[ISE] EAP-chaining by using EAP-TLS internal authc for machine cert & user cert

Hi Guys,
I'm taking the EAP-chaining into our enterprise workspace authenticaiton, now i meet following issue:
my anyconnect make the network xml profile which decide the method of  eap-fast authencation ,both  the machine authc & user authc are use the cert.
Then i found that the client always knock the authoraztion policy about the machine authenticaiton(i set this policy result which is permit access), i believe the " EAP-fast result machine & user are passed " , even though its result using the dacl "permit all", but it doesn't knock the following policy.
and about the result of  machine authentication , i set the "permit access" , is it too loose? but i check the instance and cisco document , everyone told me that this policy rusult " permit access".
it would be appreciated that anyone can help this issue.
lately i will upload my policy and live authencation pic catch. Thanks.

http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/howto_80_eapchaining_deployment.pdf
Just change the authentication policy to allow the methods you want to use under eap-fast (eap-chaining) and use the same ones in your nam client configuration settings.

Similar Messages

  • EAP-TLS machine and user cert or both

    If I use machine and user certificates does that mean the machine get's an IP address, authenticates, the user then logs on which causes another DHCP renew and user authentication?  Is it better to use machine and user or just machine?

    It depends on your needs and applications, the advantage of also using machine authentication is that the machine connects, authenticates and is on the wireless network irrelevant of whether a user has logged in, which means you can remote access or monitor the machine at that point. I know alot of facilities that do it that way because they manage the machines with things like SMS, etc..   Without machine authentication the computer won't attach to the wireless until a user physically logs into the machine at which point it pass authentication.
    personally I like the machine authentication that way you can push updates and other things to the machines without having to either send a person to the machine to login or waiting for a user to login so that you can access the machine, it just needs to be on.
    in short machine authentication replicates being hardwired to the network.
    Hope this helps...  please rate useful posts.
    Thanks,
    Kayle

  • Using the SATA internal connection for an external SATA RAID drive

    DP2G G5
    THis RAID case:
    http://wiebetech.com/products/rt5.php
    has an SATA interface on it. Can I snake the internal cable outside somehow & plug it into this case? I can't spare a PCI slot for an SATA card. If not I'll just use the FW800, but it'd be cool to have SATA speeds.
    DP2G G5   Mac OS X (10.4.5)  

    THis RAID case:
    http://wiebetech.com/products/rt5.php
    has an SATA interface on it. Can I snake the
    internal cable outside somehow & plug it into this
    case? I can't spare a PCI slot for an SATA card.
    If
    not I'll just use the FW800, but it'd be cool to
    have
    SATA speeds.
    DP2G G5
    Mac OS X (10.4.5)
    Why would you want to spend $1700 on a SATA enclosure
    and then be "cheap" on the SATA host adapter to run
    it? This expensive 5 bay uses FW800 or SATA. Why not
    use FW800 if you don't have a SATA host adapter.
    I'm not trying to be cheap here. As I said, I have no PCI slots available. I use Pro Tools HD3 & all my slots are full. I will use FW800 if needed, but speed of SATA would be great.
    WiebeTech has a $59 SATA card with one port or
    FirmTek has a two port for $99 or a 4 port for
    $139.95. Get a external SATA host adapter with direct
    connect capability for this enclosure. Or if that is
    too much get a 5 bay Fusion 500P for $500 and a
    separate card. If you have a new PowerMac G5 made
    after Oct 2005 then no PCI slots are available and
    you will need the Sonnet PCIe Tempo E4P:
    http://www.amug.org/amug-web/html/amug/reviews/article
    s/sonnet/e4p/
    Have fun!
    DP2G G5 Mac OS X (10.4.5)

  • How best use the four internal disks for user folder?

