Help! Authorization question

OK, this might be a silly question, but I thought I'd give it a shot.
I have iTunes installed on two computers. One doesn't have the internet hooked up and to listen to certain songs, it says I need to authorize them. So is there any way I can authorize these songs without being hooked up to the internet?

You don't need to be connected to the internet in order to authorize the computer ( it's not the songs you are authorizing). Just play a few seconds of one of them.
See this.
About computer authorization.

Similar Messages

  • TS1277 i cant remember my 2 authorization questions  answers and when when i click send to email it sends to an email adress thats not mine and now i cant use my $100 what should i do?

    i cant remember my authorization questions answers and when i click send to email it sends to a random email thats not even created but hotmail.
    what should i do???!

    You need to ask Apple to reset your security questions. To do this, click here and pick a method; if that page doesn't list one for your country or you're unable to call, fill out and submit this form.
    (126538)

  • Forgot my authorization questions how cani change them

    i got a new computer and i dont remember my itunes authorization questions, how can i change them?

    Click here and search the article for '2 out of 3'. Follow the instructions.
    (74000)

  • Complicated Authorization Question

    Complicated Authorization Question
    I had my itunes software on my laptop with the songs on a portable hard drive. The laptop was stolen, the portable hard drive was not. I installed itunes on the new laptop and pointed to the music on the portable hard drive and it is telling me I am not authorized to play certain songs although I have authorized the computer. Also when I try to snyc my iphone it is saying it is going to erase all the songs on the iphone and replace them. I have purchased songs on the phone that are not in my itunes.
    How do I resolve this?

    Have you tried to play one of the songs in iTunes? It should then ask you to authorize them.

  • I asked a question and accidentally clicked "this helped my question" . how can i delete that

    Yeah i really am stupid. i clicked the "this helped my question" button to somthing that didnt help at all! any way to delete it?

    No, the point award system does not permit retraction once awarded.  You just have to let it go.

  • Online Help Related Questions

    Hi
    FYI there is no longer a dedicated place on Microsoft.com for online help related questions.  
    We are told that VS General (here) is the best place for help questions.
    Note that these sites are a good place to get help on help (Microsoft and MVP presence):
    http://groups.yahoo.com/group/hatt/ -- for WinHelp & HTML Help & general help discussion
    http://tech.groups.yahoo.com/group/MSHelpViewer/ -- For HelpViewer help (VS 2010/2012 help; Windows 8 help)
    http://tech.groups.yahoo.com/group/MSHelp2/  -- For MS Help 2.x help (VS 2002/2003/2005/2008 help)
    Feel free to ask questions on this thread if you need to. At least then we can find your post. 
    You can also email the VS/MSDN help team directly -- [email protected]
    Please let them know how you feel about the lack of support for Online Help in the forums.
    Rob
    www.helpmvp.com -- Various Help resources
    Rob Chandler Help MVP www.helpwareGroup.com | mshcmigrate.helpmvp.com | hv2.helpmvp.com

    Actually, we cannot (at least anymore) directly email the team. I tried and got a reject from the mail server.  So, I'm going to post here so I can feel better knowing I said something and then I can get back to programming :-)
    Ok, I’ve been developing Windows apps since Win 3.1 (yeah, a long time) and have always admired the Microsoft attitude towards Developers and it’s desire to educate and empower R&D.
    So, I’m wondering what’s going on?  Why am I being asked to have an account to develop anything for MY own PC?  Why am I being asked for my Microsoft account password, repeatedly, when I’m just looking up documentation on UserControl or C3 keywords…
    repeatedly?  This is nothing short of annoying and it gives me pause and concern about the ecosystem.  Is the plan to lock down programmer’s capabilities, knowledge and tools?
    I’m involved in the TAP program for Windows 10 and have voiced concerns in the same category with regard to installation and deployment of Universal Apps.  Security is not a reasonable excuse.  Some of us love to program and actually
    control their PCs.  We are not planning to sell everything we write on the Windows Store.  What happened to programming something cool for your home network or just for friends?  We need, and used to have, Microsoft’s support in doing
    this sort of thing.  Documentation and tools are more important now than ever.  I’m saddened to see the direction things are heading…
    If there is a sane reason I’m being badgered to ‘log in’ to read .NET documentation every hour, please share.  If not, please consider lobbying to get things back on track.
    Thanks

  • "HELP" NEED QUESTION ANSWERED, ":PLEASE":

    "HELP" NEED QUESTION ANSWERED, ":PLEASE": OH DEAR GOD SEND SOMEONE TO ME WITH THE ANSWER.

