NWA 7.3 : Looking for "security roles" (Policy Configuration) ...

Hi guys,
We deployed a simple application in our new SAP NW 7.3 JAVA instance; by calling the application, we receive "error 403 : Error: You are not authorized to view the requested resource."; this was fixed wihtin NW 7.x by adding a user/group within security roles of the selected component ( Visual Admin => Security Provider => Policy Configurations => select component and than security roles );
where to do this within NWA 7.3 ?
any ideas;
Thanks
Oliver

Hi Oliver,
Procedure
  Start SAP NetWeaver Administrator with the quick link /nwa/auth.
  Choose Components.
  Select a policy configuration.
  On the Authentication Stack tab, choose the Edit pushbutton.
  Determine if you want to use an existing template or if you want to change the policy configuration of the current component. 
To use an existing template, select a template from the Used Template field.
For authscheme references, select a template from Used Authscheme.
The component uses the settings and authentication stack from the template. To edit these settings, edit the settings of the policy configuration template. To create a new template, see Creating Authentication Stack Templates for Policy Configurations.
  To change the policy configuration of the current component, do the following: 
Add and remove login modules as required.
The system applies the login modules in the order they appear in the list.
  Set a processing flag for each login module. 
For more information about login module flags, see Policy Configurations and Authentication Stacks.
  Add and remove any options to the login modules.
  Set the authentication stack parameters according to the type of policy configuration. 
Please,go through below help file
http://help.sap.com/saphelp_nw73/helpdata/en/4a/734e26fa92731fe10000000a42189c/frameset.htm
Cheers
Revanth Pasupuleti

Similar Messages

  • Im looking for some assistance in configuring our wireles...

    Im looking for some assistance in configuring our wireless router to allow remote connections into it.. and then from there access any of the 5 computers on our network. I dont have the model number with me now, but just want to know where to start....
    Goal=== to allow me to access our remote locations network and access / vnc into our 5 terminals...
    I just need to know how i can configure the router to allow outside connections and then from there connect to our other machines via VNC...
    Any suggestions on where to start with this?

    in order to access the router remotely , you need to enable remote management on the router and to access the terminals using VNC .. you need to open the ports used by VNC ..

  • How to specify the security policy "Allow access to everyone" for security role in Deployment descriptor

    Hi,
    I am migrating a web application from Websphere to Weblogic. The web application has a security role defined in web.xml (Use LDAP for authentication).
    security-role>
            <description>Authenticated</description>
            <role-name>Authenticated</role-name>
        </security-role>
    This role is mapped to a special subject "All authenticated user in appliation realm" in WAS.
    In weblogic, I have the following setting in weblogic.xml
    <wls:security-role-assignment>
            <wls:role-name>Authenticated</wls:role-name>
            <wls:externally-defined />
        </wls:security-role-assignment>
    And after deploy the application, have to manually add a security role and add the security policy "Allow access to everyone" to this role.
    I am wondering if this setting can be specified in  for example weblogic.xml so just deploy web applicaiton using deployment descriptor, and I don't need write script to do that .
    Thanks

    Hi,
    You need to have Back End support to achieve this. In Back End you need to create two groups . You need to know what joins has to be made for which group (which is more important) and also make session variable for the userrole (with SQL supporting it). In the BMM layer, we need to put the security join conditions in the 'where clause'.
    And make a common report. User loggin in with the respective userid will have userrole and joins assigned in the Back end. And they will be viewing the report according to their access.
    Hope this will solve your problem.
    Regards
    MuRam

  • Looking for Security Best Practices documentation for Sybase ASE 15.x

    Hello, I'm looking for SAP/Sybase best practice documentation speaking to security configurations for Sybase ASE 15.x. Something similar to this:
    Sybase ASE 15 Best Practices: Query Processing &amp;amp; Optimization White Paper-Technical: Database Management - Syba…
    Thanks!

