IE Security Setting for web.show_document

Hi,
I've run a report on the report server and generated it as a pdf, now I want to open the PDF using web.show_document.
As it starts to open I get an error message saying that the security settings of IE are preventing the opening of the file.
I've not seen this before over a number of different installations. I've disabled the pop-up blocker for this site.
After searching I've not found anything here.
Is there any documentation on what to set the security configuration to?
IAS v 10gR2
IE v 6.0
many thanks
Tony

Make sure that the URL you are opening, the OAS host server domain name in this case, is within the trusted sites of the browser.
It happened with us when opening our application online from the internet.
Tony

Similar Messages

  • ON RESTORING 1601 ERROR COMING HOE WE SET SECURE SETTING FOR RESTORE AND UPDATE

    ON RESTORING 1601 ERROR COMING HOE WE SET SECURE SETTING FOR RESTORE AND UPDATE

    If you don't have a sim card in the phone, you won't be able to activate it. You can't activate any GSM iPhone without a valid sim card installed in the phone. The sim itself need not be activated, but it must be valid & present.

  • Setting security constraint for web App

    Hai all!
    I am new to bea and i am trying to set up security constraints for my webaplication..
    I want user to be authenticated before he access any of the pages in browser..
    All i did was adding following entries to web.xml
    <security-constraint>
              <web-resource-collection>
                   <web-resource-name>
                        webresources
                   </web-resource-name>
                   <url-pattern>
                   </url-pattern>
              </web-resource-collection>           
              <login-config>          
                   <auth-method>
                   BASIC
                   </auth-method>          
              </login-config>
         </security-constraint>
    But no such thing is happening,,
    I know i am doing wrong but donno where exactly i am wrong..
    Pls guide me in sequnece of steps regarding what to do to accomplish what i want..
    Thanks and Regards
    Manohar

    I guess you need to set the role that is allowed to log into your application.
    try this in web.xml:
         <security-constraint>
              <display-name>Whatever</display-name>
              <web-resource-collection>
                   <web-resource-name>resource</web-resource-name>
                   <description>Desc</description>
                   <url-pattern>/*</url-pattern>
                   <http-method>GET</http-method>
                   <http-method>POST</http-method>
              </web-resource-collection>
              <auth-constraint>
                   <description>desc</description>
                   <role-name>MyRole</role-name>
              </auth-constraint>
                   <user-data-constraint>
                   <transport-guarantee>NONE</transport-guarantee>
              </user-data-constraint>
         </security-constraint>
         <login-config>
              <auth-method>BASIC</auth-method>
         </login-config>
         <security-role>
              <description>desc</description>
              <role-name>MyRole</role-name>
         </security-role>
    and map the role with a group/user in weblogic.xml:
         <security-role-assignment>
              <role-name>MyRole</role-name>
              <principal-name>MyGroupOfUsers</principal-name>
         </security-role-assignment>
    Hope this helps.
    Xavi
    "Manohar" <[email protected]> wrote:
    >
    Hai all!
    I am new to bea and i am trying to set up security constraints for my
    webaplication..
    I want user to be authenticated before he access any of the pages in
    browser..
    All i did was adding following entries to web.xml
    <security-constraint>
              <web-resource-collection>
                   <web-resource-name>
                        webresources
                   </web-resource-name>
                   <url-pattern>
                   </url-pattern>
              </web-resource-collection>           
              <login-config>          
                   <auth-method>
                   BASIC
                   </auth-method>          
              </login-config>
         </security-constraint>
    But no such thing is happening,,
    I know i am doing wrong but donno where exactly i am wrong..
    Pls guide me in sequnece of steps regarding what to do to accomplish
    what i want..
    Thanks and Regards
    Manohar

  • High (Maximum) Security Setting for FIOS Firewall

    If you set the maximum security setting on the Verizon FIOS Firewall then whenever Verizon decides to swap its IP's you are screwed; the unit will not get the new IP.
    To compensage for the maximum settings I have enable all of the verizon unit (SBU's) to have unrestricted access aka ANY but this does not do the trick.
    Verizon in its ultimate wisdom has not bothered to document anywhere what are the minimum outbould settings should be that would enable this communication in the High (Maximum) security mode.
    Does anyone from Verizon read this stuff?

    So, I'm pretty much convinced now that the problem with low-quality LR previews seems to be mostly isolated to the previews that LR generates after you make edits in the 'Develop' module.
    Upon first import, this image looked fine in the 'Library' & 'Slideshow' modules. After making some edits (color, tone, etc.) in the 'Develop' module, I ended up getting this hideous preview in the 'Library' & 'Slideshow' modules:
    http://web.mac.com/rishisanyal/Lightroom/07-0310_BandingBlocking.jpg
    You people with LCDs will be able to see the JPEG artifacts better than those with CRTs, since LCDs tend to be sharper.
    So, the obvious question is this:
    Does LR, when *re-generating* previews for edited images, ignore the quality-setting for JPEG previews (which I have set to 'high')??

  • Best security setting for TC? WPA, WPA2 clarification?

    I am using TC just as a wireless hard drive. What would the best security setting be? I am confused by WPA Personal and WPA/WPA2 Personal?
    Thanks in advance!

