IPSec Security Violation iTunes Desktop On Shutdown

I could use some insight into why the iTunes desktop is causing a security violation when I shut the program down. I am receiving the following failure audit code in the Event Viewer/Security File:
Event ID 615
Error Message Received:
IP Sec Services: IPSec Services failed to get the complete list of network interfaces on the machine. This can be a potential security hazard to the machine since some of the network interfaces may not get the protection as desired by the applied IPSec filters. Please run IPSec monitor snap-in to further diagnose the problem.
IPSec Snap-in Statistics:
When I run the snap in I am not receiving any changes in values within the IPSec Statistics. All categories are reflecting “0”. Within the IKS Statistics the following two categories values have been changed to “1”, Active Acquire and Acquire Heap Size. I am allowing an exception to occur within my firewall for iTunes.
This problem is only occurring when I shut the program down and the error message is appearing randomly in the event viwer. Any help would be greatly appreciated in helping me understand why this is occurring.
OS: Windows XP Home SP2 Toshiba 1135/S155 Laptop

B Noir
After my last discussion with you on this subject matter I continued receive the 615-error code in my Event Viewer\Security folder. This really ticked me off my friend. All along I thought iTunes was the source of the problem. But this just was not the case. Before I present to you the actual problem I will say by changing the Target Scope on the firewall it did resolve some minor issues that I was having with iTunes. My apologies for any misunderstandings that may have taken place on this issue. Therefore, let me present the following information to you to settle this issue once and for all:
Event Viewer – Failure Audit Id 615 Description – Security Folder
Source: Security
Category: Policy Change
Failure Aud Event Id: 615
User: NT AUTHORITY\NETWORK SERVICE
Computer: OWNER-(For security reasons I have removed the rest of this information)
Description:
IPSec. Services: IPSec Services failed to get the complete list of Network Interfaces on the machine. This can be a potential security hazard to the machine since some of the interfaces may not get the protection as desired by the applied IPSec. Filters. Please run IPSec. Monitor to further diagnose the problem.
Notes:
This event discussion will apply to the following modem:
2Wire 1700HW
SN: 384114124206
Assembly Number: 4200-00174-000
When this event occurred no special filters were in place. All settings were set to “Default” system wide. Snap-in Monitor: IKE Statistics were in normal range. IPSec. Statistics values did not change indicating any problems.
I was determined to find out what was causing the problem. So, since the 615 entries were identified as a security issue I contacted MS Security Department as my starting point. After an hour of discussion with the security team and ruling out the possibilities it was not security related. So, they shot me over to the Windows XP Home SP2 support team. After ruling out any Windows based problems we determined that it was a Modem\port issue that was causing the problem.
Now that I had a starting to point to work with my final investigation produced the final solution to correct the problem.
When the event occurred I was receiving the entry’s randomly on start-up\reboot. After several hours of discussions and running tests with a BellSouth tech, I tracked the problem down to my Troubleshooting – Event Log in the 2Wire MDC\Management and Diagnostic Console. A BellSouth Tech Supervisor confirmed this problem once I identified the possible source.
Source of the problem: “Bad Modem\Port Issue” on link up. The modem is not connecting properly on link-up with the server. As a result I began having lost connection entries indicating that the service was restarting itself on the lost connection. To confirm my lost connection findings I installed a Server Monitor and set the monitor to “Poll” the server in one-minute intervals. The source of the actual problem in this case will be centered on the following connection process: “vlanmon0”. I have provided a copy of the link-up process tree for your review.
Final Summary: At times I was receiving a lot of lost connection entries in the MDC event log. This is what was causing the 615 entries to occur in the event log on my machine. You will not automatically receive a 615 entry in the Event Viewer\Security folder on lost connections. Again in this case I was only receiving the entries on start-up\reboot randomly.
What was more frustrating is when the events started to occur I went to my command prompt and pinged the IP’s within the routing table I kept coming back with 100% Success back to the server. Bottlenecking at the Socket Connection was also ruled out. I spent a total of five hours over a two-day period diagnosing the problem. I even allowed the tech to do a remote access session on my machine. In the end I had nothing but kudos’ on how well my machine was set-up and protected. Final conclusion: BellSouth will be replacing the modem.
615 error codes can be very difficult to resolve. In closing my discussion with you on this issue I would advise caution in resolving this issue due to the many variables involved with IPSec Services.
Thank you for the intelligent discussion on the issue.
2WIRE MDC - Link Tree
Management and Diagnostic Console
Advanced – Link Manager States
root
|-->homenet0 is up
||-->vlan0 is up
||\-->ipv4net1 is up
|| |-->vlanmon0 is up >>>>>>>(Source of Event Id 615 in Security Folder)
|| \-->ipv4bridge2 is up
|\-->vlan3 is up
\-->broadband0 is up
\-->adsl0 is up
Snap Shot of today’s lost connection: 2Wire Troubleshooting – Event Log
Type Date/Time Event Description
INF +000 days 00:00:00 SYS: System started
INF 2003/01/15 05:00:01 EST SYS: Set system clock from: 1969/12/31 19:00:00 EST
INF 2003/01/15 05:00:03 EST SYS: ipv4net1: Up on vlan0 with 192.168.1.254/24
INF 2003/01/15 05:00:24 EST SYS: ppp0: Up with ipv4 service on pppoe0
INF 2003/01/15 05:00:24 EST SYS: ipv4net0: Up on ppp0 with 72.155.108.75/32
INF 2006/09/05 07:02:42 EDT SYS: Set system clock from: 2003/01/15 05:00:25 EST
INF 2006/09/05 08:44:56 EDT SYS: Successfully logged into a password protected page
INF 2006/09/05 16:48:19 EDT SYS: Successfully logged into a password protected page
INF 2006/09/05 20:18:35 EDT SYS: vlanmon0: connection lost, reconnecting...
INF 2006/09/06 06:20:08 EDT SYS: Successfully logged into a password protected page
INF 2006/09/06 06:21:25 EDT SYS: Successfully logged into a password protected page
INF 2006/09/06 09:50:24 EDT SYS: Successfully logged into a password protected page
Jblittlejohn
OS: Toshiba Satellite 1135’S155 Windows XP SP2
Server: BellSouth – DSL Lite
Socket Connection: LPT2T1

