Levels of security
Hi,
I have a confusion in levels of security.
how many types it was?
Anyone please help.
Thanks,
Lakshmipathi.
Hi,
In Object level security u have to restrict users to access Dashboards, Pages/Tabs and Sections.
Dashboard Restriction :*
Dashboard -> Settings-> Administration-> Manage Interactive Dashboard -> it will show the list dashboards and click on permissions specify the security for each user.
Pages/Tabs Restriction :*
Dashboard -> Settings-> Administration-> Manage Interactive Dashboard -> it will show the list dashboards and click on Properties of particular dashboard
-> it will show list of pages available on that dashboard -> click on permissions specify the security for each user.
Section Restriction :*
Dashboard -> Page Options -> Edit Dashboard -> go to section Properties -> Permissions -> add users or specify the explicit access for users...
Cheers,
Aravind
Similar Messages
-
Hi,
Wondering why "<plug-in name> does not support the highest level of security for Safari plug-ins" appear for some plugins in Safari > Security > "Manage Website Settings"?
Have been trying to get to the root cause of the problem but did not find much on this. I am trying to figure out what can get the warning to go away completely than using the Allow/Always Allow options for the plug-in
Thanks,
ShyamHi Linc,
Thank you for your response. Here is the screenshot of the warning that I am talking about.
Here is what I do:
1. Launch Safari and open its Preferences. I have Safari 7.1 installed on my machine.
2. Click Security Tab and click Manage WebSite Settings
3. A window opens showing me all the Plug-ins that I have (listed on the left hand side).
4. One of them is the Adobe Reader plug-in. When I click Adobe Reader, the following details about the plug-in show up on the right
I was referring to the highlighted section that warns me about this plug-in not using the highest level of security for Safari Plug-ins.
Note: I do not see this for all my plug-ins (QuickTime, Adobe Flash Player don't give me this warning) which tells me that there is a way to make the warning go away.
Thanks again,
Shyam -
Sugestion for a higher level of security in APEX
I have noticed that APEX's developer interface supports page groups but you cannot use page groups to manage security. In most of the programs I build, it would be very useful to be able to blanket apply security settings over a group of settings in one location rather than having to go to each page. Example, I have a program where you have to be in a database table to be able to access a large part of it. I would like to be able to go one place group those pages together and then set an authorization scheme and or conditions that would apply to every page in that group and not just a single page. I would also to not just have this set the page level security but retain the ability to tighten up the security to fine tune the access to individual pages in the page grouping if required. I have many cases where I really need a compound security setup where multiple authorization schemes are checked. I know I can build new schemes but it would be more efficient to be able to layer them to form my security setup from lower levels of security (designed to cover a general group of pages) to strongest (designed to be applied to one or more specific pages) in a way where their effects would compound and you would need to pass each of them in order to be authorized to view the page.
I don't know if this is practical but its just a thought for the future.Actually... yes, that is 1 of the 2 reasons I posted here.
Reason 1: That those that have the administrative and moderation access in this forum, also has access to the account information of the members that have signed up here. Which pretty much every forum software package grants the rights to those of the administrative/moderator staff. Or at least at a minimum could reply to the post, with the information that I am seeking.
Reason 2: This is a discussion forum, and I thought... people come here to help one another. And as I listed before, we tried the LEGAL contact page on Apple.com, no luck there. We tried going via iPhone developer program information contacts... dead end. And our legal contacts did in fact try to reach out to contacts that we also did have on file... and those also ended up in a dead end.
So excuse me for using yet another avenue of communicating with Apple and people who may also have or are going through the same situation.
As for the sarcastic replies... I know exactly why I am getting them, and hence why I returned them. I am absolutely no stranger to the anonymous world of discussion forums. But if you want to continue thinking that everything is just like slicing a piece of apple pie, and serving...
Then you seriously underestimating the complexity of issues like this.
All I did was come here to ask for some assistance when every known avenue has turned up to be a dead end. I thank the person that provided at least another avenue, that may lead to proper solution.
Grouch Marx was an interesting character. Last I checked, this wasn't a club. Or maybe it is, and you only want to keep to your own and forget the thousands if not magnitudes more of people that are just looking for a simple answer to a problem. -
I have and iphone 6 with iOS 8.1. My contacts and whats app messages are shown on my sister's iphone! She have iPhone 6 and and iOS as well. How can I secure my iphone and have a high level of security and privacy! Her Contacts are shown in my iphone as well! Setting in mac and iphone are a bit presice and sensitive. Is there any way to solve my issue and increase the safety, security and privacy in my iPhone and its data?
