How can I protect applications in ias

Could someone please give me some hints about what must be done to protect an application by password in IAS 1.0.
I was able to set up a password protection for all the stored procedures accessed by some dad (using the "location" directive in the configuration file).
With this, on calling an URL like http://<host>:<port>/pls/mydad/mypackage.somefunction
the server requests for a password.
Unhappily it is very easy to get around my protection. You simply have to enter the dad ("mydad") in uppercase! Is there a way to set up an protection which includes every possible spelling of the dad in the URL?
Regards
Roland

Roland
This discussion forum focuses specifically on Oracle9iAS Portal, not the Application Server per se. Look for a 9i Application Server specific forum to be on-line in the near future (I promise)!

Similar Messages

  • How can I protect application-specific resources?

    For a number of web-apps I'm working on, we need to be able to implement
    custom security rules within our servlets and EJBs, to protect access to
    application-specific resources.
    Taking the example of a bug-tracking system, handling multiple "projects"
    ... we want to be able to restrict access to individual projects by
    user/group/organisation etc. For example:
    * e.g. users from "companyY" can "raise issues" in "project N"
    Okay, then
    * I can model the user/group/organisation hierarchy as Principals and
    Groups, and access this information thru an appropriate Realm.
    * I can model my access-rules using java.security.acl.Permission and
    java.security.acl.Acl objects, and somehow persist these rules
    somewhere.
    * I can determine the identity of the authenticated user within a
    servlet, using request.getUserPrincipal()
    But, how on earth can I check at run-time whether the user has a given
    Permission? Is there some way to determine what Groups a user belongs to,
    from within a servlet or EJB?
    Mike Williams

    Quoting from:
    http://www.weblogic.com/docs51/classdocs/API_acl.html
    "The Security.hasPermission() and Security.checkPermission() methods test
    whether a user has a given permission"
    They give an example of protecting an application-level resource in that
    document too.
    John
    Mike Williams <[email protected]> wrote in message
    news:[email protected]..
    For a number of web-apps I'm working on, we need to be able to implement
    custom security rules within our servlets and EJBs, to protect access to
    application-specific resources.
    Taking the example of a bug-tracking system, handling multiple "projects"
    ... we want to be able to restrict access to individual projects by
    user/group/organisation etc. For example:
    * e.g. users from "companyY" can "raise issues" in "project N"
    Okay, then
    * I can model the user/group/organisation hierarchy as Principals and
    Groups, and access this information thru an appropriate Realm.
    * I can model my access-rules using java.security.acl.Permission and
    java.security.acl.Acl objects, and somehow persist these rules
    somewhere.
    * I can determine the identity of the authenticated user within a
    servlet, using request.getUserPrincipal()
    But, how on earth can I check at run-time whether the user has a given
    Permission? Is there some way to determine what Groups a user belongs to,
    from within a servlet or EJB?
    Mike Williams

  • How can i protect J2EE applications from piracy?

    I m looking for solution to protect Web application from piracy.
    I want my application run on web server for which it is built, &
    it musn't run on any other web server.
    how can i protect my web application from piracy?.
    Our .Net applications we protect using Hardware ID binding ,
    How can i protect J2EE applications?

    How is it going to get anywhere else? What's the threat model here? and what's the real, not imaginary, cost to you of the threat succeeding? and can you price your product such that it's cheaper to buy it than to pirate it?
    The answers to this question probably aren't in the field of tricky code or cryptography. They're more likely in marketing, time-to-market, pricing, and in physical security of the server, ...

  • How can i protect a folder with a password so everytime i want to open it it requires my password?

    how can i protect a folder or application in iPad  with a password so everytime i want to open it it requires my password?

    No way to do so at this time.

  • How can I protect my air file !

    hi to there !
    how can I protect my air application ..
    such as serial number to activist ..
    I need to get a serial number for one if hardware !
    is nay solution ?
    best.
    kiamoz

    You can now protect an Air application and apply a secure activation process with AirLicense.
    http://www.excelsoftware.com/airlicense.html

  • How can i protect my iphone from virus

    How can i protect my iphone from virus plz gelp me

    Don't jailbreak it.
    As long as you do not hack it, then you have nothing to fear.

  • How can I run applications in full screen on my MacBook Pro?

    I recently started using an external HP w1858 monitor as a secondary display with my MacBook Pro. I'm having troubles with running applications in full screen mode on the secondary display. How can I run applications in full screen mode on the secondary monitor?

    If you always have the external display connected, you can configure the OS to consider it as the default or main display. Once everything is connected and set to your liking (resolution, color depth, etc.), "bless" the external display by clicking & dragging the menubar from the Mac's internal display onto the external. This only works if you are not using video mirroring.
    Once this is done, applications will open by default on the external and now "main" display and you can configure them to go fullscreen or whatever.

  • How can I protect formulae in a newly created spreadsheet without locking the whole sheet ?

    How can I protect formulae from being overwritten on a newly created spreadsheet without locking the whole sheet ?

