot to the Recovery Volume (command - R on a restart or hold down the option key during a restart and select Recovery Volume). Run Disk Utility Verify/Repair and Repair Permissions. Then select the Erase tab. Format is Mac OS Extended (Journaled). Select Secure at the level you want. Erase and then reinstall the OS.
    OS X Recovery
    OS X Recovery (2)

  • What does the "remove option : press C" do in IMG 1.9?

    I've noticed that you can press the "c" button to remove the option of a program in IMG 1.9.
    What does it do? I don't see anything happening.
    Is there a IMG 1.9 guide online somewhere? IMG 1.9 seems to have new features, and I'd like to have a better idea of what they are.
    Solved!
    Go to Solution.

    molitar wrote:
    This is the most and UTTERLY **bleep** option!   You press C to watch in HD.. so you think you are selecting HD mode and bam!  there goes your modes!    What the **bleep** were they thinking?  **bleep** engineers have no common **bleep** sense!   Stupid modes should never be turned off that **bleep** easily the reason we set them is we want it enabled!
    I don't believe I've ever seen a post with more "bleeps" inserted by a mod.  Congratulations.

  • Why does the erase option need a different passcode?

    Hi guys!
    I'm preparing to sell my iPhone 3GS and I want to wipe the whole thing before I do.
    I selected the "erase all contents and settings" option and typed in the passcode and got an error, so I tried again and got another error.
    Why the passcode didn't work was beyond me as I've been using the passcode lock for a while. So, just out of curiosity, I tried activating the passcode lock and all was fine.
    So my question is, if the passcode works for the lock, why isn't it working for the "erase all contents and settings" option?
    At this stage, I'm guessing the two features are using a different passcode. But the problem is, I have no idea what this latter passcode is, nor have I ever known.
    I keep complete records for everything I buy, their settings and every service I use, and I have no record of any separate passcode.
    Any ideas how I resolve this?

    iPhone, iPad, iPod touch: Wrong passcode results in red disabled screen
    iOS: Understanding passcodes
    iTunes: Backing up, updating, and restoring your iPhone, iPad, or iPod touch software
    You will have to restore the iPhone.

  • How does the security model work for external USB disks attached to an AEBS

    I've attached a USB disk to my AEBS after partitioning it first on my MBP using Disk Utility. I created a single partition with a GUID partition table covering the entire disk. Next I deselected the "Ignore ownership on this volume" checkmark and assigned myself and my wife read/write access, my group read access, and the rest no access. Next, I hooked it up to the AEBS and created some test files. I noticed in Terminal that the files I created all had rwx access for user, group and others. Trying to chmod that into something less open, like rwx for me, rx for the group and nothing for others didn't work. Also I noticed that when I was logged in the files I had created had my name as the owner, but when my wife logged in, those same files were owned by my wife.
    What is happening here ? Who is the actual owner of the files on the external USB disk on my AEBS, and what are the real access rights (as they seem to depend on the actual user). On my AEBS I've setup "File sharing", "With accounts" and created accounts for both me and my wife, as well as disabled guest account access.
    I get the impression that the owner and access rights seem to depend on the actual user connected to the AEBS, but I'm not sure.
    Can anybody please enlighten me on the subject of AEBS access rights/ownership for USB disks ?
    With kind regards,
    Aloy

    All that I can provide is what has worked for me for years.
    The Time Capsule is setup as the router for the network, connected to a simple Zoom 5431J cable modem.
    Static Internet IP connection from the cable provider is 12.34.567.89
    By default, the Time Capsule is at 10.0.1.1 on the local network
    Port Mapping setup for the Time Capsule is......
    Public UDP Port 8884
    Public TCP Ports 8884
    Private IP 10.0.1.1
    Private UDP 548
    Private TCP 548
    The hard drive on the Time Capsule is accessed from a remote location at afp://12.34.567.89:8884
    The AirPort Extreme is connected by Ethernet to the Time Capsule and is it setup to operate in Bridge Mode
    The AirPort Extreme always receives a reserved local IP address of 10.0.1.2 from the Time Capsule
    The Port Mapping setup (on the Time Capsule) looks like this for the AirPort Extreme.......
    Public UDP Port 8888
    Public TCP Port 8888
    Private IP  10.0.1.2
    Private UDP 548
    Private TCP 548
    The USB hard drive connected to the AirPort Extreme is accessed from a remote location at afp://12.34.567.89:8888
    If you are still having difficulty, I would delete all of Port Mapping settings on the Time Capsule and Update the Time Capsule. Then, go back and setup the Port Mapping for the Time Capsule, check that to make sure that it is working, then setup the Port Mapping settings on the Time Capsule for the AirPort Extreme.

Maybe you are looking for

  • MB5B Report table for Open and Closing stock on date wise

    Hi Frds, I am trying get values of Open and Closing stock on date wise form the Table MARD and MBEW -Material Valuation but it does not match with MB5B reports, Could anyone suggest correct table to fetch the values Open and Closing stock on date wis

  • How to determine the length of a line of text in a multi line text control

    I am working on a simple widget to compare two snippets of text.  The string controls are side by side with a colum of square bools in between the two string controls. The Bools line up with the lines of text in each string control.  The Bools are us

  • Converting MS Access datatype to Oracle datatype

    To convert a memo datatype in MS Access into Oracle, you use a Long datatype. The problem is this one Access table hold multiple memo dataype and Oracle only allows 1 long datatype per table. Does anyone know how to resolve this issue?

  • Asha 311 vs 308/3099 - why 308/309 has brightness ...

    Why on earth does the 311 lagged down behind by this software update? I am surprised tonight to see an update on the 308 and 309 which was rolled down last march, it says that it has MANUAL brightness control on that update. I was like, "**bleep**?!?

  • Why is the MP3 that is purchased from Amazon different when it is imported?

    I purchased several MP3's from Amazon. They are automatically imported into iTunes by the Amazon MP3 Downloader. However I noticed that though the file sizes are the same the MP3's that are saved in the iTunes Media folder are different. Does anyone