Need help on workspace user authentication issue (critical)

My client implemented Oracle EPM 11.1.1.1.1 We had no issues with installation.
We started getting issues with workspace logins. All my MSAD user login have been failing through workspace. But they can access other applications like Shared Service and Planning using their own IDs. I found following entries in SharedServices_Security_Cleint.log file
Resolution is I had to bounce workspace agent and web applications. This is happening periodically and at least once in a day.
I am not sure why it is skipping my MSAD connections. I am sure my active directories are not down since i can access shared service and Essbase using my own ID. Have you guys seen this issue?
We are using web logic 9.2 as application server
Please help
2009-05-26 15:21:01,923 INFO [Foundation Server] CSS is initialized as client. The default logger properties will be loaded com.hyperion.css.CSSSystem.<init>(Unknown Source)
2009-05-26 15:21:01,923 INFO [Foundation Server] CSS Log file will be generated at D:\Hyperion\logs\BIPlus\SharedServices_Security_Client.log com.hyperion.css.CSSSystem.<init>(Unknown Source)
2009-05-26 15:21:01,923 INFO [Foundation Server] Configure CSS with registry com.hyperion.css.CSSSystem.initCSSSystem(Unknown Source)
2009-05-26 15:21:01,923 INFO [Foundation Server] Initializing CSS from Registry. com.hyperion.css.common.configuration.CSSConfigurationManager.getConfiguration(Unknown Source)
2009-05-26 15:21:01,954 INFO [Foundation Server] Trying to get Registry Instance com.hyperion.css.registry.RegistryManager.<init>(Unknown Source)
2009-05-26 15:21:02,048 INFO [Foundation Server] Got Registry Instance com.hyperion.css.registry.RegistryManager.<init>(Unknown Source)
2009-05-26 15:21:24,000 WARN [Foundation Server] Failed to instantiate provider for factory: com.hyperion.css.spi.impl.msad.MSADFactory.[Root Cause: The specified Hostname or Port number is not valid. ] com.hyperion.css.spi.CSSManager.getProvider(Unknown Source)
2009-05-26 15:21:24,000 WARN [Foundation Server] Skipping provider: Regence. Failed to get provider instance. com.hyperion.css.spi.CSSManager.isNull(Unknown Source)
Thanks,
Naveen

Hi Naveen,
Are you using SSL at all?
How many providers do you have in your CSS file? Is it just the native directory and 1 MSAD provider?
It's very odd that the same users cant logon to the Workspace but can access Shared Services and Planning. Ive seen this once in 9.3.1 and this appeared to be caused by the SSL config. We ended up reinstalling everything without SSL.
Im not sure whether its still available in System 11 but have you tried debugging the workspace:
http://server:port/workspace/index.jsp?debug=true
This will open up the workspace with a little debug box at the bottom. See if any errors come up when you log in.
Hope this helps.
Seb
www.capiotech.com

Similar Messages

  • Need help with external user authentication

    Hello,
    I need some help to set up an external user authentication in Oracle DB 10g. Using the documentation at
    http://www.oracle-base.com/articles/misc/OsAuthentication.php
    I added the user alex to my linux system and checked the parameter os_authent_prefix:
    SQL> show parameter os_authent_prefix
    NAME TYPE VALUE
    os_authent_prefix string ops$
    SQL>
    I created the oracle user alex using
    CREATE USER alex IDENTIFIED EXTERNALLY;
    as well as
    CREATE USER ops$alex IDENTIFIED EXTERNALLY;
    The parameters in the sqlnet.ora are set to
    NAMES.DIRECTORY_PATH = (TNSNAMES, HOSTNAME, EZCONNECT)
    SQLNET.AUTHENTICATION_SERVICES = (ALL)
    Being the local user alex on the linux server I can login:
    $ sqlplus /
    SQL*Plus: Release 10.2.0.1.0 - Production on Tue Aug 30 08:56:26 2011
    Copyright (c) 1982, 2005, Oracle. All rights reserved.
    Connected to:
    Oracle Database 10g Release 10.2.0.1.0 - 64bit Production
    SQL>
    Now using a Windows Client:
    C:\>sqlplus alex@<netservicename>
    SQL*Plus: Release 10.2.0.1.0 - Production on Di Aug 30 10:31:37 2011
    Copyright (c) 1982, 2005, Oracle. All rights reserved.
    Kennwort eingeben:
    ERROR:
    ORA-01017: invalid username/password; logon denied
    - So, what's wrong?
    - Do I always have to create oracle users with the prefix "ops$" to the local username? How do these users login - with or without the prefix 'ops$'?
    - I read that kerberos authentication is only available through oracle advanced security addon. What about authentication through ldap?

