New Technical Article: Securing a Cloud-Based Data Center

Securing a Cloud-Based Data Center
by Orgad Kimchi, Ron Larson, and Richard Friedman
Orgad, Ron, and Richard and explain the precautions you need to take when deploying a private cloud in a data center, and show you how to employ the security features in Oracle Solaris 11 to protect its infrastructure. Part 2 of a three-part article on cloud deployments that use the Oracle Solaris Remote Lab as a case study.
- Rick

The beautiful curve drawn by LDPC code caught my eyes, but several points hardly built up user confidence.Some details should be submitted carefully, especially comparison with BCH codes. In my opinion, X-axis is exact error bit count and Y axis is frame error rate. Then, BCH comparison is a theoretical vertical line. LDPC code will be well described in a group of points.
Moreover, can Xilinx provide more codes with different rate to support flexible design?

Similar Messages

  • Registering a new technical system in SLD - ABAP based

    Hi friends,
      For ,Registering a new technical system in SLD - ABAP based
    I followed the following steps...
    At first
    - went  to the SDL - http://server:port/sld
    - went  to the "Administaton" tab
    - went  to the "Data Supplier Bridge"
    In RFC Gateway
    Server : 
    Service :
    What I to give Here...
    is it the R/3 System  Server and Service
    Please suggest regarding it...
    With Regards,
    Sunil

    Hi Michal,
    Thanks for the Blog. It was really enlightening to find out how the Technical systems are registered. But my problem is not solved yet.:(
    I have newly installed a CRM 2007 system, and tried to see the Technical systems AS ABAP and AS JAVA which should be automatically created. But no AS ABAP system was created. So i tried doing it using your Blog.
    In the Admin tab of SLD, i did  not find any "Data Suppliers Bridge", but there was a "Data Suppliers" tab. On clicking it, i verified that sld/active was TRUE, and then updated the data in RZ70 and clicked on Activate button. The activation was successfully done, but no new AS ABAP Technical system appeared.
    Is there any more configs left to be done? Please help me out with this issue. Thanks in Advance.
    Regards,
    Savan D.

  • After installing Windows Server 2008 DATA CENTER stuck on blank screen and command prompt window

    After a new fresh install of Windows Server 2008 Data Center I get this solid blue screen with a comand prompt window showing (user\Administrator) I have limited use of the commands, am able to bring up the task manager by CTL Del and perform limited functions.  I was able to run the same software on this machine before, nothing has changed.  The way I ran the software on it before was from an image I deployed to it,(not from a fresh install).  The old image timed out and I could not rearm it, that is why I did a fresh install. I tried to use gpedit.msc but the command did not work.

    You may be using Windows with limited functionality as the previous version expired. Did you re-format the drive/partition before you did the "fresh" install if not Windows probably kept the old install information so knew that it was expired previously. Either activate Windows (try typing slui.exe and filling in the product key and activate - then restart the machine) or re-format the drive/partition that Windows is on and re-install Windows again.

  • Will I really need a new Mac or will all iphone, iPad updates be cloud based?

    Our iMac is almost 6 years old and cannot be upgraded to Lion. I will need to somehow update our iPads and iPhones with a new Mac...or will I? I figure I have 4-8 months with w Leopard before my update days are over with my iMac....then what? We almost never use our computer anymore...Just about every thing  we need to do we can do on our iPad/iPhone. I am under the impression that "Soon....?" all update will be cloud based. Since everything will be stored in the cloud, why will I need a huge hard drive or an external HD other than to keep an emergency backup in the event of a catastrophic cloud failure. I guess my main concern is future updates with our iPhone/iPads.   Thanks, Bill

    Late 2006 - Early 2007 all Macs became Lion compatible (Core2Duo and Xeon processors with 2 GB of RAM is what is needed).    As for Cloud based updates, it is anyone's guess. Apple hasn't yet announced one way or another if your fear is going to happen.  Instead of worrying about that, try to make do with what you have, until you must upgrade to Lion because of some application compatibility, and then make sure all of your applications are Lion compatible before upgrading:
    http://roaringapps.com/apps:table
    So while you may not a new Mac, it will need to be newer than the Mac you originally got if it comes to be.  Don't let updates be the driving force of whether you get Lion.  Unlike Windows many people can stick with older copies of Mac OS X, and even Mac OS without worrying too much about security as long as they don't use Peer2Peer software, and only get attachments from people they trust.