Your problem is that she used your icloud ID to connect to icloud and thus had all your data synced to her device. Contacts are not saved in a backup to icloud, since they are stored independently in the Contacts section of icloud. If someone deletes them, they are gone. If you had them on the PC would they be available in some backup you frequently make of the PC?
-
Level of security in PDFs?
What level of security is there in PDF files? My company has
asked me to create PDFs with interactive forms that would submit to
either a database or an email address (I'm not sure about this yet
because I don't know what PDFs are capable of submitting TO).
I am familiar with the typical 128 bit encryption SSL on web
pages, but I have no idea what type(s) of security is available in
PDF files. My company wants to have customers download PDFs from
our website, fill them out, and click a submit button to have the
data sent to us. The data would be highly sensitive data like
names, social sec numbers, etc.
Any thoughts or help are appreciated :)Thank you for your post. These forums are specific to the
Acrobat.com website and its set of hosted services, and do not
cover the Acrobat family of desktop products. Please visit the
following forums for any questions related to the Acrobat family of
desktop products:
http://www.adobeforums.com/cgi-bin/webx/.3bbeda8b/
Note: Acrobat supports numerous forms of encryption ranging
from 40-bit RC4 to 128-bit AES, and as of Acrobat 9 supports
256-bit AES as well. -
Level of security is there in PDF files?
What level of security is there in PDF files? My company has asked me to create PDFs with interactive forms that would submit to either a database or an email address (I'm not sure about this yet because I don't know what PDFs are capable of submitting TO).
I am familiar with the typical 128 bit encryption SSL on web pages, but I have no idea what type(s) of security is available in PDF files. My company wants to have customers download PDFs from our website, fill them out, and click a submit button to have the data sent to us. The data would be highly sensitive data like names, social sec numbers, etc.
Any thoughts or help are appreciated :)Hello
I have exactly the same requirement where in users download the PDF from our public website and fill out the form and Submit it directly to HTTPS server (that is hosting the servlet). The PDF will have have an "Owner" password with acrobat 7 compatibility and 128 bit AES encrpytion.
I have 3 questions mainly:
1. During the data transfer from user's desktop to the servlet, is the data encrypted. If so, what level of encryption.
2. If in the above case, user opens the form from within the browser, Is the browser handling the encryption or the the PDF?
3. If user stores the form they filled out, is the data stored as encrypted. If it is, how would the user who wishes to see this form decrypt it?
Appreciate your quick response. -
Multi-level password security in sap portal
Hi Experts,
We have a requirement to implement Multi level password security in SAP Portal. i was looking for any expert who can share their experience how this can be achieved and skills,time and effort required for this one.
In one of the sdn discussion i have seen that some body tried to implement Digital certificates (X.509) AND uid/pw , i am not sure if there were successful.
Your help in this regard, Really appreciated.
Thanks
Chris.
Edited by: chris n on Aug 26, 2009 10:14 PMHi Michael
Thanks for the help link.I am a novice wrt IdM concept ,so these queries.
We have 2 portals and 2 ECC installation configured with IdM.User accesses everything through portal.
My queries are :
If the user chages its password on one portal then can same be provisioned across the entire landscape?
How can we achieve it and where should we define our security policy?
regards -
Why are Symmetric keys shorter than ASyemmetric keys and provide the same level of security.
Hello
Can someone please help me with the following question.
Can someone please give me a brief (if possible) why Symmetric Keys which are much shorter than Asymmetric keys provide a similar level of security (e.g. take as long to crack).
I understand RSA and can to the math with a piece of paper and the Windows advanced calculator (e.g. encrypt and decrypt a sort message using a couple of small prims likes 53 and 59).
I also understand ( to a very basic level) AES e.g. 128bit block cypher (I believe a CBC cypher using an unpredictable IV)
Is there a simple answer if someone says why are Symmetric keys shorted and just as secure or it is just how it is? due to the different math?
Thank you
AAnoterUser__
AAnotherUser__Symmetric Key is used for same key for encrypsion & decryption but ASyemmetric key is used two keys (Public & private key) for
encrysion & decryption.
ASyemmetric
1. If Public key is used for encrypsion then private key is used for decryption
2. If private key is is used for encrypsion then public key is used for decryption.
3. It is more secure than Syemmetric
Regards,
Biswajit
MCTS, MCP 2003,MCSA 2003, MCSA:M 2003, CCNA, Enterprise Admin, ITIL F 2011
Blog:
Script Gallary:
LinkedIn:
Note: Disclaimer: This posting is provided & with no warranties or guarantees and confers no rights.. -
Whats level of secure have apex 3.0/3.1 on the web?
