How to setup security

Hi,
I would like to know the process of setting up the security to authenticate users and assign appropriate permisssions and privileges.
Regards,
AKR

Hi,
Check this article out:
http://www.box.net/shared/5ef1alb2sp
It gives a detailed explanation of security and differences between 10g and 11g.
also
Re: Security setup in obiee
http://www.biblogs.com/1969/12/31/obiee-11gr1-security-explained-an-11g-security-overview/
http://forums.oracle.com/forums/thread.jspa?threadID=1120336
http://docs.oracle.com/cd/E23943_01/bi.1111/e10543/intro.htm#BABHDGGB
Better to imple LDAP authendication type.
for LDAP implementation refer
http://obieeelegant.blogspot.com/2012/01/obiee-11g-integration-with-ldap.html
Thanks
Deva
Edited by: Devarasu on Apr 17, 2012 6:12 PM

Similar Messages

  • How to setup security manager for applet at runtime?

    hello everyone,
    I am wonder if there is a way to setup security manager at runtime. This is what I am trying to do:
    1. Create a Applet GUI and allow users to specify in an input dialog box of the URL they like make connection to.
    I know there is two way of do this
    1. Is modify java.policy file and specify the URL SocketPermission to connect to.
    2. setup signed certificate applet.
    But, I would to try to see if there is a way to have applet make connection at runtime when users specify the URL.
    Anyone have any ideas.
    Thanks.

    Thanks, Peter
    Going over some articles you and references that you pointed out was very useful on how the java security model work and a little bit history too.
    So, I am assuming that I can make my own securitymanager class that defines the permission of the applet that I am working, using Permission, SecurityManager, ....etc class right? I just want to be clear on what I am going to be doing.
    If you have any other thoughts, Thanks,

  • How to setup security for new project type templates?

    Hi Folks,
    I created some new project type templates.
    But, as per management decision, i need to restrict this new project templates for all project users except only one super user.
    So, could anybody please help me out that how to make security in the above scenario?
    Thanks in advance,
    SPR

    Soooo...I need to install OID on top of my Forms, Reports, and Discoverer install? Would it be better to install the SSO and OID before installing any other middle ware products like Forms, Reports, and Discoverer? Then extend the domain to include Forms, Reports, and Discoverer?
    Can you point me to documentation that would help me get this issue worked out?
    Thanks.

  • How to setup Security during installation

    Hi Experts,
       Please let me know how to achieve "Setting up security for service-level accounts (page 12 in SAP BPC 5.1 Master Install Guide)"... I have created 3 users in my windows server 2003:
                 1.Administrator (member of Administrators group in server 2003)
                 2.SysAdmin (member of Administrators group in server 2003)
                 3.student (member of Users group in server 2003)
    Please let me know whether\how the System Admin ID matches with the SystemAdmin role in the BPC 5.1 and how the Admin ID matches with the PrimaryAdmin role in the BPC 5.1.
    I am installing using SysAdmin ID which is a member of Administrators group on my machine.
    I have also got License file from Service Market Place for SAP BPC 5.1 where and how should I use this file ??
    Thank You,
    Sudhakar Kuricheti

    What I normally do during an installation, is to create one user whith which I do the complete installation.This user should pass the following requirements:
    u2022 The user must preferably be a domain user. It can be a local user on the server, but not in a production environment.
    u2022 The user must be a local administrator on the SAP BPC server and in the case of a multi-server installation on all the servers in the environment.
    u2022 This user will have to be part of the Remote Desktop users group as well because it is the only user that will be able to perform certain actions on the SAP BPC server through the SAP BPC Server Manager for example backups and restores of application sets.
    u2022 Please note, this user can be reset through the server manager but because it is normally also used to start the SAP BPC COM+ components, certain services and many tasks within the application, it is of utmost importance that this user must be configured carefully before the start of the installation.
    Then I instal SQL 2005 in mixed mode (so with a SA account). When finished installing SQL 2005 I run the SAP BPC setup, where I specify the same user as I used for the SQL 2005 installation for all 3 fields where usernames can be filled in.
    Regarding the license file, this can be located anywhere on your server where it does not get deleted. Mostly during my installations I make a folder on the C drive called something like C:/BPC License File and put it there. The license file should be specified in the third step (first select install BPC on SQL2005, then next on the first screen containing some warnings about closing all other windows applications).
    Edited by: Tim Vierhout on Sep 2, 2008 8:11 AM