    Hi David,
    This is something I found on the Sybase site:
    Database Encryption Design Considerations and Best Practices for ASE 15
    http://www.sybase.com/files/White_Papers/ASE-Database-Encryption-3pSS-011209-wp.pdf
    ASE Encryption Best Pracites:
    http://www.sybase.com/files/Product_Overviews/ASE-Encryption-Best-Practices-11042008.pdf
    If these do not help, you can search for others at:
    www.sybase.com > serach box on the top right.
    I searched "best pracitces security"
    Can also run advanced search > I typed in "ssl" into exact phrase.
    Hope this helps,
    Ryan

  • Requesting for Security Roles

    hi,
    can you just tell me the security roles.
    our company is going to implement a project. we dont have any KT and procedure for creating roles
    our company is starting to implement SAP. please suggest me for creating roles and  authorisation design.
    thanks
    Ramesh

    Hi Ramesh,
    If you don't have security training/experience I suggest that you book yourself on course ADM940 which covers auth basics (including info on creating a role matrix etc).
    If you don't have this then make sure that you work with someone who has done this.  You would be very lucky to produce a reasonable design without either the training or using someone who knows what they are talking about.
    Other resources are the following publications (you can find them via google):
    Authorizations Made Easy (the 4.6 version is bit out of date but if you read & learn it you will be more than OK)
    SAP Security and Authorizations
    Risk Management and Compliance with Legal Regulations in the SAP Environment
    SAP Authorization System
    Design and Implementation of Authorization Concepts for SAP R/3 and SAP Enterprise Portals
    For a wide overview of security I would recommend the SAP Security and Authorizations book, as a design aid I personally feel that SAP Authorization System would be more appropriate for a newbie

  • Looking for script - Quarantine policy reporting

    I'm looking for a way(script or CLI) to gather percentage information for Quarantine policy's and dump it to a ".csv" or ".txt" file.
    What I want is to collect the percentage of quarantined messages per policy.
    Thanks for your help in advance,

    jgarry wrote:
    [This one?|http://www.petefinnigan.com/find_all_privs.sql]
    That would be the one!
    Thanks.

  • Looking for security tips about webhosting app

    We want to use an XServe for hosting some of our clients' websites. These should have web and ftp services only (maybe webmail) as well as able to install their own CGIs (or run ours).
    So far (and with the help of the forum here I managed to set up the server. However before taking over the first websites, I generally wanted to know if there are any security issues to consider when intending such an application.
    So some things I'm still unsure with when setting up a user regarding security:
    (1)
    Each user I create is automatically assigned to the group 20 (shortname "staff"). Should I made any changes here ? Must the user be part of other groups ?
    (2)
    Should I set the login shell for these users to "none" or doesn't it play a role ?
    (3)
    Which application has the "Info" section for each user at the WGM ? Is it just for information ?
    (4)
    How can I prevent a user logging in to the server by telnet or ssh ? Currently I have configured our router to block traffic on ports 22 and 23 and this works quite well. But isn't there a more radical solution (beside disabling these ports in the server firewall) ?
    Any other advise or security tips for protecting the server is welcome and appreciated.

    1. I would probably set it up so each of your clients has it's own group.
    Although, I don't know the specifics of your setup.
    Why is this recommended seen security aspects ?
    Users have only access by ftp/mail services, anything else is disabled.
    2. A shell is required for FTP access. So unfortunatly this is not an option.
    Strange that Apple likes to give each user that requires ftp also shell access in the way that they can log in via terminal - or is their command set limited to only viewing files, creating directories and changing permissions ?
    Anyway, since we disabled the ports for ssh in our router I think that we are on the safe side here. Or can you think of a tricky user that finds a way to work around this ? I don't think, but better asking the experts before a hacker shows that it is possible
    4. The info tab in WGM is to populate the associated fields in the LDAP DB.
    Okay, then we leave this out, since users have not access to the server in a way that they can use the address book.
    May I add another question:
    How safe is it to enable the webmail feature for users ? Are there any known bugs or security holes ?

  • Looking for security info

    My G5 has been going in to sleep mode while playing an online game. When I check the logs I see a repeated attempt to generate a password which is denied by my Mac. Anyone else ever had the same problem. Sorry if I'm in the wrong forum.
    Many thanks

    What security software or hardware do you have?

