EAS Security officers

<p>We are trying to setup a group that can create groups and addusers that have been setup for Essbase.  The individuals inthis Security group can create the groups and add users but can notadd application access to these groups.  Also they would liketo be able to see what groups have access to their cubes.  It appears that this groups has to be setup withApplication Designer access to get the power to do what wasdesribed above.  We don't want our security officers to havethis power.  Is there a way to create our own roles in EAS? We want to separate the duties of security from cubedesigner.</p>

Hi,
If you ticked "Deploy essbase in standalone mode" then essbase will be using Native security and will not have been converted to Shared services mode.
By default in V11 EAS will get registered with Shared Services.
I am not sure what the problem is because you will be able to add members to essbase directly through EAS and will not have to use Shared services.
Cheers
John
http://john-goodwin.blogspot.com/

Similar Messages

  • Where are the EAS security policies stored? "Reset Security Policies"?

    When you connect Mail app to an account using EAS, security policies from the Exchange server are applied to Windows 8.1. I know that these can be reset by going to Control Panel -> User Accounts and then clicking on the "Reset Security Policies"
    option.
    However, I would like to see which policies are being applied by the Exchange server, but I can't find where Windows 8.1 is storing the policy settings.  Are they in the registry?  Can I see them in the GPEDIT local policies?
    For example, our Exchange server sets the "Max inactivity time lock" to 15 minutes.  I would like to be able to see exactly which Windows setting is storing this value and enforcing it.
    I've verified that it's overriding settings already in place that are stored in:
    Computer Config - > Windows Settings -> Local Policies -> Security Options.
    or
    Computer Config - > Admin Templates -> Control Panel -> Personalization
    or
    User Config -> Admin Templates -> Control Panel -> Personalization
    Does anyone have idea where I might be able to view these policies in Windows 8.1?

    Hi,
    Aboved suggestions is description of the EAS policy.
    If you need further assistance, feel free to let me know. I will be more than happy to be of assistance.
    If the reply is helpful, please remember to mark it as answer which can benefit our Community members. Otherwise, please unpropose it and post back with your further concern.
    Kate Li
    TechNet Community Support

  • EAS: Security mode

    Hi all, I installed EAS 11.1.1
    While configuring essbase server, I specified "Deploy Essbase in standalone mode"
    As I understand it relates to Essbase server not to Administration Server.
    When I see in EAS console -> Administration Servers -> myadmserver -> properties: configuration tab-> shared services properties:
    there is a locked "Shared services security mode" checked checkbox.
    "Shared services security mode" is checked because it was registered with shared services. Am I right?
    On which step it was registered while configuring? (I didn't see any option like "register with shared services", I only saw this in the configuration confirmation window)
    Can I unregister it?
    Edited by: Vovanenok on 13.02.2009 3:03

    Hi,
    If you ticked "Deploy essbase in standalone mode" then essbase will be using Native security and will not have been converted to Shared services mode.
    By default in V11 EAS will get registered with Shared Services.
    I am not sure what the problem is because you will be able to add members to essbase directly through EAS and will not have to use Shared services.
    Cheers
    John
    http://john-goodwin.blogspot.com/

  • EAS security

    Hi Guru's
    is there any way i can create a user who can see only one application in EAS. rest all application should not be visible to that user and only admin can see all the other application in EAS.
    thank you

    i have provided with the provisioning and application manager role of demo and sample application . And even i have refresh the security from EAS.
    In EAS i can see only essbase server and no application under it . when i right click on the server to create application but that application is disable.
    can you please tell me if i am missing any step
    thank you

  • Refreshig security from shared services

    let us assume that we are creating 5 users in shared services and provisioning them with different privileges. when refreshing these users security from shared services to essbase , i need to refresh the security of only one particular user role, how can i do that?

    if using 9.3.1 later version u can use Shared servicves patch whcih will automatically update the security
    or esle right clik on EAS security > refresh security from shared services > all users or currecnt users
    which will update ur security
    Refresh each user or group individually using MAXL command:
    alter user username sync security with all application;
    alter group groupname sync security with all application;

  • The RDBMS for EAS

    Hi There,<BR><BR>I understand an RDBMS is required to use the Log Analyzer functionality in Essbase Administration Services. Lets say, one doesnt want to use such functionality. Can one install EAS without a relational database??<BR><BR>Thanks<BR>Kizi.