    Olly,
    I'll be picky here on nomenclature ;-)
    Tables and other Obects can be locked, but Sheets can't be locked.
    If you wish to shield some parts of your content from accidental modification, arrange your layout to put that sensitive content in tables separate from the tables that need to be accessed, and lock the sensitive ones. It's also possible, but rather clunky, to place shields over the sensitive area. A shield can be made by Inserting a Shape and positioning the shape over the sensitive area. With the shape selected, go to the Graphics Inpector and set the Opacity of the shape to zero. You will then be able to see through the shape but will no be able to Click through it to get at the cells below. This method is inconvenient because you have to worry about keeping the shape aligned with the table should the table need to change size or shape.
    Jerry

  • My device is going to be erased how can i protect it from erasing

    how can i protect my ipad from erasing

    You can't delete Safari from your phone.  Check Settings>General>Restrictions and make sure Safari is turned On.  If it is, look through all your screens and inside all your folders.  (If you are running iOS 6 you can swipe your screen to the right to bring up spotlight search and search for Safari; if it is inside a folder, the folder name will appear to the right.) 
    If you still can't find it go to Settings>General>Reset>Reset Home Screen Layout.  This will restore the home screen to its original configuration but may move other apps around to do so.

  • How can i download applications for my mac

    How can i download applications for my mac for free

    At the App Store you can download any file that is available for free. Then there are other sites such as MacUpdate.com where you can also find free files to download.

  • HT1495 How can transfer a application from one iphone to another iphone?

    How can transfer a application from one iphone to another iphone?

    Follow the instructions here or here; using the first set of instructions then requires syncing the second device with the iTunes library containing it.
    (89299)

  • When I switch back to an ongoing application, from the switcher, it reverts to its own 'homepage' rather than the stay at the state/stage I left it at. How can I force applications to maintain the current state?

    iPhone 4S with the latest updates 8.1.3 (12B466) installed.
    When I switch back to an ongoing application, from the switcher, it reverts to its own 'homepage' rather than the stay at the state/stage I left it at.
    How can I force applications to maintain the current state?
    I am in the process of getting enough screenshots to demonstrate further.

    ios7 keeps refreshing apps after switching
    solcwd

  • How can I protect DVDs I create in PE from being copied?

    How can I protect DVDs I create in PE from being copied? I know that I can't prevent 100%, but would like to stop a majority. Can I apply MACROVISION to my DVDs?

    >cycle redundancy failure
    Optical discs are prone to read errors, particularly when finger prints, fluff, etc. get on the reading surface, so redundant information is added in such a way that minor errors can be corrected. If the disc is damaged sufficiently seriously, e.g. a deep scratch running around a track, the error correction system fails to correct the error, and you will be unable to read that file on a computer by normal means. Note that only the last .VOB file that was scratched would be unreadable.
    I bought a cheap commercial DVD that had a serious pressing error, causing the movie to jump. Windows explorer failed to read the DVD but I did find a program (forgotten which) which made 10 attempts to read the faulty sector before carrying on. The copied movie then played perfectly (well there must have been a minor glitch where the error was, but I couldn't see it).

  • How can I protect my MacBookPro from static electricity in my house?

    How can I protect my MacBookPro from static electricity in my house?

    I would not worry about that.
    I woud sorry more about power surges (not a grave risk unless your power in your house is twitchy) and water/soda on the keyboard or dropping.

  • How can i download applications for i phone without error 1009

    how can i download applications for my i phone without error 1009? yahoomessenger, facebook, e books application etc please help me mu i phone has ios 4.0 and i tune10

    https://www.mozilla.org/firefox/all/
    https://www.mozilla.org/thunderbird/all.html
    Full setup of Firefox and Thunderbird can be downloaded from those links instead of getting the online stub installers.

Maybe you are looking for

  • Help with Customer exit variable

    Hi Guys,      I need your urgent help. I have a requirement where I need to create a variable (on CALDAY) in a report which should use the input value given for another variable (created on CALMONTH). To put in words more clearly, CALMONTH is a varia

  • Multiple producer one consumer

    Greetings, I am developing an application where data are obtained at different rates and different processes, but I want to store in one file, store this data as I can if I have multiple producers and one consumer?? Solved! Go to Solution.

  • How do I create a HTMLLoader that allows downloads?

    I've been working on creating a air app that is essentially a browser. I've been trying to get it to allow external downloads, but I've had no success so far. I can get it to pop open a new window for external links by overriding the htmlLoader class

  • Hibernate option in Shutdown menu?

    I am using the MBP (last release prior to unishell design), with an external monitor and bluetooth keyboard an mouse. I often work on multiple files at the same time (up to ~10) and each one is ususally arranged on my screen or in spaces according to

  • Exchange Infrastructure - Node display is off in S_B6A_52000011

    Hi experts, How to turn this node in S_B6A_52000011? Netweaver 04. Thanks. Regards, Thava