Oracle wallet user certificate and Appache certificate

We have Appache 2.0 application using certificate.
We have generated certificate request from the Oracle Wallet application.
Will the newly created certificate be still good for the Appache 2.0 (not Oracle Appache)?
TIA

Apparently, if you configure the wallet to have auto login enabled you do not need the password, I have not tried this myself yet though

Similar Messages

  • My company loaded profiles onto my iPad for email and calendars.. There is also a signing certificate and a certificate. What are these for? Additionally are they able to monitor apps and usage, ie Internet usage when it is not on their wifi?

    My company loaded profiles onto my iPad for email and calendars.. There is also a signing certificate and a certificate. What are these for?
    Additionally are they able to monitor apps and usage, ie Internet usage when it is not on their wifi?
    I do not have any VPN enabled?

    Do you happen to have an Android?  If so and depending on what version there is a great data usage analyse tool built-in.  See if you can go to Settings -> Data Usage  from there you can pick a current or previous billing cycle and then use the vertical sliders to select a date range and it will filter the usage data per app to show you exactly what app(s) were using data during that time frame.

  • Does Firefox reset all the root certificates and root certificate settings whenever an upgrade is installed?

    Does Firefox reset all the root certificates and root certificate settings whenever an upgrade is installed?

    Root certificates are stored in the file nssckbi.dll and if you've disabled build-in root certificates then it is possible that they get re-enabled. There is however no reason to disable any of the build-in root certificates.
    Tools > Options > Advanced > Encryption: Certificates > View Certificates : Authorities

  • Database connectivity requiring oracle wallet, tnsnames.ora, and sqlnet.ora

    We have a new datasource that I need to write a report against.  In order to access the db, I have to install an Oracle wallet on my pc that contains a certificate.  I then have an entry in the sqlnet.ora file that references this wallet, and I have an entry in my tnsnames file.  I wrote a report successfully on my pc.  We then have our Business Objects installation on a Sun Solaris machine with Unix.  We installed the wallet, added the sqlnet.ora entry, and the tnsnames.ora entry.  I am able to connect to the db from the unix command prompt by typing sqlplus username@dbname successfully.  However, when I place my Crystal Report in Bus. Obj. I cannot get it to work.  I go to the CMC, select the report, choose Process, Database.  I am entering Use custom database logon info and choosing Oracle as my database driver.  I then enter the tnsnames entry into the server and enter my username and password and check the use use same database logon as when report is run.  I get the error The database logon information for this report is either incomplete or incorrect.  I'm guessing the report is not using the certificate in the wallet when it is trying to log on, but I'm not sure.  Does anyone have any suggestions or experience with this?  Thanks in advance for any help.

    Hi Angie,
    you should install the 32bit Oracle driver on your Solaris machine and adjust the LD_LIBRARY_PATH environment variable (in the profile of the BOBJ installation user) to point to the path of the 32bit libraries of your Oracle driver.
    BOBJ is not a native 64bit software and can therefore work only with the 32bit versions of the database drivers.
    Regards,
    Stratos
    Edited by: Efstratios Karaivazoglou on Jul 15, 2009 4:49 PM

  • Oracle Enterprise User, OVD and MS Active Directory (AD)

    Hi,
    I need to authenticate Oracle Users from MS Active Directory.
    If I create an Oracle Enterprise User, can I just use OVD or do I need also OID ?
    If the answer is YES, I just need OVD do I need just to install OVD or do I need any other installation from OIM in order for it to work?
    Thanks in advance for answering this post : )
    CMT

    Hi,
    I am not sure that you are correct.
    In the meantime, some one mentioned a white paper to read: "Directory Services Integration with Database Enterprise User Secuirty. In page 10 it mentions a scenario: EUS deployment using Active Directory and OVD
    (without OID).
    The cons mentioned are: Need to extend AD schema to include EUS meta-data (which I am not sure how its done).

  • Use gpo to determine computername, request certificate and import certificate to computer powershell

    Hey everyone,
    For deployment of winrm i need to deploy certificates in our environment.
    Now every certificate has to have a different name (computername)
    Is there a way to automate this?
    I would like to create a script that checks the computername, requests and imports the personalised certificate.
    Kind regards,
    Borrie

    Jrv,
    I don't think that's correct, as you can see in the link underneath for each computer or server you need to create a certificate and import in:
    http://blogs.technet.com/b/meamcs/archive/2012/02/25/how-to-force-winrm-to-listen-interfaces-over-https.aspx
    That's why i would like to create a script to automate this task.
    The script should check the computername, check if the cert already exists, if not request and import it with the computername as parameter.
    Borrie
    * edit, the procedure in the link describes using the domain name in stead of computername but I really need the computername, after importing the cert i also need it's thumbnail for use with configuring winrm and soon also another application.