  • HT1766 I have restored my new phone from I cloud but when I connect to my PC to put some music on it asks for  set up as new phone or back up from a date from iTunes that is too old. Help it's doing my head in

    I have restored my new phone from I cloud but when I connect to my PC to put some music on it asks for  set up as new phone or back up from a date from iTunes that is too old. Help it's doing my head in

    Select setup as "New", the next screen should prompt you to rename your phone. Just name it what you already have it named. After that, you should be able to sync and all of your data & settings will still be exactly as you've already set them up on your phone. The message is more threatening than what really happens.

  • SLD-Bridge / Data Supplier Bridge and new technical systems

    Hi,
    The data supplier (data collection process) periodically sends data to the SLD bridge. This SLD bridge provides this information to the SLD.
    My question: Will new technical systems be created(!) and updated automatically in the SLD by using SLD bridge??
    Or do I have to create new technical systems allways manually by SLD browser??
    Thanks and regards!

    How about the "creation" process of technical systems??
    I am confused of the idea of the SLD bridge. The idea sounds great to me, but how is the link between the technical systems and all these collected data passed to the SLD realized??
    The online documentation is not very helpful...

  • 8.0.2 - problem 1 - unable to scroll screen when the keyboard is present. Huge problem for emails and other cloud based providers that allow for data entry. We need a fix ASAP!

    8.0.2 - problem 1 - unable to scroll screen down or up when the keyboard is present. When typing text, I am unable to see the text I am writing due to this problem. Huge problem for emails and other cloud based providers that allow for data text entry. While the keyboard is present, I am unable to scroll down to see the text, the screen automatically scrolls back up to the top of the screen. We need a fix ASAP!

    Have you tried resetting your iPad? You will not lose any data. Reset the iPad by holding down on the sleep and home buttons at the same time for about 10-15 seconds until the Apple Logo appears - ignore the red slider if it appears on the screen - let go of the buttons. Let the iPad start up.

  • My phone is water damaged and i bought new iphone 5S can i restored the data from my previous phone cloud backup to the new one

    my phone is dead due to water damaged and i bought new iphone 5S. can i restore the data from my previous phone cloud backup to the new one?

    how? i can see the backup from the phone cloud setting but there is nothing to click to restored. the one ive got now is since last year

  • How will the Time Capsule support IPv6 and coop with the new emerging security threats that will emerge due to the new technical possibilities that IPv6 provide?

    How will the Time Capsule support IPv6 and coop with the new emerging security threats that will emerge due to the new technical possibilities that IPv6 provide?

    Cross your fingers and hope.
    Obviously if there is any big or known threat Apple will send out a firmware fix.
    But the TC is designed to be end user simple device. It has no firewall that is visible at any rate. I don't know that it truly doesn't have a firewall but it is not part of the end user controls.
    IMO if you have major security concerns that go beyond end device firewall, which is where Apple do put most of the security, since firewall in the router is plainly not a stop to anybody deliberately downloading an infected file or website, and most end users.. do not want a firewall that prevents them using the web like a business does, where only certain ports are allowed. Everything else tough luck.. you are not allowed to use it. Then TC is unsuitable for you anyway.. buy a proper firewall appliance.

