How to setup Security during installation

Hi Experts,
   Please let me know how to achieve "Setting up security for service-level accounts (page 12 in SAP BPC 5.1 Master Install Guide)"... I have created 3 users in my windows server 2003:
             1.Administrator (member of Administrators group in server 2003)
             2.SysAdmin (member of Administrators group in server 2003)
             3.student (member of Users group in server 2003)
Please let me know whether\how the System Admin ID matches with the SystemAdmin role in the BPC 5.1 and how the Admin ID matches with the PrimaryAdmin role in the BPC 5.1.
I am installing using SysAdmin ID which is a member of Administrators group on my machine.
I have also got License file from Service Market Place for SAP BPC 5.1 where and how should I use this file ??
Thank You,
Sudhakar Kuricheti

What I normally do during an installation, is to create one user whith which I do the complete installation.This user should pass the following requirements:
u2022 The user must preferably be a domain user. It can be a local user on the server, but not in a production environment.
u2022 The user must be a local administrator on the SAP BPC server and in the case of a multi-server installation on all the servers in the environment.
u2022 This user will have to be part of the Remote Desktop users group as well because it is the only user that will be able to perform certain actions on the SAP BPC server through the SAP BPC Server Manager for example backups and restores of application sets.
u2022 Please note, this user can be reset through the server manager but because it is normally also used to start the SAP BPC COM+ components, certain services and many tasks within the application, it is of utmost importance that this user must be configured carefully before the start of the installation.
Then I instal SQL 2005 in mixed mode (so with a SA account). When finished installing SQL 2005 I run the SAP BPC setup, where I specify the same user as I used for the SQL 2005 installation for all 3 fields where usernames can be filled in.
Regarding the license file, this can be located anywhere on your server where it does not get deleted. Mostly during my installations I make a folder on the C drive called something like C:/BPC License File and put it there. The license file should be specified in the third step (first select install BPC on SQL2005, then next on the first screen containing some warnings about closing all other windows applications).
Edited by: Tim Vierhout on Sep 2, 2008 8:11 AM

Similar Messages

  • How to setup security manager for applet at runtime?

    hello everyone,
    I am wonder if there is a way to setup security manager at runtime. This is what I am trying to do:
    1. Create a Applet GUI and allow users to specify in an input dialog box of the URL they like make connection to.
    I know there is two way of do this
    1. Is modify java.policy file and specify the URL SocketPermission to connect to.
    2. setup signed certificate applet.
    But, I would to try to see if there is a way to have applet make connection at runtime when users specify the URL.
    Anyone have any ideas.
    Thanks.

    Thanks, Peter
    Going over some articles you and references that you pointed out was very useful on how the java security model work and a little bit history too.
    So, I am assuming that I can make my own securitymanager class that defines the permission of the applet that I am working, using Permission, SecurityManager, ....etc class right? I just want to be clear on what I am going to be doing.
    If you have any other thoughts, Thanks,

  • How to setup multi node installation

    Hi all,
    I have successfully installed Oracle E-Business Suite 11.5.10 in a single node.
    But, I would like to get some suggestions on How to perform the multinode installation in which all the application tier servers in independent nodes?
    If the nodes are placed in different places geographically, how can I move all these nodes in to a single network? Is this possible?
    Please guide me.
    Thanking in advance
    Rameshkumar

    1. Is it right if I assumed that we must check that
    box if we want to install apps tier in more than one
    server so that if we only want to install apps tier
    in only one server then we don't need to check that
    option? Or we better check it even no matter how many
    server we installed apps tier into? You only need to check that box if you intend to used a shared application tier filesystem for a multi-node installation. If you are only going to have one app tier server, you don't need to check the box. If you plan on multiple apps tiers, each with its own copy of the application tier file system, you also don't need to check that box.
    2. If I still uncheck that option will there be any
    problem such as in backup & restore, clone, testing
    activity, etc?No, should not be any problem at all.
    3. When we created user for each db tier and apps
    tier, what will be better, create the same user for
    both tiers or differentiate user for each db tier and
    apps tier? I'm thinking of using same user for both
    tiers to avoid privilege problem later on.
    I'd recommend the same user for application tier files on all nodes in the system, and a different user for database-tier files. For example, in our system the database software (RDBMS ORACLE_HOME) and database datafiles are owned by 'oracle', and the EBS application files (APPL_TOP, forms and web server, etc) are owned by a user called 'applprod' (though of course you should choose a user name that makes sense in your environment.
    4. Can we start clone process in db tier and apps tier >paralel in multinode environment or still start clone >process in db tier first then apps tier?Still need to do the db tier first, since 'adcfgclone.pl appsTier' will want to talk to a database. :-)
    Regards,
    John P.
    Message was edited by:
    jpiwowar (forgot to answer the 4th question the first time, whoops)

  • How to setup security for new project type templates?