    Obviously it doesn't work from any remote system.
    For this to happen the parameter remote_os_authent would have been set to true.
    Warning: this poses a security risk.
    As far as I know you should have been logged in as alex on the client, and using sqlplus /
    However, from 10g onwards Oracle comes with Oracle Wallet, which stores the password encrypted outside the database in a file, called wallet, and which is accessible from anywhere.
    You would better use that.
    Sybrand Bakker
    Senior Oracle DBA

  • Need help on diagnosis of Graphics Issue

    Hello,
    I need help to determine if I am experiencing a graphics card issue and what my options are if there are any experts out there I would appreciate some feedback.
    *My system info:*
    Model Name: Mac Pro
    Model Identifier: MacPro2,1
    Processor Name: Quad-Core Intel Xeon
    Processor Speed: 3 GHz
    Number Of Processors: 2
    Total Number Of Cores: 8
    L2 Cache (per processor): 8 MB
    Memory: 4 GB
    Bus Speed: 1.33 GHz
    Chipset Model: NVIDIA GeForce 8800 GT
    Type: Display
    Bus: PCIe
    Slot: Slot-1
    PCIe Lane Width: x16
    VRAM (Total): 512 MB
    Vendor: NVIDIA (0x10de)
    Device ID: 0x0602
    Revision ID: 0x00a2
    ROM Revision: 3233
    *Description of Issue:* When playing 3D video games (i.e. Mass Effect 2 or Dragon Age) everything visually is fine for about 20 seconds and then I start to see pixelization (snow), texture anomalies and system freezes where mouse stops moving. It gives time slices occasionally so sometimes I can Alt + tab out of game and close it. Or the entire system just crashes. I think what is going on is some loop that is pegging either the CPU(s) or GPU.
    Everything was working fine up until last night. I had been playing the games without issue. I am playing these games on Windows XP and Vista using Boot Camp.
    This initially occurred on Windows XP playing Mass Effect 2.
    These are the steps I took which essentially tell me it is not a software issue:
    - Tested on another game Dragon Age (same result)
    - Updated to latest Nvidia drivers (same result)
    - Tested on separate Boot Camp Windows Vista with Dragon Age game (same result)
    These results lead me to believe I may have a broken graphics card? But I want to be certain before I go out and purchase a new one.
    *My Questions:*
    - Is there some software to verify if my graphics card is shotty?
    - Is re-seating the graphics card or memory worth trying?
    - Cleaning the dust out of my machine?
    - If I need a new graphics card, what are my options? Do I have to purchase it via Apple store? I would like to stick with an Nvidia card so am I stuck buying the same card I currently have or can I upgrade?
    If anyone can help me I would greatly appreciate it.
    Thank you,
    Leapstepman

    Is there some software to verify if my graphics card is shotty?
    Techtool Pro has some testing, the AHT tests VRAM, but game benchmarks and stressing will tell you the most.
    Is re-seating the graphics card or memory worth trying?
    Absolutely. Just don't reinstall the graphics card until you clean it thoroughly.
    Cleaning the dust out of my machine?
    YES. A dust filled graphics card heatsink will cause the GPU to cook, and cause problems thet you describe.
    If I need a new graphics card, what are my options? Do I have to purchase it via Apple store? I would like to stick with an Nvidia card so am I stuck buying the same card I currently have or can I upgrade?
    You don't have to buy from Apple, but using with OS X limits your choices to Mac compatible or flashable PC versions.
    There is an awful lot of user input into this topic here:
    http://blog.macsales.com/602-testing-those-new-graphics-cards
    Card reviews can also help:
    http://www.anandtech.com/video/showdoc.aspx?i=3140&p=9
    http://www.tomshardware.com/reviews/radeon-hd-4870,1964.html

  • User authentication issues when auth by external radius server

    We tend to use FF in a corporate environment to manage our networking devices (firewalls/switches/routers etc). Came across a bizarre problem under the following conditions:
    ZyXEL Network Switch (GS2200-24) uses external authentication (RADIUS) to allow management and accounting of who makes changes.
    When logging into the switch with FF, we get repeated prompts for user authentication. Eventually the user is logged in (and no it's not a typo!). Looking through the dev console in the beta, it seems to get a 401 unauthorised back from the switch once it tries to load another html file.
    The browser *should* be presenting the same credentials to each called page within the site, it doesn't seem to :-(
    No site added as it's an internal IP address....

    We tend to use FF in a corporate environment to manage our networking devices (firewalls/switches/routers etc). Came across a bizarre problem under the following conditions:
    ZyXEL Network Switch (GS2200-24) uses external authentication (RADIUS) to allow management and accounting of who makes changes.
    When logging into the switch with FF, we get repeated prompts for user authentication. Eventually the user is logged in (and no it's not a typo!). Looking through the dev console in the beta, it seems to get a 401 unauthorised back from the switch once it tries to load another html file.
    The browser *should* be presenting the same credentials to each called page within the site, it doesn't seem to :-(
    No site added as it's an internal IP address....