    With the TC the choices are: WPA/WPA2 Personal, WPA2 Personal, WPA/WPA2 Enterprise, and WPA2 Enterprise.
    The basic difference between WPA & WPA2 is the encryption type. WPA uses Temporal Key Integrity Protocol (TKIP), whereas WPA2 uses either TKIP or the stronger Advanced Encryption Standard (AES) encryption.
    WPA/WPA2 Personal allows for both types of clients to connect, whereas, WPA2 Personal only allows clients that support AES.
    The strongest security of the two would be to use WPA/WPA2 Personal with all clients (Mac and PC) running WPA2.

  • Specifying the character set for Web Services

    Hi
    When i set the weblogic system property
    -Dweblogic.webservice.i18n.charset=utf-8
    I get an error from weblogic douring startup
    <BEA-141087> <Unrecognized property: webservice.i18n.charset.>
    I'm using wls 8.1.
    Shouldn't this be the way to specify the encoding for web services
    Regards
    Preben

    Is it a Warning or a Error?
    If it is WARNING it is a known issue with the logging.
    The charset you set should work fine.
    Ajay
    "Preben" <[email protected]> wrote in message news:[email protected]..
    >
    Hi
    When i set the weblogic system property
    -Dweblogic.webservice.i18n.charset=utf-8
    I get an error from weblogic douring startup
    <BEA-141087> <Unrecognized property: webservice.i18n.charset.>
    I'm using wls 8.1.
    Shouldn't this be the way to specify the encoding for web services
    Regards
    Preben

  • Security Setting for a User

    Hi,
    Can we invoke and revoke security settings for a particular user at any time?What i mean by this is,
    For a particular document user1 can add/modify the document and user 2 and user3 cannot,but in another moment user2 can see the same document but user3 cannot.And finally when user3 add/modifies it all three of them can view the same document.
    Is there a possible way to do such kind of operation using UCM?

    Hi,
    I think the answer for the most part is yes, though security is not mapped to the document level, rather access is granted to groupings that contain documents.
    So in the scenarios you listed, theoretically the document would be contained in a grouping which user1 has access to and users 2 and 3 do not. In the next "moment" the document could either be moved to a new grouping or user2's access could change allowing them to see the document while still hiding it from user3.
    The third scenario is a little trickier, because user3(who did not have access to the document in scenario 2) modifies it and then everyone can see it. I'm not sure if you were inferring a series of actions on the same document, or three seperate scenarios, but if it was a series of steps, then that one probably wouldn't fly without a customization at least.
    Hope that helps
    David

  • WRT54G Security setting for an HP iPAQ 210 wireless

    I'm try to setup an HP iPAQ 210 wireless to connect to a WRT54G (Version 8.00.2)
    If the PDA and modem are set for WEP and a simple key, then the PDA connects OK.
    If I set the modem to WPA Personal + TKIP and set the PDA to WPA-PSK + TKIP, then the PDA fails to connect. I've tried other modes like WAP2 but to no avail.
    HP says it's the LinkSys WRT54G?
    Any ideas?
    Ed..

    When I checked out your iPAQ manual, I see that it was published just 10 days ago.  Since HP apparently just finished (or is still working on) the manual for your device, it would not supprise me if they were still working on the software for your device also.
    My first suggestion is to make sure you have all the latest updates and drivers for your iPAQ, especially any wireless drivers.
    Next, make sure that if the iPAQ has a software firewall, that you temporarily turn it off, and see if that will allow you to connect wirelessly.
    Next, make sure your WPA or WPA2 password or passphrase does not have any spaces in it.  Some Linksys routers have had trouble with spaces.
    Make sure the iPAQ is set to "Obtain an IP address automatically"  (sometimes called "DHCP automatic" )  and also set to "Obtain a DNS server address automatically".
    If the above does not fix your problem, then the next step would be to download and install (or re-install) the latest firmware into your router.  After a firmware upgrade, you must reset the router to factory defaults, then setup the router again from scratch.  If you saved a router configuration file, DO NOT use it.
    If you still cannot connect, then the next step would be to set your iPAQ to a fixed LAN IP address.  Try the following settings in the iPAQ:
    IP address:   192.168.1.2   (this assumes that your router is 192.168.1.1 and that you are not using the .2  address elsewhere in your network)
    Subnet Mask:  255.255.255.0
    Default Gateway:   192.168.1.1
    DNS server:  192.168.1.1  (if this does not work, then use your true Internet DNS server address  -- this info can be found in your router.)
    Hope this helps.
    Please report back with your results.
    Message Edited by toomanydonuts on 01-31-2008 02:11 AM

  • What is the 'bwuser' under security setting for SAP DB

    Forum,
    Could anyone advise what the 'bwuser' is and what it's purpose is. This is something which has been found under the security settings for a SAP database. This data has recently been migrated across to a new SQL 2008 STD server.
    Regards,
    Juan

    Hi Juan,
    This user is only used in connection between SAP B1 and Business Warehousing. It should not be deleted without purpose.
    Thanks,
    Kumar