Hi all,
before build some web applications, need to know which
level of secure have apex on the web.
I was notice security settings as AUTHORISATION SCHEME (no, admin or guest)
and AUTENTIFICATION (not public or public)
Whats level of security have any pages whith NON PUBLIC settings for users?
Is any SSL sertificate related with apex?
thanks in advance
Gordan,Joel,
I think that is exactly the problem. When I am am trying to do an installation, I need an end-to-end discussion of the task for the OS and version I am installing on. In looking through the forum, you can see many examples of people trying to configure an embedded PL/SQL gateway on 10g, editing httpd.conf, dads,conf or marvel.conf for the wrong version. I realize their may be a dozen or more scenarios, but the most common (like installing the entire bit on a network disconnected Windows laptop) should be covered end-to-end.
In addition the scenario of installing a 10g HTTP server from the companion CD is not covered.
Finally, it is completely unclear that the little "/" is needed at the end when defining the /i/ alias. Looks like just part of a UNIX file convention. No Windows example.
Warren -
How to set up row-level data security in BO XI r2
I need to get Data/Row level security into my BO XI r2 report.
A logged in user should be able to view info on pertaining to him without refreshing it.
how do i incorporate this feature into my report?
its possible to do this by setting a filter using the currentuser() function.
however it requires a refresh of the report.
hence the new user shall be able to view the data of the previous user. i need to enforce more security on the data. How do i do this???Hi Anamika, here is a sample of what the cv_security view might look like:
create or replace view cv_security
as
select distinct sec."gid", sec."uid", sec."from", sec."to"
from
-- All users where NO LIMITS APPLY (sg.group = 1)
(select distinct
sg.group_id as "gid",
sg.user as "uid",
'----' as "from",
'ZZZZ' as "to"
from dual sr, sec_groups sg, sec_users su
where su.user(+) = sg.user
and su.status = 1
and sg.coding = 'GL'
and sg.group = 1
union all
--All users with specified sec_ranges
select distinct
sg.group_id as "gid",
sg.user as "uid",
case when sr.from is NULL
then ' '
else sr.from
end as "from",
case when sr.to is NULL
then ' '
else sr.to
end as "to"
from sec_ranges sr, sec_groups sg. sec_users su
where su.user(+) = sg.user
and su.status = 1
and sg.coding = 'GL'
and sg.group_id(+) = sr.group_id) sec
grant select on cv_security to ROLENAME
Notes about cv_security:
1) For those users with NO LIMITS APPLY (i.e. Admin staff) hard code an absolute range of RC codes from '----' to 'ZZZZ' to ensure you trap all possible alpha-numeric values.
2) For those users with NO LIMITS APPLY (i.e. Admin staff) substitute the sec_ranges table with dual
3) su.status = 1 to a filter to report on only active users
4) sg.coding = 'GL' is assessing the General Ledger coding dimension of the multi-dimensioned security matrix of our Financial system (this may not apply to you)
Responses to your questions:
Q- Does it involve self join between view cv_secured_detail? A- Yes, the 1:N cardinality is a self join between view cv_secured_detail and itself.
Q- What is the difference between steps 3) and a) below it. A- Step 3a) is simply the act of importing the cv_secured_detail Oracle View as a BO Universe Class, with it's columns known to the BO Universe as Objects
Q- Can the tables from which report data is fetched be included in the Universe? or should they be part of cv_secured_detail view.
A- I'm not sure if I understand your question, but I might phrase it another way - Once you create the cv_secured_detail view, and the Universe from this view, with the user = 'BOUSER' limiter. The universe is then used to design the CR, by virtue of it belonging to the CMS Repository, you as the report designer have to log into the CMS repository using your LDAP credentials, if a match is found against the cv_security view your data is automatically row-level secured. In outher words, whatever is declared in the view, is in the universe, and is ultimately available to the report.
Does this help?
Bill. -
Item level update security in MS SharePoint 2007
Hi,
I am working on a requirement where restriction to update list items need to be made at row level. E.g. based on the data in the column of a row, the row will be available for editing to some users. I am looking for an approach to implement this requirement
in MS SharePoint 2007. Any help in this regards will be appreciated.The easiest way to do this is to set individual item permissions using an event receiver when the item is added or saved. I did an example of this in a BLOG post a while ago. Here's the post.
http://www.dontpapanic.com/blog/?p=25
The example sets item level security based on the content type, but you can change the logic to whatever you like. One Note: This solution will not scale for use in a really large list. There is a limit on how many individual ACLs you can
have in a list. For 2007 I think it was 2,000.