    Hi everyone
    With the addition of a new boot disk in the second optical bay i wish to restructure my user folder. It has so far lived on one drive which i have backed up every day to one of the other internals (i also have external backups). One reason i have installed a new boot disk in the optical bay is that i have run out of space on the user folder drive (and its backup drive).
    I am now wondering how i should set up the four internals if i want to use all of them for the user folder and an internal backup. Performance is an important consideration for me.
    I know raid setups are not backups but given that i also have external backup could i use, for instance, raid 1 or 1+0 to mimic the current two-disk setup? Which would be preferable and are there other alternative (such as having some subfolders of the user folder, like photos and documents, on one disk and the rest of the subfolders on another disk)?
    Thanks for your help
    /p

    I said forget those fancy software 0+1 or 10; they aren't supported, have high overhead, and you need 4 drives of same and would still not have enough space. Why bring it up again, it's still no in my book and from trouble it can be.
    I'm not even a fan of Apple mirror arrays. they are fine for where 24/7 and live audio recording and to protect from the rare drive failure is all. And then I use SoftRAID.com ($149).
    Full to me means less than 20% free. Though I tend to keep drives closer to 35-40% free. Less than 10-15% or less than 10-20GB can be hazardous.
    Don't put scratch on boot drive. Get more RAM, have another drive or two for scratch if necessary unless it doesn't impact you. It should though. Spotlight can get in the way, needs to be disabled so having a dedicated volume on another drive has always worked best.

  • Use one account or multiple for 10 domain users of Office 2013 Home & Business

    I have 10 seats of the retail version of Office Home & Business 2013 for use in a domain environment. Windows 7 Pro 64, Server 2008R2 environment. No exchange. Blank slate.
    Should I install all with the same account for ease of management, or setup a new MS Live account for each user? Can I do either, and what are the advantages to each?
    Thank you.

    Hi,
    Both are ok, but neither is really good.
    In your scenario, I suggest you use Office 365 to manage all these, which is more recommended:
    http://office.microsoft.com/en-001/business/compare-office-365-for-business-plans-FX102918419.aspx
    http://office.microsoft.com/en-001/business/compare-all-office-365-for-business-plans-FX104051403.aspx
    Regards,
    Melon Chen
    TechNet Community Support

  • How to use the same Windows-Profile for over 700 Users?

    Dear admins,
    i´d like to use one (1!) shared windows profile to serv over 700 user-accounts in our school. But there is a little complication in the WGM.
    I just tried to check all users and entered the path of the shared profile right in the windows tab.
    For example \\Server\Profiles\oneforallprofile
    Unfortunately the WGM put the user´s shortname behind this path.
    For example: \\Server\Profiles\oneforallprofile\mistersmith
    or \\Server\Profiles\oneforallprofile\sallymiller and so on.
    By changing this preference one by one it works, but of course i need a solution to do that for all users.
    Does anyone know how to set one Profile for all students?
    Thanks for your help!
    Rolf
    XServe G5   Mac OS X (10.4.5)   Educational System Administrator

    Hello Prasad,
    Most likely the user km_admin still has system principal roles assigned, even though you removed the Super Admin role, you should check that this user doesn't have any other admin roles, otherwise it will be considered a System Principal user and will therefore still have access to all content. For more information see http://help.sap.com/saphelp_nw70/helpdata/en/19/56f28fbd4e11d5993b00508b6b8b11/frameset.htm
    Try creating a new user with just read access to the content and you should see that it will not be able to make any changes etc.
    Regards,
    Lorcan.

  • ISE:Doubt on eap-chaining

    Hello guys,
    I would like to use eap-chaining for my ISE deployment so host and user name can be send, chained and authenticated so i only allow full access to corporate devices and users. The thing is i am not using EAP-TLS, no user certificate... Eap chaining depends of eap-fast to work?? Didnt understand that part.
    What can I do to still use the eap chaining without having eap-tls deployment?
    Thanks!!
    Emilio

    Hi Emillo,
    Yes EAP-Chaining uses EAP-FASTv2 and doesnt require certificates.
    For details on how to setup EAP-Chaining, refer this how-to-guide :
    http://www.cisco.com/en/US/solutions/collateral/ns340/ns414/ns742/ns744/docs/howto_80_eapchaining_deployment.pdf
    The profile editor mentioned in the guide can be downloaded from here:
    http://software.cisco.com/download/release.html?mdfid=283000185&softwareid=282364313&release=3.1.03103
    Refer this video on ciscolive365 for details on its functionality (need to register a free account) :
    https://www.ciscolive365.com/connect/sessionDetail.ww?SESSION_ID=6039&backBtn=true
    HTH
    -Hari

  • EAP Chaining with Machine TLS and User PEAP

    We are deploying an ISE based .1x. The design is to use eap-tls for machine and eap-peap for user. Apparently EAP-Chaining is recommended, but can anyone confirm if we can do chaining based on machine TLS and user PEAP. I have done some investigation and could not find any supporting document, but not any document saying not supporting either. Looking at Anyconnect profile editor, it does not look like this configuration is supported. Has anyone done this before?
    Thanks a lot.

    http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/howto_80_eapchaining_deployment.pdf
    Just change the authentication policy to allow the methods you want to use under eap-fast (eap-chaining) and use the same ones in your nam client configuration settings.