  • Research on the Security of NGDC Based on ASP

    Research on the Security of NGDC Based on ASP
    Zhang Li Gong Jianya Zhu Qing
    Key Words
    active server pages (ASP); national geospatial data clearinghouse (NGDC); geographic information system (GIS); Internet
    Abstract
    On the basis of the authors? experience of setting up an NGDC Web site, this paper attempts to present some significant aspects about the security of NGDC based on ASP. They include data storing, database maintenance, new technical support and so on. Firstly, this paper discusses how to provide the security of data which is saved in the host of NGDC. The security model of ?New works ?DB Sever-DB-DB Object? is also presented. In Windows NT Server, Internet Information Server (I IIS) is in charge of transferring message and the management of Web sites. ASP is also based on IIS. The advantages of virtual directory technique provide by IIS are emphasized.
    An NGDC Web site, at the Research Center of GIS in Wuhan Technical University of Surveying and Mapping is also mentioned in this paper. Because it is only an analogue used for case study, the transmission of digital spatial products is not included in the functions in this NGDC Web site. However, the management of spatial metadata is more important and some functions of metadata query are implemented in it. It is illustrated clearly in the functional diagram of the NGDC Web site.
    1 Introduction
    Needless to say, it is very important for most GIS users to acquire and integrate the geospatial information from various districts. However, the current situation of geospatial information production and dissemination in the world is still unsatisfactory. On one hand, users do not know where the geospatial data files are stored and what geospatial data is useful for their applications, or have not necessary computer facilities. On the other hand, due to the lack of coordination and cooperation, the duplication of geospatial data production widely exists. Most of geospatial information is stored by different organizations including governmental organizations, commercial companies. What?s more, the lack of geospatial data exchange and sharing mechanism results in relative low benefit of geospatial data use. It is difficult for some products to get necessary information from other producers to integrate with or to update their own databases. In short, the value of geospatial information has not been shown exactly in GIS industry of China.
    It is obvious that the information distribution technique based on Internet can play a great role in GIS industry. National Geospatial Data Clearinghouse users will be able to query what geospatial data is being produced, how about is quality, where it is produced, and how to get the geospatial data economically and conveniently.
    2 NGDC and ASP technology
    As mentioned above, NGDC is a geospatial information distributed network system which is concerned with geospatial data producers, managers and users. So the relationship among them must be harmonized. The NGDC provides the service of geospatial information through internet. In detail, it will allow various data formats to exist in this opened geospatial information service system and it supports the share and query of the geospatial data from different sources. The main mission of NGDC is to offer a means of fast, efficient, safe, economical service of geospatial data provision to users. At the same time, it will offer means for data providers to advertise their new products and collect users? demands and feedbacks in order to promote the geospatial data production.
    To date, the model of NGDC is usually described as a provider-oriented model. In this model, every geospatial data provider is linked with internet as an NGDC node... user?s access NGDC nodes through internet and browses the catalogues of geospatial data stored in NGDC, and then they query the metadata about the available products for their applications. After selecting the desired data set, the user can send an order to the relevant producer on-line or by E-mail system. If users can not find the geospatial data available in this NGDC node for their applications, they will be able to access other NGDC nodes.
    So the construction of NGDC is concerned with the planning and maintenance of dynamic Web sites linked with internet. Since Active Server Pages (ASP) came out with its peculiar characteristics several years ago, which is applied to the construction of more and more dynamic Web sites in the diverse fields? In comparison with common gateway interface (CGI), ASP is more effective and flexible as a server scripts environment.
    With html pages, script commands and active X components, ASP can set up dynamic, interactive and efficient Web server programs. It is not important whether browsers can run those ASP codes, because all of ASP programs including scripts plugged in html, such as VBScript, JScript, are executed in servers. ASP programs will send a series of commands to the script engine, and then the script engine translates the commands into some codes which can be executed by servers. After running the executive codes, the results will be sent by servers to users? browsers in html. In this way, it is sufficient for browsers to have basic function of browse. As a result, the speed of the system increases rapidly.
    NGDC Web site provides users with a catalogue of geospatial data entity, data entity and the relevant metadata. Therefore it is inevitable to access various databases in the construction of NGDC. It is convenient to connect database systems with ASP plug-in Active X components, so Web pages can be linked to all kinds of databases which provide ODBC interfaces for other programs. Active X components provide the objects whose tasks are to finish certain functions. So Active X components are of great significance in setting up Web programs.
    3 Research on security of NGDC
    This paper attempts to present some significant aspects about the security of NGDC base on ASP, such as data storing, database, maintenance, new technical supporting and so on.
    3.1 Security of data storing