  • Need help w/BW user authorization to see Web Templates thru portal

    Hello,
    We have designed Web Templates in BW which we intend to use through the SAP Portal. When these web templates are accessed via a URL which also passes a generic CPIC UserID/Password (created on the BW server), the template is fully functional and does not prompt the user for any further authentication. When we try to call up this same URL via the portal (including the CPIC User ID and password information), the report under /sap/bw/BEx comes up fine, but we are prompted for logins for nearly every object under the /MIME/ repository called by the Web Template. We have already set the /sap/bw/BEx/MIME service (ICF) to be an anonymous service (using the same UserID and Password that we are passing in the URL). So, to me it seems like additional role needs to be assigned to this user. Any ideas?
    Here is the error message we get:
    Logon failed
    What has happened?
    Call of URL http://xxxxxxxx:8002/sap/bw/Mime/BEx/JavaScript/epcfproxy.js terminated due to error in logon data.
    Note
    Logon performed in system T04 .
    Logon performed for client 020, user , and language EN. 
    What can I do?
    Check that you have entered the client, user, and password correctly.
    If you do not yet have a user ID, contact your system administrator.
    Error Code: ICF-LE-http-c:020-l:E-T:1-C:6-U:-P:-L:4
    HTTP 401 - Unauthorized
    Your SAP Internet Communication Framework Team
    Thanks in advance for your help!
    Regards,
    Abu Sadeq

    Hi abu,
    DId you solved your problem. if yes please help me. i am facing the same issue
    Thanks
    Sarang

  • AC CUP - Users authentication issue

    Hi All,
    We have defined in the CUP configuration that authentication and user data source is the SAP back-end system.
    This is due to the fact that they donu2019t manage all the users in the UME (only the ones they have too).
    When creating a new request and searching for the useru2019s details, we still see only the users that were defined in the UME.
    Do you have any idea why is that ?
    Thanks
    Yudit

    Yes, you can. Don't configure ABAP to act as your UME data source. Lots of customers did this and then there is not way to go back. As of now, SAP does not have any way to change the setting of your data source if you configure ABAP as the data source for UME.
    CUP has authentication, search data source and detail data source configuration. This will totally help you in removing depedency on SAP UME. But this only works for end-user. All your approvers and administrators need to reside in SAP UME as they need to have AEApprover and/or AESecurity and/or AEAdmin role.
    Remember, the authentication and data source config is only for end-user/requester. You have to configure all other users in UME as UME assigns authorization to access CUP. Even if you configure your SAP ABAP to act as data source for SAP UME, you will have assign necessary role to the particular user in UME.
    I hope this is clear.

  • Windows 2012 Nodes - Slow CSV Performance - Need help to resolve my iSCSI issue configuration

    I spent weeks going over the forums and the net for any publications and advice on how to optimize iSCSI connections and i'm about to give up.  I really need some help in determining if its something i'm not configuring right or maybe its an equipment
    issue. 
    Hardware:
    2x Windows 2012 Hosts with 10 Nics (same NIC configuration) in a Failover Cluster sharing a CSV LUN. 
    3x NICs Teamed for Host/Live Migration (192.168.0.x)
    2x NICS teamed for Hyper-V Switch 1 (192.168.0.x)
    1x NIC teamed for Hyper-V Switch 2 (192.168.10.x)
    4x NICs for iSCSI traffic (192.168.0.x, 192.168.10.x, 192.168.20.x 192.168.30.x)
    Jumbo frames and flow control turned on all the NICs on the host.  IpV6 disabled.  Client for Microsoft Network, File/Printing Sharing Disabled on iSCSI NICs. 
    MPIO Least Queue selected.  Round Robin gives me an error message saying "The parameter is incorrect.  The round robin policy attempts to evenly distribute incoming requests to all processing paths. "
    Netgear ReadyNas 3200
    4x NICs for iSCSI traffic ((192.168.0.x, 192.168.10.x, 192.168.20.x 192.168.30.x)
    Network Hardware:
    Cisco 2960S managed switch - Flow control on, Spanning Tree on, Jumbo Frames at 9k - this is for the .0 subnet
    Netgear unmanaged switch - Flow control on, Jumbo Frames at 9k - this is for .10 subnet
    Netgear unmanaged switch - Flow control on, Jumbo Frames at 9k - this is for .20 subnet
    Netgear unmanaged switch - Flow control on, Jumbo Frames at 9k - this is for .30 subnet
    Host Configuration (things I tried turning on and off):
    Autotuning 
    RSS
    Chimney Offload
    I have 8 VMs stored in the CSV.  When try to load all 8 up at the same time, they bog down.  Each VM loads very slowly and when they eventually come up, most of the important services did not start.  I have to load
    them up 1 or 2 at a time.  Even then the performance is nothing like if they were loading up on the Host itself (VHD stored on the host's hdd).  This is what prompted me to add in more iSCSI connections to see if I can improve the VM's
    performance.  Even with 4 iSCSI connections, I feel nothing has changed.  The VMs still start up slowly and services do not load right.  If I distribute the load with 4 VMs on Host 1 and 4 VMs on Host 2, the load up
    times do not change. 
    As a manual test for file copy speed, I moved the cluster resources to Host 1 and copied a VM from the CSV and onto the Host.   The speed would start out around 250megs/sec and then eventually drop down to about 50/60 megs/sec.  If I turn
    off all iSCSI connections except one, it get the same speed.  I can verify from the Windows Performance Tab under Task Manager that all the NICS are distributing traffic evenly, but something is just limiting the flow.  Like what I stated on top,
    I played around with autotuning, RSS and chimney offload and none of it makes a difference. 
    The VMs have been converted to VHDx and to fixed size.  That did not help.   
    Is there something I'm not doing right?   I am working with Netgear support and they are puzzled as well.  The ReadyNas device should easily be able to handle it. 
    Please help!  I pulled my hair out over this for the past two months and I'm about to give up and just ditch clustering all together and just run the VMs off the hosts themselves. 
    George

