Harvesting Projects Providing Access to Users for specific projects OER
Hello Everyone,
I am working on OER. I have to implement some requirements as follows:-
1. When I am harvesting the project, all the files of that project are harvested in the OER. I want to harvest in a Specific Project that I have created earlier in OER or with the same Project name that I am harvesting. Is it possible???
2. Suppose I have created a user named Arpit which is assigned User role in OER console. User role is provided access to view,edit,create Project. So Arpit can be able to view,edit,create all the projects in OER. But my requirement is that I want to provide access only to a specific project which are assigned to Arpit. Is it possible in OER?
Please provide any suggestions on above points.
Can you access the PDP section under the server settings and try to open the PDPs (choose the ones associated with the EPTs of the projects)? Is it successful?
Then edit and save them without changing anything to see if it helps.
Hope this helps,
Guillaume Rouyre, MBA, MVP, MCP |
Similar Messages
-
Need to give access to users for report painter query without GR55
Hi,
I need to create a transaction code for a query created using report painter. We do not want to give access to user for GR55.
Please help us in achieveing this one or any other way to execute report without GR55 access.
Regds,
Servesh
Moderator: Please, search before posting - it has been answered several timesHi,
You can create the transaction the same using SE93 transaction code.
Also see the below link for detailed rocess:-
[http://home4sap.com/Blog/2009/08/how-to-create-a-transaction-code-for-report-painter-reports/]
Regards,
Gaurav -
Change Access to user for all BPs in region & Display access to BPs in Grp
Hello
We have a 2 requirements:
- Restrict access to a BP based on Sales Organizations(Maintained in AUGRP of BUT000)
- In addition to above access, provide access on BP based on some logical groupings of BP
Ex. Provide Update access to a user for all BPu2019s that belong to region Europe and Read access to BPu2019s that belong to Group Flextronics
Proposal:
- First requirement is already implemented by adding check in B_BUPA_GRP
- For second additional authorization , our thought process is
a.Create Group Type (similar to Person, Employee tab in BP transaction) using SPRO
b.Assign that Group to some customers of BUT000-> PatGrpType in BP transaction
c.Now Link AUVAL1 to this field BUT000->PartGrpType
d.Then in the role, add any one group that was created in step b, to B_BUPA_ATT->AUVAL1
Please let mw know if above proposal is feasible or someone has a better solution.Hi,
To achieve the first requirement ( restricting access to business partners based on Sales Org) you can use the authorization object SALES_ORG. I have given more information on how to use this authorization object in one of my other replies.
Segmentation Model - Authorizations
Regarding how to use the authorization group concept for business partners, you can refer to another SDN reply
CIC0:Business Partner Authorizations not working
Hope this helped.
rgrds,
Randhir -
Access applications only for specific users
In our production server, we have some testing. But we cannot put the application down. But at the point i want only 2-3 users to access applications.
Hi user;
Please check:
11i - R12 - How To Lock Users Out Of E-Business Suite And Allow Specific Users [ID 605538.1]
How To Prevent (LOCK) Users From Logging In To Keep Them Out Of Applications As Needed? [ID 964070.1]
Hope it helps
Regard
Helios -
Admin can create user for specific company
Hi all,
I have requirement to provide authoriaztion to 3 basis admin in the way that they can use su01, pfcg or any basis related tcode but one should be restricted to one company say 'A' only... i.e. I have 3 basis admin A, B and C on single system and 3 comanies say DEF, PQR and XYZ . Now A can create use id for DEF company only...same for the rest of the user and company..
Is it possible n what way ?
Rgds
D LOf course this can be done.
Here you would be using the S_USER_GRP authorization object.
Giving access this authorization will allow user A to only manage users in group DEF
S_USER_GRP
ACTVT 02
GRP 'DEF'
Giving access this authorization will allow user C to only manage users in group XYZ
S_USER_GRP
ACTVT 02
GRP 'XYZ'
Create user groups via transaction SUGR.