    EAS uses a database a repository for a number of reasnons, not just for log analyzer. For example, EAS security and user configuration resides on the database. For small installations, the bundled MySQL database is quite sufficient for use. You can use to another RDBMS if you have one easily accessible. Our production EAS runs on the WebSphere app server and the SQL Server RDBMS that we have for our Anayzer and Reports applications. But I keep another instance of EAS Server on my desktop using the bundled Tomcat and MySQL.<BR><BR>The repository is necessary for the operation of EAS. So you will need an RDBMS to run EAS. But the good news is you can easily use the bundled MySQL database incurring no cost for the RDBMS. The MySQL database uses few system resurces in support of EAS, and the installation does all of the required administration.

  • EAS Inactivity Timeout

    Alright, so 1.1.0 gave us lots of great EAS security policy support including Inactivity Timeout:
    Inactivity timeout. IT administrators can ensure that an inactive phone goes into a locked state after a certain time period. You cannot set a higher timeout interval for your phone, but you can set a shorter interval.
    Okay, so where do we set this value on the phone?  Right now every single time I slide my phone open or press the power key I have to enter my password to unlock the phone.  My company's security has the inactivity timeout set to 8 hours on the exchange server.  Any help would be great, we have high security passwords (lots of characters, numbers, special chars, etc) and I hate having to enter it just to repond to a text message or something trivial and not business related.
    Any help would be appreciated.  Thanks!
    Post relates to: Pre p100eww (Sprint)

    The user manual suggests it is linked to the screen timeout, which for reasons of battery life, usually would be way less than 8 hours.
    The screen locks five seconds after it turns off automatically, or immediately if you turn the screen off manually. Use Secure Unlock if you want to require a PIN or a password to unlock the screen.
    Don't know whether there is a way to decouple these time intervals.
    (Also, I was looking at the original user guide, which may not match the updated OS.)
    Message Edited by Jeffro on 07-29-2009 03:28 PM

  • Bringing my 27"iMac as carry-on luggage on plane

    Hello everyone!!!!
    I know that if you see this topic you think "whaaaaaaaat????!!??"
    But this is the problem: I'm moving from Italy to USA and I have to bring my 27" Imac with me .
    I know that a macbook would be easier to carry, but I bought the IMac 27" for professional needs. And I love it as my own child so thinking about selling it makes me sick
    So I've been searching for solutions since weeks, and these are the responses:
    -Shipping it with UPS or similars costs more then 400€....too much. I have to discard this option
    -Putting it in a solid checked bag wrapped in protective foam,pillows and so on : high risk of stealing and damage
    -Cargo services from Airlines: they don't do it for personal items...and i think troubles would be same as above
    -Buying an Ilugger or this italian bag
      http://www.macshop.it/accessori-mac/borse-per-il-trasporto-1/crumar-bag-per-imac -27-and-ampldquo-black-.html
      and then bring it on plane as a carried-on bag. Ok I know that it's bigger then requested standards. I'm flying with DELTA and their size limit is 115cm total (I'm lucky, no problems about weight) . the bag is about 52x65x20cm. But they are supposed to be more tolerant since it's not a low-cost company. And of course I will have to ask to place it in a special compartment instead of above-head storage.
    This solution was also suggested to me by an American Airlines check-in employee at Fiumicino. He said : " Don't worry and bring it as a carry-on, people brings a lot of strange big instruments with them with no problems.Absolutely don't put it in a checked luggage, cause it will be stolen for sure!"
    But he was an italian "take it easy" kind of guy, so he was taking for granted something that cannot be sure at 100%
    My main concern is: would it fit to the security scan at the airport?cause the main risk is that security officers will give me troubles about this.
    So my questions are:
    -did someone made it to bring it on plane as a carried-on bag? Cause I've seen a lot of forum topic talking about this
    -does anyone knows a better solution for my case? (apart from selling it and buying a new one in US...considering also the fact that I may return to Italy within a year and have same trouble on the opposite way...and anyway I love mine and don't want to replace it)
    thanks
    bye!

