Is it possible (using PS 8.8 Security) ...

We have a situation where we have two companies on PeopleSoft HCM that should not see each other's data. Company 1 should not see Company 2. We do this using row security (dept security). The issue lies where search records check against the security tree and return only who a person has access to based on their current department. We have associates that used to work for Company 1, quit and now work for Company 2. Company 1 no longer has access to these associates...GREAT!!! Company 2 now has access to these associates...GREAT!!! -----Problem....In job Data, since company 2 has access to the associate, they can see the historty of the associate when they worked for Company1. This is a big problem for us.
Is there any way to secure a page to block history for depts that a user does not have access to? Apparently row security (via search record) just checks the top row. If they have access to the dept on the top row, then the viewing of all history is available regardless if the user does not have access to the depts under the top row.
If this makes sense to anyone and if you have an idea, please help!
Thoughts were:
*To assign a new employee id if there is a hire from one company to the next (most logical to security)
*Update pages to only display records for the associates company (somehow...and a tremendous amount of development)
*???

Hi there, did you get this problem resolved? What was your decision?
Thanks,
Lewis Hopkins
Q Software

Similar Messages

  • Is possible to sign a Captive runtime bundle executable in mac with a mac distribution using codesign (to avoid security Alert)

    Hi, again:
    Is possible to sign a Captive runtime executable (.app) in mac with a mac distribution certificate using codesign (to avoid security Alert)?
    Considering that Flash Builder does not allow you to create an unsigned .app (captive).
    Basically, apparently is imposible to do it, when I try codesign always return a: part of the bundle is sealed.
    Please anyone there can help me to solve this?
    Thank you.

    Hi, again:
    Is possible to sign a Captive runtime executable (.app) in mac with a mac distribution certificate using codesign (to avoid security Alert)?
    Considering that Flash Builder does not allow you to create an unsigned .app (captive).
    Basically, apparently is imposible to do it, when I try codesign always return a: part of the bundle is sealed.
    Please anyone there can help me to solve this?
    Thank you.

  • Just got a new IPOD Touch and it wont connect to our Wifi home network with a Belken N Router. Our router uses WEP 64 bit security, but had a "blank" password field, which the IPOD did not like. Changing to a 6 char numeric PW didnt help either.

    OS is whatever OS ships with current IPOD Touch
    I cannot understand why the APPLE engineers have designed this product so that it has SO MANY WIFI problems.  This is supposed to be an easy-to-use product.  We've had no problems connecting our new laptop, our ROKU box, etc, but it seems impossible to get the IPOD touch to work.  NOTHING LIKE SPENDING XMAS MORNING DOING APPLE TECH SUPPORT TROUBLESHOOTING TO LEAVE YOU IN THE CHRISTMAS SPIRIT!!!  Argh!
    In fact, the only way we have been able to get this expensive brand new IPOD to work on our home network is to DISABLE SECURITY in the router settings.  THIS IS ANYTHING BUT A GOOD IDEA.
    DON"T KNOW WHY BUT MANY OTHER USERS ARE REPORTING THE SAME KIND OF PROBLEM SO APPLE ENGINEERING NEEDS TO GET BUSY AND FIX THIS PROBLEM SO THAT NEW USERS CAN CONNECT TO THE INTERNET WITHOUT HAVING TO BE TRAINED ROUTER ENGINEERS TO DO IT!!!!
    Ok, sorry for the rant, but surely those of you who are experiencing this share my frustration.  This is not why I bought an APPLE product.
    IS THERE ANY POSSIBILITY THAT APPLE WILL NOT ALLOW A WIFI PASSWORD with more than one identical alphanumeric character?  Any ideas?  We also tried eliminating the 40 MHZ setting under Bandwidth settings in the router settings for our router, but it made no difference.  The router has the latest firmware, too.  Running out of ideas, and am ready to box this unit up and send it back!

    Thanks, Bob!  You are correct.  And, we learned this as we spoke with APPLE TECH SUPPORT by phone on Christmas day (800-APL-CARE).  One of their reps spent the time to help us troubleshoot this, but the boiled down conclusion is your answer, and to repeat for the benefit of others, here is what worked:
    1. With our Belkin router set to "out-of-the-box" WEP 64 bit security, we could not get wireless access of any kind.  Only with the Security Mode set to DISABLED, could we gain access.
    2. Changing the router's security mode setting to "WPA/WPA-2...." and entering a new min. 8 char passphrase, and then entering that same passphrase into the IPOD Touch, and restarting the router, did the trick!
    Based on this, and some info found in another posting, I can only conclude that the IPODs and IPHONES do not support WEP security mode in many generic routers used by thousands of consumers.  Hopefully, those same consumers can figure out how to change their wireless router setttings to WPA/WPA-2 security mode and ALSO get all their other wireless devices (PCs, laptops, WII boxes, ROKU boxes) all reconfigured to WPA mode, too.
    I THINK THE BOTTOM LINE HERE IS THAT THERE IS AN ISSUE THAT APPLE NEEDS TO ADDRESS WITH WEP COMPATIBILITY and it may also be the case that MOST CONSUMERS ARE USING WEP 64 BIT security on their home wireless routers?
    In any case, it's working now, so anyone who is having problems should try changing to WPA mode and post back here if it worked for them!