Similar Messages

  • Keeping iTunes Desktop conflicts to a minimum – Series 1(Reposting # 2) Fir

    Note: If you don’t take the time from your busy schedule to address these suggestions being provided in this and future upcoming series, then by all mean continue with what you were doing before and continue to experience the frustrations and problems. The series is not meant to be a cure-all for the problems you are having. But the information will go a long way to correcting and improving a lot of issues that you may be having with your system. Think About It !!!!!!!!!!
    In reviewing this forum I see a lot of folks here are having difficulties with running iTunes on the desktop and using the features available within the program. As far as information is concerned relating to iTunes conflicts, “the possible basic root causes” that can contribute to the conflicts are lacking in the discussions. The conflict discussion that I am presenting here in this first series that have been discussed many times before in various forums boards elsewhere. But for some reason it dos not seem to be sticking well in people’s minds when dealing with computers at this point in time. Therefore, I thought this would be a good opportunity to start running a series of articles here to help those who are interested in cutting the problems down to a minimum and to try and help you understand why the conflicts are occurring. If you are like me you want to enjoy your music without having to go through a lot of hassle to reach that enjoyment. But if you want to correct the problem you are having I will need to guide you through a little bit of hassle to improve your performance. These articles will be primarily directed to the learning advanced users and to those who have a complete set of available Recovery and Applications/Drivers CD’s that was provided with your system. The following is critical. If your system just came with one instillation disk I strongly advise against using some of this information. IF YOU DO, proceed at your own risk especially if you have an OEM system. If you are NOT an advanced user you can still learn from this material.
    My objective in this opening series as I stated in my opening remarks is to address the possible root causes that can and will interfere with programs and iTunes. Before I go any further let me provide a summary of my upcoming series objectives:
    1) Conflicts – Current series
    2) HDD Formatting – “Main key to reducing conflicts”
    3) Security
    4) iTunes Setup and Firewall configuration
    All four of the above categories will play a vital role in reducing the conflicts. Now lets begin the series for those who are interested in learning.
    1)Open Ports – WARNING!!!! OPEN PORTS ARE A SURE FIRE INVITATION TO PROBLEMS. Also, it is a “potential security hazard” to the local machine in question. Therefore I strongly suggest visiting one of the following links for a free online Port Scan. www.broadbandreports.com when you reach the site look for the Tools tab. www.sygate.com There are many other places you can visit but I would use caution because of the hidden dangers that could be involved if you don’t know a whole lot about the scan provider. I would stick to the most popular scan sites if possible. I suggest also going to www.microsoft.com and typing in the following search term: “Ports”. The search results will yield you a wide verity of information relating to port issues. Or, use your favorite search engine to research the issue. The bottom line is this, it is very important and relevant to understand the importance of protecting yourself in this area for it can and will at times have a system wide impact on the local machine. So now is a good time to start learning how to lock your system up to the outside world as much as you can if you have not already done so. Question? You would not leave your home without locking it up first, Right? Get my point? Throughout my series I will be revisiting this subject and discuss other aspects relating to ports issues.
    2)Virus/Spyware Programs - Unfortunately we live in a world today where people have hidden motives and agendas. Others are just out to cause trouble for others. The reason that I am bringing up these two programs is because they are well known programs to cause conflicts. Even though both of these programs is a necessity in our every day tasks lets break each one down and briefly discuss what we can do to reduce the conflicts. Virus Programs: I know you may have heard it before but I am going to reiterate it again that it is imperative that you keep this program up to date. This will be just one part of your front line defense in protecting your computer. Virus Programs/Firewalls: The virus programs coming out today are multi-functional packages now. Example: Spyware programs included, etc. But lets focus our attention at the firewall level for just a minute. When I run my virus program I usually do the following, I will disengage the Spyware portion of the program. I will discuss a little bit more about Spyware programs soon. The point that I am trying to make is “Configuration”. In order to reduce the conflicts it is important that you understand the program that you are running. At times you may have to go back and configure your firewall in order for the program to properly work as well. Therefore, check with your program vender as well as your firewall vender to ensure that you are properly configured. And finally, Spyware programs. As I just stated, I usually disengage the Spyware portion when I setup my virus program. I do it for a specific reason(s). 1) I run my own independent program and, 2) I have found that the Spyware programs that are included in the multi-functional packages are just not effective. I am currently running Ad-Aware SE Plus. 3) Running two Spyware programs can and will cause conflicts.
    3)Firewalls - Firewalls can be and often is a source of conflicts as I had briefly mentioned in the Virus program section. This will be another important aspect of your defense measures. You may ask, “What does this have to do with iTunes?” Well my friend it is important for configuration purposes again as I stated in the virus program section. When you listen to the radio or purchase music from the store you are dealing with what is called a live stream. To ensure the integrity of the live stream “Proper Firewall Configuration” is the key to maintaining that integrity. During my iTunes Setup and Firewall Configuration Series I will go into further details on this subject matter. If you are running the Windows Firewall and another firewall in one of the multi- functional packages that I spoke off, disengage it now. The probability of conflicts occurring will be high for sure.
    4)Screen Savers and Tray Programs – Screen Savers is another well-known source of conflicts. If you are going to use a Screen Saver, then I suggest doing the following: 1) If you are going to spend a period of time at your PC, disengage the Screen Saver, and 2) If you are going to leave your PC running while you go to lunch or what ever, create a short cut from the Control Panel to the Desktop so that you can engage or disengage the Screen Saver at will. You will be better off in the end. Tray Programs If you are running iTunes products it is also a good ideal to shut down any programs that are not necessary to keep the conflicts to a minimum. Especially if you going to copy music to your iPod or iTunes player.
    5)Internet Connection – In this last subject of this opening series I would like to briefly touch upon your actual Internet Connection. This can also be a source of conflict. If you are a Bell South user and have inside line filters on your phone lines as well as fax lines I suggest you consider getting rid of them. Then contact Bell South and have them come out to your home and install a line splitter on your line at the point of entry into your home. There is no charge for doing this. Fax Machines: If you have one and it is sharing your phone line I recommend considering putting it on a dedicated line, if you can afford it. Bellsouth will work with you in spreading out your payments on your phone bill. Once you have done this you will notice an immediate improvement in your connect.
    In closing, everything that has been presented here for your consideration I have personally gone through. To date, as a result of my efforts I rarely have any problems. I am currently running the new update 7.0 When I do have a problem I can quickly pin point the problem and resolve the issue. Also, everything that has been presented here can cause a conflict by either direct or indirect means. Example of how a conflict can affect iTunes products: lets take the iPod for example, either one of the above can cause a conflict in such a way as to keep you from properly transferring your songs from the iTunes player to the iPod itself. This is why you don’t want to miss my next upcoming series.
    In my HDD Formatting Series, I will show you how to properly lay out a hard drive in a way that will cut down the conflicts. Because of the amount of information that I will be providing, I may have to break it into two to three series on the subject. I can guarantee you though if you follow my suggestions in the series you will notice an improvement in your system. The principles of this information can be applied to all connections. Print these series off and save them as a reference points for yourself or others. I look forward to seeing you in my next series.
    Jblittlejohn
    Toshiba Satellite 1135/S155 Laptop
    Windows XP Home SP2
    Build 2600
    DSL Lite – 2Wire