    Silvia, Buongiorno ..
    How did you go with this?
    Just one man's opinion:
    (1) You can easily buy a flight case for a 27" iMac. Google. Every single working photographer, film crew, rock band, etc, uses these every day.  These are used every day by photographers, etc, to send their iMac 27 in an airplane as checked luggage.  This is completely normal and you can buy one immediately.
    BUT it is VERY EXPENSIVE. €500 for the case and €500++ extra for the extra luggage.  AND MOST IMPORTANTLY ................ THERE IS ABSOLUTELY NO GUARANTEE it won't get smashed.  Any working photographer will tell you "yeah they often get smashed".  It's really only a professional solution where noney is no object and you have professional production insurance.
    (2) You could simply SHIP IT, for example with UPS or Collissimo or whoever.  JUST USE THE ORIGINAL PACKING BOX / MATERIAL.This is exactly how the iMac came from China to Italy originally. Insure it properly.  This will be pretty expensive and probably your best option.
    (3) I agree with you totally:  REMOVE the rear leg, and then put the iMac in the smallest/thinnest bag possible. (Put the keyboard and everything else in your checked luggage.)  You and your wife / etc .. don't take ANY OTHER CARRYON LUGGAGE AT ALL, not even a handbag.
    They will take pity on you since it is your ONLY carryon luggage. IMO you should be OK.
    You know, we landed at Malpensa once with very expensive "indestructible" Rimowa metal cases.
    The ground handlers completely destroyed one of the Rimowas!!!!!!  (Fortunately there was nothing fragile inside, so nothing inside was damaged.)  The airline very generously completely replaced the extremely expensive case, but if any machine had been inside it would have been toast and no insurance.  Again the important point is .... ANY PROFESSIONAL WILL TELL YOU flight cases get destroyed all the time. If you take course "1" it is very expensive, AND, there is NO guarantee at all your computer will arrive.
    With option "2" there is no more or less risk than option "1", and option "2" is tremendously cheaper.
    In option "2" a flight case WILL NOT PARTICULARLY HELP YOU. Fedex/etc is completely used to moving the type of box that an iMac comes in.  Don't forget, ALMOST EVERY iMAC PURCHASED, IS DELIVERED BY UPS or Fedex!!!!
    Every single iMac bought from the apple.com online store, travels the last 1000 km with Collissimo, Fedex or whoever. They are not total idiots. They obviously deliver those sort of things every day. So it is pointless adding  a flight case (€500 !!) to option 2.
    But really for me your best option is to fake it as carryon luggage.  Remove the stand as you say.  And do the trick of you and your family, have NO other carryon.  Explain you are a working photographer or whatever and it is your instrument, and just place it carefully in the overhead bins.  You should be fine, I'd say.
    FINALLY: in fact are you shipping your furniture to the USA???  if so ....... just include it. Use the original iMac box.  Put it - say - on the sofa cushions, tied down.  Of course, then you will be without your computer for a month or so.
    BTW what's with these peope saying "sell your computer"?!  I would never sell a Mac, too emotionally attached!  Good luck!

  • KNOWN ISSUE: HTML Messages with plain-text signatures

    To get around the EAS security policy issue, I'm having non-sensitive emails from work forwarded to a GMail account from a redirect set up in our corporate OWA. The redirect seems to send the messages to GMail without any issues; formatting is 100% intact, and in the GMail web client as well as Thunderbird, Entourage, etc., HTML emails with plain-text signature attachments show the plain-text message inline with the rest of the formatted message. All of our internal mailing lists have these plain text attachments that say where the message was coming from (Message sent from [email protected] by listserv). These get affixed to every message, both plain text and HTML.
    Here's my problem: The Pre's email client handles both plain text and HTML messages beautifully. But, when I receive a message from a mailing list with a plain text attachment, the HTML portion disappears, and all I see is the signature.
    Is there any way to make the Pre show the HTML INSTEAD of the plain text? I can live without the sig, I know where the messages are coming from already. But if I can't read the message, it's useless. I've only begun researching this and so far Google hasn't been much help, nor has searching these or other forums. Any help would be appreciated.
    Palm Pre P100EWW
    Post relates to: Pre p100eww (Sprint)
    Message Edited by HowellBP on 06-16-2009 04:13 PM

    1-51626418773
    I just got off the phone with Palm Support. Apparently this is a bug in the mail application. It currently does not support parsing both HTML and plain text in the same message. It will read EITHER plain text OR HTML, but not both at the same time. This will be fixed in a future update.

  • Boot camp windows vista

    does anyone know if windows vista will run off of boot camp?