  • Java Security Model for Web Apllication Security

    Hi,
    Any one can tell me about Java Security model used in web site protection. what are th eAPI's used to implement this model on Websites.
    I am keen to know only about the Authentication and Authorization secutiry.
    Thanks,
    Vivek

    Hi Ram, thanks for reply. I appreciate your comments.
    This is a very interesting topic because we need to know how much flexibility we have in order to apply security policies to our services. After all, SOA is about flexibility (with appropriate level of control), isn't it? :-P
    Option 1 (WSDL files) is a reasonable one. We could create "views" of the same service using ESB. But I'm concerned if this approach ("Security Oriented Views" of a service) can lead to difficulties in operational governance and appropriate discovery and reuse of the service.
    Option 2 is also something to be concerned, as we could end up designing "Security Oriented Architecture" :-P
    Option 3 (Customization through OAM) is also reasonable, but I don't know if this is really possible to achieve since OAM is mostly related to web resources. It would be nice if we had a chance to implement this in WSM instead.
    Denis
    Message was edited by:
    [email protected]
    Message was edited by:
    [email protected]

  • Best setting for web?

    I am trying to load a picture up to the web and the ones I have loaded have poor resolution. can someone please give me suggestions on what setting I should use from I-PHOTO for the best resolution.
    Thanks
    JIm

    iPhoto will scale a full sized (2.5MB) image file down to 640 x 480 at 180 dpi (the same as the original file) at 225KB with the File export option. If you want a smaller image file, like under 100 KB you'll need to use a 3rd party application like ReSize! X (freeware) that resizes and reduces the resolution of the image file to 72 dpi. With it you have a choice of quality and, thus, a choice of final file size.
    Another way you could do it is with the BetterHTMLExport plug-in for iPhoto or Galerie, a freeware application that works with iPhoto. Both will generate web galleries that you can take the resized media or large image files from to upload to the web site. Each allows you to pick the image size and quality, thus giving you complete control over the image and file size.

  • Password setting for web gallery

    Plz can some one let me know how I can set password for viewing/downloading pics in web gallery?
    Thank
    VVN

    Click here for information.
    (33642)

  • Best exporting setting for web

    What will be the best exporting setting from FILE>EXPORT> to share a HD projet on the web.
    Jean

    Convert it to h.264.
    Try this:
    File - Export - QT Conversion...
    Make sure QT movie is selected and where it says default... change it to Broadband High.
    Then go into the OPTIONS button and change the size to reflect the 16:9 aspect ratio...
    That will give you the quality you want I'm sure.
    As for # megs... well -- try a smaller SIZE option and then force it 2x or 1.5x from your web page.
    Good luck,
    CaptM

  • Security setting for Material Master

    Hi Experts,
    After creation or while creation of material master MM and PP group user should have access to MM and PP views for MM02/MM01. FI should have access to FI views and SD group should have access to SD views. And everybody should have access to all views for MM03. Please advice how to do this security settings.
    Thanks in advance.
    Ashok

    Hi Ashok,
    This all, you can do through profile creation and maintainance. You can define role area also for this.
    Although, SAP has given default profiles for FI MM n SD, which you can use.
    TC s through Su01 then tab ---> role.
    I feel, Role definition will be the Ans for you question.
    Thanks
    Arpit

  • Security settings for web analysis and finacial reporting

    Hi
    Would anyone be able to let me know when I am creating a group/user within Shared Services what provisioning I need to set up so that the user can create there own reports using finacial reports and web analysis.
    Also If a user is to just refresh reports but cannot change them what access do they need?
    Thanks

    Hi,
    Have a read here :- http://download.oracle.com/docs/cd/E12825_01/epm.111/epm_security_11111/apas04.html
    It should have all the information you are after.
    Cheers
    John
    http://john-goodwin.blogspot.com/

Maybe you are looking for

  • Need help with Logic Error(I think?)

    Hello. The following is a program I am creating to calculate the start value of a gymnastics routine, the basics are as follows(And not everything is implemented yet): In gymnastics there are the aparatuses, then skill group codes, then "skills" a-g

  • URGENT PLEASE HELP: iTunes Will Play Songs With No Sound.

    Hello all. I recently did the following and significantly screwed up my iTunes: -Tried to move my directory to an external hard drive. -This didn't work, so I then had to reload my iTunes. -I did this by doing the standard copying the .xml library fi

  • APEX 4.0 Bug: APEX_APPLICATION_PAGE_RPT_COLS.REPORT_COLUMN_WIDTH missing

    Hi APEX team The column REPORT_COLUMN_WIDTH has not been exposed in the APEX_APPLICATION_PAGE_RPT_COLS view. Could you please add this in the next release.

  • Custom Materialized View

    Hi I am ha query regarding Materialized View . Materialized View Query : select * from emp@db1 where salary in ('1000','3000'); Scenario : In the DB2 (Target DB) : create materialized view emp_mv refresh force on demand as select * from emp@db1 where

  • Account Determination KDM

    Dear Guru, While posting invoice, as we know that during the invoice GR/IR is Debited and Vendors account is credited. i want to know that hoe does the system select which vendor account is to be credited?? e.g. if a vendoe IM-D-0009 (import) is my v