    Drowning, welcome to the forum.
    This is an extensive list of requirements.  What is your maximum budget?  This will make it much easier to give you  a realistic choice of computers.  There is a great gaming computer for $999.  I know that you said slight gaming, but the other tasks can still use some power.  Once I know your budget, I will help you more.
    As you can see from my signature below, I have an 810qe model.  It has all of the power that I could possibly need.
    Signature:
    HP TouchPad - 1.2 GHz; 1 GB memory; 32 GB storage; WebOS/CyanogenMod 11(Kit Kat)
    HP 10 Plus; Android-Kit Kat; 1.0 GHz Allwinner A31 ARM Cortex A7 Quad Core Processor ; 2GB RAM Memory Long: 2 GB DDR3L SDRAM (1600MHz); 16GB disable eMMC 16GB v4.51
    HP Omen; i7-4710QH; 8 GB memory; 256 GB San Disk SSD; Win 8.1
    HP Photosmart 7520 AIO
    ++++++++++++++++++
    **Click the Thumbs Up+ to say 'Thanks' and the 'Accept as Solution' if I have solved your problem.**
    Intelligence is God given; Wisdom is the sum of our mistakes!
    I am not an HP employee.

  • HT3819 Does anyone get an unknown library under their shared libraries on the ITunes desktop?

    I have never turned on sharing and have a secure home network yet somehow I have a shared library under my ITunes desktop that I would appear to have access to.  This seems really strange.  Anyone seen this before?

