How to Limit Learner Access by Person Type

My goal is to have a course or class for which only employees can self-enroll (contingent workers may not enroll). I am using the 11.5.10.2 EBS applications, where Learner Access can be controlled by individual learner or by position or job within an organization hierarchy. The OTA_EVENT_ASSOCIATIONS table corresponds to this structure, with columns for Job ID, Position ID, and Organization ID. Has anyone come up with a solution for defining learner access more flexibly? I found one Oracle Support note, 731227.1, where database triggers control administrative functionality within OLM, and I was wondering if triggers might also be useful for controlling who can enroll in a course (if person type is contractor, display a message, etc). I would be very interested to learn about creative solutions from the community. Thank you.

Unfortunately, I haven't heard of a good custom solution for 11.5.10, but I know of one creative extension using Learner Groups coupled with eligibility profiles in R12 that I thought was good. I can provide you with contact info for the developer that built it at a company that I used to work for if you're interested.

Similar Messages

  • How to  limit the access of a transaction

    please provide hw to create an authorization object... like hw to limit the access of a particular userdefined trasaction to a particular user

    hi
    good
    Element of the authorization concept.
    Authorization objects allow you to define complex authorizations.
    An authorization object groups together up to 10 authorization fields in an AND relationship in order to check whether a user is allowed to perform a certain action.
    To pass an authorization test for an object, the user must satisfy the authorization check for each field in the object.
    http://help.sap.com/saphelp_nw04s/helpdata/en/52/671285439b11d1896f0000e8322d00/content.htm
    Basic form->
    AUTHORITY-CHECK OBJECT object
    ID name1 FIELD f1
    ID name2 FIELD f2
    ID name10 FIELD f10.
    Example
    Check whether the user is authorized for a particular plant. In this case, the following authorization object applies:
    Table OBJ : Definition of authorization object
    M_EINF_WRK
    ACTVT
    WERKS
    Here, M_EINF_WRK is the object name, whilst ACTVT and WERKS are authorization fields. For example, a user with the authorizations
    M_EINF_WRK_BERECH1
    ACTVT 01-03
    WERKS 0001-0003 .
    can display and change plants within the Purchasing and Materials Management areas.
    Such a user would thus pass the checks
    AUTHORITY-CHECK OBJECT 'M_EINF_WRK'
        ID 'WERKS' FIELD '0002'
        ID 'ACTVT' FIELD '02'.
    AUTHORITY-CHECK OBJECT 'M_EINF_WRK'
        ID 'WERKS' DUMMY
        ID 'ACTVT' FIELD '01':
    but would fail the check
    AUTHORITY-CHECK OBJECT 'M_EINF_WRK'
        ID 'WERKS' FIELD '0005'
        ID 'ACTVT' FIELD '04'.
    To suppress unnecessary authorization checks or to carry out checks before the user has entered all the values, use DUMMY - as in this example. You can confirm the authorization later with another AUTHORITY-CHECK .
    thanks
    mrutyun

  • DMS - locked status / how to limit security access

    I have a couple issues with a security profile (customer service) we have defined for DMS.   This profile is set up that when the document info record is in a "released" status, the customer service person has edit (CV02N) access.  When in an "on hold" status, the customer service person does not have edit (CV02N) access.  Further, the "Released" status is a "locked" status.
    1)  The Object links appears to be open for edit, regardless of whether or not we have the status "locked". 
    Also, the deletion indicator can be changed when in locked status.  I am looking for all fields to be locked except for the status field.  Customer Service should only be able to change status from "released" to "on hold", and should not be able to change anything else.  Any suggestions on how to do this?.
    2)  The intention is that the customer service person can use CV02N to change a document from "released" status to "on hold".  This is the ONLY change customer service should be able to make.  However, once the status changes from "released" to "on hold", it seems there is an authorization check missing.....  meaning now the customer service person is in "on hold" status and they should not be able to edit anything, but apparently they still have the CV02N access from the "released" status, and they can now also change any other fields, update object links and attachments before they save the document.  What am I missing?
    Any help would be greatly appreciated!!

    Hi,
    U can use following authorization objects to resrticts the document access
    1.C_DRAD_OBJ - Create/Change/Display/Delete Objec
       here in activity field dont check delete, change option, so that user can not change, delete existing object links
    2. C_DRAW_TCD - Authorization for document activit
    here in activity field dont check delete option, so that user can not mark DIR for deletion.
    award points if useful
    Regards
    sham

  • How to limit ftp access to single directory with lion

    I am setting up an sftp server on a Lion system and I would like to know how I can limit a logged on user to a single directory.  I am using the ftp daemon that comes with Lion. I start my ftp server using the following command:
    sudo launchctl load -w /System/Library/LaunchDaemons/ftp.plist
    I am using FileZilla for a client that will be run on a mac running Lion or Leopard.
    I have seen threads on this but they are from 2009 and don't help with Lion.
    thanks for the help
    john

    Hi, Did you find any info?
    I am also looking for similar solution.
    I am not using FileZilla, but just want to know how to setup a particular user on  to access only a certain folder on MAC when logged in via FTP. They can log in by command line or any FTP utility from another PC or MAC or other Unix OS.
    Please let me know, if you find something. I will share some info.

