Forte with Access/Pointbase

Hi, I am new with Forte and I was wondering if anyone knows how to connect to a database using Forte. There are some connectionSource properties that I saw available but I have no idea how to connect them to either a Access database file or a pointbase database file. There are some URL's and driver's that I should know but I have no idea on how to start. Any tips?
How do I initialise a pointbase database too?? I am trying to learn to create a database on my own computer without any network connection, hence could I run forte with a database available on my own computer thru pointbase or access?
cheers.

first you should check the tutorial on jdbc, which is very good.
in your class, you'll need to load a driver, for example, jdbc.odbc.JdbcOdbcSunDriver (if memory serves me correctly, you'll then also need to set up a connection ... all explained in the jdbc tutorial. to use access, you'll also need to point to the database through control panel. in control panel choose odbc drivers (using winme), choose admin. tools in xp, the click on odbc, and then i forget the rest since i don'y use access anymore. you'll find how to do this somewhere on the net.

Similar Messages

  • Re: (forte-users) access violation caught in debugmode

    Eric,
    There has been a problem with Forte debug mode for sometime now when the app
    is silent. If you attempt to inspect the variables when the app is in the
    'silent' mode, i.e., waiting on an event loop for a user input or a system
    event, then you get the "Access violation caught ..." exception message and
    the workspace including the launch server crashes.
    If you are getting this problem in the 'step-through' mode, you should look
    at the lauch server immediately after you get the exception before
    everything disappears. There could be a stack backtrace due to some illegal
    reference. We have faced a similar situation before but the error appeared
    both in the 'debug' and 'run' modes.
    Hope this helps.
    Braja K Chattaraj.
    From: Eric Decossaux <[email protected]>
    To: forte mailing <[email protected]>
    Subject: (forte-users) access violation caught in debug mode
    Date: Thu, 23 Sep 1999 17:31:39 +0200
    Hello,
    I have a problem using Forte in debug mode. If I run my program on my NT
    machine from the partition workshop (distributed run), the program works
    fine except that some object does not display what I'm expecting. So I
    want to use the debug mode to inspect the objets of this window. When I
    choose the "local variables" option to see the content of my window, I
    have a "access violation caught" and forte disappears. If I just let my
    program run without choosing this option, everything is the same than
    with the distributed run.
    Does somebody have an idea what to look for ? I really want to look the
    inside the attributes of this window.
    We recently upgraded from release 30G2 to release 30L2. Could it be the
    problem ?
    Eric Decossaux
    Cliniques Universitaires St Luc
    Informatique des Laboratoires
    av Hippocrate 10 / 1730
    1200 Bruxelles
    +32+2+764 17 53
    For the archives, go to: http://lists.sageit.com/forte-users and use
    the login: forte and the password: archive. To unsubscribe, send in a new
    email the word: 'Unsubscribe' to: [email protected]

    Eric,
    Another possibility has to do with the repository. You said you recently
    migrated 30G2 to release 30L2.
    Many strange problems have been traced to release migrations with old
    repositories. If the repository was properly migrated another thing you can try
    is to export the project(s) to PEX files, delete them from the repository, and
    then re-import. I know this can be time consuming but I have solved more than
    one unexplained problem in the IDE by doing it.
    ---------------------- Forwarded by Charlie Shell/Bsg/MetLife/US on 09/23/99
    01:19 PM ---------------------------
    "Ajith Kallambella" <[email protected]> on 09/23/99 12:08:54 PM
    To: [email protected], [email protected]
    cc: (bcc: Charlie Shell/Bsg/MetLife/US)
    Subject: Re: (forte-users) access violation caught in debug mode
    Eric,
    Sometimes( 90% ) you can solve this problem by
    checking out the class that is causing the crash
    and force-compiling it.
    If it doesn't help, run through this checklist.
    1. Do you have enough memory resources.?
    2. Is the object you are inspecting held in a lock ?
    ( mutex, transaction lock etc )
    3. Does it work when you wait for sometime at the
    breakpoint before inspecting the values? I mean
    are you interrupting some process thread?
    4. Does it work if you log the attributes using logmgr?
    5. Are you using any call-outs/call-ins? Any external
    systems integration? Sometimes( for reasons beyond
    my comprehension ) the objects allocated outside
    Forte gets corrupted when its passed back and forth.
    6. ...finally...Santa Clause, help me!
    Ajith Kallambella M.
    Forte Systems Consultant.
    From: Eric Decossaux <[email protected]>
    To: forte mailing <[email protected]>
    Subject: (forte-users) access violation caught in debug mode
    Date: Thu, 23 Sep 1999 17:31:39 +0200
    Hello,
    I have a problem using Forte in debug mode. If I run my program on my NT
    machine from the partition workshop (distributed run), the program works
    fine except that some object does not display what I'm expecting. So I
    want to use the debug mode to inspect the objets of this window. When I
    choose the "local variables" option to see the content of my window, I
    have a "access violation caught" and forte disappears. If I just let my
    program run without choosing this option, everything is the same than
    with the distributed run.
    Does somebody have an idea what to look for ? I really want to look the
    inside the attributes of this window.
    We recently upgraded from release 30G2 to release 30L2. Could it be the
    problem ?
    Eric Decossaux
    Cliniques Universitaires St Luc
    Informatique des Laboratoires
    av Hippocrate 10 / 1730
    1200 Bruxelles
    +32+2+764 17 53
    For the archives, go to: http://lists.sageit.com/forte-users and use
    the login: forte and the password: archive. To unsubscribe, send in a new
    email the word: 'Unsubscribe' to: [email protected]
    For the archives, go to: http://lists.sageit.com/forte-users and use
    the login: forte and the password: archive. To unsubscribe, send in a new
    email the word: 'Unsubscribe' to: [email protected]