  • ISE Certificate Chain Not Trusted By WLAN Clients

    We are running ISE 1.1.3 using Entrust cert signed by Entrust sub CA L1C, which is signed by Entrust.net 2048, which is in all major OS stores as trusted (Windows, Android, iOS).
    We have installed a concatenated PEM file with all of the certificates from the chain, as described in the ISE User Guides. The ISE GUI shows all of the certs in the chain individually after the import (i.e. the chain works and is good). However, we are not sure if the ISE is sending the entire chain to the WLAN clients during EAP authentication or just the ISE cert because of the error message we get on ALL client types which state that the certifiicate is not trusted.
    So the question is if the ISE is really sending the whole chain or just its own cert with out the rest of the certs in the chain (which would explain why the WLAN clients complain about the certificate trust.)
    Anyone out there know if the ISE code is not up to sending the cert chain in version 1.1.3 yet or if there is some other explanation? Screenshot attached of iPhone prompting for cert verification.

    Thanks hardiklodhia, your post confirms what we are seeing - the Windows clients have no issue as long as they are set to either NOT validate the EAP server cert or they are set to trust the signing CA cert from the local store by specifically selecting the signing CA (i.e. tick next to "Validate Serverr Certificate" and then another tick next to the signing CA cert in the box below.)
    The iOS clients ALWAYS prompt for verification (thanks Apple.)
    Note: we are using 1.1.3 and the cert chain import using a concatenated PEM file with ALL of the certs in the chain works fine. We are seeing the whole chain on the clients and the ISE extracts each PEM file into its local store.
    The PEM file format is not adequately described in the user guides rather a vague description of cert order is provided.
    The file should look like this:
    -------------------------Top of page-----------------------------
    Root CA PEM FILE
    Intermediate CA 1 PEM FILE
    Intermediate CA 2 PEM FILE
    ETC
    ISE CERT PEM FILE
    ------------------------Bottom of page-------------------------
    By "PEM FILE" I mean the actual base64 encoded PEM output from openssl when you convert a .crt or .der file to PEM, including the words "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----" for each PEM FILE above,
    e.g.
    -----BEGIN CERTIFICATE-----
    MIIE2DCCBEGgAwIBAgIEN0rSQzANBgkqhkiG9w0BAQUFADCBwzELMAkGA1UEBhMC
    VVMxFDASBgNVBAoTC0VudHJ1c3QubmV0MTswOQYDVQQLEzJ3d3cuZW50cnVzdC5u
    ZXQvQ1BTIGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMc
    KGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDE6MDgGA1UEAxMxRW50cnVzdC5u
    ZXQgU2VjdXJlIFNlcnZlciBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw05OTA1
    MjUxNjA5NDBaFw0xOTA1MjUxNjM5NDBaMIHDMQswCQYDVQQGEwJVUzEUMBIGA1UE
    ChMLRW50cnVzdC5uZXQxOzA5BgNVBAsTMnd3dy5lbnRydXN0Lm5ldC9DUFMgaW5j
    MAwGA1UdEwQFMAMBAf8wGQYJKoZIhvZ9B0EABAwwChsEVjQuMAMCBJAwDQYJKoZI
    hvcNAQEFBQADgYEAkNwwAvpkdMKnCqV8IY00F6j7Rw7/JXyNEwr75Ji174z4xRAN