    The information stored in NGDC includes geospatial data, relevant metadata and catalogues of data products. The maintenance of all the information is a very hard task. Of course, the security of data storing is included in it. From the point of system maintenance, the security of data storing in NGDC is concerned with disk error-tolerance and back-up supporting.
    With the rapid development of manufacturing technique of hard disk, the life-span of hard disk has been lengthened. Disk error-tolerance decreases usually the possibility of data-losing because of errors of hard disks. It is inevitable that some errors cannot be limited in spite of any error-tolerance system. In order to maintain the security of data, the significance of data should be assessed firstly and so should the loss of data-losing. There are three kinds of dump plans for database or data files: full data dump, increment data dump and combination of them. As in NGDC the need of data back-up depends on its significance.
    3.2 Security of database maintenance
    As for popular large-scale database systems such as Microsoft SQL Server, Sybase, Oracle, Informix, security maintenance is implemented by four levels of ?New works ?DB Sever-DB-DB Object? security model. Every user has his network login ID and his password, with which the user ID and the password, users can login into network. Take Windows NT Server for example, Windows NT Server provides some security maintaining methods such as encoded password, minimum password length and so on.
    In general, network cannot automatically permit its network users to access databases in it. The fact that a user can access databases does not mean that he can automatically access databases in it. Only those users who have their database user IDs stored in system tables in database can access database.
    3.3 Security with ASP
    In the environment of Windows NT Server, Internet Information Server (IIS) is in charge of distributing information and maintenance of Web sites. ASP is also based on IIS. When users access some ASP files in their browsers, the relevant ASP scripts will run in server and the results will be sent users in Web pages.
    Virtual directories are different from physical directories in hosts or servers. Net work administrators may make good use of the mechanism of virtual directory in order to maintain the security. IIS supports virtual directory which plays a great role in the security maintenance of Web sites. Firstly, virtual directory conceals the information about actual directory structure. In normal browsers, users can get the path information of a certain Web site; the directory information of Web sites will be exposed to users linked with Internet. As a result, it is easy for the Web sites to be attacked by hikers. Secondly, it is convenient to transfer the WWW service from one server to another without updating the code in Web pages if there is the same virtual directory structure in two servers. Finally, when putting Web pages into virtual directories, administrators can assign different attributes to the directories. For example, in the construction of NGDC Web site, it is important to put normal html files and ASP files into different virtual directories. The attribute of directories in which normal html files are stored may be ?Read? while the attribute of directories in which ASP files are stored may be ?Execute?. On one hand, it simplifies the maintenance and management of NGDC Web sites. On the other hand, ASP source files will never be sent to user browsers. In other words, hikers cannot get the ASP source codes through their browsers. Thus it improves the security of ASP files.
    4 An NGDC model Web site in WTUSM
    Some other security aspects in operational model, programming, management in the plan and construction of NGDC should be concerned. As an example the construction of an NGDC model Web site is presented below in order to explain the security maintenance of NGDC in detail. On the basis of authors? research on relevant problems, this NGDC model Web site was planned and deployed in early 1999. As a model project, the purpose of construction of this Web site is to provide some useful experiences for other projects on NGDC. Therefore the process of geospatial metadata plays a great role in this Web site. In fact, there are not actual geospatial data products stored in this NGDC model Web site. The main task of this Web site is to provide relevant geospatial metadata services, so the functions of data product maintenance cannot be found. Geospatial metadata is stored into meta-database in Microsoft SQL Server. With ?New works -DB Sever-DB-DB Object? security model in Microsoft SQL Server, the relations between user and access rights are set up. In order to simplify the problem, those two tasks are assigned to two DB users. One is a user who is the owner of DB objects. (Of course, he has all rights to access, update and delete DB objects); the other is a normal user who can only access DB objects such as tables. While developing ASP programs in the integrate developing environment of Microsoft Interdev, the functions may be fulfilled by script programs running either in clients or in servers. As a result, it improves the confidentiality of ASP programs and the efficiency of NGDC service system.
    In the NGDC Web site, something has been done in order to improve the security of operation: a table named providers? information table is stored in NGDC to keep some useful information about relevant geospatial data providers, such as name, ID, passwords, contact methods and son on. The information may be a long, irregular string whose length is less than 1024. It is produced and maintained by NGDC. The providers? information table is stored in the server in NGDC. In this way, data producers provide geospatial products together with their identifying information through Internet.
    5 Conclusions
    In short, it is very convenient and efficient to distribute geospatial data in the NGDC nodes through internet. On the other hand, with the development and construction of NGDC, there will come more and more challenges and problems about the security of NGDC. Obviously some researches and discussions in this field need to be further carried on.