    I think thats not correct. HP is selling there notebook with intel core duo and the say are VISTA CAPABLE .
    This is what they say
    "What's a Windows Vista Capable PC?
    The next generation Microsoft operating system—Microsoft Windows Vista—is coming soon. What will Windows Vista mean for you? It will offer new levels of ease, security and reliability, a new interface, and simple ways to organize and search for information on your PC.
    We've worked with Microsoft to help ensure that the PC you buy today can run Windows Vista when it's available. All of our new notebook and desktop PCs will be able to run Windows Vista* when properly configured.
    Windows Vista will be available in versions ranging from Windows Vista Home Basic for entry-level home users to Windows Vista Home Premium or Windows Vista Business, for those needing more robust features and functionality*.
    *Not all Windows Vista features are available for use on all Windows Vista Capable PCs. All Windows Vista Capable PCs will run the core experiences of Windows Vista, such as innovations in organizing and finding information, security, and reliability. Some features available in premium editions of Windows Vista—like the new Windows Aero user interface—require advanced or additional hardware. Check www.windowsvista.com/getready for details. "

  • How much lithium in in my powerbook battery?

    I'm taking a flight tomorrow and TSA says that laptop batteries with more than 8 grams of lithium are forbidden. The spec sheet from Apple says it's a 50 watt hour battery which makes me think it's probably below this limit but I'm not positive. I would be seriously ****** if they made me throw a battery away!

    From TSA:
    Lithium-ion batteries, often found in laptop computers, differ from primary lithium batteries, which are often used in cameras. Some newer AA-size batteries are also primary lithium.
    While there is no explosion hazard associated with either kind of battery, the Federal Aviation Administration has studied fire hazards associated with both primary and lithium-ion cells, and their extensive research is publicly available. As a result of this research, the FAA no longer allows large, palletized shipments of these batteries to be transported as cargo on passenger aircraft.
    The research also shows that an explosion will not result from shorting or damaging either lithium-ion or primary lithium batteries. Both are, however, extremely flammable. Primary lithium batteries cannot be extinguished with firefighting agents normally carried on aircraft, whereas lithium-ion batteries are easily extinguished by most common extinguishing agents, including those carried on board commercial aircraft.
    TSA has and will continue to work closely with the FAA on potential aviation safety and security issues, and TSA security officers are thoroughly and continually trained to find explosive threats. TSA does not have plans to change security regulations for electronic devices powered by lithium batteries.

  • Azure and WORM for compliance

    Does Azure support WORM capability to store legal health records when it is used an archive target?

    hi,
    I suggest you should read the
    Windows Azure HIPAA Implementation Guidance. This document was developed to assist customers who are interested in HIPAA and the HITECH Act to understand the relevant capabilities of Windows Azure. The intended audience includes privacy officers, security
    officers, compliance officers, and others in customer organizations responsible for HIPAA and HITECH Act implementation and compliance. The document covers some of the best practices for building HIPAA compliant applications, and details (http://www.windowsazure.com/en-us/support/trust-center/compliance/
    ). Also, the document included the encrypt/decrypt data policy.
    See the same thread (http://social.msdn.microsoft.com/Forums/windowsazure/en-US/bead4059-8946-465f-b5ac-c9ef70d0ba6b/azure-blob-storage-hipaa-compliance-question?forum=windowsazuredata
    Hope it helps.
    Regards,
    Will
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • Best browser to develop for ApEx, Firefox or Internet Explorer

    Greetings!
    I have a simple question, which is the best web browser for doing Oracle ApEx (Applications Express)? I already know the answer, Firefox, but Firefox is blacklisted by my current employer.
    My primary reason for asking such a question is to help me make a case to my company internet security officers to allow Firefox to be installed on the work stations of the ApEx developers. Currently, we are restricted to using Internet Explorer (IE 6.x) only.
    The security of Firefox has been sited for not allowing it's installation or use on any computers on our corporate network. There are some who believe that IE 6.x is more secure that Firefox 3.x.
    My expertise as a seasoned ApEx developer who has used both and has become a better and more efficient developer since using Firefox along with the Firebug plug-in. Firefox and Firebug allow a JavaScript debugging that is far superior to JavaScript debugging utility that is available for IE 6.x.
    Please make any suggestions that may help me to present a compelling argument for allowing Firefox to be allowed on the systems of the ApEx development team members.
    Thanks,
    Charles

    Hello Charles,
    Seems you have all the right information and arguments at hand:
    My expertise as a seasoned ApEx developer who has used both and has become a better and more efficient developer since using Firefox along with the Firebug plug-in. Firefox and Firebug allow a JavaScript debugging that is far superior to JavaScript debugging utility that is available for IE 6.x.
    There are some who believe that IE 6.x is more secure that Firefox 3.x..
    Ask these people to support their believe by evidence.
    Greetings,
    Roel
    http://roelhartman.blogspot.com/
    You can reward this reply by marking it as either Helpful or Correct ;-)

  • I need to have the Spiceworks Discount set up for my new account.