    You need patience. This isn't instant answers, you may have to wait for an answer. Your questions are here - locking this thread.
    https://support.mozilla.com/en-US/questions/859594 <br />
    https://support.mozilla.com/en-US/questions/859665

  • Authorization question - Need Answers - Please help

    Hi,
    I have collected the following questions. Can you please answer? Thanks.
    1)     What is Authorization object
    a.     Collection of Authorization fields
    b.     Authorization fields fill with Values
    c.     Group of Authorization Key.
    d.     Authorization object fill with Values.
    2)     Which of the statement below accurately describe when S_RS_ADWMB  will be used.
    a.     when using transaction code RSA1, the administrator work bench
    b.     when creating new query in the Bex Analyser.
    c.     When updating source system in RSA1
    d.     None of the above.
    3)     which of the following objects protect ODS data.
    a.     S_RS_ODSO
    b.     S_RS_ODSP
    c.     S_RS_ODSS
    d.     S_RS_ODSA
    4)     When would you use the $ in an authorization value?
    a.     If you are using user exit to fill the authorization values at runtime.
    b.     If you have cost centres that starts with $
    c.     Anytime you want to grant all values: $ is just like * in the SAP R/3
    d.     If you want all variables to be filled with authorization values at runtime.
    5)     Hierarchies are used in SAP BW to rank Employees.
    a.     True
    b.     False
    6)     RFC destinations tell SAP systems where external systems are located.
    a.     True
    b.     False
    7)     Which are the following objects are used for infosource with flexible updating
    a.     S_RS_ISOUR
    b.     S_RS_ISRCM
    c.     S_RS_ISOCR
    d.     S_RS_ISCOM
    8)     Which of the following regarding Info area is correct
    a.     Group of Infocube.
    b.     Group of Infosource
    c.     Group of source system
    d.     Group of actual data.
    9)     Field S_RS_COMP can protect the query elements by infoarea,infocube and query name that user is trying to access.
    a.     True
    b.      False
    10 ) Authorization object S_RS_HIER is used when creating infocubes.
    a.     True
    b.     False
    11)If the info object is authorization relevant then it must have authorization object.
    c.     True
    d.     False
    12) What is composite role.
    a.     Includes number of roles
    b.     Single role including number of authorization keys\
    c.     Role within a role
    d.     None of the above.
    13) EP uses same role for portal access.
    a.     True
    b.     False
    14) You must include S_RFC in any role used by reporting user.
    a.     True
    b.      False
    15)     Same BW role can be used for another BW system using the same client.
    a.     True
    b.      False
    Advance Thanks,

    Can anyone please help me urgently?
    Advance Thanks.

  • Authorization question-Two users on one computer

    My wife and I are going to share a MacBook and all our iTunes purchases are shared under one iTunes account. 
    My questions are...Will iTunes need to be authorized twice? And do both user logins count towards the 5 authorizations?
    Thanks for any help.

    iTunes Store: About authorization and deauthorization - http://support.apple.com/kb/HT1420
    I'm not 100% positive about this but I believe authorization is for a whole machine.

  • Multiple Libraries - Authorization Question - For NON-iTune purchased music

    Please help! The questions come at the end.
    I have an extensive classical music iTunes library in AAC format that I ripped from CDs I've purchased over the past 20 years. NON of these were purchased from iTunes. (I have another library on my PC with other music, and I have purchased some iTunes songs for that library). I access one or the other by pressing Shift, etc. No problem.
    Both my son and I listen to classical music, and I wanted to share this library with him by moving my classical iTunes Library to his computer. (I copied the entire folder structure from my PC to his, nearly 50 GB worth). So he now has 2 libraries on his computer. One (the classical library) and his own iTunes library.
    He can access the classical library (hold down shift key, etc.), but gets a message to "AUTHORIZE THE FILE SOURCE" before listening to the music. So my questions:
    ++ Why does he need to authorize music from non-iTunes source? I'm not trying to illegally give him anything from iTunes. My family owns this classical CD collection.
    ++ If he does need to authorize the FILE SOURCE, I suppose he would use MY iTUNES account information to do so. Is this correct? Or should he use HIS account information?
    ++ And if he does use my account info, _will he retain his iTunes account setting for his other iTunes Library_? I.e., He would have a classical music library that's authorized by me (I guess my second computer?), and his regular library with his account information?
    This sounds more complicated than it is (maybe it IS more complicated than I think (sic).
    Any help greatly appreciated.

    I could be wrong, but if that's the exact message he's getting, it sounds more like a file permssions error in Windows rather than the typical iTunes authorization message which brings up an obvious request for an iTunes Store ID and password. I'd suggest he look at the Windows permissions for the folder and it's contents and see if perhaps he doesn't have the correct permissions to access that material.
    Hope this helps.

  • Authentication and Authorization question.

    Hi All,
    I require your help in getting validated my understanding on Authentication and Authorization. This is wrt to WebLogic Server and WebLogic Portal.
    Authentication.
    1. The custom authentication provider can authenticate(user and group) against any datastore(LDAP OR DB). The LoginModule is a kind of blockbox and it can return true/false depending on authentication.
    2. The end result of this process is true/false.
    Authorization.
    1. The custom authorization providers can authorize the authenticated user based on role. All these entities ie(user,group,role) can be either in LDAP OR DB.
    2. The end result of this process is true/false.
    Role mapping.
    1. The custom role mapper can put all the roles that a user belongs and returns all Role. This can happen agaist LDAP OR DB.
    2. The end result is list of roles for a user.
    Security policy configuration.
    Is it mandatory that a user/group/role should be existing in WebLogic Server LDAP server(OR Portal LDAP server) to create these policies and authorization rules. What i mean by is that can user,group,role can exist in application specific database and still can be used for creatiing security policies??
    Thanks,
    Prashanth Bhat.