    I have never heard of a virus that is transmitted via a shared library. 
    What you are seeing is regular sharing, not Home Sharing.  Regular sharing allows listening, but not copying.  There is a short description here:  http://support.apple.com/kb/PH12350

  • Security-violation error in 3750

    We Have a strange behavior with the computer of a user who connects with his laptop to the network through port replicator or docking station,Where we have a acs.When he goes to another place of the company in another City, Where we have other acs, he connects without port replicator directly to network,It works well. But when the laptop returns does not have
    network and the following message of error in switch appears:
    May 16 07:51:23: %DOT1X-5-SECURITY_VIOLATION: Security violation on interface FastEthernet1/0/27, New MAC address 00c0.f200.53f0 is seen on the interface in Single Host mode
    May 16 07:51:23: %PM-4-ERR_DISABLE: security-violation error detected on Fa1/0/27, putting Fa1/0/27 in err-disable state
    May 16 07:51:24: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1/0/27, changed state to down
    May 16 07:51:25: %LINK-3-UPDOWN: Interface FastEthernet1/0/27, changed state to down
    I execute the commando "shutdown" and "not shutdown" in the interface of switch, and soon the commando: "dot1x port-control auto" and soon "not dot1x port-control auto". laptop make authentication and begins to work well.
    What think you about What this occurring?

    Hi,
    Is there any port security being set on the switch?
    are you able to paste your config file here?
    thanks,
    rgds,
    ken L

  • SG-500-28P How to configure switchport port-security violation setting

    Is there a way to do switchport port-security violation {protect | restrict | shutdown} in SG-500-28P in case of a BPDU Guard violation?
    Seems like the default option is shutdown and I don't know how to change it.
    Thank you!

    Hi,
    you can recover this Violation.By using below command:
    To enable automatic re-activation of an interface after an Err-Disable shutdown, 
    use the errdisable recovery cause Global Configuration mode command. To 
    disable automatic re-activation, use the no form of this command.
    Syntax
    errdisable recovery cause {all | port-security | dot1x-src-address | acl-deny | 
    stp-bpdu-guard | loopback-detection | udld }
    no errdisable recovery cause {all | port-security | dot1x-src-address | acl-deny | 
    stp-bpdu-guard | loopback-detection | udld }
    For more information:
    Refer this URL:page no :406
    http://www.cisco.com/c/dam/en/us/td/docs/switches/lan/csbms/Sx500/cli_guide/CLI_500.pdf
    regards
    Moorthy

  • Difference between protect/restrict port security violation action?

    Hi all,
    I've read the documentation, but found the explanations a bit vague. Could someone please explain the difference between these two?
    http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/12_1e/comref/s1.htm#wp1184020
    Thanks.

    Only difference is that, security violation counters are incremented in restrict, while its not incremented in protect.
    So each time a violation occurs and you do a show port-security on that port.
    Switch# show port-security interface fastethernet0/1
    Port Security: Enabled
    Port status: SecureUp
    Violation mode: Shutdown
    Maximum MAC Addresses :50
    Total MAC Addresses: 11
    Configured MAC Addresses: 0
    Sticky MAC Addresses :11
    Aging time: 20 mins
    Aging type: Inactivity
    SecureStatic address aging: Enabled
    Security Violation count: 0
    The counter above in bold will be incremented when restrict is configured, and will not increment, if protect is configured.
    Either ways, the packets from the insecure hosts will be dropped, if a violation occurs.
    HTH
    Sankar.

  • My iPad no longer appears in the iTunes desktop app, so I can't sync or transfer files?, my iPad no longer appears in the iTunes desktop app, so I can'y sync or transfer files?

    My iPad no longer appears in the iTunes desktop app, so I can't sync or transfer files?
    I also have an iPod Touch. It appears in iTunes but willnot sync... "unknown error 1723"
    This is a recent problem. Everything was fine initially, and I don't think that I've done anything to change my setup.
    ...Charles

    iPad not appearing in iTunes
    http://www.apple.com/support/ipad/assistant/itunes/
    iOS: Device not recognized in iTunes for Mac OS X
    http://support.apple.com/kb/TS1591
    iOS: Device not recognized in iTunes for Windows
    http://support.apple.com/kb/TS1538
    iTunes for Windows: iTunes can’t contact the iPhone, iPad, or iPod software update server
    http://support.apple.com/kb/ts1814
    iTunes for Windows: Device Sync Tests
    http://support.apple.com/kb/HT4235
    IOS: Syncing with iTunes
    http://support.apple.com/kb/HT1386
    Apple - Support - iPad - Syncing
    http://www.apple.com/support/ipad/syncing/
    iTunes 10.5 and later: Troubleshooting iTunes Wi-Fi Syncing
    http://support.apple.com/kb/ts4062
    iOS: “Not enough free space” alert when trying to sync
    http://support.apple.com/kb/ts1503
    You may need to delete iTunes on your computer and then reinstall.
    How To Completely Uninstall and Remove All Traces of iTunes
    http://zardozz.com/zz/2008/04/how-to-completely-uninstall-and-remove-all-traces- of-itunes.html/
     Cheers, Tom

  • Mail Removes Open Emails From Desktop On Shutdown

    I like to open Mail emails onto my desktop to remind me that they need to be replied to.  But beginning awhile back, maybe around Mtn Lion or so, they randomly get removed from my desktop upon shutdown or startup.  This has complicated my organizational system for keeping my communications in order.  This is on my iMac 27, i7, 2.8 GHz, 8 GB. Running OSX 10.9.4, Mail 7.3.  This has been happening for awhile now and still is so I don't think it is specific to current hardware of software.  I haven't tried any specific fixes for this as I don't know where to begin.  Over this same time I have replaced the OS and Clean Installed everything, for other reasons, yet still the issue persists. Is anyone else having a similar problem?  I would really love to find a fix for this, any suggestions.

