List Help/Authorization

Hi guys
i am trying setup a Authorization scheme for my list menu so that only admin and team managers would be able to enter these pages from my list menu.
i have a ruff idea on how to do this and i have created one for admin which doesnt seem to work
I have setup the USER_IS_ADMIN method but it doesnt seem to work i get a error when viewing the page logged in as admin
Has anyone got a quick script i could borrow?!!! I need Admin and team managers only to be able to enter 2 of the pages in the menu.

Hi Andy
I tryed your code and got this error
ORA-00911: invalid character
Error
ERR-1082 Error in executing authorization scheme code.
OK
I have also tryed this code
select 1 from user_repository
where upper(username) = :APP_USER
and admin = 'Y'
I tryed this code as well
select 1 from dual
where f_manages_user(:APP_USER,null) = 'Y'
and get this error
ORA-00904: "F_MANAGES_USER": invalid identifier
Error
ERR-1082 Error in executing authorization scheme code.
OK
When i create a Authorization scheme in Authorization Schemes do i need to add any other Conditions in the lists
Obviously in list i would have to edit the authorization tab to pick up my scheme, but should i add more conditions in the conditions area within lists?
Any help to simplify this would be great !!
Edited by: user8637829 on 28-Sep-2009 01:50

Similar Messages

  • HT1420 How can I get a list of authorize computers under an Apple ID?

    How can I get a list of authorize computers under an Apple ID?
    How can I deauthorized a computers under an Apple ID if I do NOT have possession of that computer?
    Thanks
    -William

    It's not currently possible to see a list of authorised computers, but if you have 2 or more computers authorised then, as described on the page that you posted from, you can log into your account on your computer's iTunes (Store > View My Account, Store > View My Apple ID on iTunes 11) and 'deauthorise all' (which you can do once every 12 months) and you can then authorise/reauthorise the computers that you still have and need.
    Deauthorising a computer doesn't remove any content from it, it just means that you won't be able to use iTunes downloads on it until you reauthorise it

  • Hi  how to find list help in parameters..?

    hi gurus
    i have some doubt..?
    my selection-screen is
    sales organization,
    distributed channel,
    division..
    i got list help for sales organization
    but i could not get list help for remaining two.
    i need list help for distributed channel from that sales organization,
    division list help for combination of sales organization n distributed channel,
    finally i got the customer list of those combination on selection-screen itself.
    can anybody suggest me
    how to solve that.
    thank you
    regards
    kals.