  • RE: Forte with OpenVMS

    Forte uses the standard VMS user privileges of TMPMBX and NETMBX, although
    you may consider them restrictive, these are normal non-privileged account
    settings.
    If you have a wrapped C routine, then this will show up as a shared library.
    You could install the library as a shareable image and give it the
    appropriate
    run-time privileges, so that any code that executes within the library gets
    what
    is needed - obviously you need to control who calls this code - which is
    your
    next problem.
    The simplest mechanism that I can think of to do this is to use a set of
    rights
    identifiers, similar to that within VMS, for the Forte user. Obviously you
    will
    need a user and rights database - but I guess that you must have this
    somewhere
    in the system anyway.
    Attach the rights identifiers to the task on the task context object so that
    they
    get sent over the network with every call. For sensitive calls check the
    presence
    of the rights identifiers before allowing the call to take place. Using
    application wide rights identifiers means that you can be independent of the
    underlying OS user id / password mechanisms once you have the information.
    Regards,
    - David
    David Bell
    Consulting Technical Manager - North Europe
    Forte Software
    St James's House Phone : +44 1344 482100
    Oldbury Fax: +44 1344 420905
    Bracknell Mobile: +44 378 300613
    RG12 8SA Email : [email protected]
    http://www.forte.com
    -----Original Message-----
    From: [email protected]
    [<a href="mailto:[email protected]">mailto:[email protected]]On</a> Behalf Of Alberto Lamas
    Sent: 02 July 1999 08:23
    To: 'Andy Grace'; Forte Users (Adresse de messagerie)
    Subject: RE: Forte with OpenVMS
    We are using Forte and VMS, and we use the forte usercode to run the node
    manager. All the subprocesses inherit this username when fired off as
    detached processes. You can take a look at the tech note 11037
    for more info
    about subprocess privileges, and for a way to change all this.
    We are using the standard way to fire off partitions, which means that we
    are restricted to the forte username (or whatever other username we choose
    to be our node manager owner, of course) and the forte defined subprocess
    privileges. This does not give us too many problems unless we try
    doing some
    functions that are not allowed under the privileges defined by Forte. I
    have no idea as of why Forte has chosen the current privilege
    set, which is
    quite restrictive. This can be a pain, especially if you try to do some
    system management functions via a Forte partition. It would be highly
    desirable to have a means to dynamically acquire the privileges we need
    without having to incurr the cost of managing specially built procedures.
    Forte says that this may change in the future...
    We have implemented a network wide user security and validation component
    based on the VMS getuai system service, which we have wrappered
    very easily
    via a C routine. As far as our application is concerned, the
    actual OS user
    executing the partition is specifically made not important for,
    among other
    reasons, we have a mixed environment (NT, VMS, W95/8) and our server
    partitions are distributed in different servers throughout the
    network. Our
    main concerns are centered around controlling the client requesting
    something from the application and not the OS security since the user does
    not have direct access to it anyway. Under these circumstances we need to
    handle the application's security issues ourselves (We are not reinventing
    the wheel here, only implementing some Forte and well known patterns).
    Maybe somebody else has a better solution than coding a user security
    schema, I would certainly like to hear about it for it should be a fairly
    commmon problem for every distributed application.
    Regards,
    Alberto
    To unsubscribe, email '[email protected]' with
    'unsubscribe forte-users' as the body of the message.
    Searchable thread archive <URL:<a href=
    "http://pinehurst.sageit.com/listarchive/">http://pinehurst.sageit.com/listarchive/</a>>
    >
    To unsubscribe, email '[email protected]' with
    'unsubscribe forte-users' as the body of the message.
    Searchable thread archive <URL:<a href=
    "http://pinehurst.sageit.com/listarchive/">http://pinehurst.sageit.com/listarchive/</a>>

    Forte uses the standard VMS user privileges of TMPMBX and NETMBX, although
    you may consider them restrictive, these are normal non-privileged account
    settings.
    If you have a wrapped C routine, then this will show up as a shared library.
    You could install the library as a shareable image and give it the
    appropriate
    run-time privileges, so that any code that executes within the library gets
    what
    is needed - obviously you need to control who calls this code - which is
    your
    next problem.
    The simplest mechanism that I can think of to do this is to use a set of
    rights
    identifiers, similar to that within VMS, for the Forte user. Obviously you
    will
    need a user and rights database - but I guess that you must have this
    somewhere
    in the system anyway.
    Attach the rights identifiers to the task on the task context object so that
    they
    get sent over the network with every call. For sensitive calls check the
    presence
    of the rights identifiers before allowing the call to take place. Using
    application wide rights identifiers means that you can be independent of the
    underlying OS user id / password mechanisms once you have the information.
    Regards,
    - David
    David Bell
    Consulting Technical Manager - North Europe
    Forte Software
    St James's House Phone : +44 1344 482100
    Oldbury Fax: +44 1344 420905
    Bracknell Mobile: +44 378 300613
    RG12 8SA Email : [email protected]
    http://www.forte.com
    -----Original Message-----
    From: [email protected]
    [<a href="mailto:[email protected]">mailto:[email protected]]On</a> Behalf Of Alberto Lamas
    Sent: 02 July 1999 08:23
    To: 'Andy Grace'; Forte Users (Adresse de messagerie)
    Subject: RE: Forte with OpenVMS
    We are using Forte and VMS, and we use the forte usercode to run the node
    manager. All the subprocesses inherit this username when fired off as
    detached processes. You can take a look at the tech note 11037
    for more info
    about subprocess privileges, and for a way to change all this.
    We are using the standard way to fire off partitions, which means that we
    are restricted to the forte username (or whatever other username we choose
    to be our node manager owner, of course) and the forte defined subprocess
    privileges. This does not give us too many problems unless we try
    doing some
    functions that are not allowed under the privileges defined by Forte. I
    have no idea as of why Forte has chosen the current privilege
    set, which is
    quite restrictive. This can be a pain, especially if you try to do some
    system management functions via a Forte partition. It would be highly
    desirable to have a means to dynamically acquire the privileges we need
    without having to incurr the cost of managing specially built procedures.
    Forte says that this may change in the future...
    We have implemented a network wide user security and validation component
    based on the VMS getuai system service, which we have wrappered
    very easily
    via a C routine. As far as our application is concerned, the
    actual OS user
    executing the partition is specifically made not important for,
    among other
    reasons, we have a mixed environment (NT, VMS, W95/8) and our server
    partitions are distributed in different servers throughout the
    network. Our
    main concerns are centered around controlling the client requesting
    something from the application and not the OS security since the user does
    not have direct access to it anyway. Under these circumstances we need to
    handle the application's security issues ourselves (We are not reinventing
    the wheel here, only implementing some Forte and well known patterns).
    Maybe somebody else has a better solution than coding a user security
    schema, I would certainly like to hear about it for it should be a fairly
    commmon problem for every distributed application.
    Regards,
    Alberto
    To unsubscribe, email '[email protected]' with
    'unsubscribe forte-users' as the body of the message.
    Searchable thread archive <URL:<a href=
    "http://pinehurst.sageit.com/listarchive/">http://pinehurst.sageit.com/listarchive/</a>>
    >
    To unsubscribe, email '[email protected]' with
    'unsubscribe forte-users' as the body of the message.
    Searchable thread archive <URL:<a href=
    "http://pinehurst.sageit.com/listarchive/">http://pinehurst.sageit.com/listarchive/</a>>

  • HT204406 I am having a very difficult time with accessing my music from the cloud.  I need to have itunes open on my laptop in order for it to work.  And as soon as I close out itunes on my laptop, it gives me a warning that all users will be logged out. 

    I am having a very difficult time with accessing my music from the cloud.  I need to have itunes open on my laptop in order for it to work.  And as soon as I close out itunes on my laptop, it gives me a warning that all users will be logged out.  Help!!!

    Where are iTunes files located?
    No, I do not mean just the music.  Copying just the media/music files or the media folder creates problems.

  • How to implement Oracle user/role security with Access front end?