    This is a POP account, right? What are your Preferences > Accounts > Advanced > Remove copy from server settings?

  • Weblogic 10.3.0 -  Security Violation when Group Membership Lookup enabled

    Dear Admins,
    We're running a Weblogic 10.3.0 cluster with our own software deployed.
    We're using SQL authentication (JDBC to Oracle DB) to authenticate users.
    Recently we've been tuning our WL cluster to improve performance, and have enabled Group Membership Lookup Hierarchy Caching.
    Sometimes users log into our application and get inssuficient rights (or some other error). This appears to happen at random. Most of the times they can log in without problems.
    We determined it's not something to do with the cluster, although it can happen on one node and the other node will work as normal.
    In the Managed server we see this error (with test user):
    Managed7Server.out00011:java.rmi.AccessException: [EJB:010160]Security Violation: User: 'test' has insufficient permission to access EJB: type=<ejb>, application=leanapps, module=process_general.jar, ejb=LaLifeProcessController,
    method=create, methodInterface=Home, signature={}.
    When we disable Group Membership Lookup Hierarchy Caching, this error never occurs.
    Our settings (Security Realms -> myrealm -> Providers -> SQL Authenticator -> Performance):
    Max Group Hierarchies In Cache: 5000 (we have approx. 2000 groups)
    Group Hierarchy Cache TTL: 3600
    provider specific settings :
    Group Membership Searching: unlimited
    Max Group Membership Search Level: 0
    Also in Myrealm -> Performance we have set :
    Enable WebLogic Principal Validator Cache
    Max WebLogic Principals In Cache: 5000
    If we put the TTL really low (default 60 seconds), the error hardly ever occurs. But we want to have cache that lasts longer then one minute.
    This might be a bug, as we have other clusters running on WL 10.3.5, 12c where we use the same cache settings. This issue does not occur there.
    I'm more then willing to provide more info or config files
    Edited by: user5974192 on 21-nov-2012 5:17

    This is fixed now. Someone had defined a Servlet for the web service in web.xml that was preventing the EJB container to kick in.
    Edited by: user572625 on Aug 25, 2011 11:54 PM

  • Error encountered while signing: The Windows Cryptographic Service Provider reported an error: Access was denied because of a security violation. Error Code: 2148532330

    Last night when i tried to sign a document i received the mesage below and after that it says this document can't be signed what can i do to fix this problem.
    Error encountered while signing:
    The Windows Cryptographic Service Provider reported an error:
    Access was denied because of a security violation.
    Error Code: 2148532330

    I assume you are implying "biztax" application here, right?
    I have contacted their program lead, with no result at all.
    Past days I have been searching for a solution - reinstalls / new systems - no solution.
    This issue appeared a week or two ago only.
    I found http://forums.adobe.com/message/5338853 useful - but no positive results either.
    http://test.eid.belgium.be/faq/faq_nl.htm obviously didnt help either.
    If anyone finds a solution to this issue, please do let me know - any help is appreciated.
    Biztax tells to use the "signature", not the "authentication"  - but it is only Auth. that is showing up as option to sign (that works)
    ps, did you fiddle with the Adobe Reader XI security settings and import that PKI etc as well? I hoped that would be the breaktrough. Sadly i'm still crying in my chair.
    Oh, and dont forget: they claim nobody else got this issue. Maybe one or two people. (We got about 8 customers experiencing exactly the same symptoms at the same time )
    >  I noticed that when I try to open the pdf  document that is 'signed' by the government it is not showing the filename in the title bar, but only " - Adobe Reader".    every piece of info helps I guess.
    Obviously last version of Reader   11.0.03

  • Security Violation Error while running schedule task from OIM.

    Hi All,
    I am getting this error while running a custom java schedule task from OIM:
    *Thor.API.Exceptions.tcAPIException [EJB:010160] Security Violation: User '<anonymous>' has insufficient permission to access EJB:*
    type=<ejb>,application=Xellerate,module=xlDataObjectBeans.jar,ejb=tcReconciliationoperations,method=createDeleteReconciliationEvent
    at Thor.API.Operations.tcReconciliationOperationsClient.createDeleteReconciliationEvent(UnKnown Source).
    I got this error as soon as my code start creating Delete Reconciliation Event.
    Note: I have already protected the JNDI Namespace.
    Please provide some pointers.
    Regards,
    Sunny