  • Difference between "trusted" certificate and "valid" certificate?

    I have added a new system root certificate, but I am having problems with it. In Tiger, I would add certificates to the x509 Anchors keychain. Then, when I would select them in Keychain Access, underneath the expiration date I would see a little green dot with a white check-mark in the middle, next to the words "This certificate is valid."
    I understand that, in Leopard, new system root certificates are supposed to go in the System keychain. But, no matter whether I put my new certificate in the System keychain or the X509 Anchors keychain, I cannot cause it to look like it did before, with the message about its being "valid."
    Instead, when I select it in Keychain Access, underneath the expiration date, I see a little blue dot with a white cross in the middle, next to the words "This certificate is trusted for all users."
    What is the difference? And how can I cause a new certificate to be marked as "trusted" (with the green dot and check-mark, like before)?
    I've googled and searched the forums, and experimented, without success. Can anyone help me? Thanks for reading!

    Did you search the Internet on 'midp trusted untrusted'? The first link from Google points to http://www.j2medev.com/api/midp/javax/microedition/midlet/doc-files/Authorization.html
    Maik

  • Oracle Wallet Manager won't allow me to create a certificate request

    Hello,
    I am trying to setup my installation with SSL, I am trying to create a certificate request on Oracle Wallet Manager and I keep getting this error:
    "Could not create certificate request. Please check user information"
    I am entering the following information:
    Common Name: portal.grupoalsea.com.mx
    Organizational Unit: Desarrollo
    Organization: Sistema Integral de Administracion, S.A. de C.V.
    Locality/City: Distrito Federal
    State/Province: Mexico
    Country: Mexico
    Key Size: 1024 bits
    Why could this be happening? Does Oracle Wallet Manager go and look for my info some place? Common Name is the name for my site on WebCache, which is in turn mapped to the HTTP Server called Mservicio.localdomain.
    At this point, I have also tried setting the Common Name to other values, like the name of my HTTP Server, the name of my HTTP server without the "localdomain", but I still get the same message.
    Any help will be really appreciated!!!!

    Problem was due to a bug that won't allow to enter commas in Organization Name. All we needed to do is remove the comma from the Organization name and the certificate was correctly created.

  • How to load the ssl certificate to oracle wallet

    I have oracle 10.2.0.3 on Unix.
    I have a oracle wallet created. I need to load ssl certificate to the oracle wallet. I have CA certificate and server related certificate. In owm interface, there is Certificate:(Empty) and Trusted Certificates. Does anybody know where my certificate should go, Certification:(Empty) or Tryusted Certificates? By the way my certificate is from Verisign.
    Thanks a lot!

    Hi
    Thanks. I have added my LDAP certificate to Oracle wallet.
    Now my doubt is :
    Before adding this cert to my wallet , i have tried to connect my application through SSL , am able to connect it.
    I have used DBMS_LDAP.open_SSL function for conencting.
    Before adding the new cert my wallet conatins :
    ewallet.p12
    cwallet.sso
    GeoTrust.cer
    Equifaxb64.cer
    After adding the new cert also i am able to conenct through ssl my concern is , how we can figure out whether the ldap package checking my cert or not?
    How DBMS_LDAP.open_SSL works?
    Could anyone help me out to solve the issue?
    Thanks,
    San

  • Oracle Wallet and XE

    I believe this topic has been discussed quite a bit in the past on this forum. Essentially I would like to be able to utilize utl_http to access an external website using https. Doing research on this, I've come to find out that:
    a. You need to use Oracle Wallet Manager to import trusted certificates from these sites.
    b. Oracle Wallet Manager is part of Oracle Advanced Security Module
    c. Oracle Advanced Security Module is only applicable to Enterprise Edition Database.
    d. The 'owm' binary does not come packaged with Oracle XE.
    In my search, I also came across the following in the official Oracle Database Licensing Information document (http://download-west.oracle.com/docs/cd/B19306_01/license.102/b14199/editions.htm)
    Oracle Wallet
    Oracle Wallet is a password-protected container used to store authentication and signing credentials, including passwords, private keys, certificates, trusted certificates, and TDE master keys. Oracle Wallet Manager is an application that wallet owners can use to manage and edit the security credentials in their Oracle wallets. Oracle Wallets can be deployed on clients, middle tiers, and database servers free of charge. However, the following features that use an Oracle Wallet in turn require licensing of the Oracle Advanced Security Option: PKI credentials and transparent data encryption master keys. Oracle Advanced Security option is not required when configuring wallets to secure communication between the Oracle Database and Oracle Internet Directory.
    Based on this description, my intended use of Oracle Wallet would not require the Oracle Advanced Security option as I just want to store certificates of those sites I'm accessing via https.
    Does this mean that I could fire up owm on another database server, create the file and then use it in my XE application? Or does it mean that because I'm running XE and because owm did not come with the distribution, I have no right to utilize the functionality?
    Thanks in advance for any input.