Paul Stork SharePoint Server MVP
Principal Architect: Blue Chip Consulting Group
Blog: http://dontpapanic.com/blog
Twitter: Follow @pstork
Please remember to mark your question as "answered" if this solves your problem. -
So I'd like to create a security filter preventing write access across all dimensions at upper levels. In other words, I only want users to be able to lock and send at the zero level.
Can I use multiple @LevMbrs() functions in a single row to do this? Or is it better to create a separate row for each dimension? I've looked at the DBAG and around the 9.3.1 documentation and while I know I can use multiple members in a row, I don't know about functions. Further, I don't know what the best practice in this situation happens to be.
Thanks for all your help.You Need to do it on a single line if it is on multiple line you will most likely not get the results you want
Well actually two lines one to be able to read the entire database( or part of it) and the second to be able to write to the intersections you want. -
Extra level of security in ABAP for sensitive custom tcodes
Hi All,
Is it a best practice to include this extra level of authority check in custom programs which are deemed as sensitive ?
CALL FUNCTION 'AUTHORITY_CHECK_TCODE'
So trying to execute the underlying program for a tcode with SE38/SA38 would still prompt a check on S_TCODE.
I see this check in some sensitive SAP tcodes, viz. SU01,SU22.
Your inputs would be appreciated.
Thank you
AbhishekThere have been a number of discussions about tcodes, how and when to check them and the function module 'AUTHORITY_CHECK_TCODE'.
Try search a search for: https://forums.sdn.sap.com/search.jspa?threadID=&q=authority_check_tcode&objID=f208&dateRange=all&numResults=15&rankBy=10001
I have also seen some comments in some SAP programs, which indicate that this is "the old way" of checking authority, and not a new way as you might be thinking... which makes a critical report transaction without security in the report seem like a stone age idea...
But it is very usefull, particularly for retro-fitting unprotected report transactions which might be used by more than one transaction => you can then instruct the system via SE97 to permit a submit of the report from a set of transactions and not just one.
But that it only limited to transactions.
Cheers,
Julius -
Wrt300n How to lower the level of security
Hi guys !
I'm using a pocket pc with wifi and it's working well, but since i've remove my connection for internet with the cellular line i cannot connect on the wifi network. My operator Telus think it's the router secutity level too high. Please i need your advice, Thanks .hi... are you able to go online with the wired pc connected to the router?? try tweaking up wireless settings on the router...logon to the router's setup page >> click on wireless tab >> try changing radio band to wide 40MHz, wide channel to 9 and standard channel to 11... try disabling wireless security on the router, check whether it works for you or not and let me know.
-
Set Security Level per Security Zone in IE
I am trying to set the Trusted Security Zone to Low in IE (all versions).
I have made the change under Computer > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel >
Security Page > Trusted Sites Zone Template (and also tried under User). With User logged in I can see rsop which shows the setting, but in IE it remains at Medium.Hi,
Please check below article and set the security level for each zone:
Best
Practice: How to use Group Policy to configure Internet Explorer security zone sites
Regards,
Yan Li
Regards, Yan Li
Maybe you are looking for
-
IE error while submitting Adobe Form
Hi All, I am facing an unusual problem while submitting Adobe form. When I try to submit Adobe form a dialog box will appear, which shows some missing dll information. "sapadobecontrol.dll" and force me to close that dialog box which ultimately leads
-
in imovie 10.0.2, i have a green screen clip. first i want to change background - solid color probably - but then i'd like to also add a picture within picture along side the video....have attempted to "stack" all three, and can get two out of three
-
hey ya'll, i just picked up a dual 1.25, airport, bluetooth, superdrive, 17inch studio display, and pair of 120 gig harddrives MDD g4, for a ridiculously low price. how loud are these fans supposed to be? i'm hearing sort of a clunking sound, havn't
-
Uninstalled final cut HD express but software update still reminds me
I have uninstalled Final cut express HD, because I didn't know it would not run on an intel Mac (no AGP video), but when running software updates it reminds me of updates. Uninstalled by dragging to trash, can't find any other related items using spo
-
Logic 7.1 - Where's the buffer setting for DTDM/DAE?
Seems that I cannot find the buffer to vary my Digi HD setup. I can see the buffer process manager at the bottom of the driver setup menu (small,medium,large) but I would love to find the usual 128-1024 options that are the usual standard offerings.