  • How to setup security on T530

    Hi,
    This question is whether to and best way to setup Client Security / and or Fingerprint Security.
    I have been using a T500 (model 2081CTO) and now have a T530 (model 2359CTO)  both with biometric fingerprint reader and using Windows 7.  On the T500 I used Client Security which in turn used Fingerprint reader for Windows login and also for browser user names and passwords.  Great tool.
    The T530 comes with fingerprint security, which I have setup yet does not prompt at Windows logon time or within browsers to save / user username and passsword.  I downloaded and installed Lenovo Client Security yet the fingerprint option within that is greyed out.
    How do I correctly setup on the T530 so as to use the fingerprint reader for windows login and and also for browser user names and passwords?
    Thanks

    http://www.thinkscopes.com/thinkpad-t430u-fingerprint-reader-has-no-one-swipe-power-on/
    http://www.flickr.com/photos/lead_org/8237196137/
    does your T530 fingper reader software have the settings shown as above?
    Regards,
    Jin Li
    May this year, be the year of 'DO'!
    I am a volunteer, and not a paid staff of Lenovo or Microsoft

  • In UCM, How to setup Security Group based conversion of PS files?

    Hello, everyone.
    Some of my PS Format files need converted to PDF format, some do not. So, I created group 1 and group 2 in the security group. And installed gs8.54 and PDFc components.
    The present result (situation) is all the PS format files are converted into PDF, but I would like that the ps format files in group 1 can be converted by selecting Distiller, the ps format files in group 2 can not be converted by selecting PassThru.
    Who can tell me how to create content server filters and configure the conversion based on security groups?
    Thank you very much!
    By the way, my mother tongue is not English. So please use simple English as possible as you can. Thanks!

    Hi
    The best possible way to get this requirement done is to use SelectivelyRefineandIndex component. With this component you can create conditions and put it in the resource file for the component such that we can have only contents that are checked in to Sec Grp 1 be sent to refinery and those not belonging to this will not be sent.
    The same way one can also create conditions to FullText index contents or not based on any condition that is put in the resource file for this component.
    I believe you should be able to get the requirement sufficed with this component .
    More details are at :
    http://www.oracle.com/technology/products/content-management/ucm/samples/selectivelyrefineandindex-20080515-5.zip
    Just go through the readme with the component and you will be able to get going with this component.
    Hope this helps
    Thanks
    Srinath

  • How to setup security for Forms, Reports, and Discoverer11g on WLS 10.3.5

    I am trying to setup simple security on my WebLogic server (linux OS) using a Windows Active Directory Server. I have an LDAP authentication provider created that links to a central Active Directory server, but I am unclear on where to go next.
    I want the user to login to the network from their PC but not have to login again if they decide to run an application like Discoverer, all of the authentication would be handled by the Windows AD server. Has anyone else done this before on WebLogic?
    Are there white papers out there that would explain the steps required to accomplish this? Thanks for any help.

    Soooo...I need to install OID on top of my Forms, Reports, and Discoverer install? Would it be better to install the SSO and OID before installing any other middle ware products like Forms, Reports, and Discoverer? Then extend the domain to include Forms, Reports, and Discoverer?
    Can you point me to documentation that would help me get this issue worked out?
    Thanks.