    The T in TDE stands for transparent, so your application shouldn't need to even be aware that any columns or tablespaces are encrypted. TDE is generally implemented in systems that were never designed to encrypt the data, so in theory it should be "perfectly safe" to develop unencrypted and have the client encrypt the columns during installation.
    Of course, when marketing folks start talking about things that are "perfectly safe", that's always a sign of danger ahead. Even though I've never heard of a case where encrypting a column caused a problem for an application, I would be very dubious of doing development in an environment different than production. That includes the exact version of the database (I assume the client has installed the latest patchsets, so they're running 10.2.0.4, for example) as well as the edition. If you decide to rely on the fact that everything should go smoothly when you promote to a different version of a different edition of the database with a different schema definition, even though it normally should, you're pretty much guaranteeing that you will end up with a problem that will be a pain to resolve.
    In your case, I wouldn't use XE for development. It would be much safer to develop against the personal edition. That isn't free, but that is the enterprise edition of the database licensed to be run on developer machines. It isn't free, but it's way less than an enterprise edition license.
    Justin

  • Uploading of signed certificate Server certificate and Intermediate certifi

    Hello,
    We are implementing SSL for the first time on NW AS JAVA 7.0. I have received signed certificate from the CA.
    It contains Web server certificate and Intermediate certificate.
    I guess we import the Webserver CSR response. I not sure on what is the intermediate certificate and they say it is mandatory.
    Can you please guide.
    Thanks.
    Siddhartha

    Sorry Here,
    Hope I understand this correctly.
    The Comodo Positive SSL is a Web certificate. Although I ask OD to use it, it didn't.
    Then Profile Manager expects a "code signing" certificate which is why all it saw was Open Directory's one.
    Francois

  • Oracle Wallet Manager

    Hi I have a server.key , a server.cer and server-ca.crt. I need to import these using oracle wallet manager. How do I do that?

    hi,
    The installation consists of three main parts:
    a) Importing the Primary Root CA
    b) Import the Intermediate Certificate and Cross Certificate
    c) Installing your SSL123 certificate
    a) Importing the Primary Root CA
    1. Get a copy of the root certificate
    2. Launch Oracle Wallet Manager.
    3. Click Operations and select Import Trust Certificates from the menu
    4. When the Import Trusted Certificate window appears, click Paste the Certificate and click OK.
    5. When the message "Please provide a base64 format certificate and paste it below" appears, paste the entire contents of Primary Root CA text into the box and click OK.
    6. A message should appear that the import was successful and you will see the Root Certificate at the bottom of the Trusted Certificates tree.
    b) Importing the Intermediate and Cross certificates
    1. Launch the Oracle Wallet Manager.
    2. Click Operations > Import Trust Certificates from the menu.
    3. When the Import Trusted Certificate window appears, click Paste the Certificate and click OK.
    4. When the message "Please provide a base64 format certificate and paste it below" appears, paste the entire contents of the Intermediate Certificate text into the box and click OK.
    5. A message should appear that the import was successful and you will see the Intermediate Certificate at the bottom of the Trusted Certificates tree.
    6. Repeat the same steps for the Cross certificate
    c) Importing your SSL123 certificate
    1. Click Operations > Import User Certificate from the menu bar.
    2. The Import Certificate dialog appears.
    3. Select the Paste the Certificate radio button, and click OK.
    4. The Import Certificate dialog appears.
    5. Paste the entire contents of your SSL123 Certificate file and click OK.
    6. A message should show that the certificate was imported successfully.
    7. When you return to the main window, wallet status should show "Ready."
    Hope this will help you,
    Regards
    Fabian