  • Firewall. I'm looking for one that auto-configures my installed progs

    Hello pals. How I've said before, I'm newbie on arch. On other distros, some firewalls bring pré-configurated rules to the 'comon programs', thing that arch doesn't. In a way it's good, but, on "my way" not.
    I need a program, or a way, that I feel myself secure, and, after install a firewall, anyone, I can listen streaming on internet, an other things. It's a really easy thing, may you think, but, firefox uses a port, xmms, other one, and qbittorrent, other one. Trying firestarter, it's blocked all. I couldn't navigate, and should I off the firewall
    Could you help me in any way?

    Try Gufw. You can add rules for programs that it detects on your computer:

  • Looking for the steps to configure remote access to HD connected to airport Extreme via Surfboard modem

    I found an article that seemed a little dated outlining steps on how to access files on my exteral hard drive that is connected to my airport extreme.  I have enabled personal file sharing, specified the ports and put in the internal IP address. To test, I am connecting to VPN on my ipad, firing up a browser and trying to navigate to the external IP address and port number specified (xxx.xx.xxx.xx:xxxx)  I keep getting a page cannot be displayed error. Any suggestions?

    Test from a real WAN connection.. not a loop around via vpn. as it is hard to know where the problem is.. is it the vpn or the port forwarding.
    Also it is hard to test from ipad as the only effective protocol to use is AFP on 548 and ipad is not able to do it.
    Read Tesserax info on remote access.
    https://discussions.apple.com/docs/DOC-3413

  • Unable to assign all security roles to a user with a new custom security role

    Dear All,
    Happy New Year.!
    I have a query regarding the assignment of Security Roles to new users in CRM. Normally we assign the security roles to new users via an Admin user who has 'System Administrator' security role assigned to him/her. This works perfectly fine, and we can assign
    any desired security role to the new user.
    However, in our case, we need to delegate the user creation rights to some of the client partners. We do not want to give them access to all the Administration functions; hence we created a new Security Role, lets say 'Support User Role'. We have provided
    'Create', 'Append', 'Append To', and 'Assign' rights on 'User' entity for this new security role. With this security role, we are able to create new users now, but we are only able to assign 'Agent' security role, not any other security roles.
    For example, if user 'x' has Security Role defined as 'Support User Role'. If 'x' tries to add a new user 'y', then 'x' is only able to assign 'Agent' security role to 'y', but not any other security role. As per business requirement, 'x' should be able
    to assign some other security roles, including 'Support User Role', to new user 'y'.
    I believe that there is something missing in Security Role configuration, which is causing the above problem. We compared both 'Support User Role' and 'System Administrator' security roles, but not able to figure out which minimum rights we can provide to
    'Support User Role' so that users with this security role can only add new users (with any security role), and that they are not having access on any other Administration features as well.
    Appreciate any help that you can provide on the above issue.
    Thanks in anticipation.

    Hi,
    Can you check if you have organization level Read access for Securitity Role and Organization level Assign access for Security role.
    Refer:-
    http://www.magnetismsolutions.com/blog/paulnieuwelaar/2013/04/22/permissions-required-to-manage-roles-in-dynamics-crm-2011
    Hope this helps!!!
    Thanks,
    Prasad
    Make sure to "Vote as Helpful" and "Mark As Answer",if you get answer of your question

  • Looking for SAP Leasing Configuration guide

    Hi,
    I am looking for SAP Leasing related configuration/best practices guide.
    Can any one help me on this?
    Thanking you in advance.
    Regards,
    Ram.

    Check:
    http://help.sap.com/bp_profservicev1600/ProfServ_US/HTML/Scenarios/DUB_Scen_EN_US.htm
    http://help.sap.com/bp_profservicev1600/ProfServ_US/Documentation/Scenarios/DUB_Scen_Overview_EN_US.ppt
    http://help.sap.com/content/bestpractices/industry/index.htm
    http://help.sap.com/bp_retail603/Retail_US/HTML/index.htm