    A few things...
    For starters, I recommend opening a case with Microsoft support.  They will be able to dig in and help you...
    Turn on the CSV Cache, it will boost your performance 
    http://blogs.msdn.com/b/clustering/archive/2012/03/22/10286676.aspx
    A file copy has no resemblance of the unbuffered I/O a VM does... so don't use that as a comparison, as you are comparing apples to oranges.
    Do you see any I/O performance difference between the coordinator node and the non-coordinator nodes?  Basically, see which node owns the cluster Physical Disk resource... measure the performance.  Then move the Physical Disk resource for the
    CSV volume to another node, and repeat the same measure of performance... then compare them.
    Your IP addressing seems odd...  you show multiple networks on 192.168.0.x and also on 192.168.10.x.   Remember that clustering only recognizes and uses 1 logical interface per IP subnet.  I would triple check all your IP schemes...
    to ensure they are all different logical networks.
    Check you binding order
    Make sure you NIC drivers and NIC firmware are updated
    Make sure you don't have IPsec enabled, that will significantly impact your network performance
    For the iSCSI Software Initiator, when you did your connection... make sure you didn't do a 'Quick Connect'... that will do a wildcard and connect over any network.  You want to specify your dedicated iSCSI network
    No idea what the performance capabilities of the ReadyNas is...  this could all likely be associated with the shared storage.
    What speed NIC's are you using?   I hope at least 10 GB...
    Hope that helps...
    Elden
    Hi Elden,
    2. CSV is turned on, I have 4GB dedicated from each host to it.  With IOmeter running within the VMs, I do see the read speed jumped up 4-5x fold but the write speed stays the same (which according to the doc it should).  But even with the read
    speed that high, the VMs are not starting up quickly.  
    4. I do not see any difference with IO with coordinator and non coordinator nodes.  
    5.  I'm not 100% sure what your saying about my IPs.  Maybe if I list it out, you can help explain further.  
    Host 1 - 192.168.0.241 (Host/LM IP), Undefined IP on the 192.168.0.x network (Hyper-V Port 1), Undefined IP on the 192.168.10.x network (Hyper- V port 2), 192.168.0.220 (iSCSI 1), 192.168.10.10 (iSCSI2), 192.168.20.10(iSCSI 3), 192.168.30.10 (iSCSI 4)
    The Hyper-V ports are undefined because the VMs themselves have static ips.  
    0.220 host NIC connects with the .231 NIC of the NAS
    10.10 host NIC connects with the 10.100 NIC of the NAS
    20.10 host NIC connects with the 20.100 NIC of the NAS
    30.10 host NIC connects with the 30.100 NIC of the NAS
    Host 2 - 192.168.0.245 (Host/LM IP), Undefined IP on the 192.168.0.x network (Hyper-V Port 1), Undefined IP on the 192.168.10.x network (Hyper- V port 2), 192.168.0.221 (iSCSI 1), 192.168.10.20 (iSCSI2), 192.168.20.20(iSCSI 3), 192.168.30.20 (iSCSI 4)
    The Hyper-V ports are undefined because the VMs themselves have static ips.  
    0.221 host NIC connects with the .231 NIC of the NAS
    10.20 host NIC connects with the 10.100 NIC of the NAS
    20.20 host NIC connects with the 20.100 NIC of the NAS
    30.20 host NIC connects with the 30.100 NIC of the NAS
    6. Binding orders are all correct.
    7. Nic drivers are all updated.  Didn't check the firmware.
    8. I do not know about IPSec...let me look into it.  
    9. I did not do quick connect, each iscsi connection is defined using a specific source ip and specific target ip.  
    These are all 1gigabit nics, which is the reason why I have so many NICs...otherwise there would be no reason for me to have 4 iscsi connections.  