    Jaya
    We have two ways to achieve this scenario
    1.Going with PCR where we Query No of Years Completed
    2. Going for Custom Function
    In the above two ways  we have to maintain the year of completion in Date Specification Either Manually or Thorugh Dynamic Action which shd automaticallly update....IT00041
    I prefer the second one since PCR is some wht complicated

  • Is Forms Central a "Cloud"-based service?

    I am a sole proprietor. I'm considering using Forms Central to create and upload to my website the intake documents for new clients to fill out prior to intake appointment.  In order to receive their completed forms, will I need to subscribe to this service indefinitely?  If so, how secure are the forms "in the cloud"-- meaning, will I be the only one looking at them? Thanks!

    Yes, it is a cloud based service. You have complete control over your data.
    Our pricing page explains your options for subscriptions:
    https://www.acrobat.com/formscentral/en/pricing.html

  • AD sync service account for cloud based application

    i have a cloud based application that i am setting up AD sync with. in their directions below i have bolded the ones i need answers too. my domain functional level is windows server 2003
    The active directory synchronization requires the following:
    A domain user which has the following properties:
    The password is known and does not expire - completed
    The domain user account has read permissions to all objects in the entire domain within active directory
    Confirm that if the domain has been upgraded to Windows 200x functional level from Windows NT4, 2000 or 2003 that we have the appropriate Group permissions below available to the domain user account for the synchronization in addition
    to read permissions to the entire domain:
    Pre-Windows 2000 Compatible Access
    Pre-Windows 2003 Compatible Access
    The username and password are passed using the appropriate communication channels - completed
    i have created a service account in my AD called myappldap. does a domain user have read permissions to all objects in the entire domain within active directory without adding the to any other security groups except domain users? Or do i have to click on
    the top level domain object in AD>go to properties>security>and give them read permission and proprogate down those premissions? Also i do not see Pre-windows 2003 compatible access as a security object i can give this service account read permissions
    to. i just wanted to confirm that this is because i am still running a functional domain of windows server 2003?

    A domain user has complete Read on everything in the forest.
    As for the Pre-Windows 2000 Compatible group, that's a reduced security group to allow NULL password for pre-Windows 2000 DCs, such as the way NT4 RRAS (VPN servers) used. In Windows 2000 and newer, we can eliminate that group, since it's a security concern.
    More info to read up on it, here:
    http://social.technet.microsoft.com/Forums/windowsserver/en-US/e8dfacba-985f-4042-abeb-f341bf37522f/prewindows-2000-compatible-access-group?forum=winserverDS
    Everyone group does not include anonymous security identifier
    http://support.microsoft.com/kb/278259
    As for Pre-Windows 2003, I haven't come across anything that would say
    pre-2003.  It almost appears that the software is using NULL or some other kind of reduces security on the password. Then again, I could totally be wrong. Is that specifically how the third party software specifies it in the docs? 
    Can you post a link to it?
    Ace Fekay
    MVP, MCT, MCSE 2012, MCITP EA & MCTS Windows 2008/R2, Exchange 2013, 2010 EA & 2007, MCSE & MCSA 2003/2000, MCSA Messaging 2003
    Microsoft Certified Trainer
    Microsoft MVP - Directory Services
    Complete List of Technical Blogs: http://www.delawarecountycomputerconsulting.com/technicalblogs.php
    This posting is provided AS-IS with no warranties or guarantees and confers no rights.

  • Cloud based computing for beginners?