    Hi,
    Use the below logic.
    tables: t001k.
    For Identification Number
    DATA: BEGIN OF it_bwkey OCCURS 0,
            bwkey LIKE t001k-bwkey,
          END OF it_bwkey.
    data: v_bukrs(4).
    For Run date
    DATA: BEGIN OF it_bukrs OCCURS 0,
            bukrs LIKE t001k-bukrs,
          END OF it_bukrs.
    DATA it_ret LIKE ddshretval OCCURS 0 WITH HEADER LINE.
    SELECTION-SCREEN: BEGIN OF BLOCK main WITH FRAME TITLE text-001.
    SELECTION-SCREEN SKIP.
    PARAMETERS:    p_bukrs(4) TYPE c.
    SELECT-OPTIONS s_bwkey FOR t001k-bwkey NO INTERVALS.
    SELECTION-SCREEN END OF BLOCK main.
    Validation Section
    INITIALIZATION.
      SELECT DISTINCT bukrs FROM t001k INTO TABLE it_bukrs.
    AT SELECTION-SCREEN ON VALUE-REQUEST FOR p_bukrs.
      CALL FUNCTION 'F4IF_INT_TABLE_VALUE_REQUEST'
        EXPORTING
          retfield        = 'BUKRS'
          dynpprog        = sy-repid
          dynpnr          = sy-dynnr
          dynprofield     = 'P_BUKRS'
          value_org       = 'S'
        TABLES
          value_tab       = it_bukrs
        EXCEPTIONS
          parameter_error = 1
          no_values_found = 2
          OTHERS          = 3.
      IF sy-subrc <> 0.
        MESSAGE ID sy-msgid TYPE sy-msgty NUMBER sy-msgno
                WITH sy-msgv1 sy-msgv2 sy-msgv3 sy-msgv4.
      ENDIF.
    AT SELECTION-SCREEN ON VALUE-REQUEST FOR s_bwkey-low.
      TABLES: t130r.
      DATA: BEGIN OF dynpfields OCCURS 0. "Hilfsstruktur zum auslesen des
              INCLUDE STRUCTURE dynpread. "Feldwertes vom Dynpro bei >F4<
      DATA: END OF   dynpfields.
      DATA : sy_repid LIKE sy-repid,
             sy_dynnr LIKE sy-dynnr.
      CLEAR dynpfields.
      REFRESH dynpfields.
      dynpfields-fieldname = 'P_BUKRS'.
      APPEND dynpfields.
      Lesen des akt. Wertes von Dynpro
      sy_repid = sy-repid.
      sy_dynnr = sy-dynnr.
      CALL FUNCTION 'DYNP_VALUES_READ'
        EXPORTING
          dyname     = sy_repid
          dynumb     = sy_dynnr
        TABLES
          dynpfields = dynpfields
        EXCEPTIONS
          OTHERS     = 01.
      IF sy-subrc = 0.
        READ TABLE dynpfields WITH KEY fieldname = 'P_BUKRS'.
        IF sy-subrc = 0.
          v_bukrs = dynpfields-fieldvalue.
        ENDIF.
      ENDIF.
      SELECT bwkey FROM t001k
      INTO TABLE it_bwkey
      WHERE bukrs = v_bukrs.
      DELETE ADJACENT DUPLICATES FROM it_bwkey.
      CALL FUNCTION 'F4IF_INT_TABLE_VALUE_REQUEST'
        EXPORTING
          retfield        = 'BWKEY'
          dynpprog        = sy-repid
          dynpnr          = sy-dynnr
          dynprofield     = 'S_BWKEY'
          value_org       = 'S'
        TABLES
          value_tab       = it_bwkey
        EXCEPTIONS
          parameter_error = 1
          no_values_found = 2
          OTHERS          = 3.
      IF sy-subrc <> 0.
        MESSAGE ID sy-msgid TYPE sy-msgty NUMBER sy-msgno
                WITH sy-msgv1 sy-msgv2 sy-msgv3 sy-msgv4.
      ENDIF.

  • Is there a quick way of listing all Authorization Schemes?

    Is there a quick way of listing all Authorization Schemes of all pages/items/tabs/etc of a particular application? V4.1.

    Perhaps with a combination of queries from the dictionary views
    SELECT * FROM APEX_DICTIONARY
    WHERE APEX_VIEW_NAME LIKE '%AUTH%'
    OR COLUMN_NAME LIKE 'AUTHORIZATION_SCHEME';
    SELECT * FROM APEX_APPLICATION_AUTHORIZATION;
    SELECT ITEM_NAME, AUTHORIZATION_SCHEME FROM APEX_APPLICATION_PAGE_ITEMS;Would you please change your username to something more friendly to the forum?
    Scott

  • Where do i see the list of authorize computers?

    where do i see the list of authorize computers?

    It is not possible to see a list.  You can see how many are authorized by going into Store > View My Account, but they will not be listed.

  • List of authorization Needed

    Hi All,
    I need to sent a list of all authorizations needed in BI 7.0 including source system & BI repoting level also.
    If any one have it or any links please provide the same.
    Best Regards,
    VSN

    Authorization objects for the Data Warehousing Workbench:
    S_RS_DS: For the DataSource or its sub objects (NW2004s)
    S_RS_ISNEW: For new InfoSources or their sub objects (NW 2004s)
    S_RS_DTP: For the data transfer process and its sub objects
    S_RS_TR: For transformation rules and their sub objects
    S_RS_CTT: For currency translation types
    S_RS_UOM: For quantity conversion types
    S_RS_THJT: For key date derivation types
    S_RS_PLENQ: Authorizations for maintaining or displaying the lock settings
    S_RS_RST: Authorization object for the RS trace tool
    S_RS_PC: For process chains
    S_RS_OHDEST: Open Hub Destination
    Authorization objects for the Business Explorer:
    S_RS_DAS: For Data Access Services
    S_RS_BTMP: For BEx Web templates
    S_RS_BEXTX: Authorizations for the maintenance of BEx texts
    Authorization objects for the Admin of analysis authorizations
    S_RSEC: Authorization for assignment and administration of analysis authorizations
    S_RS_AUTH: Authorization object to include analysis authorizations in roles
    Changed Authorization Objects:
    S_RS_ADMWB (Data Warehousing Workbench: Objects):
    Hope it Helps
    Chetan
    @CP..