    Hi,
    We have successfully migrated our Access database tables to Oracle 10g using SQL developer. We've recreated all the users and roles(i.e., access groups) in Oracle and granted rights to tables.
    In the Access front end database, in the Database window we have saved linked Oracle tables which replaced the Access tables. The forms, reports, queries run fine with the linked Oracle tables. All the linked table use one ODBC DSN to the Oracle database with the same Oracle user id.
    We need to be able to authenticate users into the Oracle database and RE-link the tables based on their own unique user id. By during so we can allow users to use the Oracle standard user id/role and system privileges to control select, update, ect. rights to the database.
    I've been able to use the VB code within Access to logon into the database with a unique id, but I have not been able to find out how to RE-link the tables to the unique user id using VB. There should be some way to relink tables dynamically, based on users login into the Access front end.
    I don't know a great deal about Access projects, but I do know with SQL server allows login into your Access project and link tables dynamically.
    Can someone give me some assistance or point me in the right direction?
    Thanks in advance,
    Larry

    We had one of our programmers here come up with a VB code solution for re-linking table within Access. However the relinking takes 3-4 minutes for 100+ tables.
    In an effort to help you understand the situation better, I will attempt to elaborate on the problem:
    We have an Access 2003 application which currently has a front end using Access(forms, reports, queries, & VB code) and a MS Access 2003 backend.
    We have migrated the backend tables to Oracle. However, we still have a need to maintain the front end in Access, since we have over 60 forms, 40 reports, 200+ queries in Access. Its easy to understand, we have a significant investment in the front end(Obviously, the plan is to migrate the front end also at some future date).
    In order to utilized the existing front end, we have to validate and modify the current front end connections to the new Oracle backend. One of the features of Access is that you can "link" tables and save the link for runtime. Each Access table can have its own link which is a separate ODBC/JET connection. As such, each separate link has its own userid/database information.
    The other issue with using the Access front-end is that Access utilizes a workgroup file to implement user and group security. The workgroup file contains all the users and which groups the users belong to in Access. Then within Access, you allow users access to object(tables, queries, ect) by their userid and or group. When users open an Access database with Access security enabled, they are required to log into Access. The login is authenticated by the workgroup file. Once, logged into Access, users have rights to Access objects based on their rights granted to their userid and groups they belong. The problem here is that when you remove the linked Access tables and replace them with linked Oracle tables, Access has knowledge about Oracle table rights granted to users; nor would you expect it to.
    The dilema is the disconnect between Access and the fact Oracle utilizes a similar but much more sophisticated security model. It creates users and roles(which are similar to Access groups), and again this is independent of Access security.
    Our solution was to still use the Access workgroup file security along with the Oracle security model. By using the Access userid and then creating a similar Oracle userid with similar table rights granted in Access, you could apply security within Access and also with the Oracle database.
    For example, a user BOB logs into Access via the workgroup file, using VB code, Access then establishes a Oracle connection logining into Oracle using the same unique userid BOB into Oracle.
    After connecting and validating user BOB into Oracle, then the Access tables are relinked to Oracle using the user BOB userid and table rights.
    This Oracle userid has been granted table rights specific for this userid.This allows the user BOB to use the Access application and still be authenticated into the Oracle database.
    The problem with this solution is that the relinking of the saved Access tables takes 3-7 minutes for about 100+ tables. This is not acceptable for users each time they log into the application.
    Our current alternative is to use one Oracle userid to login each user, and use Access form restrictions/security to allow/prevent users from updating/viewing data. Obviously, this is not the optimal solution in respect to security, but it at least allows us to control access to the data(via the forms) by using one logon required for each user, and quick startup time for the application.
    I understand SQL server does a better job in integration, but we use Oracle which is what I am trying to work with.
    Larry

  • I'm trying to open a java report and it keeps coming back with access denied to dashboard module. any ideas?

    i'm trying to open a report on a web site and it keeps coming back with access denied to dashboard module. any ideas?

    Exactly how are you trying to restore form TM?
    Have you tried rebuilding your iPhoto library?
    And your comments indicate that you may not understand iPhoto at all - you should not be inside the iPhoto library - there are no user servicable parts in it - and iPhoto does not duplicate photos  - more details of yoru work flow would help sort this out
    LN

  • Too  Slow - Domino 6.5.4  with access manager agent 2.2 ?