  • How to setup Security and Notification

    Hi, I have developed a small application for call logging. I would like to know the procedure for implementing security and about the notification settings.
    As I am new to this field, Please explain in detail. Any screenshots showing the setups ([email protected]) would be highly appreciated.
    The key features and procedures of the application -
    a) Users will be given individual user ids and passwords to raise calls on a particular department
    b) Each department has a call manager who will assign the call to a technician
    c) The technician will resolve the call and update the status
    d) The user will close the call and provide feedback
    Structure -
    1 table for maintaining users / employees - 1 Page - Report & Form
    1 table to manage call manager department wise - 1 Page - Report & Form
    1 table for calls (raise, assign, resolve) - multiple report and form pages (one for logging, one for assigning, one for resolving and one for feedback with only the relevant columns of the table) - I have created multiple forms so that a call cannot be modified by a subsequent user)
    My Requirement:
    1. The user should view only the calls raised by him/her (User1 should not view the calls raised by user2)
    2. The technician should view the call raised by him/her (user role) and also can view the calls assigned to him/her
    3. The Call manager can view the calls raised by him (user role) and also can view the calls raised on his department
    4. Notification: E-mail should be fired at each event only to the concerned people attached to the call (user, call manager, technician)
    Please guide me in setting up the above features.
    Regards,
    Sandeep

    user4441274 wrote:
    HiWelcome to the forum: please read the FAQ and forum sticky threads (if you haven't done so already), and update your profile with a real handle instead of "user4441274".
    When you have a problem you'll get a faster, more effective response by including as much relevant information as possible upfront. This should include:
    <li>Full APEX version
    <li>Full DB/version/edition/host OS
    <li>Web server architecture (EPG, OHS or APEX listener/host OS)
    <li>Browser(s) and version(s) used
    <li>Theme
    <li>Template(s)
    <li>Region/item type(s)
    With APEX we're also fortunate to have a great resource in apex.oracle.com where we can reproduce and share problems. Reproducing things there is the best way to troubleshoot most issues, especially those relating to layout and visual formatting. If you expect a detailed answer then it's appropriate for you to take on a significant part of the effort by getting as far as possible with an example of the problem on apex.oracle.com before asking for assistance with specific issues, which we can then see at first hand.
    My Requirement:
    1. The user should view only the calls raised by him/her (User1 should not view the calls raised by user2)
    2. The technician should view the call raised by him/her (user role) and also can view the calls assigned to him/her
    3. The Call manager can view the calls raised by him (user role) and also can view the calls raised on his departmentThis is known as Fine Grained Access Control (FGAC) and is normally implemented using either views or Oracle's Virtual Private Database (VPD) feature.
    If you're licensed to use an Enterprise Edition database and want to apply these restrictions across the entire application, or across multiple applications, then use Virtual Private Database (VPD). In APEX 4.1 you can set up/tear down the security context using the Initialization PL/SQL Code/Cleanup PL/SQL Code attributes. In earlier versions the set up attribute is termed Virtual Private Database (VPD), and there is no tear down option. (A somewhat out of date article on using VPD with APEX is available.)
    Should you not be using EE, then you can roll your own VPD using parameterized views, again using the VPD security attribute to set the required application context.
    4. Notification: E-mail should be fired at each event only to the concerned people attached to the call (user, call manager, technician)Build the application using PL/SQL package APIs that provide transactional procedures for raising, assigning, resolving calls etc. These will encapsulate all the required functionality, including sending email notifications when the transaction is complete. APEX form regions can be created on top of these API procedures.

  • How to setup security to view deleted sales order deletion information

    User is going into VA03. entering a sales order number but instead of hitting enter, is going it to the top menu, selecting Environment and then changes.  When the screen appears, they are selecting time of change and getting not authorized.
    When I look at SU53 for them I see
      Authorization check failed
       Object Class SD   Sales and Distribution
         Authorization Obj. V_VBAK_VKO Sales Document: Authorization for Sales Areas
           Authorization Field ACTVT Activity
                                                                                                       03
           Authorization Field SPART Division
           Authorization Field VKORG Sales Organization
           Authorization Field VTWEG Distribution Channel
    How would I set the display role for this transaction up to allow me to put in blanks for the division, Sales Org, and Distribution Channel since that is what comes back for this sales order after it has been deleted.
    Is there a different transaction that they should be using to see this info?
    Obviously SAP_ALL will give me the info, but I do not want the user to have that authority. 