  • Using EFI password "full" security isn't working

    Hi,
    I'm trying to use the EFI Password Utility to prohibit any attempt to boot my MacBook Pro without the correct password.  I used the utility available on the MacBook Pro's supplied install DVD, and so far have successfully prevented the use of any keystrokes on boot without the correct password (ie. "command" mode).  However, I am unable to set the EFI to prohibit any attempt to boot.
    Apple documents in its, "Mac OS X: Security Configuration - For Mac OS X Version 10.6 Snow Leopard" PDF manual that,
    You can also configure EFI from the command line by using the nvram tool. […] 
    You can set the security mode to one of the following values:
         Full: This value requires a password to start up or restart your computer. It also requires a password to make changes to EFI.
    For example, to set the security-mode to full you would use the following command:
         $ sudo nvram security-mode=full
    I applied this setting, but it doesn't appear to be working.  The redacted output of "nvram -x -p" is as follows:
    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
    <plist version="1.0">
    <dict>
              <key>EFICapsule_Result</key>
              <data>
              REDACTED
              </data>
              <key>SmcFlasherResult</key>
              <data>
              REDACTED
              </data>
              <key>SystemAudioVolume</key>
              <data>
              REDACTED
              </data>
              <key>boot-image</key>
              <data>
              REDACTED
              </data>
              <key>efi-apple-payload0</key>
              <data>
              REDACTED
              </data>
              <key>efi-apple-payload0-data</key>
              <data>
              REDACTED
              </data>
              <key>efi-apple-recovery</key>
              <data>
              REDACTED
              </data>
              <key>efi-boot-device</key>
              <data>
              REDACTED
              </data>
              <key>efi-boot-device-data</key>
              <data>
              REDACTED
              </data>
              <key>gpu-policy</key>
              <data>
              REDACTED
              </data>
              <key>prev-lang:kbd</key>
              <data>
              REDACTED
              </data>
              <key>security-mode</key>
              <string>full</string>
    </dict>
    </plist>
    What makes it confusing is that Apple specifies later on the same page (56) that the the term passed to the "security-mode" option should be encased in quotes:
    # Secure startup by setting security-mode. Replace $mode-value with # "command" or "full."
         sudo nvram security-mode="$mode-value"
    So, assuming that I may have used the wrong version of the command, and thereby not applied the setting correctly, I deleted the "security-mode" key using:
    sudo nvram -d security-mode
    I then re-applied the setting using:
    sudo nvram security-mode=full
    because I was confident that, initially, I had used the version with quotes.  However, it's made no difference - booting the machine does not require entry of an EFI password.
    Oddly, the EFI still prevents the use of keystrokes (ie. "command" mode), so it's definitely functional; I just can't tell it to use "full" mode.  Also, I note that "security-mode" is the only key to have a "string" child not a "data" child - is this indicative of a problem?
    Any advice?

    I've got the same problem as OP but I'm not concerning myself with the physical security of my device--an entirely separate topic altogether.
    Essentially, I know that with physical access to a Mac box it's possible to enter single user mode and change the password. I also know there is a way to prevent that ability by changing the default login credentials I just don't remember the phrase of what I'm looking for. I know that I have a pdf on hardening snow leopard which probably has information on how to restrict password changes when in single user mode, but I can't find it.
    Here's some stuff that should at least get you started in the right direction:
    http://support.apple.com/kb/HT1352
    http://lists.apple.com/archives/fed-talk/2011/Feb/msg00022.html
    Definitely read:
    http://www.nsa.gov/ia/_files/factsheets/macosx_10_6_hardeningtips.pdf
    Depending how much time you want to spend on this, there's also a book by Charlie Miller called "Mac Hackers Handbook" that's worth the read--although I have yet to do completely so myself. I did get to see his talk at DefCon 2011 and it was pretty amazing- he developed a technique to essentially make a Mac laptop battery explode from a remote location-- although he never has actually done it for fear of...you know...actually destroying his computer. lol. The next time you hear a MacTard bragging about how OSX is a secure platform, be sure to bring that up. Also distinguish between viruses and malware in general the next time you talk to a genius about mac security- we recently discovered a rootkit on one of the Macs on our network.
    Back to the topic--If you're going to go through the effort of securing one aspect of your box, you mind as well keep going with it if you have legitimate reasons to worry about unauthorized access.
    Another awesome resource is the Electronic Frontier Foundation:
    https://www.eff.org
    https://ssd.eff.org/risk
    They have guides about nearly everything concerning online anonymity and/or security and they're really good about keeping it 'human readable' - ie understandable to the average user. I'll try to find that pdf and upload it if I do. Those other resources should point you in the right direction- if not explicitly answer your question. Let me know if you find anything too . Help me help you.
    <Edited by Host>

  • Can I use parted magic to secure erase Apple SSD?