    I don't know how to tune Domino 6.5.4 with access manager agent 2.2?
    I think AMAgent.properties is not good for SSO.
    Please help me to tune it.
    # $Id: AMAgent.properties,v 1.103 2005/09/19 22:08:34 madan Exp $
    # Copyright ? 2002 Sun Microsystems, Inc. All rights reserved.
    # U.S. Government Rights - Commercial software. Government users are
    # subject to the Sun Microsystems, Inc. standard license agreement and
    # applicable provisions of the FAR and its supplements. Use is subject to
    # license terms. Sun, Sun Microsystems, the Sun logo and Sun ONE are
    # trademarks or registered trademarks of Sun Microsystems, Inc. in the
    # U.S. and other countries.
    # Copyright ? 2002 Sun Microsystems, Inc. Tous droits r&#38303;erv&#38303;.
    # Droits du gouvernement am&#38302;icain, utlisateurs gouvernmentaux - logiciel
    # commercial. Les utilisateurs gouvernmentaux sont soumis au contrat de
    # licence standard de Sun Microsystems, Inc., ainsi qu aux dispositions en
    # vigueur de la FAR [ (Federal Acquisition Regulations) et des suppl&#38297;ents
    # ? celles-ci.
    # Distribu? par des licences qui en restreignent l'utilisation. Sun, Sun
    # Microsystems, le logo Sun et Sun ONE sont des marques de fabrique ou des
    # marques d&#38300;os&#38289;s de Sun Microsystems, Inc. aux Etats-Unis et dans
    # d'autres pays.
    # The syntax of this file is that of a standard Java properties file,
    # see the documentation for the java.util.Properties.load method for a
    # complete description. (CAVEAT: The SDK in the parser does not currently
    # support any backslash escapes except for wrapping long lines.)
    # All property names in this file are case-sensitive.
    # NOTE: The value of a property that is specified multiple times is not
    # defined.
    # WARNING: The contents of this file are classified as an UNSTABLE
    # interface by Sun Microsystems, Inc. As such, they are subject to
    # significant, incompatible changes in any future release of the
    # software.
    # The name of the cookie passed between the Access Manager
    # and the SDK.
    # WARNING: Changing this property without making the corresponding change
    # to the Access Manager will disable the SDK.
    com.sun.am.cookie.name = iPlanetDirectoryPro
    # The URL for the Access Manager Naming service.
    com.sun.am.naming.url = http://sportal.yjy.dqyt.petrochina:80/amserver/namingservice
    # The URL of the login page on the Access Manager.
    com.sun.am.policy.am.login.url = http://sportal.yjy.dqyt.petrochina:80/amserver/UI/Login
    # Name of the file to use for logging messages.
    com.sun.am.policy.agents.config.local.log.file = c:/Sun/Access_Manager/Agents/2.2/debug/C__Lotus_Domino/amAgent
    # This property is used for Log Rotation. The value of the property specifies
    # whether the agent deployed on the server supports the feature of not. If set
    # to false all log messages are written to the same file.
    com.sun.am.policy.agents.config.local.log.rotate = true
    # Name of the Access Manager log file to use for logging messages to
    # Access Manager.
    # Just the name of the file is needed. The directory of the file
    # is determined by settings configured on the Access Manager.
    com.sun.am.policy.agents.config.remote.log = amAuthLog.Dominoad.yjy.dqyt.petrochina.80
    # Set the logging level for the specified logging categories.
    # The format of the values is
    #     <ModuleName>[:<Level>][,<ModuleName>[:<Level>]]*
    # The currently used module names are: AuthService, NamingService,
    # PolicyService, SessionService, PolicyEngine, ServiceEngine,
    # Notification, PolicyAgent, RemoteLog and all.
    # The all module can be used to set the logging level for all currently
    # none logging modules. This will also establish the default level for
    # all subsequently created modules.
    # The meaning of the 'Level' value is described below:
    #     0     Disable logging from specified module*
    #     1     Log error messages
    #     2     Log warning and error messages
    #     3     Log info, warning, and error messages
    #     4     Log debug, info, warning, and error messages
    #     5     Like level 4, but with even more debugging messages
    # 128     log url access to log file on AM server.
    # 256     log url access to log file on local machine.
    # If level is omitted, then the logging module will be created with
    # the default logging level, which is the logging level associated with
    # the 'all' module.
    # for level of 128 and 256, you must also specify a logAccessType.
    # *Even if the level is set to zero, some messages may be produced for
    # a module if they are logged with the special level value of 'always'.
    com.sun.am.log.level =
    # The org, username and password for Agent to login to AM.
    com.sun.am.policy.am.username = UrlAccessAgent
    com.sun.am.policy.am.password = LYnKyOIgdWt404ivWY6HPQ==
    # Name of the directory containing the certificate databases for SSL.
    com.sun.am.sslcert.dir = c:/Sun/Access_Manager/Agents/2.2/domino/cert
    # Set this property if the certificate databases in the directory specified
    # by the previous property have a prefix.
    com.sun.am.certdb.prefix =
    # Should agent trust all server certificates when Access Manager
    # is running SSL?
    # Possible values are true or false.
    com.sun.am.trust_server_certs = true
    # Should the policy SDK use the Access Manager notification
    # mechanism to maintain the consistency of its internal cache? If the value
    # is false, then a polling mechanism is used to maintain cache consistency.
    # Possible values are true or false.
    com.sun.am.notification.enable = true
    # URL to which notification messages should be sent if notification is
    # enabled, see previous property.
    com.sun.am.notification.url = http://Dominoad.yjy.dqyt.petrochina:80/amagent/UpdateAgentCacheServlet?shortcircuit=false
    # This property determines whether URL string case sensitivity is
    # obeyed during policy evaluation
    com.sun.am.policy.am.url_comparison.case_ignore = true
    # This property determines the amount of time (in minutes) an entry
    # remains valid after it has been added to the cache. The default
    # value for this property is 3 minutes.
    com.sun.am.policy.am.polling.interval=3
    # This property allows the user to configure the User Id parameter passed
    # by the session information from the access manager. The value of User
    # Id will be used by the agent to set the value of REMOTE_USER server
    # variable. By default this parameter is set to "UserToken"
    com.sun.am.policy.am.userid.param=UserToken
    # Profile attributes fetch mode
    # String attribute mode to specify if additional user profile attributes should
    # be introduced into the request. Possible values are:
    # NONE - no additional user profile attributes will be introduced.
    # HTTP_HEADER - additional user profile attributes will be introduced into
    # HTTP header.
    # HTTP_COOKIE - additional user profile attributes will be introduced through
    # cookies.
    # If not within these values, it will be considered as NONE.
    com.sun.am.policy.agents.config.profile.attribute.fetch.mode=NONE
    # The user profile attributes to be added to the HTTP header. The
    # specification is of the format ldap_attribute_name|http_header_name[,...].
    # ldap_attribute_name is the attribute in data store to be fetched and
    # http_header_name is the name of the header to which the value needs
    # to be assigned.
    # NOTE: In most cases, in a destination application where a "http_header_name"
    # shows up as a request header, it will be prefixed by HTTP_, and all
    # lower case letters will become upper case, and any - will become _;
    # For example, "common-name" would become "HTTP_COMMON_NAME"
    com.sun.am.policy.agents.config.profile.attribute.map=cn|common-name,ou|organizational-unit,o|organization,mail|email,employeenumber|employee-
    number,c|country
    # Session attributes mode
    # String attribute mode to specify if additional user session attributes should
    # be introduced into the request. Possible values are:
    # NONE - no additional user session attributes will be introduced.
    # HTTP_HEADER - additional user session attributes will be introduced into HTTP header.