  • New Users Not Appearing On Login List - Help!

    Hello Mac geniuses,
    I run a 10.3.9 network in an elementary school, and I since returning from summer vacation I have had problems with many of my client eMacs not displaying the names of users I have added in WGM. These eMacs are also still displaying the names of accounts I have deleted.
    If anyone is kind enough to help a stranger, I have copied below the transcripts of my email exchanges with an Apple tech, in my struggle to get my school functioning again. (I have placed them in the correct order so the 1st email is on top and the last on bottom. The tech's name is John and I am using "Jon" to make it slightly less confusing!).
    My very grateful thanks in advance to anyone who can help me.
    Jon
    On Sep 5, 2006, at 3:28 PM, Jon T wrote:
    Hi John,
    After deleting and adding users in WGM, some login screens still show deleted users and do not display the new users.
    I tried deleting the MCX cache via NetInfoManager on the clients, and even restarted the server, but it has not affected several machines.
    Any advice?
    Server: Dual 1Ghz G4 (Mirror Door) running Panther Server 10.3.9
    Clients: eMacs running 10.3.9
    Thanks in advance.
    On Sep 5, 2006, at 3:47 PM, John G wrote:
    Jon,
    Go into the client as the admin account.
    Delete /Library/Preferences/Directory Service
    Restart and setup Directory Access in Utilities
    Let me know if that works.
    John
    On Sep 6, 2006, at 9:08 AM, Jon T wrote:
    Hi John,
    Thanks for replying. unfortunately, that didn't work either . . . 
    Jon
    On Sep 6, 2006, at 2:03 PM, John G wrote:
    Jon,
    Are you sure the machine is on the network and talking to your
    server?
    Go into Dir Access and uncheck LDAP and readd the server.
    On Sep 6, 2006, at 4:07 PM, Jon T wrote:
    Hi John,
    Yeah, they're on the network, students can log in using the "Other" option, I can connect to the server and mount shared folders, etc.
    I did as you said, rebooted, still no updated list.
    Jon
    On Sep 6, 2006, at 8:57 PM, John G wrote:
    Jon,
    Netinfo is probably corrupt.
    Follow these directions to blow out Netinfo to create a new one.
    Bind back to server.
    <OS X frozen while booting.pdf>:
    AFP548.com: Articles: NetInfo Recovery Techniques
    NetInfo Recovery Techniques
    Joel Rennich, [email protected]
    4 June 2002
    When working with NetInfo, which we are and hope to have some more articles on in the near future, it is important to know
    how to back up to a previous version of your database.
    1. First, the most brutal way of recovering from a nonfunctional database.
    Boot into single user mode by holding down the "s" key while starting up. Follow the handy instructions Apple gives you at the end of the startup sequence and run fsck. Then mount the system root disk as read/write with:
    mount -uw /
    Now you can get on with recreating your database in a very brutal way. Remove your current database with:
    rm -rf /var/db/netinfo/local.nidb
    Now remove the file that prevents the Setup Assistant from running:
    m /var/db/.AppleSetupDone
    And now reboot to get things rolling.
    reboot
    This will cause the Setup Assistant to launch, complete with music and bouncing blue blobs. If you remember which account you set up first when you last saw this screen, set up that account now. Otherwise, go with whatever you want for your first
    Administrator account. If you match it up with the original Administrator account, all of your permissions should be groovy.
    Otherwise, get familiar with chown and chmod and you will be able to set things right.
    The above method is rather draconian and isn't for times when you need to replace a complicated NetInfo setup, but should work perfectly well for an essentially single user machine. However that probably rules out most Servers.
    On Sep 7, 2006, at 8:15 AM, Jon T wrote:
    Hi John,
    I performed that protocol, but even that didn't fix the problem!
    I know I've heard someone once suggest (in a moment of resignation) that I just use the blank name and password fields at login, but this is not really an option in elementary school. I only have 478 users in WGM, so I can't believe that would be too taxing for OS X Server!
    Thanks again for your thoughts on this.
    Regards,
    Jon
    On Sep 7, 2006, at 9:53 PM, John G wrote:
    Jon,
    The last resort is to reimage.
    Are you managing computers by Guest computers or
    computer groups?
    John, we're talking about 23 computers here - re-imaging is not an option for me alone unless I have some technical assistance (I don't know how to 'ghost' images across a network).
    I was managing the users by Groups though I did have a list of the computers called "lab computers". I just noticed that when I try accessing the Computers tab in WGM (whether on my teacher's station or on the server itself) I get the same error message:
    Got Unexpected Errror
    Error of type -14136 on line 432 of
    ComputerListPluginView.mm
    Please advise!
    Thank you again,
    Jon