  • Need help in Payroll Tax Balance Issue - Urgent

    Hi,
    Please help me with the following Tax and Balance issue. The system is on 12.0.3, South African Legislation.
    Issue : Salary has been restructured from Basic Salary to Total package structure in Dec 2008. Retro Pay was used to pay the difference amounts in Dec Run. But while configuring the new Elements for this Total Package they have missed out adding the Retro Elements to Proper Tax calculating Balances.
    Eg : "TP Salary" element is fed to "Taxable Income RFI" balance but "TP Retro Salary" element is not fed to this balance.
    So tax has not been calculated for those Retro amounts. This has been identified while validating test run for IRP5 tax certificates.
    The Feb 09 (Feb is the Tax year End for payroll) Payroll was already run on 10th and payments were already done. Now we need to tax the retro amounts and retrieve the balance tax amounts from Employees.
    I added the proper tax balances to those Retro elements and and the balances were adjusted to add the Retro amounts. Then I ran the Feb run the payroll again as of 20th, it did not recalculate the tax.
    How to recalculate the tax so that correct tax reflects in the Tax certificates? Please help me with the necessary Info.
    Thanks,
    Sri.

    Hi,
    As I mentioned earlier, I added the appropriate balances which are used to calculate Tax to Retro Elements and those Balances got updated with the delta amount but Tax was not updated. I want to know is there any process provided by Oracle using which Tax for those already paid amounts can be recalculated.
    I calculated the Tax manually and using Adjust Balance form added ZA_TAX_BALANCE_ADJUSTMENT Element and given the difference tax amount in PAYE and Tax Input values and saved the form. The Tax got updated.
    Tax_ASG_RUN - 15000
    Tax_ASG_TAX_YTD - 153257.32 (Prev - 138257.32). When I run the IRP5 (Tax Certificate Process) the tax is also getting correctly on it.
    But client wants Oracle to calculate the Tax for those retro amounts so thats the challenge.
    Could you help me with this.
    Thanks,
    Sri

  • Need help brainstorming a tricky IMAGE issue

    Hi,
    I've been trying to figure out a simple way around an issue, but as i simply cannot come up with an answer, i thought I'd put it out to the community to see if i can get some ideas back.
    I'm putting a Mobile game together, and I'm still establishing the foundations of it. One element is the idea of having all creatures and character to be able to look different. To this end, my proposal is to have a set of various frames of say different creatures, and with other items (like armour and weapons) in matching poses. For example, You would have say a person running in 4 frames. For each frame, there is a matching set of clothes frames for each pose. One coule be normal clothes, and another armour so when the character is wearing normal clothes, the system would draw to the screen the naked character and then place the clothes over the top. Proper transparency (using the PNG alpha channel) makes this masking effect work as it should and it seems to work okay here.
    Here is the problem. What i want to do is to be able to represent say, a hiding creature as being partially transparent wether through alpha blending or dithering. I have put an efficient class together than can quickly resize and recolour any image and draw it to the screen, and can also modify the transparency via either alpha blending or dithering. Here is the issue: This will NOT work when building the characters onto the screen! the problem if no-one notices here is lets say you then make the system draw the person at 50% opacity to the screen.Great, it works, but now we need to put the clothers on top so we draw THAT at 50% transparency. Uh-oh... Because the clothers are transparent, we get an artifact of the naked character shining through the clothers we just placed on top. So, the solution WOULD be simple: create an offscreen image for buffering, draw the character to it, then draw the results to the screen at 50% opacity... WRONG. The only Mutable off-screen image you can make is one filled with white pixels! Useless: we get an ugly white box around the character.
    The only two solutions i can think of are the following:
    1) Take a snapshot of the box around where we intend to draw the character. This should capture the background. We now build the character onto the screen as we normally would but if we want to make them transparent, we then paste the original background image over the top at a sertain opacity. I see problems with this being a) The design on the game is already very lean on memory requirements. I have built my own image handling classes that only load stuff when needed and discards it when no longer needed and also block wasteful reloading of images into memory, but having to always take a snapshot of a box around a character prior to drawing will slow it all down immensly.
    2) the class i use for transformations, recolouring and resizing does so by copying the image data into an array and then manipulating it. I've designed it very well so that it only ever holds one image at a time and loading a new image into it uses the same array and thus, never creates a new array in memory and then relying on the Garbage collector to reclaim it. Using this, i could render the characters to it, and then draw it to screen but the problem as i see it is that this would be very processor intensive and would most likely slow the entire system down.
    Naturally, the ideal solution is to draw to an offscreen image buffer and go from there, but i think the only way to do that is to use the BufferedImage which is on an API that isn't widely available (at least, it's not on my phone and it is pretty new). I need this to be as compatible as possible, so i don't want to access any optional API's i don't need to. I would prefer to be able to do this transparency trick, but if i can't, i guess i would have to find another way to represent a hiding character in the game (I guess a Black silouette).
    Any help, hints or ideas would be greatly appreciated!