  • Error :Authorization check for caller assignment to J2EE security role whil

    Hi Experts,
                 i m working as a portal resource .
    after the deployment of standered Sap e-rec package .
    i m getting some error. i have assigned the recruiter role to one test user.
    Now i m getting two issue:
    1)All the services are appearing in Detailed Navigation Pannel but not in Portal content area..
    2) I m able to see few iview for the test user but those are also in detailed navigation view.
       And few ivews are giving following error :
      i)Internal error
    ii)error 2011-12-19 07:59:57:315 ACCESS.ERROR: Authorization check for caller assignment to J2EE security role [sap.com/com.sap.lcr*sld : LcrInstanceWriterNR] referencing J2EE security role [SAP-J2EE-Engine : administrators].
    /System/Security/Audit/J2EE com.sap.engine.services.security.roles.audit n/a EP-DEV-KRT Server 0 0_97989
    Full Message Text
    ACCESS.ERROR: Authorization check for caller assignment to J2EE security role [sap.com/com.sap.lcr*sld : LcrInstanceWriterNR] referencing J2EE security role [SAP-J2EE-Engine : administrators].
    please suggest what can be  done or what is pending from my side.

    Prajakta2602 wrote:
    Hi Experts,
    >
    > the previous issue got solved..
    > it was due to servies pack miss match and applying notes
    > the Basis guy  checked the SLD logs and accordingly found that the base components J2EECORE and JTECHS required paching as per
    > notes 1445294 and 1175239 were applied.
    > now the issue is:
    >
    >
    >  After implemetation and  i assigning the standerd sap roles
    > 1)Recruiter Administrator
    > 2)Recruiter
    > to the test user .
    > but for few iview it is showing error as in
    > 1) you are not a authorized user
    > 2) internal error
    >
    > please help experts.
    >
    >  i m working on portal side have i to assign any role to that test user..
    >
    >
    > Thnaks & Regards,
    > Prajakta
    You can run a quick check using the below steps:
    1. Check in backend whether there is any authorisation errors... you may use transactions SU53 or ST22 for any ABAP errors
    2. Also check in NWA -> log viewer -> last 24 hours log for the particular user to see any java related issues.
    Regards,
    Mahesh

  • Looking for a Darknet/Secure BBS app

    I have been a fan of Haxial KDX for the longest time, but due to the bugs, etc., I would like to move on.  I'm looking for a secure darknet/bbs styled program that supports chat, filesharing, and of basic user management (who can login, who can't, etc..).  I have been asking this question all over the web, and haven't gotten (or found) a single response.  Waste has never worked right for me, by the way.  I would definitely prefer it to be open source, which is why I thought it best to post here.  Please help out, or at least direct me somewhere where I should ask... Thanks.
    As an aside, the guy who wrote KDX and Hotline (Adam?? Hinckley) claimed on the Haxial website that he is willing to sell the project.  I wouldn't mine purchasing and restarting the KDX Project, but I've been unable to get in contact with him.  So...if you are him, or know him, or own the rights to Haxial KDX and all related projects...$$$$$
    Last edited by xen0blade (2010-01-12 13:18:15)

    I've recently become a big fan of OneSwarm - http://oneswarm.cs.washington.edu - I like that it supports remote access.
    But I'm definitely interested to see what this thread brings up!
    Last edited by hAyZe (2010-01-11 20:50:45)

  • Looking for a free app for secure note taking with search feature (unlimited)

    Hi dudes,
    As the topic suggests, I'm looking for a free app for secure note taking with search feature without any restriction on the number of notes or any other major restriction. I already use HiDisk (which lacks search feature), and security note+ (which has limitation on the number of notes). I also have used My Disk which its search feature doesn't work correctly (it's buggy).
    Thank you.

    One named NotePad is free, saves as .txt files.
    Another, WriterRoom, costs $1.99USD, and saves as .txt and .doc files.
    1. If any post helps you please click the below the post(s) that helped you.
    2. Please resolve your thread by marking the post "Solution?" which solved it for you!
    3. Install free BlackBerry Protect today for backups of contacts and data.
    4. Guide to Unlocking your BlackBerry & Unlock Codes
    Join our BBM Channels (Beta)
    BlackBerry Support Forums Channel
    PIN: C0001B7B4   Display/Scan Bar Code
    Knowledge Base Updates
    PIN: C0005A9AA   Display/Scan Bar Code

Maybe you are looking for