    The list of users is a plist file and should be at at /Library/Preferences/com.apple.loginwindow.plist on the clients. See this thread for more information:
    http://discussions.apple.com/thread.jspa?messageID=2368769&#2368769
    If you've got a good plist from a client that sees the right users, you should be able to copy it over. If not, try backing up the file from one client and then deleting it and restarting.

  • I'm not able to do the DELETE and the SEARCH options on my list ( HELP!! )

    import java.io.*;
    public class StudentContactManager
    public static void main(String[] args) throws IOException
    char userSelection;
    final int maxStudents = 10;
    String [] Lname = new String [maxStudents];//LName= Last Name
    String [] FName= new String [maxStudents];//FName=First Name
    String [] En= new String [maxStudents];//En = Enrolment Number
    String [] PhoneNo= new String [maxStudents];
    int activeEntries = 0;
    boolean found = false;
    //================================
    System.out.println ( "1 - Initialise contact detail list" );
    System.out.println ( "2 - Display contact details list" );
    System.out.println ( "3 - Insert new entry into cotact detail list" );
    System.out.println ( "4 - Delete entry from contact detail list" );
    System.out.println ( "5 - Search cotact detail list" );
    System.out.println ( "Q - Quit" );
    System.out.print ( "Option : " );
    userSelection = Text.readChar ( "Enter option" );
    while ( userSelection != 'Q' & userSelection != 'q' )
    switch ( userSelection )
    case '1': activeEntries=0 ;
    break;
    case '2': if (activeEntries > 0)//IF contact detail list contains entries
    System.out.println("\tEnrolment Number\tFirst Name\tSecond Name\tTelephone Number");
    for (int i = 0; i<activeEntries; i ++)//FOR each stored contact
    {//DO
    System.out.println();
    System.out.println("\t"+En[i]+"\t"+"\t"+FName[i]+ Lname[i]+"\t"+"\t"+PhoneNo);//Display one/current contact detail
    }//END-FOR
    else
    {// ELSE
    System.out.println("Contact detail list empty");//Display �Contact detail list empty� message
    }//END-IF
    break;
    case '3': if(activeEntries<maxStudents)
    En[activeEntries]= Text.readString("Enter enrolment number");
    found = false;
    int i = 0;
    while ( !found && i < activeEntries)
    if (En[i].equals(En[activeEntries]) )
    found = true;
    else
    i++;
    }//end-if
    }//end-while
    if (found == false)
    FName[activeEntries]=Text.readString("Enter first name");
    Lname[activeEntries]=Text.readString("Enter last name");
    PhoneNo[activeEntries]=Text.readString("Enter telephone number");
    // Insert new contact details into contact detail list
    activeEntries++;
    else
    System.out.println("Enrolment number already exists");
    else
    System.out.println("Contact detail list full");
    break;
    case '4': Text.showMessage("Selected Option 4");
    break;
    case '5':Text.showMessage("Selected option 5");
    default: Text.showMessage("invalid selection, Please input a valid option");
    break;
    }//switch
    userSelection = Text.readChar ( "Enter option" );
    }//while
    System.exit(0);
    }//main
    }//StudentContactManager
    //===============================================================================
    I need help with case 4 and case 5...the search option should include while statement. and the 5th case is the delete option
    Thanks guys =).