    Hi Folks,
    I created some new project type templates.
    But, as per management decision, i need to restrict this new project templates for all project users except only one super user.
    So, could anybody please help me out that how to make security in the above scenario?
    Thanks in advance,
    SPR

    Soooo...I need to install OID on top of my Forms, Reports, and Discoverer install? Would it be better to install the SSO and OID before installing any other middle ware products like Forms, Reports, and Discoverer? Then extend the domain to include Forms, Reports, and Discoverer?
    Can you point me to documentation that would help me get this issue worked out?
    Thanks.

  • How to setup security on T530

    Hi,
    This question is whether to and best way to setup Client Security / and or Fingerprint Security.
    I have been using a T500 (model 2081CTO) and now have a T530 (model 2359CTO)  both with biometric fingerprint reader and using Windows 7.  On the T500 I used Client Security which in turn used Fingerprint reader for Windows login and also for browser user names and passwords.  Great tool.
    The T530 comes with fingerprint security, which I have setup yet does not prompt at Windows logon time or within browsers to save / user username and passsword.  I downloaded and installed Lenovo Client Security yet the fingerprint option within that is greyed out.
    How do I correctly setup on the T530 so as to use the fingerprint reader for windows login and and also for browser user names and passwords?
    Thanks

    http://www.thinkscopes.com/thinkpad-t430u-fingerprint-reader-has-no-one-swipe-power-on/
    http://www.flickr.com/photos/lead_org/8237196137/
    does your T530 fingper reader software have the settings shown as above?
    Regards,
    Jin Li
    May this year, be the year of 'DO'!
    I am a volunteer, and not a paid staff of Lenovo or Microsoft

  • In UCM, How to setup Security Group based conversion of PS files?

    Hello, everyone.
    Some of my PS Format files need converted to PDF format, some do not. So, I created group 1 and group 2 in the security group. And installed gs8.54 and PDFc components.
    The present result (situation) is all the PS format files are converted into PDF, but I would like that the ps format files in group 1 can be converted by selecting Distiller, the ps format files in group 2 can not be converted by selecting PassThru.
    Who can tell me how to create content server filters and configure the conversion based on security groups?
    Thank you very much!
    By the way, my mother tongue is not English. So please use simple English as possible as you can. Thanks!

    Hi
    The best possible way to get this requirement done is to use SelectivelyRefineandIndex component. With this component you can create conditions and put it in the resource file for the component such that we can have only contents that are checked in to Sec Grp 1 be sent to refinery and those not belonging to this will not be sent.
    The same way one can also create conditions to FullText index contents or not based on any condition that is put in the resource file for this component.
    I believe you should be able to get the requirement sufficed with this component .
    More details are at :
    http://www.oracle.com/technology/products/content-management/ucm/samples/selectivelyrefineandindex-20080515-5.zip
    Just go through the readme with the component and you will be able to get going with this component.
    Hope this helps
    Thanks
    Srinath

  • How to setup security

    Hi,
    I would like to know the process of setting up the security to authenticate users and assign appropriate permisssions and privileges.
    Regards,
    AKR

    Hi,
    Check this article out:
    http://www.box.net/shared/5ef1alb2sp
    It gives a detailed explanation of security and differences between 10g and 11g.
    also
    Re: Security setup in obiee
    http://www.biblogs.com/1969/12/31/obiee-11gr1-security-explained-an-11g-security-overview/
    http://forums.oracle.com/forums/thread.jspa?threadID=1120336
    http://docs.oracle.com/cd/E23943_01/bi.1111/e10543/intro.htm#BABHDGGB
    Better to imple LDAP authendication type.
    for LDAP implementation refer
    http://obieeelegant.blogspot.com/2012/01/obiee-11g-integration-with-ldap.html
    Thanks
    Deva
    Edited by: Devarasu on Apr 17, 2012 6:12 PM

  • How to setup security for Forms, Reports, and Discoverer11g on WLS 10.3.5

    I am trying to setup simple security on my WebLogic server (linux OS) using a Windows Active Directory Server. I have an LDAP authentication provider created that links to a central Active Directory server, but I am unclear on where to go next.
    I want the user to login to the network from their PC but not have to login again if they decide to run an application like Discoverer, all of the authentication would be handled by the Windows AD server. Has anyone else done this before on WebLogic?
    Are there white papers out there that would explain the steps required to accomplish this? Thanks for any help.