    # HTTP_COOKIE - additional user session attributes will be introduced through cookies.
    # If not within these values, it will be considered as NONE.
    com.sun.am.policy.agents.config.session.attribute.fetch.mode=NONE
    # The session attributes to be added to the HTTP header. The specification is
    # of the format session_attribute_name|http_header_name[,...].
    # session_attribute_name is the attribute in session to be fetched and
    # http_header_name is the name of the header to which the value needs to be
    # assigned.
    # NOTE: In most cases, in a destination application where a "http_header_name"
    # shows up as a request header, it will be prefixed by HTTP_, and all
    # lower case letters will become upper case, and any - will become _;
    # For example, "common-name" would become "HTTP_COMMON_NAME"
    com.sun.am.policy.agents.config.session.attribute.map=
    # Response Attribute Fetch Mode
    # String attribute mode to specify if additional user response attributes should
    # be introduced into the request. Possible values are:
    # NONE - no additional user response attributes will be introduced.
    # HTTP_HEADER - additional user response attributes will be introduced into
    # HTTP header.
    # HTTP_COOKIE - additional user response attributes will be introduced through
    # cookies.
    # If not within these values, it will be considered as NONE.
    com.sun.am.policy.agents.config.response.attribute.fetch.mode=NONE
    # The response attributes to be added to the HTTP header. The specification is
    # of the format response_attribute_name|http_header_name[,...].
    # response_attribute_name is the attribute in policy response to be fetched and
    # http_header_name is the name of the header to which the value needs to be
    # assigned.
    # NOTE: In most cases, in a destination application where a "http_header_name"
    # shows up as a request header, it will be prefixed by HTTP_, and all
    # lower case letters will become upper case, and any - will become _;
    # For example, "common-name" would become "HTTP_COMMON_NAME"
    com.sun.am.policy.agents.config.response.attribute.map=
    # The cookie name used in iAS for sticky load balancing
    com.sun.am.policy.am.lb.cookie.name = GX_jst
    # indicate where a load balancer is used for Access Manager
    # services.
    # true | false
    com.sun.am.load_balancer.enable = false
    ####Agent Configuration####
    # this is for product versioning, please do not modify it
    com.sun.am.policy.agents.config.version=2.2
    # Set the url access logging level. the choices are
    # LOG_NONE - do not log user access to url
    # LOG_DENY - log url access that was denied.
    # LOG_ALLOW - log url access that was allowed.
    # LOG_BOTH - log url access that was allowed or denied.
    com.sun.am.policy.agents.config.audit.accesstype = LOG_DENY
    # Agent prefix
    com.sun.am.policy.agents.config.agenturi.prefix = http://Dominoad.yjy.dqyt.petrochina:80/amagent
    # Locale setting.
    com.sun.am.policy.agents.config.locale = en_US
    # The unique identifier for this agent instance.
    com.sun.am.policy.agents.config.instance.name = unused
    # Do SSO only
    # Boolean attribute to indicate whether the agent will just enforce user
    # authentication (SSO) without enforcing policies (authorization)
    com.sun.am.policy.agents.config.do_sso_only = true
    # The URL of the access denied page. If no value is specified, then
    # the agent will return an HTTP status of 403 (Forbidden).
    com.sun.am.policy.agents.config.accessdenied.url =
    # This property indicates if FQDN checking is enabled or not.
    com.sun.am.policy.agents.config.fqdn.check.enable = true
    # Default FQDN is the fully qualified hostname that the users should use
    # in order to access resources on this web server instance. This is a
    # required configuration value without which the Web server may not
    # startup correctly.
    # The primary purpose of specifying this property is to ensure that if
    # the users try to access protected resources on this web server
    # instance without specifying the FQDN in the browser URL, the Agent
    # can take corrective action and redirect the user to the URL that
    # contains the correct FQDN.
    # This property is set during the agent installation and need not be
    # modified unless absolutely necessary to accommodate deployment
    # requirements.
    # WARNING: Invalid value for this property can result in the Web Server
    # becoming unusable or the resources becoming inaccessible.
    # See also: com.sun.am.policy.agents.config.fqdn.check.enable,
    # com.sun.am.policy.agents.config.fqdn.map
    com.sun.am.policy.agents.config.fqdn.default = Dominoad.yjy.dqyt.petrochina
    # The FQDN Map is a simple map that enables the Agent to take corrective
    # action in the case where the users may have typed in an incorrect URL
    # such as by specifying partial hostname or using an IP address to
    # access protected resources. It redirects the browser to the URL
    # with fully qualified domain name so that cookies related to the domain
    # are received by the agents.
    # The format for this property is:
    # com.sun.am.policy.agents.config.fqdn.map = [invalid_hostname|valid_hostname][,...]
    # This property can also be used so that the agents use the name specified
    # in this map instead of the web server's actual name. This can be
    # accomplished by doing the following.
    # Say you want your server to be addressed as xyz.hostname.com whereas the
    # actual name of the server is abc.hostname.com. The browsers only knows
    # xyz.hostname.com and you have specified polices using xyz.hostname.com at
    # the Access Manager policy console, in this file set the mapping as
    # com.sun.am.policy.agents.fqdn.map = valid|xyz.hostname.com
    # Another example is if you have multiple virtual servers say rst.hostname.com,
    # uvw.hostname.com and xyz.hostname.com pointing to the same actual server
    # abc.hostname.com and each of the virtual servers have their own policies
    # defined, then the fqdnMap should be defined as follows:
    # com.sun.am.policy.agents.fqdn.map = valid1|rst.hostname.com,valid2|uvw.hostname.com,valid3|xyz.hostname.com
    # WARNING: Invalid value for this property can result in the Web Server
    # becoming unusable or the resources becoming inaccessible.
    com.sun.am.policy.agents.config.fqdn.map =
    # Cookie Reset
    # This property must be set to true, if this agent needs to
    # reset cookies in the response before redirecting to
    # Access Manager for Authentication.
    # By default this is set to false.
    # Example : com.sun.am.policy.agents.config.cookie.reset.enable=true
    com.sun.am.policy.agents.config.cookie.reset.enable=false
    # This property gives the comma separated list of Cookies, that
    # need to be included in the Redirect Response to Access Manager.
    # This property is used only if the Cookie Reset feature is enabled.
    # The Cookie details need to be specified in the following Format
    # name[=value][;Domain=value]
    # If "Domain" is not specified, then the default agent domain is
    # used to set the Cookie.
    # Example : com.sun.am.policy.agents.config.cookie.reset.list=LtpaToken,
    # token=value;Domain=subdomain.domain.com
    com.sun.am.policy.agents.config.cookie.reset.list=
    # This property gives the space separated list of domains in
    # which cookies have to be set in a CDSSO scenario. This property
    # is used only if CDSSO is enabled.
    # If this property is left blank then the fully qualified cookie
    # domain for the agent server will be used for setting the cookie
    # domain. In such case it is a host cookie instead of a domain cookie.
    # Example : com.sun.am.policy.agents.config.cookie.domain.list=.sun.com .iplanet.com
    com.sun.am.policy.agents.config.cookie.domain.list=
    # user id returned if accessing global allow page and not authenticated
    com.sun.am.policy.agents.config.anonymous_user=anonymous
    # Enable/Disable REMOTE_USER processing for anonymous users
    # true | false
    com.sun.am.policy.agents.config.anonymous_user.enable=false
    # Not enforced list is the list of URLs for which no authentication is
    # required. Wildcards can be used to define a pattern of URLs.
    # The URLs specified may not contain any query parameters.
    # Each service have their own not enforced list. The service name is suffixed