    Recently, I have bought Apple SSD128GB (Toshiba HG3 serie) to upgrade my MBP 15" early 2011. It's a second hand drive of my friend so I want to do secure erase by using Parted Magic for improving the performance as factory reset. I have heard about Parted Magic that it will do secure erase by sending ATA command to drive's controller (If I'm not wrong) but some people mentioned OS X Lion has Trim support that needs not to do secure erase. Now I don't know which ones is correct answer and can I use Parted Magic to secure erase this drive. Please give me your ideas.

    I don't know, but I doubt it can be done using Disk Utility. I suggest you consult the user manual for it or see if there is a Reset option in the onscreen menues. If you don't have a manual, then you will find one at http://support.apple.com/manuals.

  • Is RDC integration with Lotus notes apps possible using CR XI and lotus 8

    Hi,
    We have reporting feature implemented in one of lotus notes application using crystal reports 6 (OCX)  and as Crystal report is going to be upgraded to CR XI version in my organisation, we need to implement the same using RDC component.
    Background (on how it has been implemented using CR 6 ) :-
    i) Lotusscript generate few CSV file and pick a .RPT file from profile doc and places it under one folder on local machin (say x).
    ii) RPT file is designed to pick data from CSV file using system DSN (data source).
    iii) Data source (system DSN) has been configured with folder (x) that contains CSV and RPT file .
    iv) Crystal report control object has been embedded in the lotus notes form and lotusscript code gets handle of control object and opens the  report (RPT)file .
    We have set up all neccesary environment and trying to implement above functionality using RDC component but when we are embedding the crstal report report viewer in a lotus notes form , it throws an error "An error has occured while processing a request on an object".
    Please let me know if it possible using RDC or can anyone suggest me some other alternatives .
    TIA

    Hello,
    You should be able to use the RDC in Lotus Notes. There are significant differences between the object model for the old OCX (crystl32.ocx) compared to the Report Designer Component (RDC) and it's components, the craxdrt.dll, crviewer.dll, etc.
    I was able to find an older document that shows how to integrate CR9 into Lotus Notes: "[Using the Report Designer Component (RDC) in Lotus Notes|http://www.sdn.sap.com/irj/boc/index?rid=/library/uuid/50ce64b3-241f-2b10-b792-9685d3815a21]". You can use this as a starting point to compare with your code.
    The RDC object model hasn't changed much since CR9, but some of the runtime component references in the document may need to be correct (e.g. craxdrt.dll for v11.x vs craxdrt9.dll for v9.x).
    It is worth noting that the RDC has been retired with the release of CR2008. CR XIR2 (v11.5) is the last version of Crystal Reports that uses the RDC. The suggested migration path is to move to the Crystal Reports .NET SDK. This means you'll have no upgrade path with a v11.x application.
    Sincerely,
    Dan Kelleher

  • Error : Access not possible using "null" objects reference

    Hello.
    i am working with a zbapi.
    i called a external email program in this bapi,everything is working fine over here.
    In webdynpro java they mapped my bapi and starting working from there.
    every functionality is working fine but regarding this email stuff it is showing an error as access not possible using null objects reference.
    where could be the possible error.
    is it in webdynpro or in abap side.

    Raghu,
    You are right. When it comes from the WD Java, may be you are not passing any value at all. You can trace it by these ways.
    1. Check it using SE37, make sure everyhting is fine.
    2. Print all the values that you are passing to the RFC in the execute RFC method().
    3. using ST05 transaction in R/3, enable RFC and SQL trace, check what is passing in between web dynpro and R/3.
    Moreover paste your error message here.
    Thanks,
    Raj.

  • How to use JAZN as a security provider

    Hello,
    I've got a J2EE application (ADF) which uses JAZN as the security mechanism. We're using BI Publisher in conjunction with this J2EE application.
    How can we reuse the JAZN mechanism within BI Publisher?
    Thanks in advance,
    Regards Leon Smiers

    Then you need to get an AT&T sim card to first activate the phone(the phone should have come with an AT&T sim installed)...you can borrow one to do this, but you can't do anything with any iPhone until it is first activated.

  • Is it possible using SQLite to collect data from an older SQL database?