    Soooo...I need to install OID on top of my Forms, Reports, and Discoverer install? Would it be better to install the SSO and OID before installing any other middle ware products like Forms, Reports, and Discoverer? Then extend the domain to include Forms, Reports, and Discoverer?
    Can you point me to documentation that would help me get this issue worked out?
    Thanks.

  • How to setup Security and Notification

    Hi, I have developed a small application for call logging. I would like to know the procedure for implementing security and about the notification settings.
    As I am new to this field, Please explain in detail. Any screenshots showing the setups ([email protected]) would be highly appreciated.
    The key features and procedures of the application -
    a) Users will be given individual user ids and passwords to raise calls on a particular department
    b) Each department has a call manager who will assign the call to a technician
    c) The technician will resolve the call and update the status
    d) The user will close the call and provide feedback
    Structure -
    1 table for maintaining users / employees - 1 Page - Report & Form
    1 table to manage call manager department wise - 1 Page - Report & Form
    1 table for calls (raise, assign, resolve) - multiple report and form pages (one for logging, one for assigning, one for resolving and one for feedback with only the relevant columns of the table) - I have created multiple forms so that a call cannot be modified by a subsequent user)
    My Requirement:
    1. The user should view only the calls raised by him/her (User1 should not view the calls raised by user2)
    2. The technician should view the call raised by him/her (user role) and also can view the calls assigned to him/her
    3. The Call manager can view the calls raised by him (user role) and also can view the calls raised on his department
    4. Notification: E-mail should be fired at each event only to the concerned people attached to the call (user, call manager, technician)
    Please guide me in setting up the above features.
    Regards,
    Sandeep

    user4441274 wrote:
    HiWelcome to the forum: please read the FAQ and forum sticky threads (if you haven't done so already), and update your profile with a real handle instead of "user4441274".
    When you have a problem you'll get a faster, more effective response by including as much relevant information as possible upfront. This should include:
    <li>Full APEX version
    <li>Full DB/version/edition/host OS
    <li>Web server architecture (EPG, OHS or APEX listener/host OS)
    <li>Browser(s) and version(s) used
    <li>Theme
    <li>Template(s)
    <li>Region/item type(s)
    With APEX we're also fortunate to have a great resource in apex.oracle.com where we can reproduce and share problems. Reproducing things there is the best way to troubleshoot most issues, especially those relating to layout and visual formatting. If you expect a detailed answer then it's appropriate for you to take on a significant part of the effort by getting as far as possible with an example of the problem on apex.oracle.com before asking for assistance with specific issues, which we can then see at first hand.
    My Requirement:
    1. The user should view only the calls raised by him/her (User1 should not view the calls raised by user2)
    2. The technician should view the call raised by him/her (user role) and also can view the calls assigned to him/her
    3. The Call manager can view the calls raised by him (user role) and also can view the calls raised on his departmentThis is known as Fine Grained Access Control (FGAC) and is normally implemented using either views or Oracle's Virtual Private Database (VPD) feature.
    If you're licensed to use an Enterprise Edition database and want to apply these restrictions across the entire application, or across multiple applications, then use Virtual Private Database (VPD). In APEX 4.1 you can set up/tear down the security context using the Initialization PL/SQL Code/Cleanup PL/SQL Code attributes. In earlier versions the set up attribute is termed Virtual Private Database (VPD), and there is no tear down option. (A somewhat out of date article on using VPD with APEX is available.)
    Should you not be using EE, then you can roll your own VPD using parameterized views, again using the VPD security attribute to set the required application context.
    4. Notification: E-mail should be fired at each event only to the concerned people attached to the call (user, call manager, technician)Build the application using PL/SQL package APIs that provide transactional procedures for raising, assigning, resolving calls etc. These will encapsulate all the required functionality, including sending email notifications when the transaction is complete. APEX form regions can be created on top of these API procedures.

  • How to setup security to view deleted sales order deletion information

    User is going into VA03. entering a sales order number but instead of hitting enter, is going it to the top menu, selecting Environment and then changes.  When the screen appears, they are selecting time of change and getting not authorized.
    When I look at SU53 for them I see
      Authorization check failed
       Object Class SD   Sales and Distribution
         Authorization Obj. V_VBAK_VKO Sales Document: Authorization for Sales Areas
           Authorization Field ACTVT Activity
                                                                                                       03
           Authorization Field SPART Division
           Authorization Field VKORG Sales Organization
           Authorization Field VTWEG Distribution Channel
    How would I set the display role for this transaction up to allow me to put in blanks for the division, Sales Org, and Distribution Channel since that is what comes back for this sales order after it has been deleted.
    Is there a different transaction that they should be using to see this info?
    Obviously SAP_ALL will give me the info, but I do not want the user to have that authority. 