    # after "# com.sun.am.policy.agents.notenforcedList." to specify a list
    # for a particular service. SPACE is the separator between the URL.
    com.sun.am.policy.agents.config.notenforced_list = http://dominoad.yjy.dqyt.petrochina/*.nsf http://dominoad.yjy.dqyt.petrochina/teamroom.nsf/TROutline.gif?
    OpenImageResource http://dominoad.yjy.dqyt.petrochina/icons/*.gif
    # Boolean attribute to indicate whether the above list is a not enforced list
    # or an enforced list; When the value is true, the list means enforced list,
    # or in other words, the whole web site is open/accessible without
    # authentication except for those URLs in the list.
    com.sun.am.policy.agents.config.notenforced_list.invert = false
    # Not enforced client IP address list is a list of client IP addresses.
    # No authentication and authorization are required for the requests coming
    # from these client IP addresses. The IP address must be in the form of
    # eg: 192.168.12.2 1.1.1.1
    com.sun.am.policy.agents.config.notenforced_client_ip_list =
    # Enable POST data preservation; By default it is set to false
    com.sun.am.policy.agents.config.postdata.preserve.enable = false
    # POST data preservation : POST cache entry lifetime in minutes,
    # After the specified interval, the entry will be dropped
    com.sun.am.policy.agents.config.postcache.entry.lifetime = 10
    # Cross-Domain Single Sign On URL
    # Is CDSSO enabled.
    com.sun.am.policy.agents.config.cdsso.enable=false
    # This is the URL the user will be redirected to for authentication
    # in a CDSSO Scenario.
    com.sun.am.policy.agents.config.cdcservlet.url =
    # Enable/Disable client IP address validation. This validate
    # will check if the subsequent browser requests come from the
    # same ip address that the SSO token is initially issued against
    com.sun.am.policy.agents.config.client_ip_validation.enable = false
    # Below properties are used to define cookie prefix and cookie max age
    com.sun.am.policy.agents.config.profile.attribute.cookie.prefix = HTTP_
    com.sun.am.policy.agents.config.profile.attribute.cookie.maxage = 300
    # Logout URL - application's Logout URL.
    # This URL is not enforced by policy.
    # if set, agent will intercept this URL and destroy the user's session,
    # if any. The application's logout URL will be allowed whether or not
    # the session destroy is successful.
    com.sun.am.policy.agents.config.logout.url=
    #http://sportal.yjy.dqyt.petrochina/amserver/UI/Logout
    # Any cookies to be reset upon logout in the same format as cookie_reset_list
    com.sun.am.policy.agents.config.logout.cookie.reset.list =
    # By default, when a policy decision for a resource is needed,
    # agent gets and caches the policy decision of the resource and
    # all resource from the root of the resource down, from the Access Manager.
    # For example, if the resource is http://host/a/b/c, the the root of the
    # resource is http://host/. This is because more resources from the
    # same path are likely to be accessed subsequently.
    # However this may take a long time the first time if there
    # are many many policies defined under the root resource.
    # To have agent get and cache the policy decision for the resource only,
    # set the following property to false.
    com.sun.am.policy.am.fetch_from_root_resource = true
    # Whether to get the client's hostname through DNS reverse lookup for use
    # in policy evaluation.
    # It is true by default, if the property does not exist or if it is
    # any value other than false.
    com.sun.am.policy.agents.config.get_client_host_name = false
    # The following property is to enable native encoding of
    # ldap header attributes forwarded by agents. If set to true
    # agent will encode the ldap header value in the default
    # encoding of OS locale. If set to false ldap header values
    # will be encoded in UTF-8
    com.sun.am.policy.agents.config.convert_mbyte.enable = false
    #When the not enforced list or policy has a wildcard '*' character, agent
    #strips the path info from the request URI and uses the resulting request
    #URI to check against the not enforced list or policy instead of the entire
    #request URI, in order to prevent someone from getting access to any URI by
    #simply appending the matching pattern in the policy or not enforced list.
    #For example, if the not enforced list has the value http://host/*.gif,
    #stripping the path info from the request URI will prevent someone from
    #getting access to http://host/index.html by using the URL http://host/index.html?hack.gif.
    #However when a web server (for exmample apache) is configured to be a reverse
    #proxy server for a J2EE application server, path info is interpreted in a different
    #manner since it maps to a resource on the proxy instead of the app server.
    #This prevents the not enforced list or policy from being applied to part of
    #the URI below the app serverpath if there is a wildcard character. For example,
    #if the not enforced list has value http://host/webapp/servcontext/* and the
    #request URL is http://host/webapp/servcontext/example.jsp the path info
    #is /servcontext/example.jsp and the resulting request URL with path info stripped
    #is http://host/webapp, which will not match the not enforced list. By setting the
    #following property to true, the path info will not be stripped from the request URL
    #even if there is a wild character in the not enforced list or policy.
    #Be aware though that if this is set to true there should be nothing following the
    #wildcard character '*' in the not enforced list or policy, or the
    #security loophole described above may occur.
    com.sun.am.policy.agents.config.ignore_path_info = false
    # Override the request url given by the web server with
    # the protocol, host or port of the agent's uri specified in
    # the com.sun.am.policy.agents.agenturiprefix property.
    # These may be needed if the agent is sitting behind a ssl off-loader,
    # load balancer, or proxy, and either the protocol (HTTP scheme),
    # hostname, or port of the machine in front of agent which users go through
    # is different from the agent's protocol, host or port.
    com.sun.am.policy.agents.config.override_protocol =
    com.sun.am.policy.agents.config.override_host =
    com.sun.am.policy.agents.config.override_port =
    # Override the notification url in the same way as other request urls.
    # Set this to true if any one of the override properties above is true,
    # and if the notification url is coming through the proxy or load balancer
    # in the same way as other request url's.
    com.sun.am.policy.agents.config.override_notification.url =
    # The following property defines how long to wait in attempting
    # to connect to an Access Manager AUTH server.
    # The default value is 2 seconds. This value needs to be increased
    # when receiving the error "unable to find active Access Manager Auth server"
    com.sun.am.policy.agents.config.connection_timeout =
    # Time in milliseconds the agent will wait to receive the
    # response from Access Manager. After the timeout, the connection
    # will be drop.
    # A value of 0 means that the agent will wait until receiving the response.
    # WARNING: Invalid value for this property can result in
    # the resources becoming inaccessible.
    com.sun.am.receive_timeout = 0
    # The three following properties are for IIS6 agent only.
    # The two first properties allow to set a username and password that will be
    # used by the authentication filter to pass the Windows challenge when the Basic
    # Authentication option is selected in Microsoft IIS 6.0. The authentication
    # filter is named amiis6auth.dll and is located in
    # Agent_installation_directory/iis6/bin. It must be installed manually on
    # the web site ("ISAPI Filters" tab in the properties of the web site).
    # It must also be uninstalled manually when unintalling the agent.
    # The last property defines the full path for the authentication filter log file.
    com.sun.am.policy.agents.config.iis6.basicAuthentication.username =
    com.sun.am.policy.agents.config.iis6.basicAuthentication.password =
    com.sun.am.policy.agents.config.iis6.basicAuthentication.logFile = c:/Sun/Access_Manager/Agents/2.2/debug/C__Lotus_Domino/amAuthFilter