  • How to limit internet access in dpc3925

    Hi all,
    I have dpc3925 router and I want to restrict the time of internet access to a certain laptop.. I know it can be done... Plese help me how to do it... Appriciate thevhelp in advance....

    That is how the gateway is designed. As for the other software that you can use for restricting the laptop, you can try searching the net but I doubt it will work since the laptop is connected to the gateway’s network and it’s only thru the gateway that you can restrict that laptop at certain times to connect to the internet.

  • How to limit file access for different users in 10.7.4 Server

    We had everything working perfectly with an earlier version of Lion Server. The update to 10.7.3, or 4, seems to have opened access to all files for all users. Much to our surprise, this wide-open access started without warning.
    - We have an external drive that contains all of the company's archives
    - We had set access for one employee to get to the files he needs, and different access for another employee. Neither saw sharepoints outside of their access settings.
    After an update, each employee can see and log in to all sharepoints. There doesn't seem to be a way to limit access for each employee now. I can set 'read' access for one employee, but it doesn't stop the other employee from accessing that sharepoint/folder.
    Is there some new way to go about this? Or is something simply broken with the current release?

    That is good to know. If the file share is seeing the drive and ignoring its permissions, that is why everyone can see everything. I have found, in Lion Server, that it is best to get the permissions set before turning on File Sharing. I don't know if you have the luxury of turning the file share off for a little while, but I would unshare the drive and see if the issue persists if you plug the external drive into another machine. The settings for permissions are set on the file or folder itself, so the issue should follow you to the other machine.
    Again, if you can, I would unshare the drive and reshare it with the permissions that you want and turn file sharing back on. However, if you can get the drive to respect permissions rather than ignoring them, I think it will save you a lot of work.

  • Parental control - how to limit internet time

    Anyone got any advice on how to limit internet access time to a shorter time than the full amount of computer time set in Parental Controls. My 14 year old wastes most of her computer time surfing stuff of little value. I am happy for her to still have daily computer time but don't want it all used up on the net. I want to encourage her to use some of the more creative potential of the Mac i.e Garageband, iMovie - she used to - she is very creative but gets sucked into other stuff very easily.
    Are there any add-ons that I should consider?
    Any advice gratefully received.

    If you use a Time Machine connected to your router, you can limit the time on that and when it can kick certain devices of the internet between certain times.
    I would happy to go through the set up of this with you if you would like.
    Other than that there maybe some add-ons / free software however if she's clever enough she could disable them.
    I hope this helps

  • I unfortunately just got my IPhone 4s stolen.I thought I had the find my iPhone enabled but I didn't because I cannot locate the phone when I sign in ICloud.How can I erase all data on the phone so the thief can't access my personal information.

    I unfortunately just got my IPhone 4s stolen.I thought I had the find my iPhone enabled but I didn't because I cannot locate the phone when I sign in ICloud.I have a password on the phone but i'm not sure if I turned on the option where the phone resets if you incorrectly put the password more than ten time. I immediately called my phone company (Verizon) and reported the phone stolen.So I know whoever took the phone cannot place calls or use the phone. But can they still access my data on the phone if they manage to unlock the phone?  If so how can I erase all data on the phone so the thief can't access my personal information? is there any other way other than Find my IPhone to wipe off the data on the phone? I really don't want my personal information such as pictures, text messages, notes and social networks profile available to a stranger!!? Help please!!!

        Hello thewrongway,
    I'm sorry to hear about your phone!  I understand the need for an active device. You are able to activate an old device and process an insurance claim for your iPhone 4s within 60days from the incident date.  Keep in mind if the old phone is not a smartphone and you currently have unlimited data that feature will fall off.  If you have a tier data plan no changes will be made.  Please let me know if you have any additional questions.  Thank you.   
    TominqueBo
    VZW Support
    Follow us on Twitter at @VZWSupport

  • I have a MacBook Air and recently downloaded the new operating system. Since that time, I am no longer able to access my personal ITunes library to add music to IPhoto slideshows.  I put I tunes library on my desktop, as suggested. How do I drag it?

    I have a MacBook Air and recently downloaded the new operating system, 10.10 OSX Yosemite. Since that time, I am no longer able to access my personal ITunes library to add music to IPhoto slideshows.  I put I tunes library on my desktop, as suggested. How do I drag it to the I Photo slideshow?

    That crash appears to be casued by the Facebook plug-in.
    Create a new account (systempreferences -> accounts or Users & Groups on 10.7 and 10.8), make a new Library in that account, import some shots  and see if the problem is repeated there. If it is, then a re-install of the app might be indicated. If it's not, then it's likely the app is okay and the problem is something in the main account.

  • How can I do to limit the access to modify the materials texts?