    Hi John,
    Did you run a trace(ST01) and check the missing authorization. Are you getting the same missing authorization in trace.
    Also the Sales Order, for which the user is trying to check the Change document is it a valid one? I mean does it belong to any Sales org/division/..?
    Cheers,
    Laxman

  • I got my new Imac today, first mac, AMAZING - how to setup security?

    Hello,
    what a computer, i was scared of the glossy screen , but is amazing all is amazing so far.
    What should i do regarding the security ? ( spyware, virus etc )
    I found the firewall and set it to he most secure mode, so I only allow the programs I want - did i do right?
    Please tell me what else I should do , to make it more secure.
    There are some options but i dont understand them and I am lost.
    many thx for ur help in advance

    anteros27 wrote:
    thx. Could u please help me which are the best setting to make under the security in my Imac?
    I have a bit of a long list.
    Feel free to post back for clarification.
    First, and MOST important, make SURE you are NOT in an admin account.
    Go to >System Preferences...>Accounts, unlock the lock, click the "+" to make a new account, make it an administrator account, and then take away your own account's admin privileges.
    Next (assuming you already have the firewall on, which you stated you did), go to >System Preferences...>Security>Firewall, unlock the lock if necessary, click "Advanced", and check both boxes. Click "OK".
    Also make sure that you don't have any applications added to the "Allow" section, unless you NEED them there. (NOTE: The most secure firewall mode is "Allow Only Essential Services".)
    Next, staying in the "Security" preference pane, click "General".
    Check the boxes: "Disable Automatic Login", "Require Password to Unlock Each Secure System Preference Pane", and "Use Secure Virtual Memory".
    Then restart.
    Those methods, along with being careful with what you install, and/or give access to your mac, will keep your mac secure from any intruders.
    Good luck!
    Message was edited by: joshz
    Message was edited by: joshz
    Message was edited by: joshz
    Message was edited by: joshz

  • How to fix error during installation of windows 7?

    im trying to install windows 7 pro
    the first steps of boot camp came simple and easy
    partitioned and load installation disk but when i click on "install now", an error came up stating "windows could not retrieve information about the disks on this computer"
    Plz help me fix the problem anybody!!!
    Thank U
    JOT

    im trying to install windows 7 pro
    the first steps of boot camp came simple and easy
    partitioned and load installation disk but when i click on "install now", an error came up stating "windows could not retrieve information about the disks on this computer"
    Plz help me fix the problem anybody!!!
    Thank U
    JOT

  • How can I quit a setup during installation

    How can I quit a setup during installation?
    The program I am trying to quit is 'CANON_IJ'

    Restart or force restart the computer, if it refuses to restart, i.e. repeat the steps already shown by Noble Seven. If it stubborn, and does not restart— well, in dispair of solutions, press power button for 6 seconds until mac shuts down. Wait one minute and press power button again, you will be able to eject the disk now.
    This is not a recommended solution, try to calmly quit all activities, including by forcing mac to quit them. If you succeed in logging out, you will be able to restart it normally.

  • How can I run ni488216.exe without any prompts during installation?

    How can I run ni488216.exe without any prompts during installation (Silent mode)?

    Typically you can do a silent install of the NI-488.2 software by running:
    setup.exe /S LV_INSTALL path=
    Regards,
    Greg Caesar
    National Instruments
    Applications Engineer

  • Am being prompted to enter security questions when making a purchase on my new IPad.  I don't believe I have ever setup security questions on my apple id.  How to I create new security questions?

    I am being prompted to enter security questions when making a purchase on my new IPad.  I don't believe I have ever setup security questions on my apple id.  I have tried logging into my apple id and have chosen the security and priviacy settings to set up security questions.  However I am prompted to enter answers to security questions and am told they don't match.  How to I create new security questions or reset them? 

    You need to ask Apple to reset your security questions; ways of contacting them include phoning AppleCare and asking for the Account Security team, clicking here and picking a method for your country, and filling out and submitting this form.
    They wouldn't be security questions if they could be bypassed without Apple verifying your identity.
    (104011)

Maybe you are looking for