    95K+8cPV1ZVqBLssziY2ZcgxxufuP+NXdYR6Ee9GTxj005i7qIcyunL2POI9n9cd
    2cNgQ4xYDiKWL2KjLB+6rQXvqzJ4h6BUcxm1XAX5Uj5tLUUL9wqT6u0G+bI=
    -----END CERTIFICATE-----
    -----BEGIN CERTIFICATE-----
    MIIEnzCCBAigAwIBAgIERp6RGjANBgkqhkiG9w0BAQUFADCBwzELMAkGA1UEBhMC
    VVMxFDASBgNVBAoTC0VudHJ1c3QubmV0MTswOQYDVQQLEzJ3d3cuZW50cnVzdC5u
    ZXQvQ1BTIGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxpYWIuKTElMCMGA1UECxMc
    VeSB0RGAvtiJuQijMfmhJAkWuXAwHwYDVR0jBBgwFoAU8BdiE1U9s/8KAGv7UISX
    8+1i0BowGQYJKoZIhvZ9B0EABAwwChsEVjcuMQMCAIEwDQYJKoZIhvcNAQEFBQAD
    gYEAj2WiMI4mq4rsNRaY6QPwjRdfvExsAvZ0UuDCxh/O8qYRDKixDk2Ei3E277M1
    RfPB+JbFi1WkzGuDFiAy2r77r5u3n+F+hJ+ePFCnP1zCvouGuAiS7vhCKw0T43aF
    SApKv9ClOwqwVLht4wj5NI0LjosSzBcaM4eVyJ4K3FBTF3s=
    -----END CERTIFICATE-----
    -----BEGIN CERTIFICATE-----
    MIIE9TCCA92gAwIBAgIETA6MOTANBgkqhkiG9w0BAQUFADCBtDEUMBIGA1UEChML
    RW50cnVzdC5uZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9DUFNfMjA0OCBp
    bmNvcnAuIGJ5IHJlZi4gKGxpbWl0cyBsaWFiLikxJTAjBgNVBAsTHChjKSAxOTk5
    IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNVBAMTKkVudHJ1c3QubmV0IENlcnRp
    EN551lZqpHgUSdl87TBeaeptJEZaiDQ9JifPaUGEHATaGTgu24lBOX5lH51aOszh
    DEw3oc5gk6i1jMo/uitdTBuBiXrKNjCc/4Tj/jrx93lxybXTMwPKd86wuinSNF1z
    /6T98iW4NUV5eh+Xrsm+CmiEmXQ5qE56JvXN3iXiN4VlB6fKxQW3EzgNLfBtGc7e
    mWEn7kVuxzn/9sWL4Mt8ih7VegcxKlJcOlAZOKlE+jyoz+95nWrZ5S6hjyko1+yq
    wfsm5p9GJKaxB825DOgNghYAHZaS/KYIoA==
    -----END CERTIFICATE-----
    -----BEGIN CERTIFICATE-----
    MIIFKjCCBBKgAwIBAgIETB9GEzANBgkqhkiG9w0BAQUFADCBsTELMAkGA1UEBhMC
    VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xOTA3BgNVBAsTMHd3dy5lbnRydXN0
    Lm5ldC9ycGEgaXMgaW5jb3Jwb3JhdGVkIGJ5IHJlZmVyZW5jZTEfMB0GA1UECxMW
    KGMpIDIwMDkgRW50cnVzdCwgSW5jLjEuMCwGA1UEAxMlRW50cnVzdCBDZXJ0aWZp
    yhHR/hYfdVM88hBXXypACgrxBv/JFlKzSEDwKydJeT1tcP//nG4jv1WWgLk6O2Mi
    0oE0fnGmuf9fTX4+CdapG2gTDFJ29Chv3kavJDNtB85A7CK8oWI8Qav78Rvaz7nA
    LiRMLBQ1RkqUrQFL2WHx4mJkCddPXzOeOVJlUTGJ
    -----END CERTIFICATE-----
    The last PEM output (the one directly above) is the ISE cert in PEM format. The first PEM output (the one at the top) is the Root CA cert in PEM format. The ones in the middle are intermediate signing CAs in order (from root to leaf).

  • Machine and User authentication with ISE 1.2.1

    Hi ,
    Can any one tell me in machine authentication what access need to be enable DACL for machine logon?
    Can we enable the access on port level ? direct to tcp/udp or ip level what is the best practice.
    Thanks 
    Pranav

    is this what you are looking for EAP Chaining which uses a machine certificate or a machine username / password locked to the device through the Microsoft domain enrollment process. When the device boots, it is authenticated to the network using 802.1X. When the user logs onto the device, the session information from the machine authentication and the user credentials are sent up to the network as part of the same user authentication. The combination of the two indicates that the device belongs to the corporation and the user is an employee.
    http://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zone-security/howto_80_eapchaining_deployment.pdf