    Hello,
    I need to limit the access to modify the texts of the materials from the transaction MM02.  How can I do?
    These texts (Basic Data Text) are on "Basic Data 1" view.
    Thanks a lot, and best regards.
    Carmen

    Hello Carmen,
    This can be achieved with limted authorization. Work with basis team.
    Regards,
    Arif Mansuri

  • How to access  complex data type from a soap web services?

    hello
    can u please tell me how can i access complex data type from a soap web service from jdeveloper 10g
    Jdeveloper generates 3 classes
    serviceStub
    getproperties
    response
    i have to retreview the data which is a complex data type it gives some
    unknown type. and the return value is a key-value pair data type .
    regards
    vs

    After you create the partner link and the invoke (to create the variables), change the element type of the response message to the complex type definition of your collection that appears in the XSD. You can do the same thing if you want to change the element type of the payload of the request message as well.

  • How to change person type 'Applicant.Employee' to 'Employee'?

    we created one record with person type "Applicant" and later hired him by selecting "Create Employment" option.
    Now the person type is "Employee.Applicant"
    Can you please tell me how to change this person type to "Employee"?
    Since most of our reports are designed to pick up only "Employee" and not other person types
    Can someone help me on this?

    Hi
    I wish you luck, but I am not sure that will work either. Changing a person type is not necessarily the same as changing some other person attribute, such as a middle name. Person type changes tend to happen by virtue of a specific business process, eg. hire applicant, terminate employee etc - these are all distinct processes that do a whole host of other back-end stuff, and the person type change just reflects what has been done. I think you can change a person type to another of the same fundamental type (e.g. 'Emp1' to 'Emp2', where they both have a system person type of EMP) but that's about it. The whole multiple person type thing has been around for a while now, and is needed for the Trading Community Architecture, so is not likely to take kindly to being changed in the manner you are hoping to do. In any case, what happens when you've made your change, and then something else comes along and changes it to some other combination?
    If it were me, I'd bite the bullet and change the reports. Thereafter, any further changes to the employee's record(s) will not affect them.
    Clive

  • How to understand who access server unautorize person ?

    How to understand who access server unauthorized person ? How I tracking ?
    Thanks & Regards, Amol . Amol Dhaygude

    You would have to enable SQL server auditing to track who are accessing SQL server database.
    Please refer to this Technet library that will assist you in right direction to enable server audit in SQL database :http://msdn.microsoft.com/en-us/library/cc280386.aspx
    To understand in depth about SQL server audit, please walk through this library :
    http://msdn.microsoft.com/en-us/library/cc280386%28SQL.100%29.aspx
    In addition, you can also have a look at this proficient application available at (http://www.sqlserveraudit.org/) that provide all the comprehensive auditing report at granular level with real time monitoring
    and alerts instantly of all critical changes occurred in SQL server.
    Carlo

  • How do I access my personal folders in my email account? They were there but in the latest set up they've disappeared

    How do I access my personal folders in my email account? They were there but in the latest set up they've disappeared

    It's hard to know whether your hard drive has actually failed or if your system has just gotten badly corrupt. If the former, unfortunately, there may be no way to get any data off the drive at this point. If there aren't any backups of that data, it will be gone forever, unless perhaps a high-priced (ie, in the thousand dollar range) data recovery service has some luck with it.
    If the system and/or hard drive are badly corrupt, the same may be true. Some or all of that data may be irrevocably corrupt by now. However, there are some ways that you can attempt to recover from this situation without paying such huge fees. First, if you have access to another Mac, and both have Firewire ports, you can connect the two using Firewire target disk mode. This will mount the damaged drive as if it were an external hard drive on the second Mac, and could allow you to copy some data from the drive.
    Another possibility would be to buy an external hard drive, install Mac OS X on it and boot the machine from that, then copy any data from there that you can.
    In both of these cases, it may be helpful to scan the damaged drive for recoverable files using something like Data Rescue.
    There are also some possible ways to repair the drive if you can't do either of those things, but any repairs at this point could potentially destroy data. I only recommend this as a last resort. Still, if all other options have failed, try repairing the drive using DiskWarrior. This can fix problems that Disk Utility (and fsck, the command-line tool that it sounds like you may have used) cannot. It is possible that DiskWarrior will be able to get the drive back in working order long enough to get the data recovered, though of course it's also possible the process will be destructive.
    If none of the above work, you'll have to seek professional help.

  • How to make more than one person can access the database at one time

    how to make  more than one person can access the database at one time 

    Please post further f'up's in the Access forum.
    In short: for different reasons it is best practice that each user gets its own local copy of the database. This means that you need to split it into a front-end which only consists of the forms, queries, reports etc. Everything which doesn't need to be
    shared. And a back-end, which only stores the data.
    Take also a look at Allen Browne's article:
    Split your Access database into data and application.
    When you've splitted your database, you may often consider to use SQL Server as back-end. Here you may read Armen Stein's
    The Best of Both Worlds: Access-SQL Server Optimization.

Maybe you are looking for