    A hidden Windows 10 feature allows users to hide and ignore mandatory Windows 10 updates, a feature that could have come in handy for Windows Insiders this weekend plagued with a glitchy Nvidia driver update. The feature, labeled in a package called KB3073930, allows users to block specific Windows updates.Over the weekend, days before the launch of Windows 10, an Nvidia driver update was rolled out to Windows Insiders running Build 10240. The mandatory update, a decision made by Microsoft to deliver new features and security patches to users in a timely fashion as Windows is transformed into a service, caused constant Windows Explorer crashes among other graphics issues.However, Microsoft has a hidden workaround through KB3073930 to block unwanted features, driver updates or patches from being installed through Windows Update....Read...

    A MOBILE SECURITY RESEARCHER has done his work and found a cluster of vulnerabilities in Android that, when combined, present a problem for 95 percent of the user base.This is bad stuff. Despite references to unicorns in the official information, there is also some goosebump-inducing wordplay. The official warning is that almost anyone with an Android mobile phone can be sent one text message and be plunged into security chaos.This threat package has been dubbed Stagefright by Joshua Drake from the security outfit Zimperium zLabs."Gaining remote code execution privileges merely by having access to the mobile number? Enter Stagefright. The targets for this kind of attack can be anyone from prime ministers, government officials, company executives, security officers to IT managers," said the firm in a blog post....Read More
    Read More

  • MBP stolen, please keep a eye on the serial number

    Hi everyone
    My 2010 mac book pro got stolen from the office where I work during lunch time today, along with my ipad and some cash.
    I would like to list the details of my MBP here in case anyone comes accoss it in the future.
    15 inch i7 mac book pro with high resolution matte screen.
    Frosty Incase cover
    Patriot Torqx 256GB SSD
    1 X 4Gb Kingston RAM and 1X stock RAM
    Serial number: W8015*GD6
    The MBP has a little dent on the lower right hand corner of the main body opposite of the screen.
    Don’t have the money to buy another MBP, so will go for a Windows laptop now.
    <Edited by Host>

    Hi, thank you for your empathy, no insurance on both products fortunately.
    I've already had two security officers from work and two policemen came to my office to take statement. I've also phoned Apple support to inform them that my two Apple products has been stole.
    The Apple rep was very helpful and refunded the majority of my Apple Care for the MBP back. He even offered me another chance to buy another Mac with Education discount.
    All he could do is to note down the serial number of the products in case anybody contact them with the same machine.
    The police did promise to send somebody from their forensic team to have a look at the office next week.
    I'm not holding any hope of ever see my MBP and ipad again, but I want people here to be aware that there are stole Apple products out there. They should always contact Apple with the serial no of the item they want to buy before exchange money with any private sales. As they could loss both their new machine and hard earned cash they saved up for it.

Maybe you are looking for

  • Weird video freeze / Preview Blacking out?

    Hi everyone I am just wondering if any of you ever got lockups from videos? Sometimes if i just highlight a video clip (browsing in column view) and my MBP would just freeze up while generating the prview on the right side! Like complete freeze and i

  • Nautilus bookmarks - drag and drop - gnome 3

    Hi in gnome 2 nautilus I could add folder from right pane to the left as a shortcut (or what was the name for that). In gnome 3 all my shortcuts are there, now called bookmarks. Only thing is that now I can't drag and drop files from right pane to th

  • About serilize/deserilize complex objects

    Dear friends, I have a question about transfering complex objects between client and server. if I just transfer primitive data type, any language of client side can consume this web service. but how about if I transfer complex object? for example, in

  • How to call JCS in simple java class

    I want to make a atsratup class and this class will have to communicate with a java controls.But i am not able to create an instance of java control in simple startup class. IF any body has called java control in simple java class pls. let me know

  • DNG converter just started changing dates wildly-by 10 years!

    Hey all, Been using DNG converter for awhile now with zero problems.  The past couple weeks whenever I process some files up to my server at work, it will change the date from today's date (i.e. 2/24/14) to some date in 2002. I've tried rebooting the