  • Apple macosx machine authentication with ISE using EAP-TLS

    Hello,
    On a ongoing setup we are using eap-tls authentication with account validation against AD. We have our own CA (microsoft based). ISE version 1.2.1 patch 1.
    With windows machines all is working well. We are using computer authentication only.
    Now the problem is that we wish to do the same with MAC OSX machines.
    We are using casper software suite and are able to push certificates into macosx, and are doing machine authentication.
    in ISE the certificate authentication profile is being set to look at the subject alternative name - DNS name of the machines. Whenever we set it to the UPN (hostname$) windows accounts are not found in ad.
    When MAC OSX authenticate as machines (they have a computer account in AD) they present themselves with RADIUS-Username = hostname$ instead of host/hostname.
    The consequence is that by lacking the host/, ISE considers that this is a user authentication, instead of a computer one, and when it sets off to find the account, it searches in User class instead of Computer - which obviously returns no results.
    Is anybody aware of any way to force MAC OSX to present a host/hostname RADIUS-Username when authenticating?
    Any similar experiences of authenticating MAC OSX with ISE and machine/computer authentication are welcome.
    Thanks
    Gustavo Novais

    Additional information from the above question.
    I have the following setup;
    ACS 3.2(3) built 11 appliance
    -Cisco AP1200 wireless access point
    -Novell NDS to be used as an external database
    -Windows 2003 enterprise with standalone Certificate Authorithy Services Installed
    -Windows XP SP2 Client
    My Goal is to use Windows XP Native Wlan Utility to connect to AP using EAP-TLS authentication against Novell NDS.
    Tried to connect using Cisco compatible wlaN utility and authenticate using EAP-GTC against Novell NDS for for users, it works fine and perfectly.
    When connecting using EAP-TLS, I am getting an error from ACS failed attempt "Auth type Not supported by External DB". But in the ACS documentation says that it supports EAP-TLS. How true is this? Is there anybody have the same problem? Do I need to upgrade my ACS? What should I do? What other authentication type could be used to utilize native WinXP Wlan Utility?
    Please help...
    Thanks

  • ISE 1.2 / WLC 5508 EAP-TLS expired certificate error, but wireless still working

    Hi I have a customer that we've deployed ISE 1.2 and WLC 5508s at.  Customer is using EAP-TLS with and everything appears to setup properly.  Users are able to login to the network and authenticate, however, frequently, I'm getting the following error in ISE authentication logs:
    12516 EAP-TLS failed SSL/TLS handshake because of an expired certificate in the client certificates chain
    OpenSSL messages are:
    SSL alert: code=Ox22D=557 : source=local ; type=fatal : message="X509
    certificate ex pi red"'
    4 727850450.3616:error.140890B2: SS L
    rOYbne s: SSL 3_  G ET _CL IE NT  _CE RT IF ICAT E:no ce rtific ate
    relurned: s3_ srvr.c: 272 0
    I'm not sure if this is cosmetic or if this is something that I should be tracking down.  System isn't in full production yet, but every client seems to be working and there is no expired cert in the chain.  Any ideas what to check?

    Hello Dino,
      thanks very much for your reply.
      The client uses a machine-certificate, the PKI is not a microsoft one, but a third party PKI.   The certificate is fresh and valid, the root-cert is installed and checked to be validated against it for the login.
    Clock is correct too. The same setup works flawlessly in Windows 7 and XP.
    EKU is set on the certificate (1.3.6.1.5.5.7.3.2)
    I suspect the cert-setup itself, but don't get a clue where this might stuck...
    Björn

  • ISE Provisioning Issues - Public Certificate & EAP-TLS

    Anyone run into the issues similar to the below?:
    Public Certificate bound for HTTPS
    Internal AD Certificate Bound for EAP
    Issue is SPW or Native Supplicant will be provisioned with Root CA of Public Cert then SCEP enrolls EAP-TLS with Internal CA however as client device (ipad/iphone/android) doesnt get the Internal Root CA provisioned they will fail EAP-TLS communication
    Running ISE 1.1.2 patch2, 2 node-cluster
    Guest Portal being used for Provisioning if AD credentials passed
    Works a treat if i bind both https & eap on the Internal identity ceritficate (only issue then is Guests/BYOD devices get Certificate Warnings on the portal)
    Cheers
    Kam