Read more at:
http://help.sap.com/saphelp_nw70/helpdata/EN/fa/f63f4222fab16be10000000a155106/frameset.htm
Good luck
Regards Fredrik -
Handling page level access to users for sub-pages
Hi,
In my webcenter portal application, in navigation , I have mainpage1 and 3 sub-pages under it: subpage1,subpage2 and subpage3. We have a requirement that users with role manager should have access to all sub-pages under mainpage1 and users with role employee should have access to only subpage3.
All these 3 pages are created in Jdeveloper (not at runtime) and have static region for different taskflow on each page. All 3 taskflows have access permission to all authenticated users.
Using WebCenter Portal Administration Console, Resources tab I am setting access levels for user groups with Delegate Security as follows:
mainpage1 -- manager and employee both have view
subpage1 - only manager have view
subpage2 - only manager have view
subpage3 - manager and employee both have view
When I am logging as user with manager role , I am able to see all three pages, but when I am logging as employee the link mainpage1 and all other subpages are hidden.
I am able to set different access permissions for different groups at mainpages but facing issue for sub pages.
Please help me if I am missing anything for setting page level access.
Thanks and Regards,
MinalTry to add the users instead of groups and see if you get same page access error?
-
Authenticate user for specific pages
hello,
my application is authenticate via LDAP.
i want to grant access specific pages by users.
please advise.
thanks
ShahafShahaf - See the User Guide and search this forum to learn about authorization schemes. That's what you need.
Scott -
Limiting access to internet for specific time period every day
I was able to limit particular computers via static ip using acl, but not working now. Any clues? (mac address hasn't changed). This is the code I'm using:
access-list 102 deny ip host 192.168.0.35 any log time-range work-morning
access-list 102 deny ip host 192.168.0.35 any log time-range work-afternoon
access-list 102 deny ip host 192.168.0.142 any log time-range work-morning
access-list 102 deny ip host 192.168.0.142 any log time-range work-afternoon
Many thanks!Hi Leo,
Here is the output to the command: sh time:
time-range entry: no-heavy-traffic (active)
periodic daily 5:00 to 22:00
used in: IP ACL entry
used in: IP ACL entry
used in: IP ACL entry
used in: IP ACL entry
used in: IP ACL entry
used in: IP ACL entry
used in: IP ACL entry
used in: IP ACL entry
used in: IP ACL entry
used in: IP ACL entry
used in: IP ACL entry
used in: IP ACL entry
used in: IP ACL entry
used in: IP ACL entry
used in: IP ACL entry
used in: IP ACL entry
time-range entry: work-afternoon (inactive)
periodic daily 13:30 to 17:30
used in: IP ACL entry
used in: IP ACL entry
time-range entry: work-morning (inactive)
periodic daily 8:00 to 12:30
used in: IP ACL entry
used in: IP ACL entry
Thanks! -
TS2846 Why doesn't apple provide Model info designated for specific country or carrier?
Why doesn't Apple just reveal the model numbers so the consumers know which carrier the iPhone was originally locked to? Instead of having consumers running around to ask multiple carriers in different countries to find out which country or carrier it was locked to begin with.
They are good inputs and they do make sense, it's just there are other forum saying differently as well.
http://gfgsm.blogspot.com/2010/11/iphone-carrier-list-model-numbers.html
or
http://www.gsmreloaded.com/f81/iphone-3g-3gs-model-numbers-country-carrier-13076 .html
Just to name a few.
Although they are not Apple affiliated but few hundreds is still not a big number and if there are lists then that would be helpful.
Just a shot in the dark and wonder if I can get more info out from others.
Thank you all. -
Access level to users at specific fields
Dear Techies,
I am new guy In BO and also to this forum icon_smile.gif
I am designing my universe and now i little concern
I want to design one universe for 5 departments in company
and then i want to give specific rights for users for specific fields in the universe level
any best way / solution there...
any suggestion / help / link / tutorial would be highly appreciated
regards
Nadir FirfireHi,
You can deifne metadata restrictions for group of users in the universe.
In Universe Designer, select the "Tool" menu then the menu option "Manage Security" and finally menu option "Manage access restrictions".