    Hi,
    I installed opensso (so Sun Java(TM) System Access Manager 7.5) and the agent for Domino 6.5.4 and I have the message in logs "amAgent"
    2007-07-11 18:40:16.119 Error 1708:3dbcf768 PolicyAgent: render_response(): Entered.
    I have the box to identify but it doesnot connect me on my opensso server.
    It still identify with Domino's server
    Thanks for your response
    Thomas

  • How can I set up my devices where I share an account so that I'm the only one with access to gift card

    How can I limit access to my iTunes gift card balance from others on iTunes account?

    You have to sign out of the account in Settings>Store Apple ID. If those that you share the account with know your Apple ID and password, then it will do not good. Anyone with access to the account can spend the balance on the card.
    Or you can set restrictions on the iPad so that nobody can unlock the device or restrict the downloading of apps. Anybody that you let share the device that knows your ID and password can spend the money on the card.

  • Is it possible to easily run Microsoft office 2010 with access on a MacBook pro or have I wasted my money ?

    Okay , first off thanks for any help in advance . I just purchased a MacBook pro for my daughter for college . ( finance major ) . Her class requires Microsoft office 2010 with access .  As you probably already know , and I have just learned , that is no offered for Mac. Is there an easy way To run ms office with access on a MacBook pro or have I wasted my money ?

    All that matters is file compatibility. The documents look the same. I've been a professor, so I don't see any issues here at all.
    Another option you may want to consider is this: Run Windows on the Mac:
    Windows on Intel Macs
    There are presently several alternatives for running Windows on Intel Macs.
         1. Install the Apple Boot Camp software.  Purchase Windows
             XP w/Service Pak2, Vista, or Windows 7.  For Boot Camp
             4.0 and above you can only use Windows 7 or later. Follow
             instructions in the Boot Camp documentation on
             installation of Boot Camp, creating Driver CD, and
             installing Windows.  Boot Camp enables you to boot the
             computer into OS X or Windows.
         2. Parallels Desktop for Mac and Windows XP, Vista Business,
             Vista Ultimate, or Windows 7.  Parallels is software
             virtualization that enables running Windows concurrently
             with OS X.
         3. VM Fusion and Windows XP, Vista Business, Vista Ultimate,
             or Windows 7.  VM Fusion is software virtualization that
             enables running Windows concurrently with OS X.
         4. CrossOver which enables running many Windows
             applications without having to install Windows.  The
             Windows applications can run concurrently with OS X.
         5. VirtualBox is an Open Source freeware virtual machine such
             as VM Fusion and Parallels that was developed by Solaris.
             It is not as fully developed for the Mac as Parallels and VM
             Fusion.
    Note that VirtualBox, Parallels, and VM Fusion can also run other operating systems such as Linux, Unix, OS/2, Solaris, etc.  There are performance differences between dual-boot systems and virtualization.  The latter tend to be a little slower (not much) and do not provide the video performance of the dual-boot system. See MacTech Labs- Virtualization Benchmarks, January 2013 | MacTech for comparisons of Boot Camp, Parallels, and VM Fusion. Boot Camp is only available with Leopard or Snow Leopard. Except for Crossover and a couple of similar alternatives like DarWine you must have a valid installer disc for Windows.
    You must also have an internal optical drive for installing Windows. Windows cannot be installed from an external optical drive.

  • Upgrade of scvmm 2012 sp1 to scvmm 2012 r2 fails with "Access to the path 'C:\ProgramData\VMMLogs\SetupWizard.log' is denied"

    I had a working scvmm 2012 sp1 installation, and am attempting to upgrade to 2012 r2.
    The old SCVMM product was removed (retaining the database), as well as ADK 8.0.  I then installed ADK 8.1.
    The install fails after a number of minutes with "Access to the path 'C:\ProgramData\VMMLogs\SetupWizard.log' is denied".  From my reading of the log, that was the only obvious failure, and that the VMM server MSI installed successfully. 
    It doesn't appear to get so far as to upgrade the database.
    The OS is Windows Server 2012 R2 Standard, with all updates applied.  I have tried the install many times, noticed that the McAfee virus scanner was pushed to the box at some point, so I removed it, but still no dice.
    12:18:58:LaunchMSI: MSI C:\Users\mscott\Desktop\mu_system_center_2012_r2_virtual_machine_manager_x86_and_x64_dvd_2913737\amd64\setup\msi\Server\vmmServer.msi succeeded.
    12:18:58:Doing Postinstall task for PangaeaServer
    12:18:58:ProcessInstalls: Install Item VMM management server was successful.  We will launch the post process delegate.
    12:19:47:Windows feature RSAT-Clustering-PowerShell already enabled, skipping
    12:20:15:Windows feature WindowsStorageManagementService already enabled, skipping
    12:20:41:Windows feature UpdateServices-API already enabled, skipping
    12:23:31:VMMPostinstallProcessor threw an exception: Threw Exception.Type: System.UnauthorizedAccessException, Exception.Message: Access to the path 'C:\ProgramData\VMMLogs\SetupWizard.log' is denied.
    12:23:31:StackTrace:   at System.IO.__Error.WinIOError(Int32 errorCode, String maybeFullPath)
       at System.IO.FileStream.Init(String path, FileMode mode, FileAccess access, Int32 rights, Boolean useRights, FileShare share, Int32 bufferSize, FileOptions options, SECURITY_ATTRIBUTES secAttrs, String msgPath, Boolean bFromProxy, Boolean useLongPath,
    Boolean checkHost)
       at System.IO.FileStream..ctor(String path, FileMode mode, FileAccess access, FileShare share, Int32 bufferSize, FileOptions options, String msgPath, Boolean bFromProxy, Boolean useLongPath, Boolean checkHost)
       at System.IO.StreamWriter..ctor(String path, Boolean append, Encoding encoding, Int32 bufferSize, Boolean checkHost)
       at System.IO.StreamWriter..ctor(String path, Boolean append, Encoding encoding, Int32 bufferSize)
       at System.IO.StreamWriter..ctor(String path, Boolean append)
       at System.IO.File.AppendText(String path)
       at Microsoft.VirtualManager.SetupFramework.CommonLogger.Log(String trace)
       at Microsoft.VirtualManager.SetupFramework.CommonLogger.Log(LogLevel level, String trace)
       at Microsoft.VirtualManager.SetupFramework.Trc.Log(LogLevel level, String trace, Object parameter1, Object parameter2, Object parameter3)
       at Microsoft.VirtualManager.SetupFramework.Trc.LogException(LogLevel logLevel, String customMessage, Exception exception)
       at Microsoft.VirtualManager.Setup.DBConfigurator.ExecuteScript(SqlContext ctx, String fileName)
       at Microsoft.VirtualManager.Setup.DBConfigurator.UpgradeDatabaseTables()
       at Microsoft.VirtualManager.Setup.VirtualMachineManagerHelpers.CreateDB()
       at Microsoft.VirtualManager.Setup.InstallItemCustomDelegates.PangaeaServerPostinstallProcessor()
    12:23:31:ProcessInstalls: Running the PostProcessDelegate returned false.
    12:23:31:ProcessInstalls: Running the PostProcessDelegate for PangaeaServer failed.... This is a fatal item.  Setting rollback.
    12:23:31:SetProgressScreen: FinishMinorStep.
    12:23:31:ProcessInstalls: Rollback is set and we are not doing an uninstall so we will stop processing installs
    12:23:31:****************************************************************
    12:23:31:****Starting*RollBack*******************************************
    12:23:31:****************************************************************
    12:23:31:SetProgressScreen: StartMinorStep.
    Mark E. Scott Jr.