    Okay, imagine you have a character running. The whole purpose of my design idea is to have it so the characters look different based on the gear they are equipped with (+Image a common game like Neverwinter nights, or WoW. Your character looks different based on what they are equipped with and no, I am not trying to create a game of that scale on a Mobile phone+). Naturally, the character isn't a static figure, so they move, run, attack and so fourth. My plan is to have a set of character frames in all the different frames, and matching clothes and equipment frames matching each cell (+we KNOW where their arm will be in the 2nd frame of a run-right action, so we would position say, a shield in the right spot. A clever appraoch is to be taken here for example, a right handed person would weild their shield in their left hand, and if they are running right, the shield would appear behind them and would be facing out, so the system would draw it in the order of "Left_Hand_Item->Character_in_the_Nude->Clothes_for_the_Character->Right_Hand_Item". Simple mirroring can handle any left/right directions as the frames for running in the different directions are also mirrored+). Essentially, the look of the character would need to be built on a per-frame basis. I am hessitant to build all of the frames of the character in memory at load time as I have the following action factors:
    - The character can face in 8 directions being all the diagonals, Vertical and horizontal directions.
    - The character needs the following actions to be available: Running, Standing, Dying -> On the ground (+This also counts falling down or sleeping+), Attacking / Swinging, Ranged attacks (+bow and arrow+).
    - To at least offer some kind or animateable look, there should be at least 2 frames for each action.
    As you can see, there is quite a lot. The approach i have already taken is fairly powerful. I decided to scrap the Java Sprites as it couldn't do what i needed it to do so i created my own caching system. A special MAP file stores the information on all the frames, and another class retrieves this on demand from the file, but only takes certain chunks. A initial class manages file access and loads the entire image into memory, and another uses this class to extract the frame it wants. When the other class is finished, the file-opening class then drops the full file from memory and attempts to reclaim the used memory. So far, it works well. The reason i have taken this appraoch is there is just too much data to have it all laoded into memory, it has to be done on demand and store as little information as possible. If i can represent 5 different characters by using a combination of other frames, i should have excellent results. I am trying to find a good balance between memory consumption and CPU usage. So, in a long winded answer:
    --There are a LOT of frames that may need to be transparent at any one time.
    --The amount of memory I'll need is still in the air at this point. As i build it, I am keeping a hawk-like eye on memory consumption and watching for anything being wasted (+using boolean where possible, If i don't need the capacity of an int, i use byte instead, etc+). This incidently ran me into the strong desire to utilize unsigned values as i don't need negatives anywhere, but I will have to live with that wasted bit.
    --I am aware that not all devices support Alpha blending which is why I also aim to support dithering. For example at 50% transparency, more than half the pixels are fully transparent (+Some may already be transparent, so we're not going to go and make them visible!)+
    --The transparent character is used to represent a character that is hiding. For example, you may have an Ally character being stealthy, so to make sure YOU the player can still see them, but represent clearly that they are in a special state, i wanted them to be transparent. Also, if there is an enemy stealthing, but you have detected them. I need to be able to represent that they have indeed been detected and that they can be seen, but they are still trying to be stealthy. So yes, one substitute would be to make them entirely black pixels and maybe even just draw the naked character black without any armour or equipment as a stealthing character would assume reduced detail.                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                           