    Please use the code tags when posting code (there is a button on the posting page for them). It would also help if you told us what you are trying to do, what error you are getting, and what you expect to get.
    If you are just asking us to write the code for you, then you are in the wrong place.

  • AirPlay Speakers drop off iTunes list - help!

    My 4 AirPlay speakers (Bose, JBL, iHome) have worked fine connected by wi-fi to my Netgear WNDR4000 router. I play from iTunes, and also sometimes stream radio directly from my iPhone or iPad.
    I have had some issues with poor wi-fi coverage, so yesterday I up graded to a high end Wireless Access Point, the EnGenius EAP-1750h. This is a 802.1ac dual band high power device - the signal strength is amazing. I have turned off wi-fi on my router completely, and am using the access point for wi-fi connections.
    The issue I am having is that the AIrPlay devices are falling off iTunes after a variable time (minutes to hours). If I click on them in the iTunes airplay list, they disappear and I cannot connect to them. At the same time, the "connected devices"  lists of the access point and the router show that the speakers are still connected. There is NO issue with internet access on any devices. REBOOTING THE ACCESS POINT BRINGS THE DEVICES BACK, until they drop off again.
    I am thinking that perhaps there is a bonjour port that keeps track of the devices that is not making it from the WAP to the router or something - and Apple in its wisdom makes it really hard to find out such info. I am an experienced user, and do not have any gross mistakes in my device configuration; I have read the relevant Apple support documents. I am not an IT tech, however, and I am not familiar with some the advanced settings, particularly of the WAP, which is a high-end business-oriented device.
    All the AirPlay devices are connected on the 2.4Ghz network. The base PC is hardwired by Ethernet to the router. Turning off the 5Ghz band completely and using only a single 2.4Ghz network does not help. All software and firmware of all devices is up to date.
    Does this ring any bell to anyone? I sthere a setting that will fix this?  I love the WAP, but I will have to bring it back if I can't get AirPlay to work! I'm sure it is not a hardware defect issue - it is an Apple AirPlay configuration issue - that's why I am posting here. Help appreciated!!

    Recreating the speakers didn't work for me. I am not sure what the issue could be at this point. Any help would be apreaciated.

  • Circular Linked List Help

    Hi,
    I'm developing a circular linked list class.. However everytime I add to the front of the list it overwrites the first element in the list.. I pretty confused at the moment. If anyone could assist me in what I'm doing wrong it would be greatly appreciated..
    My Class:
    public class CNode<T>
         public T nodeValue;          //data held by the node
         public CNode<T> next;     //next node in the list
         //default constructor; next references node itself
         public CNode()
              nodeValue = null;
              next = this;
         //constructor; initializes nodeValue to item
         //and sets the next to reference the node itself
         public CNode(T item)
              nodeValue = item;
              next = this;
    }My addFirst:
    public static <T> void addFirst(CNode<T> header, T item)
              CNode<T> curr;
              CNode<T> newNode = new CNode<T>(item);
              //header.next = newNode;
              //newNode.next = header;
              curr = header;
              newNode.next = header;
              curr.next = newNode;
         }

    You need a Node class and a class that manages the nodes. The class the manages the nodes is typically called something like MyLinkedList. The MyLinkedList class will typically have a member called 'head' or 'first' and another member called 'last', 'end', or 'tail'. Those members will contain references to the first node and the last node respectively.
    The methods like add(), remove(), find(), etc. will be members of the MyLinkedList class--not the Node class. The add() method of the MyLinkedList class will create a node, set the value of the node, and then set the next member to refer to the proper node or null if the node is added to the end of the list. Therefore, there is really no need for a default constructor in the node class. The MyLinkedList class will always set the value of the node, and then set it's next member to refer to something.
    You might want to try to write a linear linked list first, and get that working, and then modify it to make it a circular linked list. In addition, you should be drawing pictures of nodes with arrows connecting the different nodes to understand what's going on. Whenver the next member of a node refers to another node, draw an arrow starting at the next member and ending at the node it refers to. The pictures will be especially helpful when you write functions like add().
    Message was edited by:
    7stud