Then click on "New" button to create an access restriction and select the "Object" tab.
Last you have to associate the restrictions to users or group of users.
Didier -
Send notification to all users of specific responsibility in 11i
Hi All,
Is there anyway to send notification to all users of specific responsibility in 11i ?
I have a setup form for hierarchy level (e.g level 1 - 5) by which each level will be notified either by responsibility or user?
If its setup by responsibility, notification will be sent to all users under that responsibility.
Do i have to create role using WF_DIRECTORY.CreateAdHocRole and add all users for specific responsibility to the role?
Also if the responsibility setup changed, how to maintain the existing notification with the old resp.
eg. level 1 is set to resp X then later on set to resp Y.
Regards,
FendyUse 'Expand Roles' to achieve this. Please check the WF Developers Guide to see how it works.
Yes, you may use wf_directory.createadhocrole for this purpose too.
What do you mean when you say the responsibility has changed? It it is end-dated no notification should be sent to any of its members. It depends on the assignments of the role/user. if the assignment is used then the user will get it. If the assignment is end-dated then the user will not get the notification.
You can always use wf_local_synch.Propagate_user_role to change the assignment of a user/role. If you want to end-date it, you can use it. Or you can add another user to the role, etc.
Hope this helps,
Alejandro -
How can I access user permission for specific items in Sharepoint 2013 via REST API?
I want to access user permissions for specific items like lists, documents, folders etc. via the REST API.
Currently I am hitting the following endpoint:
http://win-5a8pp4v402g/sharepoint_test/site_1/_api/web/getUserEffectivePermissions('win-5a8pp4v402g\\Sharepoint User 2')
However the response looks like this:
"d":
"GetUserEffectivePermissions":
"__metadata":
"type": "SP.BasePermissions"
"High": "0",
"Low": "0"
I cant understand why high and low are both 0? I have added the user to a specific group. Also this is the same result for each of the users. Another thing to note is that I havent added the "Guest" user in the sharepoint server. So when I hit the endpoint for the Guest user, it still shows the same response. So I know there is something I am doing wrong.I want to access permission of a user for a specific item, say a document using the REST API. Can someone tell me how? What would be the endpoint?Thanks for the reply. Although this works for Lists, I need to get permissions of documents too. Here is what I have tried:
http://win-5a8pp4v402g/sharepoint_test/site_1/_api/web/GetFileByServerRelativeUrl('/sharepoint_test/site_1/Documents/file1.txt')/GetUserEffectivePermissions(@user)?@user='i%3A0%23%2Ew%7Cwin-5a8pp4v402g%5Csharepoint%20user%201'
And the response is:
"error":
"code": "-1, Microsoft.SharePoint.Client.ResourceNotFoundException",
"message":
"lang": "en-US",
"value": "Cannot find resource for the request GetUserEffectivePermissions."
Clearly this doesnt work for a file. Whats wrong? -
Hi Nico, Thaks you so much for your reply,, Can you please advice or give me some steps to write script pelase? Regards,Kareem
Hi All, How can we provide access/provide permissions to a user/group for group of folders at single step?? I can able to provide access for a single folder at a time. I want provide access to a list of folders( more than 30 ..) at single step?? Regards,Kareem
-
Restrict telnet access for specific users on ios router
aaa new-model
aaa authentication login default local
username aaa password aaa
username bbb password bbb
user aaa should have ssh and telnet access.
user bbb is only used for vpn authentication, i dont want him to access router via ssh or telnet ,even in user exec mode.
i also can not apply access-class on vty lines because i am loging in device from different places ,and dont know exact ranges of ip address to create access-list
radius and tacacs is not option for me
what can be done in order to restrict user bbb from ssh and telnet access ?OK. I did not clearly remember the OP description of aaa and bbb. So for bbb to only have VPN access try
User bbb password bbb privilege 0
HTH
Rick
Sent from Cisco Technical Support iPhone App -
Best practice for select access to users
Not sure if this is the correct forum to post, if not then let me know where should I post.
From my understanding this is the best forum to ask this questions.