    Hi John,
    Did you run a trace(ST01) and check the missing authorization. Are you getting the same missing authorization in trace.
    Also the Sales Order, for which the user is trying to check the Change document is it a valid one? I mean does it belong to any Sales org/division/..?
    Cheers,
    Laxman

  • I got my new Imac today, first mac, AMAZING - how to setup security?

    Hello,
    what a computer, i was scared of the glossy screen , but is amazing all is amazing so far.
    What should i do regarding the security ? ( spyware, virus etc )
    I found the firewall and set it to he most secure mode, so I only allow the programs I want - did i do right?
    Please tell me what else I should do , to make it more secure.
    There are some options but i dont understand them and I am lost.
    many thx for ur help in advance

    anteros27 wrote:
    thx. Could u please help me which are the best setting to make under the security in my Imac?
    I have a bit of a long list.
    Feel free to post back for clarification.
    First, and MOST important, make SURE you are NOT in an admin account.
    Go to >System Preferences...>Accounts, unlock the lock, click the "+" to make a new account, make it an administrator account, and then take away your own account's admin privileges.
    Next (assuming you already have the firewall on, which you stated you did), go to >System Preferences...>Security>Firewall, unlock the lock if necessary, click "Advanced", and check both boxes. Click "OK".
    Also make sure that you don't have any applications added to the "Allow" section, unless you NEED them there. (NOTE: The most secure firewall mode is "Allow Only Essential Services".)
    Next, staying in the "Security" preference pane, click "General".
    Check the boxes: "Disable Automatic Login", "Require Password to Unlock Each Secure System Preference Pane", and "Use Secure Virtual Memory".
    Then restart.
    Those methods, along with being careful with what you install, and/or give access to your mac, will keep your mac secure from any intruders.
    Good luck!
    Message was edited by: joshz
    Message was edited by: joshz
    Message was edited by: joshz
    Message was edited by: joshz

  • Am being prompted to enter security questions when making a purchase on my new IPad.  I don't believe I have ever setup security questions on my apple id.  How to I create new security questions?

    I am being prompted to enter security questions when making a purchase on my new IPad.  I don't believe I have ever setup security questions on my apple id.  I have tried logging into my apple id and have chosen the security and priviacy settings to set up security questions.  However I am prompted to enter answers to security questions and am told they don't match.  How to I create new security questions or reset them? 

    You need to ask Apple to reset your security questions; ways of contacting them include phoning AppleCare and asking for the Account Security team, clicking here and picking a method for your country, and filling out and submitting this form.
    They wouldn't be security questions if they could be bypassed without Apple verifying your identity.
    (104011)

  • How to setup the security based on roles in Organization.

    Hi,
    How to setup the security based on roles in Organization.
    For example:Few users are Manager and a few user are Non Manager .Manager should have access to all work data including Non Manager and Non Manager should access based role.How to setup this? How OBI server identify the user role?
    kindly let me know.
    Regards.,
    CHR

    Hi,
    You need to have Back End support to achieve this. In Back End you need to create two groups . You need to know what joins has to be made for which group (which is more important) and also make session variable for the userrole (with SQL supporting it). In the BMM layer, we need to put the security join conditions in the 'where clause'.
    And make a common report. User loggin in with the respective userid will have userrole and joins assigned in the Back end. And they will be viewing the report according to their access.
    Hope this will solve your problem.
    Regards
    MuRam

  • How to setup a password protection in my wireless airPort?

    How to setup a password protection to my wireless AirPort?

    To configure the AirPort base station for wireless security, you will need to use the AirPort Utility.
    AirPort Utility > Select the AirPort > Manual Setup > AirPort > Wireless tab
    Wireless Security: <None | WEP (Transitional Security Network) | WPA/WPA2 Personal | WPA2 Personal>
    Wireless Password: <enter your desired password>
    Verify Password: <reenter your desired password>

  • How to setup real SFTP in Yosemite?