    Is it possible using SQLite to collect data from an older SQL database? Where can I find a possible answer. Thanks in advance.

    There are 3rd-party tools (see comprehensive list at http://www.kenhamady.com/bookmarks.html) that provide extra pdf functionality on top of the pdf export from Crystal. 
    In the case of my Visual CUT software, you can use hidden formulas inside your Crystal report to generate form fields (pre-populated as well as empty) as part of the pdf export process.
    hth,
    ido

  • C++: Is it possible using callback function with ncacn_http and rpcproxy server ?

    I have a remote procedure and I can call it using http over rpc. I pass trough an rpc proxy server for arriving to my rpc server.
    But I cannot call a callback function to my client inside the server function.
    Is it possible using callback function with ncacn_http and rpcproxy server ?
    We are using IIS on windows server 2008 R2 and the server rpc and the client on the same PC with rpc rpoxy.
    If I use ncan_ip_tcp all works fine.
    Thanks
    Gianluca

    Hi,
    About the develop question please post to the MSDN forum.
    MSDN forum Developer Network
    http://social.msdn.microsoft.com/Forums/en-US/home?forum=WAVirtualMachinesVirtualNetwork&filter=alltypes&sort=lastpostdesc
    Thanks for your understanding and support.
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • Is multimapping is possible using abap map

    Hi,
      My scenario is to deal with 1:n message splitting.Is it possible using abap mapping instead Graphical mapping?
    Appreciate for your response.
    Regards,
    Daniel.LA

    Prateek,
    Could you please tell why it's not possible thru ABAP Mapping? I think it's possible thru ABAP mapping, plz correct me if i'm wrong. I agree that Multimapping is possible only for adapter that lies in J2EE Engine! Plz clarify.
    raj.

  • Is it possible use PPF to setting Auto Good Receive?

    Dear Experts,
    We met the problem in inbound process
    When we packing the product to Handling unit in Inbound Delivery ,then we want to EWM system can be auto Good Receive.
    Is it possible use PPF to setting Auto Good Receive?
    I have tried to use Full Pack then Auto Good Receive. but it doesn't work.
    Can anyone help us to solve this problem?

    Hi Howard
    Yes it is possible need to check action and execute with schedule condition when pack post GR.
    check action and there process and method in this tcode and copy and use when create ID from IDN.
    /nSPPFCADM
    this action with execute when IDN converts to ID and it will check line item is packed in HU. If yes then post GR.
    Regards
    Suraj

  • How to use iSight camera as security centre

    How to use iSight camera as security centre

    can you elaborate?
    security centre can be many things
    and most hardware and network setups would likely not work with usb webcams
    but again it really depend on what you mean by security centre

  • I just want know if is possible use the iphone's charge battery for the i-pod touch. Thank you!

    i just want know if is possible use the iphone's charge battery for the i-pod touch. Thank you!

    Using an  iPhone wall charger for the iPod is fine.  You can also use an iPhone cable for the iPod.
    The term " iphone's charge battery" is not really clear.

  • May i know what kind of leather used in making the iphone 5s casing?is there any possibility using pig skin?

    Subject:
    May i know what kind of leather used in making the iphone 5s casing?is there any possibility using pig skin?

    Actually, Apple does make an iPhone 5s case in leather, but they do not indicate what species the leather is from.
    http://store.apple.com/us/product/MF041LL/A/iphone-5s-case-brown?fnode=47
    There are number of other companies that make leather iPhone cases though - I've used numerous Sena leather sleeves and cases over the years although I've never inquired what species of leather they use.

Maybe you are looking for

  • How do I change the start up page for new tabs?

    I've tried looking through options but I can't seem to find anything related to it. Please help.

  • NLS_LENGTH_SEMANTICS and work tables in KMs

    Hi everybody, I'm working on an interface that uses a 11g-based workarea. A quick query on v$nls_parameters returns: NLS_CHARACTERSET: AL32UTF8 NLS_LENGTH_SEMANTICS: BYTE Because of this every time a km creates a "$" table, CHAR and VARCHAR2 column l

  • Flash Player 9 - OS X install problem

    I downloaded the latest version and am trying to install on my MacBook. OS is 10.5.2. After quitting Firefox and Safari I launched the installer, and it went fine until I reached "Items remaining to be installed: 4". It hung there with the blue-and-w

  • Delivery Date And Reference Field

    Hi All, SAP Business One 2007A PL 30. I just want to know if it is possible whilst in a Sales Order whether the delivery date can by default come in as the same date as the posting date.  I know it is simple enough to press a key and then tab but jus

  • Parts of Horizonal Navigation Bar Do Not Appear In the Browser???

    Hi, When I added 'Contact Us" to Horizontal Navitation Bar it appears in the browser. There is No Negative Offset. Cheers, Dreamer101.1