Are you aware of any "Best Practice Document" to grant select accesses to users on databases. These users are developers which select data out of database for the investigation and application bug fix.
From time to time user want more and more access to different tables so that they can do investigation properly.
Let me know if there exists a best practice document around this space.
Asked in this forum as this is related to PL/SQL access.Welcome to the forum!
Whenever you post provide your 4 digit Oracle version.
>
Are you aware of any "Best Practice Document" to grant select accesses to users on databases. These users are developers which select data out of database for the investigation and application bug fix.
From time to time user want more and more access to different tables so that they can do investigation properly.
Let me know if there exists a best practice document around this space.
>
There are many best practices documents about various aspects of security for Oracle DBs but none are specific to developers doing invenstigation.
Here is the main page for Oracles' OPAC white papers about security.
http://www.oracletechnetwork-ap.com/topics/201207-Security/resources_whitepaper.cfm
Take a look at the ones on 'Oracle Identity Management' and on 'Developers and Identity Services'.
http://www.dbspecialists.com/files/presentations/implementing_oracle_11g_enterprise_user_security.pdf
This paper by Database Specialists shows how to use Oracle Identity Management to limit access to users such as developers through the use of roles. It shows some examples of users using their own account but having limited privileges based on the role they are given.
http://www.dbspecialists.com/files/presentations/implementing_oracle_11g_enterprise_user_security.pdf
And this Oracle White Paper, 'Oracle Database Security Checklist', is a more basic security doc that discusses the entire range of security issues that should be considered for an Oracle Database.
http://www.oracle.com/technetwork/database/security/twp-security-checklist-database-1-132870.pdf
You don't mention what environment (PROD/QA/TEST/DEV) you are even talking about or whether the access is to deal with emergency issues or general reproduction and fixing of bugs.
Many sites create special READONLY roles, eg. READ_ONLY_APP1, and then grant privileges to those roles for tables/objects that application uses. Then that role can be granted to users that need privileges for that application and can be revoked when they no longer need it.
Some sites prefer creating special READONLY users that have those read only roles. If a user needs access the DBA changes the password and provides the account info to the user. When the user has completed their duties the DBA resets the password to something no one else knows.
Those special users have auditing on them and the user using them is responsible for all activity recorded in the logs during the time the user has access to that account.
In general you grant the minimum privileges needed and revoke them when they are no longer needed; generally through the use of roles.
>
Asked in this forum as this is related to PL/SQL access.
>
Please explain that. Your question was about 'access to different tables'. How does PL/SQL access fit into that?
The important reason for the difference is that access is easily controlled thru the use of roles but in named PL/SQL blocks roles are disabled. So those special roles and accounts mentioned above are well-suited to allowing developers to query data but are not well-suited if the user needs to execute PL/SQL code belonging to another schema (the app schema).
Maybe you are looking for
-
I paid and downloaded the creative suite to my old laptop a year or so ago, do i have to de-activate my last one before doing anything on my new computer? I just don't want to have to pay again and I'm not sure what steps i should be taking to put it
-
Ever since last sunday, whenever I try to purchase an app from itunes, I always get this error explaining that I cannot establish a secure connection. I made sure TLS 1.0 and SSL 3.0 were enabled in options and I made sure the firewall was notblockin
-
Free (?) upgrade because Acrobat 7.0 professional won't install in Windows 7
I have Acrobat 7.0 Professional running under Windows XP pro with no problem. I understand from user forums that this version does not run under Windows 7. Does Adobe offer me a free upgrade to a version compatible with Windows 7 or am I forced to bu
-
Hi We have a situation where very many WFs are started for travel. The user has then completed the trip in PR05, and we need to logically delete all these WFs to get them out of users inboxes. In SWIA I find a possibility for "complete manually" (bu
-
Problem with Maintenance Optimizer - Solman EHP1
Hi All, I have a solution manager 7.0 ehp1 system and maintenance optimizer does not work at all. Initial configurarion and Basic configuration has been done - Tcode : Solman_Setup A solution has been created and systems have been assigned to it, how