    Hi Rajiv,
    Check this:
    package com.centrica.iam.scheduletask;
    import java.io.BufferedReader;
    import java.io.File;
    import java.io.FileFilter;
    import java.io.FileNotFoundException;
    import java.io.FileReader;
    import java.text.SimpleDateFormat;
    import java.util.ArrayList;
    import java.util.Calendar;
    import java.util.Date;
    import java.util.HashMap;
    import java.util.Hashtable;
    import java.util.Iterator;
    import java.util.Set;
    import oracle.iam.connectors.common.ConnectorLogger;
    import com.thortech.xl.dataaccess.tcDataSet;
    import com.thortech.xl.dataaccess.tcDataSetException;
    import com.thortech.xl.dataobj.PreparedStatementUtil;
    import com.thortech.xl.orb.dataaccess.tcDataAccessException;
    import com.thortech.xl.scheduler.tasks.SchedulerBaseTask;
    import Thor.API.tcResultSet;
    import Thor.API.Exceptions.tcAPIException;
    import Thor.API.Exceptions.tcInvalidValueException;
    import Thor.API.Operations.tcLookupOperationsIntf;
    import Thor.API.Operations.tcReconciliationOperationsIntf;
    import Thor.API.Operations.tcSchedulerOperationsIntf;
    public class CustomFlatFile extends SchedulerBaseTask {
         private static tcSchedulerOperationsIntf schedulerIntf;
         private static tcLookupOperationsIntf lookupIntf;
         private static tcReconciliationOperationsIntf reconIntf;
         String sObjectName;
         String LookupName;
         String LookupName2;
         String FileDirectory;
         String FileName;
         String File;
         String delimeter;
         String isDeleteTrue;
         HashMap<String, String> attrMap = new HashMap();
         HashMap<String, String> delMap = new HashMap();
         HashMap<String, String> finalMap = new HashMap();
         ArrayList list = new ArrayList();
         public boolean isReconStopped;
         public CustomFlatFile()
              isReconStopped = false;
         public void init()
              LookupName = getAttribute("Attribute Lookup Name");
              FileDirectory = getAttribute("Directory Path");
              FileName = getAttribute("File Name");
              delimeter = getAttribute("Delimeter");
              sObjectName = getAttribute("Resource Object Name");
              isDeleteTrue = getAttribute("Is Delete Allowed");
         public void execute(){
              try {
                   System.out.println("Start Exceute");
                   //Initiate lookupIntf
                   lookupIntf = (tcLookupOperationsIntf)getUtility("Thor.API.Operations.tcLookupOperationsIntf");
                   reconIntf=(tcReconciliationOperationsIntf)getUtility("Thor.API.Operations.tcReconciliationOperationsIntf");
                   catch (tcAPIException tcapiexception){
                        tcapiexception.printStackTrace();
                        //logger.error(classname, s, tcapiexception.toString());
                        //logger.setStackTrace(tcapiexception, classname, s, tcapiexception.getMessage());
                   catch (Exception excep){
                        excep.printStackTrace();
                        //logger.error(classname, s, excep.toString());
                        //logger.setStackTrace(excep, classname, s, excep.getMessage());
                   attrMap = readLookup(LookupName);
                   System.out.println(attrMap.toString());
                   readFile();
                   if (isDeleteTrue.equalsIgnoreCase("true"))
                        performDelete();
                   System.out.println("Finish Execute");
         public void performDelete()
              System.out.println("Start Perform delete");
              int k = list.size();
              System.out.println("list size " + list.size());
              try
                   Thread.sleep(15000);
         /*     Hashtable ahashtable[] = new Hashtable[k];
              Hashtable hashtable = new Hashtable();
              for (int i=0;i<k;i++)
                   hashtable.put("User Id", list.get(i));
                   ahashtable[i] = hashtable;
                   System.out.println(list.get(i));
              Set set = reconIntf.provideDeletionDetectionData(sObjectName, ahashtable);
              System.out.println("Set--" + set.toString());
              tcResultSet tcresultset = reconIntf.getMissingAccounts(sObjectName, set);
              System.out.println("tcresultset - " + tcresultset.getRowCount());
              if (!(tcresultset.isEmpty()))
                   long l[] = reconIntf.deleteDetectedAccounts(tcresultset);
                   for (int i1=0;i1<l.length;i1++)
                        System.out.println("delete recon key " + l[i1]);
              //Get the existing list of Managed users
                   tcDataSet tcdataset = new tcDataSet();
                   tcDataSet tcdataset1 = new tcDataSet();
                   String query = "select orf.orf_fieldname,prf.prf_columnname, sdk.sdk_name from orf, sdk, pkg, tos, prf, obj " +
                             "where pkg.obj_key = obj.obj_key and pkg.pkg_key = tos.pkg_key and tos.sdk_key is not null " +
                             "and tos.sdk_key=sdk.sdk_key and tos.tos_key=prf.tos_key and prf.prf_iskey='1' and prf.orf_key=orf.orf_key " +
                             "and orf.orf_parent_orf_key is null and obj.obj_name='" + sObjectName + "'";
                   tcdataset.setQuery(getDataBase(), query);
                   tcdataset.executeQuery();
                   String FFName = tcdataset.getString("prf_columnname");
                   String FName = tcdataset.getString("sdk_name");
                   String ROFName = tcdataset.getString("orf_fieldname");
                   System.out.println("form- " + FName + " Field- " + FFName);
                   query = "select " + FFName + " from " + FName + " udtable, oiu a, ost b " +
                             "where udtable.orc_key=a.orc_key and a.ost_key=b.ost_key and b.ost_status!='Revoked'";
                   System.out.println(query);
                   tcdataset1.setQuery(getDataBase(), query);
                   tcdataset1.executeQuery();
                   int i = tcdataset1.getRowCount();