    Perhaps relevant, perhaps not. This error shows up right after the above log snippet. I assumed it was an error with the rollback routine, but just in case, here it is:
    12:23:31:SetProgressScreen: StartMinorStep.
    12:23:31:ProcessInstalls: Install Item VMM management server has a Preprocessing delegate of PangaeaServerPreinstallProcessor.  Launching it now.
    12:23:31:GetSqlLoginName: TThe login name for the vmm server service is [DGSLAB\tfs-vmm]
    12:24:49:no HAVMM name detected in DB. Doing VMM Uninstall
    12:24:53:Start setspn.exe parameters  -D SCVMM/tfsvmm1.dgslab.com DGSLAB\tfs-vmm
    12:24:56:Start setspn.exe parameters  -D SCVMM/tfsvmm1 DGSLAB\tfs-vmm
    12:25:00:DBConfigurationHander.SetupAsVMMServerRole() CarmineException : Threw Exception.Type: Microsoft.VirtualManager.Utils.FailedToAcquireLockException, Exception.Message: Unable to perform the job because one or more of the selected objects are locked by
    another job.
    To find out which job is locking the object, in the Jobs view, group by Status, and find the running or canceling job for the object. When the job is complete, try again.
    12:25:00:StackTrace:   at Microsoft.VirtualManager.Utils.CarmineObjectLock.ExecuteAcquireLockSP(CarmineObjectLockType lockType)
       at Microsoft.VirtualManager.Utils.CarmineObjectLock.AcquireLockWithRetries(CarmineObjectLockType lockType)
       at Microsoft.VirtualManager.Utils.CarmineObjectLock.AcquireLock(CarmineObjectLockType lockType, Boolean doNotWaitForLock)
       at Microsoft.VirtualManager.DB.Adhc.AgentServer..ctor(RemoteServer server, Guid serverID, Version agentVersion, VersionState agentVersionState, AgentPackageType agentPackageType, Boolean wsManOverSSL, Int32 wsManPort, Nullable`1 complianceStatusID,
    Nullable`1 mostRecentTaskID, Nullable`1 mostRecentTaskUIState, Guid taskID, CarmineObjectLockType lockType)
       at Microsoft.VirtualManager.DB.Adhc.AgentServer..ctor(SqlRow row, Guid serverID, Guid taskID, CarmineObjectLockType lockType)
       at Microsoft.VirtualManager.DB.Adhc.AgentServer.<>c__DisplayClass4.<GetInstance>b__3(SqlRow row)
       at Microsoft.VirtualManager.Engine.DbAccessHelper.GetFromCommand[_RetTy,_ColumnsTy](ReadOption readOption, SqlRetryCommand cmd, GetFromCommandWorker`1 worker)
       at Microsoft.VirtualManager.Engine.DbAccessHelper.HandleReadErrors[_RetTy](DbAccessDelegate`1 func, ErrorInfo notFoundErrorInfo)
       at Microsoft.VirtualManager.DB.Adhc.AgentServer.GetOne(String computerName, GetFromCommandWorker`1 ctor, ConnectionProperties properties)
       at Microsoft.VirtualManager.Setup.DBConfigurator.SetupAsVMMServerRole(Boolean isAssociate)
    12:25:00:InnerException.Type: Microsoft.VirtualManager.DB.DBCorruptionException, InnerException.Message: Unable to connect to the VMM database because the database is in an inconsistent state.
    Contact an experienced SQL administrator whenever this error occurs. In some cases, it may be necessary to restore the VMM database. If the problem persists, contact Microsoft Help and Support.
    12:25:00:InnerException.StackTrace:   at Microsoft.VirtualManager.DB.SqlRetryCommand.ValidateReturnValue()
       at Microsoft.VirtualManager.DB.SqlRetryCommand.ExecuteNonQuery()
       at Microsoft.VirtualManager.Utils.CarmineObjectLock.ExecuteAcquireLockSP(CarmineObjectLockType lockType)
    Mark E. Scott Jr.

  • I want to set up a second user on my viao with access to itunes....how do I do that?

    I want to set up a second user on my viao with access to itunes....how do I do that?

    I bought an thunderbolt to dvi adapter and connected the thunderbolt connector to my imac and the dvi part to the monitor
    and turned on the monitor then it would mirror the imac screen a quick trip to the system preference and changed it to be 2 different screens and the rest is history

  • Using AirPort Time Capsule as an external drive with access to files by guest account

    Is it possible to use my AirPort Time Capsule as an external drive with access to files by a guest account?
    I would like to store a large number of folders containg photographs on my AirPort Time Capsule and allow anyone with a password to access the photographs - at the time of viewing the Time Capsule would be connected to the internet but I wouldn't want users to actually access anything other than the files on the Time Capsule - is this possible?  if so any help in configuring it would be really helpful.

    No it is not possible.. Guest is just that.. a guest that is allowed permission to access the internet but none of the local files.
    To give a person access to the TC they must have password to access your normal network..
    From there it is up to you how you do this.. people cannot actually access files on your computers unless you give them share and password permissions for that.. you can even setup accounts on the TC although I recommend against it.. if you want shared photos anyway. All security on a TC is illusion.. merely pressing the reset and it is all blown away.. so if you are concerned about security don't put stuff on the TC people should not access.. or like your TM backups ensure they are encrypted.
    A person can then access you TC and the photos.. but what else on the network??

  • When I open my "fotos" (Photo) standard app in Iphone4 the the bar "Album is above the row with access to my photos taken - how do I solve this?

    When I open my "fotos" (Photo) standard app in Iphone4 the the bar "Album is above the row with access to my photos taken - how do I solve this?

    Not that I have a solution... I'm just sympathizing as I have the same issue... can't select the frist album because the title bar... and strangely it's only happening in iphone4 not in 3GS... currently I am syncing my photo from Aperture... to reoslve this I just created dummy event with one meaningless photo inside. I think it's a big bug!!!

  • I need to align the margins of my forms with those of my website, I have looked at all the options and unfortunately I am unable to do it with access to the Adobe.form.min.CSS file which I can't access as a consumer, how else can I fix my problem

    I need to align the margins of my forms with those of my website, I have looked at all the options and unfortunately I am unable to do it with access to the Adobe.form.min.CSS file which I can't access as a consumer, how else can I fix my problem

    I need to align the margins of my forms with those of my website, I have looked at all the options and unfortunately I am unable to do it with access to the Adobe.form.min.CSS file which I can't access as a consumer, how else can I fix my problem

  • How to make report with access 2010 from SharePoint Discussion lists 2013

    HI,
    I want to make an access report from SharePoint Discussion lists 2013. When i open the list with access, the body of the list is in HTML format in access. Also if i reply something to one subject in the discussion, the reply is not mapped to that subject
    but instead it is shown as a separate entry in the database.
    Anyone can please help?
    SAN
    Santhiya
    Santhiya

    Hi Santhiya,
    I have seen a similar post from you, my understanding is that you wonder that the reply is mapped to the related subject. You can take a look at Daniel's reply in the following thread:
    http://social.technet.microsoft.com/Forums/en-US/dfb5bcb9-0076-412a-b34f-46aa9cfba876/how-to-make-report-with-access-2010-from-sharepoint-discussion-lists-2013?forum=sharepointgeneral
    Thanks,
    Wendy
    Wendy Li
    TechNet Community Support

Maybe you are looking for