    The first thing you need to figure out is WHICH cloud skill set are they looking for?  Do they want you to know how to use public cloud offerings like Amazon, Azure and Rackspace?  If so, make an account and start working with them, it's that easy.  There is no way to learn except to do it.
    If they are looking for building and supporting cloud computing itself, then you do the same thing that you do with any field.... download the software and build yourself a lab at home.  OpenStack is far and away the dominant cloud platform and it is completely free.  You can do cloud computing at home pretty easily to get yourself started.
    Cloud isn't a skill on its own.  That's like says "computers" as a skill.  What specific skill set are they seeking?

    This link should introduce you to basics and then acquiring some knowledge, you should contact your local CLOUD SOLUTIONS SMBs to find out more about what they are offering, what they mean by cloud based app solutions, pricing ideas, hosting, reliability & stability, cost effectiveness comparing to your local hosted server, security of your hosted data. Before all that, just go through the basics and then get some consultation as practical knowledge and experiences are better than theories over the internet everywhere.
    Click on the link below :-
    Microsoft cloud Basics

  • Cloud-based software-as-a-service (SaaS)

    Hello
    Does anyone know where can I find documentation on how to configure SaaS with WAAS?
    I'm looking to setup salesforce application on the WAAS for WAN optimization out to the branch office. All I can find is whitepapers that talks about what it does. I need detail steps on how to properly configure it or examples showing how to. 
    Do you just build an SSL service connection to *.salesforce.com?
    How will the traffic from the branch office be able to route to salesforce.com when they have their own local ISP?
    Do you add static routes for all of the possible IP addresses for the application out of your Data Center? If so, this makes it very difficult to manage since the cloud service can change their IP address at any given time.
    I would appreciate for someone to give me a simple example to follow. :-)
    Thanks in advance!
    John

    Hello John,
    I am not an expert on this but still PLEASE read the following on detailed, you will find most of your questions answered:
    Simplified Deployment Model for Cloud-Based Services
    Cloud-based  software-as-a-service (SaaS) providers such as WebEx.com and  Salesforce.com primarily use HTTPS to securely deliver services to their  clients. Using Cisco WAAS SSL Application Optimizer, Cisco WAAS can  optimize delivery of these services to the remote branch-office users  who connect to these services through a backhaul connection to the data  center.
    However,  the solution poses some unique challenges related to simplifying the  implementation and deployment model. Typically, SaaS providers have  multiple SSL server farms with multiple hosts spanning several data  centers. When a client initiates an SSL connection request to a server  located in the SaaS server farm, the Cisco WAAS SSL Application  Optimizer needs to map the destination IP address in the incoming SSL  request to an SSL accelerated service to present the right SSL  certificate to the client to perform an SSL handshake.
    For  SSL services that are hosted in the enterprise data center, the IT  administrator knows and controls the SSL server IP address and can  provide it to the data center Cisco WAAS. But for an SSL service hosted  at a third-party SaaS provider cloud, the SSL server IP address is not  controlled by the IT administrator. Also, there may be not just one but  multiple server IP addresses even for a single SaaS service, and these  may be subject to change.
    To  simplify the deployment model for SaaS optimization, Cisco WAAS  provides support for domain names in the SSL accelerated service  configuration. This model can be applied to any cloud-based SaaS  applications such as Salesforce.com and WebEx.com. For example, when an  SSL accelerated service is configured in the data center Cisco WAE with a  wildcard domain name (for instance, *.webex.com) option, the Cisco WAAS  SSL Application Optimizer performs a reverse Domain Name System (DNS)  lookup on the destination server IP upon receiving an SSL connection  request from the client, and if the IP address resolves to a host that  matches the configured wildcard domain name (for instance, *.webex.com),  then the appropriate SSL accelerated service policy is applied to this  connection (Figure 3).
    Cisco Wide Area Application Services SSL Application Optimizer Deployment Guide  (Simplified Deployment for SaaS Optimization)
    http://www.cisco.com/en/US/prod/collateral/contnetw/ps5680/ps6870/deployment_guide_c07-541981.html
    This topic is pretty complex for a support forum, I suggest to open a TAC case or contact your  Cisco partner or PDI support.
    hope this helps!
    Felix

  • New to BW security

    Hi Guys,
           I am completely new to BW security.Can someone please help me with good documentation about how the  roles are built and maintained?
    Kindly please do not give any help.sap.com or SDN links.I have already seen those but i am not able to understand the exact procedure.
    Any help would be appreciated. Please send the documents if any to my email ID [email protected]
    Thanks In advance.