                   ArrayList list1 = new ArrayList();
                   String s1 = null;
                   System.out.println("N. of rows--" + i);
                   for (int j=0;j<i;j++)
                        tcdataset1.goToRow(j);
                        s1 = tcdataset1.getString(0);
                        System.out.println("s1---" + s1);
                        if (!(list.contains(s1)))
                             list1.add(s1);
                             System.out.println("under if--" + s1);
                   //Getting the existing list of unmanaged users
                   query = "select distinct (b.rcd_value) from rce a, rcd b, orf c, obj d where a.rce_key=b.rce_key and " +
                             "b.orf_key=c.orf_key and c.orf_fieldname='" + ROFName + "' and a.rce_status!='Event Linked' " +
                                       "and a.obj_key = d.obj_key and d.obj_name='" + sObjectName + "'";
                   tcdataset1.setQuery(getDataBase(), query);
                   tcdataset1.executeQuery();
                   i = tcdataset1.getRowCount();
                   System.out.println("No. Of Unmanaged Users " + i);
                   for (int j=0;j<i;j++)
                        tcdataset1.goToRow(j);
                        s1 = tcdataset1.getString(0);
                        System.out.println("s1---" + s1);
                        if (!(list.contains(s1)))
                             list1.add(s1);
                             System.out.println("under if--" + s1);
                   int k1 = list1.size();
                   System.out.println("list1 size--" + k1);
                   for (int j1=0;j1<k1;j1++)
                        delMap.clear();
                        delMap.put(ROFName, (String)list1.get(j1));
                        System.out.println(delMap.toString());
                        long l = reconIntf.createDeleteReconciliationEvent(sObjectName, delMap);
                        System.out.println("delete recon key--- " + l);
              catch (Exception exception)
                   exception.printStackTrace();
         public void readFile(){
              String s = "readFile()";
              //logger.setMethodStartLog(classname, s);
              HashMap map = new HashMap();
              try {
              File = getFile();
              BufferedReader reader = new BufferedReader(new FileReader(new
                        File(File)));
              String line = "";
              int k = attrMap.size();
              String value[] = new String[k];
              String Header[]= new String[k];
              if (delimeter.equalsIgnoreCase("|"))
                   delimeter = "\\" + delimeter;
                   line = reader.readLine();
                   Header = line.split(delimeter);
                   while((line = reader.readLine()) != null)
                        value = line.split(delimeter);
                        k = value.length;
                        for (int i = 0;i<k;i++){
                             finalMap.put(attrMap.get(Header), value[i]);
                        System.out.println(finalMap.toString());
                        System.out.println("Start Ignoring Event");
                        if (!(reconIntf.ignoreEvent(sObjectName, finalMap)))
                             System.out.println("Not Ignored");
                        long l1 = reconIntf.createReconciliationEvent(sObjectName, finalMap, true);
                        System.out.println("Recon Key--" + l1);
                        else
                             System.out.println("ignore event ---" + finalMap.toString());
                        list.add(finalMap.get("User Id"));
                        System.out.println(list.size() + "add--" +finalMap.get("User Id") );
                        finalMap.clear();
              catch (Exception exception)
                   exception.printStackTrace();
         public boolean stop(){
              String s = "stop()";
              //logger.setMethodStartLog(classname, s);
              //logger.info(classname, s, "Stopping Reconciliation........");
              isReconStopped = true;
              //logger.setMethodFinishLog(classname, s);
              return true;
         FileFilter fileFilter = new FileFilter()
         public boolean accept(File file)
         String sFilePath = file.getName();
         if( sFilePath.startsWith(FileName) )
         return true;
         else
         return false;
         public String getFile() throws FileNotFoundException, Exception{
              String s = "getFile()";
              //logger.setMethodStartLog(classname, s);
              String s1;
              File dir =     new File(FileDirectory);
              File[] files = dir.listFiles(fileFilter);
              if (files.length ==0)
                   throw new FileNotFoundException();
              if (files.length>1)
                   throw new Exception("Multiple Matches found for this file name");
              s1 = files[0].toString();
              //logger.setMethodFinishLog(classname, s);
              return s1;
         public HashMap readLookup(String s1){
              String s = "readLookup()";
              //logger.setMethodStartLog(classname, s);
              HashMap map = new HashMap();
              try {
              tcResultSet tc1=     lookupIntf.getLookupValues(s1);
              int i = tc1.getRowCount();
              for (int j = 0;j<i;j++){
                   tc1.goToRow(j);
                   map.put(tc1.getStringValue("Lookup Definition.Lookup Code Information.Code Key"), tc1.getStringValue("Lookup Definition.Lookup Code Information.Decode"));
              catch (tcAPIException tcapiexception){
                   tcapiexception.printStackTrace();
                   //logger.error(classname, s, tcapiexception.toString());
                   //logger.setStackTrace(tcapiexception, classname, s, tcapiexception.getMessage());
              catch (Exception excep){
                   excep.printStackTrace();
                   //logger.error(classname, s, excep.toString());
                   //logger.setStackTrace(excep, classname, s, excep.getMessage());
              return map;