  • Need Help about Certificate based Authentication

    Hi friends..
    Currently, i'm trying to develop an applet that using Certificate Based Authentication..
    i have looked at this thread : http://forums.sun.com/thread.jspa?threadID=5433603
    these is what Safarmer says about steps to generate CSR :
    0. Generate key pair on the card.
    1. Get public key from card
    2. Build CSR off card from the details you have, the CSR will not have a signature
    3. Decide on the signature you want to use (the rest assumes SHA1 with RSA Encryption)
    4. Generate a SHA1 hash of the CSR (without the signature section)
    5. Build a DigestInfo structure (BER encoded TLV that you can get from the PKCS#1 standard) that contains the message digest generated in the previous step
    6. Send DigestInfo to the card
    7. On the card, the matching private key to encrypt the DigestInfo
    8. Return the encrypted digest info to the host
    9. Insert the response into the CSR as the signature
    Sorry, i'm a little bit confused about those steps.. (Sorry i'm pretty new in X509Certificate)..
    on step 4,
    Generate a SHA1 hash of the CSR (without the signature section)
    Does it mean we have to "build" CSR looks like :
    Data:
    Version: 0 (0x0)
    Subject: C=US, ST=California, L=West Hollywood, O=ITDivision, OU=Mysys, CN=leonardo.office/[email protected]
    Subject Public Key Info:
    Public Key Algorithm: rsaEncryption
    RSA Public Key: (1024 bit)
    Modulus (1024 bit):
    00:be:a0:5e:35:99:1c:d3:49:ba:fb:2f:87:6f:d8:
    ed:e4:61:f2:ae:6e:87:d0:e2:c0:fd:c1:0f:ed:d7:
    84:04:b5:c5:66:cd:6b:f0:27:a2:cb:aa:3b:d7:ad:
    fa:f4:72:10:08:84:88:19:24:d0:b0:0b:a0:71:6d:
    23:5e:53:4f:1b:43:07:98:4d:d1:ea:00:d1:e2:29:
    ea:be:a9:c5:3e:78:f3:5e:30:1b:6c:98:16:60:ba:
    61:57:63:5e:6a:b5:99:17:1c:ae:a2:86:fb:5b:8b:
    24:46:59:3f:e9:84:06:e2:91:b9:2f:9f:98:04:01:
    db:38:2f:5b:1f:85:c1:20:eb
    Exponent: 65537 (0x10001)
    Attributes:
    a0:00
    on step 5, Build a DigestInfo structure (BER encoded TLV that you can get from the PKCS#1 standard) that contains the message digest generated in the previous step
    How DigestInfo structure (BER encoded TLV that you can get from the PKCS#1 standard) looks like?
    And what is the DigestInfo Contains, and what is TAG for DigestInfo?..
    Please help me regarding this..
    Thanks in advance..
    Leonardo Carreira

    Hi,
    Leonardo Carreira wrote:
    Sorry, Encode the Public Key is handled by On Card Application or Off Card Application?..
    I think its' easier to encode the public key by Off Card app..
    Could you guide me how to achieve this?, i think Bouncy Castle can do this, but sorry, i don't know how to write code for it.. :( All you need to do is extract the modulus and exponent of the public key. These will be in a byte array (response from your card) that you can use to create a public key object in your host application. You can then use this key to create a CSR with bouncycastle.
    I have several some questions :
    1. Does Javacard provide API to deal with DER data format?JC 2.2.1 does not buy JC 2.2.2 does, however I believe this is an optional package though. You can implement this in your applet though.
    2. Regarding the Certificate Based Authentication, what stuff that need to be stored in the Applet?..
    - I think Applet must holds :
    - its Private Key,
    - its Public Key Modulus and its Public Key Exponent,
    - its Certificate,
    - Host Certificate
    i think this requires too much EEPROM to store only the key..This depends on what you mean by Certificate Based Authentication. If you want your applet to validate certificates it is sent against a certificate authority (CA) then you need the public keys for each trust point to the root CA. To use the certificate for the card, you need the certificate and corresponding private key. You would not need to use the public key on the card so this is not needed. You definitely need the private key.
    Here is a rough estimate of data storage requirements for a 2048 bit key (this is done off the top of my head so is very rough):
    ~800 bytes for your private key
    ~260 bytes per public key for PKI hierarchy (CA trust points)
    ~1 - 4KB for the certificate. This depends on the amount of data you put in your cert
    3. What is the appropriate RSA key length that appropriate, because we have to take into account that the buffer, is only 255 bytes (assume i don't use Extended Length)..You should not base your key size on your card capabilities. You can always use APDU chaining to get more data onto the card. Your certificate is guaranteed to be larger than 256 bytes anyway. You should look at the NIST recommendations for key strengths. These are documented in NIST SP 800-57 [http://csrc.nist.gov/publications/PubsSPs.html]. You need to ensure that the key is strong enough to protect the data for a long enough period. If the key is a transport key, it needs to be stronger than the key you are transporting. As you can see there are a lot of factors to consider when deciding on key size. I would suggest you use the strongest key your card supports unless performance is not acceptable. Then you would need to analyse your key requirements to ensure your key is strong enough.
    Cheers,
    Shane

  • Need help in Importing User, Shared and Journals into Exchange

    Hi,
    I have been tasked with the following imports into EX07 and EX10 following an acquisition:
    Shared MB 12 GB, corrupt pre-nov 2013 archives of users 30GB, shared sent items 4GB, users sent items 80GB. All in .pst format.
    4-8TB of journal data to be imported into Enterprise Vault 2010 with EX2010 (in .pst format)
    I'm looking for the best approach to get these imports done. Also, need to compile an assessment done on the time and performance ramifications of running these imports into EX as other migrations are currently on. Do I need to parallel run perfmon with
    EX counters to monitor while import is running in the background?
    Is it a good idea to run import of journal into Enterprise Vault of 4-8 TB data in .pst format in one go?
    Thank you for your comments...
    TY
    - thestriver