  • HELP AUTHORIZATION ISSUE

    So I've only ever connected my ipod to my macbook, never to another computer, and I never authorized my ipod with my computer or anything because I would download apps with wifi and i would be fine. I downloaded some music with my ipod the other day though and I authorized my computer and it said i have 2 authorizations with my account? I don't understand why I have two authorizations. Can anyone help explain this to me?
    Message was edited by: TKhan91

    Hi Vamsi,
    SU53 shows us the last failed authorization for a user. However, it might not only be the failed authorization object failed.
    Hence, "just to learn" , you can use transaction ST01 to enable and run a trace for particular users. Be sure to use in a test environment first, and with proper filters. (for a particular user only).
    Then check-> which auth object is failing.
    RC=4 means a object value is failing.
    RC=12 means an object is missing!
    Check, which tcode is calling that object and this tcode is present in which role. Then.........proceed.
    You can check the SAP documentation on running traces on the help portal of SAP.  I think you will find the answer yourself by troubleshooting more and may be massaging some test roles here and there!
    Likewise, if you are new to security, I would encourage you to start by reading some books on SAP security. Authorizations made easy is a good book to start with.
    Let me know if you have any questions
    EOD for me :P . take care
    Abhishek

  • Help - authorization key

    dear all,
    i created an authorization key and i assigned it to some status with transaction BS02.
    Now i need to assign a group of people to this authorization key but i don' t know how to do it.
    thanks for help
    Elena

    this is done through PFCG.
    Best to speak with an authorization consultant

  • Help authorization

    I Need help authorizing my computer.  I am using an address that has never been used but it telling me that I have already used this address.  I have not.

    You don't need to be connected to the internet in order to authorize the computer ( it's not the songs you are authorizing). Just play a few seconds of one of them.
    See this.
    About computer authorization.

  • Sorting linked lists - Help

    I am writing a program for an assignment that reads a file containing population growth for all the Counties in the U.S. I'm required to use a link list to store the data. They want me to sort the data based on certain criteria. My first problem is that as each new County instance is created, it is to be inserted into this linked list in alphabetical order first by county name.
    My understanding of linked lists is that they cannot be randomly accessed like a vector or an array. So is it possible to do this without using a vector or an array? And how would I go about it?
    thanks.

    Can you create a second, sorted linked list?The prof. didn't specify whether or not I can use a second list.
    Are you prohibited from using the collections framework (probably, if it is a school assignment!)Not really sure on this one. Again it is not specified in the assignment
    (Why would they have you store this data in a linked list??)I their reasoning is to have us learn how to implement linked list because it can grow or shrink when necessary.(Other than that I don't understand the practicality of it either)
    Are you using a doubly linked list (forwards and backwards)?The assignment does not specify a certain linked list to use.
    Did your prof mention any sort algorithms you might use? He states later in the assignment that I have to generate different growth reports by using MergeSort.
    I appreciate your help and comments. Unfortunately my prof. is very vague about the assignment and its implementation in his outline. He just kind of throws us into it hoping that we will figure it out.

  • Java Linked List Help

    Hey,
    I am having trouble understanding the Linked List implementation code given under the Node Operations part of this pdf.
    http://www.cs.berkeley.edu/~jrs/61b/lec/07.pdf
    public ListNode(int item, ListNode next) {
    this.item = item;
    this.next = next;
    public ListNode(int item) {
    this(item, null);
    ListNode l1 = new ListNode(7, new ListNode(0, new ListNode(6)));
    I understand the earlier implementation, but this one has me confused. Would someone please go through/explain the flow of this implementation with me?
    Thanks

    Well the code is pretty self explanitory.
    a ListNode class that has two fields. an int field item, and a ListNode field next.
    so when you create a ListNode object you can do so by one of two means passing one parameter or passing two parameters.
    if you pass one parameter then you have a ListNode which has an int say 1 and a ListNode object who's value is null.
    if you pass two parameters then you have a ListNode which has an int say 2 and a ListNode object who's value is the ListNode you pass to it.
    ex ListNode myNode = ListNode(1,new ListNode(2));
    so myNode now has an integer 1 and a reference to another ListNode which has an integer value of 2 and a reference to a null ListNode.
    hope this helps.

Maybe you are looking for