    Hi Guptha,
    Unlike R/3 Security, BW Security is not Transaction based, it actually deals with securing BW Objects like Info Objects, Info Cube, ODS, Info Source, etc....
    The main Authorization Objects in BW are:
    S_RS_ADMWB
    Authorizations for working with individual objects of the Administrator Workbench. In detail, these are: source system, InfoObject, monitor, application component, InfoArea, Administrator Workbench, settings, metadata, InfoPackage, InfoPackage group, Reporting Agent settings, Reporting Agent package, documents (for metadata, master data, hierarchies, transaction data), document store administration, InfoSpoke.
    S_RS_IOBJ
    Authorizations for working with individual InfoObjects and their sub-objects
    Until Release 3.0A, only general authorization protection was possible with authorization object S_RS_ADMWB. General authorization protection for InfoObjects still works as in the past. Special protection with S_RS_IOBJ is only used if there is no authorization for S_RS_ADMWB-IOBJ.
    S_RS_ISOUR
    Authorizations for working with InfoSources with flexible updating and their sub-objects
    S_RS_ISRCM
    Authorizations for working with InfoSources with direct updating and their sub-objects
    S_RS_ICUBE
    Authorizations for working with InfoCubes and their sub-objects
    S_RS_MPRO
    Authorizations for working with MultiProviders and their sub-objects Until BW 3.0B, Support Package 1, authorizations for MultiProviders were checked by using the authorization object S_RS_ICUBE. As of BW 3.0B, Support Package 2, this can be maintained, or you can change the check over to the authorization object S_RS_MPRO. To do this, choose in Customizing under Business Information Warehouse ® General BW Settings ® Settings for Authorizations.
    S_RS_ODSO
    Authorizations for working with ODS objects and their sub-objects.
    S_RS_ISET
    Authorizations for working with InfoSets
    S_RS_HIER
    Authorizations for working with hierarchies
    S_RS_COMP
    New Authorizations Check for Variables in Query Definition
    Object type is ‘VAR’
    S_RS_COMP1
    Is checked additionally with S_RS_COMP
    Checks for authorizations on query components dependent on the owner (creator RSZOWNER)
    Authorizations are necessary, e.g. for creating queries
    S_RS_FOLD
    Suppress InfoAreaview of BExelements
    Specify ‚X‘ (true) in the authorization maintenance for suppressing
    To get more information on BW Security, plz visit:
    http://www.*********************/bw_security/bw_security.htm
    Hope it helps.
    Please award points if it is useful.
    Thanks & Regards, Santosh

Maybe you are looking for

  • HR Stadard Cube 0PA_C01: error while activating the transformation

    Hello, I have migrated the data source 0HR_PA_0 to version 7. While activating the transformation to HR standard cube, the start routine has the following error: E:Field "COMM_STRUCTURE-EMPLOYEE" is unknown. It is neither in one of the specified tabl

  • Rulers by default in Acrobat X

    Is there a way to set the Rulers to display by default when opening documents in Acrobat X Pro

  • Second display show non-Keynote application windows?

    I use Citrix' GoToWebinar and would like to use Keynote to give presentations with a two-display setup. Citrix' GoToMeeting application (which is what you use to give a webinar) shows useful information such as who is online viewing, and it enables y

  • New 2012 server in a mixed 2003 and 2008 domain (in process of upgrading)

    We are replacing a Windows Server 2003 machine which crashed and is gone, with a Windows Server 2012 Standard machine.  The old 2003 Server was a domain controller running along side one other 2003 server (which is getting replaced next) and 3  Windo

  • Email pictures

    How do you email out a picture? I don't see anything to add an attachment, or can this not be done. Also, if i receive an email with a picture, can i then save that picture on the iphone. Thanks!