    the process doesnt fail as such for the onboarding/provisioning on the iphone, however the when entering domain credentials to the guest portal which intiates the onboarding/provisioning process, i notice the root CA certificate is prompted to be installed on the iphone is that of the public certificate instead of the internal root CA, the rest of the user certificate and scep process properly completes however as the root CA for the internal CA wasnt installed i get warnings when connect to our dot1x eap-tls SSID.
    On other devices this process fails which i can only assume is down to the lack of internal root CA cert
    so as per the above im pretty much following this (differentiated access via certificates) :
    http://www.cisco.com/en/US/solutions/collateral/ns340/ns414/ns742/ns744/docs/howto_60_byod_certificates.pdf
    however my setup is slighlty different as the EAP & HTTPS indentity certificate is not the internal, i have installed a public cert for HTTPS to remove certificate warnings on guest portal (as BYOD devices and guests will only have non-domain machines thus a public cert removes the certificate warnings)
    does that clarify anymore?
    Cheers
    Kam

  • ISE 1.1.1 - EAP-TLS / User Cert - Determine if corporate laptop?

    Greets. Is there a way to determine if the machine a user has authenticated from via EAP-TLS / user cert (or PEAP / mschapV2) is an active directory computer or not. I understand that EAP-Chaining using EAP-FAST and the Anyconnect client would work for this, but what about using the native windows supplicant and a user cert (or PEAP / mschapv2)?
    Long story short, what I'd like to do is: 
    User authenticates to ISE via EAP-TLS / user cert (or PEAP / mschapV2)
    Authorization based on whether it's a personally owned device or a corporate laptop (different AuthZ rule/ACL's based on this)
    personally owned devices only allowed to do ICA,
    corporate device can use SQL, RDP, etc...
    Thoughts, ideas?

    Not sure i understand your response, or perhaps my original question isn't clear.
    User authenticates with EAP-TLS / User cert
    User is authorized based on user cert CN Name, Active Directory lookup, group membership matched, and proper ACL applied
    Unable to determine if the machine that the user is authenticating from is an active directory computer or not which would need to be determine in order to allow further ACL refinement (permit/deny certain protocol's based on if it is a personally owned device or a domained device, etc...).
    My question is, is it possible to do this using the native windows suplicant and EAP-TLS / user? I am only able to look up details based on the user cert (since this is what the supplicant is using), and not sure how to validate the PC as being a member of the domain or not (since the machine cert wasn't used in EAP-TLS).

  • ISE 1.2 - MAR cache with PEAP vs EAP Chaining

    Does EAP chaining with EAP-FAST v2 and NAM 3.1 present the machine certificate for authentication during each connection to wireless?  It's not still tied to the windows log in event as with PEAP?
    I found this article, but would like to see if anyone has experience working with EAP chaining in ISE.
    https://tswireless.wordpress.com/2012/09/22/cisco-ise-machine-authentication-cache/

    Yes if you set up NAM for EAP-Chaining - Machine and User, and then select EAP-TLS w/cert, nam will send both when a user logs in. When the machine is booting only the machine identity will be sent (because we don't know the users identity before they have attempted to log in).

Maybe you are looking for

  • Fingerhut??

    So I applied to their fresh start program. And before accepting it I have been doing some reading. Consumer affairs has hundreds of bad reviews stating they will report late payments even if you are on time and such. Anyone have any experience with t

  • SAP HR - Qualification (IT 0024) - how to get them?

    Hi Gurus, I'm starting to work on SAP HR and i'm finding some difficulties with infotypes. My main problem, at the moments, are Qualifications (infotype 24). I need to read all the qualifications for a Personnel number i got from input. I think that

  • Updating values from OPC server on startup

    I'm using LabVIEW to create a screen to display data from an OPC server (KepSERVER). I've been using standard indicators and have been linking them to the OPC server with the Datasocket system. The system works well for rapidly updating values. The i

  • Query after insert

    Hi All Does anyone know how to make a form do a query just after a commit? Any help would be appreciated. Regards Herman

  • Vector does NOT implement Serializable

    Hi : can anyone think of a reason why Vector does not implement Serializable? Suppose, I want to send a Vector of TimingResults accross a dataStream, now TimingResult is a class that I created which does implement Serializable, yet I am getting erron