  • Security violation exception with Weblogic cluster installation on OIm 9.1

    Hi,
    I have OIM9.1 installed on weblogic 8.1 SP4 in clustered environment, which more often than not seems to work fine. But some time I get following exception on server console/log file which causes certain provisioning task to be rejected...
    at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:224)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:183)
    Caused by: javax.ejb.AccessLocalException: [EJB:010160]Security Violation: User: 'xelsysad
    m' has insufficient permission to access EJB: type=<ejb>, application=Xellerate, module=xl
    DataObjectBeans.jar, ejb=tcFormInstanceOperations, method=create, methodInterface=LocalHom
    e, signature={}.
    at weblogic.ejb20.internal.MethodDescriptor.checkMethodPermissionsLocal(MethodDesc
    riptor.java:486)
    at weblogic.ejb20.internal.StatelessEJBLocalHome.create(StatelessEJBLocalHome.java
    :80)
    at com.thortech.xl.ejb.beans.tcFormInstanceOperations_2j82mm_LocalHomeImpl.create(
    tcFormInstanceOperations_2j82mm_LocalHomeImpl.java:93)
    ... 126 more
    ERROR,19 Dec 2008 14:20:03,752,[XELLERATE.APIS],Class/Method: tcBaseUtilityClient/getLocal
    Interface encounter some problems: {1}
    java.lang.reflect.InvocationTargetException
    at sun.reflect.NativeMethodAccessorImpl.in
    Problem is, I get this exception only 4 out of 6 times (when it is least expected). I have googled, and tried all possible means but have't been able to resolve it. One more thing I am sure of is, it only comes with Weblogic installation not with Jboss. So there should be some configuration issue with weblogic installation.
    Any suggestions would be useful...

    No Response???
    Where are the good guys??

  • I have just clicked on my iTunes desktop icon and got the following message "The file iTunes Library.itl" cannot be read because it was created by a newer version of iTunes. Why has this occurred when it working fine?

    I have just clicked on my iTunes desktop icon and got the following message "The file iTunes Library.itl" cannot be read because it was created by a newer version of iTunes. Why has this occurred when it working fine? Is it best to update iTunes to 10.2 to attempt to resolve? Initially I got the prompt Quicktime was out of date so I updated that successfully in all programs. I do not want to lose my iTunes library.

    Sorted problem updated and reinsatlled and restarted computer.

  • I have Windows 8 and Itunes 11.1.2. When I click on the Itunes desktop shortcut, Itunes won't open. I just the icon go to the taskbar and nothing more. Please help.

    I have Windows 8 and Itunes 11.1.2. When I click on the Itunes desktop shortcut, Itunes won't open. I just the icon go to the taskbar and nothing more. Please help.

    Delete the shortcut and make a new one. The 'real' application will probably be fine if you launch it from the Start/Programs menu.

  • Security Violation during PATH Variable Substitution

    Hi -
    I' m trying to write a file with the receiver file adapter by the variable substitution feature from SP12 on.
    Whereas the %filename% variable works fine, I get for the %path% variable an exception in the adapter engine, whenever I'm trying either
    - to use an absolute path like "/tmp" or
    - composed pathnames like "tmp/test" (that are based on $XIHOME/j2ee/cluster/server0)
    Non-composed pathnames like $XIHOME/j2ee/cluster/server0/tmp by setting %path% to "tmp" work also.
    Any clue?
    I'm on AIX on SP12.
    Here is the exception:
    java.text.ParseException: Security violation encountered during variable substitution: Content of variable path is not safe
    Thanks.
    Stefan

    Hi Stefan,
    did you check the flag 'Disable Security Checks' in the communication channel?
    Regards
    Stefan

Maybe you are looking for

  • 2012 to 2009

    File was made in demo version of 2012.  I need it converted to Labview 2009.   Solved! Go to Solution. Attachments: Enphase Data.vi ‏18 KB

  • Stolen Macbook Pro 13'. Help!

    Well, this is sad... I have a friend who has been victim of an steal in some kind of party, and he brought his macbook pro 13 inch. After a while, the Mac dissapeared and there are no "suspicious" people, and we want to know if we can locate the comp

  • Dynamic Forms - text fields

    Hi, I am currently using LiveCycle Designer 8.0. I am having major problems getting my text field boxes to expand dynamically on the page and over to the next page to accommodate large amounts of text. I have employed the 'allow multiple lines' and '

  • "A Suitespot Server" tab disappears after Calendar Server install

    After installing another Suitespot server and then Calendar, the tab from one of the other servers disappears. I reinstall that server, then the Calendar Server tab disappears! <p> Using a text editor, verify that the suitespot_server_root/admin-serv

  • Merging two iPhoto libraries

    I've got a big library of photographs on my G5 and on my iBook. I'd like to merge these two. How can I do this without getting duplicates? Is there an easy way to do this over the wi-fi network?