    There's lots and lots of information online about how to setup remote access to my mac using SSH and SFTP in Yosemite...but apparently none of it is actually useful for genuinely  remote access...access from outside my network, access from miles away.  Because here is what I have learned:
    The ip address listed in the Sharing pane when you access remote login is internal.  it's some version of 192.168.x.x, which is essentially everybody's computer and utterly useless from outside the network.
    So my actual public ip as assigned by my service provider is really my IP if you are trying to get to my computer from outside.
    But that IP doesn't "just work" via SSH or, much more importantly for me, SFTP.  Evidently that involves something called "port forwarding" which one used to be able to do via Airport Utility, but is no longer possible because such options do not exist in the current version of the utility.
    (What I want to achieve is for a friend of mine, a friend on a mac about 4 miles away,  to be able to directly access very large files on my computer. I don't want to use clouds or public sites or anything like that, I just want to be my own private little FTP server just for her. That used to be no big deal.)
    So... is there a solution for this?

    Dropbox may be a better option if you can both have accounts with enough storage, it is a simple setup process that can be forgotten about.
    Bittorrent sync is another option that mirrors data between several endpoints. You should get better performance if the files are not being transferred over the network (Dropbox & Bittorrent sync create copies at each end).
    ssh & port forwarding allows you to use sftp, if you do some more setup you can also use sshfuse to mount the remote content as a network disk, it's a plugin for http://osxfuse.github.io
    Just be aware that many scripts & botnets are constantly attempting to login on visible ssh ports on routers across the internet. Enabling ssh to outside access means that any user on you Mac can be a potential login - have good passwords set on ALL user accounts, and do not enable the root account password. There are also options to disable passwords in ssh (& use ssh keys only) if you want better security.
    ssh is good, but it is not trivial to setup and it won't open ports for you. Apps like bittorrent sync can use UPnP to request port forwarding rules, to make setup easier.
    Back to My Mac is OK, provided you are willing to hand over the keys to your Apple ID.
    P.S. You keep mentioning ftp, please avoid ftp. ftp can use plain text passwords that can be sniffed over the network, avoid opening the network to inbound ftp traffic too.

  • When I create a photo stream in ios6, everyone who is logged in to my iCloud account can see and edit my stream (on their iPhones only). Not just the email addressees that I sent the photo stream link to. Is that how photo stream security is meant to work

    When I create a photo stream in ios6, everyone who is logged in to my iCloud account can see and edit my stream (on their iPhones only). Not just the email addressees that I sent the photo stream link to. Is that how photo stream security is meant to work? Is so it means my whole family can see any photo stream I set up. Hence no security? Can't share the pics with the wife then :(

    The whole idea to an icloud account is that one user uses it and has all their devices synced together.  Different users need different Apple IDs to create their own icloud accounts.  Note that everyone can still use the same ID for an iTunes account (to share purchases).
    To create a new icloud account, go to
    http://www.apple.com/icloud/setup/

Maybe you are looking for

  • Error while generating a flat file from oracle database

    i have imported three knowledge modules for the interafce. LKM SQL to SQL IKM SQL to FILE Append CKM oracle I have tried executing the interface in following ways 1. checked the staging area different from target and choosed SUNOPSIS_MEMORY_ENGINE. t

  • Satellite P200-15N: No Sound, WLan on Windows XP Pro

    I finally was able installing "Windows XP" on my Laptop ... But now i got "NO" sound and "NO" wireless lan .. I got a Vista & Xp Boot now .. So that's cleared .. but need the sound & wireless on XP What programms do I have to install to have sound an

  • Problem while starting the Eclipse

    Whenever i am trying to open Eclipse 3.0.1 its asking me to open the log file.The log file shows one error !SESSION ---------------------------------------------------------------------- !ENTRY org.eclipse.core.launcher 4 0 Oct 10, 2006 16:43:15.624

  • Nokia E7 call screen question

    Hi Does anybody know if is it possible to make the screen auto-lock when you are talking to the phone...???? (from the options in the mid of a conversation if found that you can manually lock it) i know that deactivates when you cover the light senso

  • Debugging the Popup windows

    Hi,   When i am debugging the original program i got a popup window like address information. How can i debug the popup window...?   Is there any way except finding and keeping break point in the respective popup code... Thanks in advance. Regards, G