    The Security Providers are useful/can be used for developing a standard j2ee application , which will be deployed as standard j2ee application.
    The DA means Delegated Administrator, which is way how portal components are restricted to different types of administrators.
    The VE means Visitor Entitlemens, which is way how portal components are restricted to end users.
    My question is whether thess(DAs and VEs) can also be put
    our datastore for access rights??
    Thanks,
    Prashanth Bhat.

  • HELP AUTHORIZATION ISSUE

    So I've only ever connected my ipod to my macbook, never to another computer, and I never authorized my ipod with my computer or anything because I would download apps with wifi and i would be fine. I downloaded some music with my ipod the other day though and I authorized my computer and it said i have 2 authorizations with my account? I don't understand why I have two authorizations. Can anyone help explain this to me?
    Message was edited by: TKhan91

    Hi Vamsi,
    SU53 shows us the last failed authorization for a user. However, it might not only be the failed authorization object failed.
    Hence, "just to learn" , you can use transaction ST01 to enable and run a trace for particular users. Be sure to use in a test environment first, and with proper filters. (for a particular user only).
    Then check-> which auth object is failing.
    RC=4 means a object value is failing.
    RC=12 means an object is missing!
    Check, which tcode is calling that object and this tcode is present in which role. Then.........proceed.
    You can check the SAP documentation on running traces on the help portal of SAP.  I think you will find the answer yourself by troubleshooting more and may be massaging some test roles here and there!
    Likewise, if you are new to security, I would encourage you to start by reading some books on SAP security. Authorizations made easy is a good book to start with.
    Let me know if you have any questions
    EOD for me :P . take care
    Abhishek

  • HT1420 Forgot answers to authorization questions

    I forgot my authorization answers to the two questions.  How do I find the answers?

    If you have a rescue email address (which is not the same thing as an alternate email address) set up on your account then you can try going to https://appleid.apple.com/ and click 'Manage your Apple ID' on the right-hand side of that page and log into your account. Then click on 'Password and Security' on the left-hand side of that page and on the right-hand side you might see an option to send security question reset info to your rescue email address.
    If you don't have a rescue email address then see if the instructions on this user tip helps : https://discussions.apple.com/docs/DOC-4551

  • Authorization questions

    So, this may be a dumb question and I have tried to find an answer to no avail. I am wanting to set up iTunes to use the same information for all three users on one iMac. I am hoping this will include the iTunes authorizations (which are limited to only 5 total).
    Is this possible? What I don't want is to have one computer (with three users) use up over half of the authorizations on one machine. If it is possible, can anyone direct me to instructions on how to set it up? Right now iTunes set up for one of the users.
    Thank you for any help you can provide.

    OK, that clarifies, thank you.
    The issue is that (I assume) each user has at least one device (e.g., iPhone).
    Each device will count in the authorization count.  You can have up to five devices.  There is no way to avoid this, given the constraints of each user having at least one device.
    Remember that music, movies, apps, etc. are protected items (i.e., generally not free).  You would not simply be able to share these items indiscriminately with other folks.

  • De-Authorizing/Re-Authorization Question

    Hi Everyone.  Thanks for the help in advance.
    I recently discovered/remembered that my iTunes account is authorized on the limit of 5 machines.  Many of them are old/"dead" that I forgot to deauthorize.  I understand the only real option I have is to de-authorize all.  My question is, will de-authorizing all the computers using my apple ID and then reauthorizing the 2 I want effect iTunes match at all?  Also, does my iPhone (or other iOS devices) count against the 5 authorization limit?
    Thanks.

    click here for information.
    JGG

Maybe you are looking for

  • Error in quality enviroment after transport

    I have imported a mapping from Development to Quality.I have tested the scenario in Development it was working fine.But in quality when i imported and tested its not working when i execute the interface I am getting the following error in Trace. <Tra

  • Why have 24/7 chat if it is "closed"

    So I wanted to ask support a question.  Click on "Chat: 24 hours a day, 7 days a week".  Fill out the form with my issue, get to the bottom and get "Chat is currently closed.  Please choose another option" /rant.

  • To create report EWA

    Good days the motive of my doubt is like to create a report EWA in the solman to extract a few monthly reports and if there is a note sap where I can find realize it like. Marcos A. Monzón

  • Uninstalling Parallels and Windows XP!??! help please!

    ok so i want to uninstall parallels and also windows XP. so my question is do i just drag and drop Parallels into the trash and that will uninstall it or are there some steps i should be doing first please help!!

  • CS4 Playback Settings

    I can set the External Device to my DV monitor, but the Program Monitor in PP CS4 freezes. Tried all the different settings, what am I missing? Both played in CS3 and just upgraded to CS4. Thanks