    Hi,
    In addition to Rajith's suggestion, I would like to verify the following things:
    In Exchange 2007, you can use the Import-Mailbox cmdlet to import all messages types, including messages, calendar items, contacts, distribution lists, journal entries and so on. Here is an example of importing the mailbox data from the amy.pst file that
    is in the Sent Items folder:
    Import-Mailbox -Identity amy -PSTFolderPath C:\PSTFiles\amy.pst -IncludeFolders '\Sent Items'
    In Exchange 2010, you need to use the New-MailboxImportRequest cmdlet.
    For more information, here is a thread for your reference.
    New-MailboxImportRequest
    http://technet.microsoft.com/en-us/library/ff607310(v=exchg.141).aspx
    Hope it helps.
    Best regards,
    If you have feedback for TechNet Subscriber Support, contact
    [email protected]
    Amy Wang
    TechNet Community Support

  • Need help in PBEN0011 user exit

    Hello Experts,
    I am using EXIT_SAPLHRBEN00GENERAL_011 FM of PBEN0011 user exit to calculate the coverage amount.But in my requirement i have to calculate that based on the PA0008-TRFST(pay scale level).But in this user exit there is pernr field in import parameters.
    I need perner to read the pay scale level for that employee.
    Please help...is there any way to access the screen fileds like pernr ,begda,endda in the user exit if they are being passed to the user exit.
    Thanks in advance..
    Shweta

    Hello All,
    I want to copy all queries under one infoset and user group to new infoset.I tried copying using copy function vaialable in goto menu.But it is giving error for the query having varian.
    I am unable to copy the queries with variants. And I am getting following message:
    Error when copying query report XXXXXXX= with variants. Error when importing query
    Please help...
    Thank you in advance
    Shweta

  • Need help urgently in user exit

    Hi experts,
      i m new to the concept of user exit.
    shud anyone have very good coding knowledge for doing uiser exit.
    i havent got a clear idea about my specification.
    problem: one of the sd transaction code (dnt know the transaction code)) there is a tabstrip or table control window.In that windoww i m supppose to add one more column.
    This is an idea that i recieved from the sd consultant, i havebnnt recieved my spec yet.
    pls p[ls help me.
    i need to perform this task  very well so pls guide me
    will reward for sure
    sincerely
    jay

    Hi Jaya
               For using USER EXISTS you need Access Key from SAP.If you know the TCODE follow the procedure given below.
    ->enter TCODE in command field
    ->enter
    ->System(Menu item)
    ->Status(in drop down list)
    ->Double click on Program(screen) name
    ->you will find empty INCLUDE programs under commented heading USER EXISTS.
    ->Read the Description given for each INCLUDE and select the required one.
    ->Double click on hte INCLUDE.
                  You'll see a pop-up asking for access key, which we should get from SAP.Without Access Key you cannot use USER EXISTS.
    Regards
    Lakshman

  • Hi i need help in  sort in out issue in worflow in sap EDI

    i sap gurus
    i have two issues in sap workflow .can u guys help me out in sorting out these issues.
    1) When checking out/reserving a work flow item(TC: SBWP), there is no option to display who has it checked out. When the workflow item is reserved, it is removed from everyone elses workflow list. It can happen that people put these back at the end of the day, when there is no time to work on them any longer. <b>It would be a great help to have visability to all items even if they are reserved, and to have a name associated with it to see who has it reserved.</b>
    2) In the "Change Layout" option of work flow (TC:SBWP), there are dynamic fields that look like they could be assigned. Perhaps one of these could be used for the person doing the reserving, but in addition to this, i<b>t would be very helpful if customer number could also be populated in one of these fields. This would allow sales specialist to pick up work flow items by customer.</b>
    thanks in advance
    sam sd

    Hi Sam,
    As far your first requirement concerned,I don't think it is possible.
    because reserveing of workitem is to prevent other users from executing it.
    So you can't just have the workitems only for display in other users inbox even after someone else reserved it.It defeats the own purpose.
    I would suggest you to go for a report kinda tool where you can actually help the users have the visibility.
    About second one,you use tcode SWL1 to define the dynamic columns and enter the container elemet ther to have the customer number displayed.

  • Need Help for role based authentication

    Hi,
    I am creating a web application which will run on Linux-apache using jsp and oracle as database.
    This web application will show information about customers.
    I want to create role based authentication, which has read only access for cuatomers so they can see
    only there data, users having readonly access to all customer information also admin user to
    add/update/delete information.
    please help me.

    Can you please explain more on this ? or any resource on internet to help
    me.
    thanks.

Maybe you are looking for