  • Oracle Wallet manager error

    Hi all,
    Inorder to test SSL, i created a certificate request in OWM.Then i got a trial certificate from verisign for this request.What should i do now ? I tried to import that certificate in Oracle Wallet manager but getting this error.
    "Trusted Certificate Installation Failed.
    Input was not a valid certificate".
    Please guide me
    Srini

    belw is the note
    PURPOSE
    To list the steps needed to configure Oracle HTTP Server (OHS) to use the Secure
    Sockets Layer (SSL) when installed with Oracle9i Application Server (9iAS)
    Release 2 (9.0.2). The below instructions show, step by step, instructions for
    obtaining a trial certificate from a Certificate Authority, such as Verisign or
    Thawte. Please refer to the Oracle 9iAS Documentation for further details.
    SCOPE AND APPLICATION
    Oracle9i Application Server (9iAS) Release 2 (9.0.2 and above)
    Configuring SSL with Oracle HTTP Server in 9iAS Release 2
    There are two major steps needed to configure SSL in 9iAS:
    I. Create an Oracle Wallet which contains an SSL Certificate
    II. Configure httpd.conf directives to enable SSL with OHS
    NOTE:
    Only standard server certificates are supported. These are sometimes referred
    to as "40-bit Certificates", but will allow 128-bit encryption provided the
    browser supports 128-bit encryption. 9iAS Release 2 does not support Global
    Server Certificates, called "128-bit Certificates", that allow 56-bit export
    browsers to step up to 128-bit.
    STEP I: Configuring Oracle Wallet Manager (OWM)
    1. Start Oracle Wallet Manager from the 9iAS $ORACLE_HOME.
    Note: If you wish to use AutoLogin features you must start OWM as the user
    who owns the httpd parent process.
    To start Oracle Wallet Manager:
    On Windows: select Start > Programs > Oracle - ORACLE_HOME >
    Integrated Management Tools > Wallet Manager
    On UNIX: enter owm at the command line.
    2. Create an Oracle Wallet which contains an SSL Certificate:
    - Select Wallet -> New
    - Enter a password for the wallet e.g Welcome1
    - Create a Certificate Request.
    - Enter the details for the request. For example:
         Common Name:          <hostname.domainname>
    Organizational Unit:      Support
    Organization:      Oracle
         Location:          Reading
         State:               Berkshire
         Country:          United Kingdom
         Key Size:          1024bits
    * Common Name has to match the hostname.domainname that the webserver is
    known as. This is the Servername parameter in the httpd.conf file, and
    is the hostname.domainname that users will enter in the browser URL.
    - Click OK.
    - Click 'Certificate:[Requested]' and select from the Menu 'Operations' and
    'Export Certificate Request'
    - Save to a file e.g server.csr
    - Open the file in a text editor and copy the contents of the certificate
    signing request, to be pasted in a Certificate Authority (Verisign) form.
    An example is shown below:
    -----BEGIN NEW CERTIFICATE REQUEST-----
    MIIBtzCCASACAQAwdzELMAkGA1UEBhMCR0IxEjAQBgNVBAgTCWJlcmtzaGlyZTEQMA4GA1UEBxMH
    cmVhZGluZzEPMA0GA1UEChQGb3JhY2xlMRAwDgYDVQQLFAdzdXBwb3J0MR8wHQYDVQQDFBZ1a2Ro
    MTkzNC51ay5vcmFjbGUuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCYkFMb9x4ehsG3
    yQ2ub319GxPW+/TC3NSIYRLzEa49EziqBUr08R3Ssn9+6nolVjj1eb3rzwCfjiOSzsp1lSa/B9Vo
    63pwP6xLbCgF8J86YfcZvavgLzY0Yc1fPfRxpZkb/jjt+F1zkaI6Lilm5YU3bRNYMb36TAWxUYL1
    m6wZOwIDAQABoAAwDQYJKoZIhvcNAQEEBQADgYEACKXTmPHaSe3Lx3onnKJk/qI8SzpKyQC/B29v
    JGg1+7Lb7gl052Y9WKxbKHzOQOYr8yYxMXNBCUwW6kBAFoxTWSpIxIQOpJXcsu1RlHKaLfAnw053
    LiwpRB6do7MBrVgMRiv3AyTkJkgRzSxABWAgNpBPbhH+L6PZj5tSjOPErKA=
    -----END NEW CERTIFICATE REQUEST-----
    3. Request a Certificate from a Certificate Authority:
    - Load a web browser and go a Certificate Authority website of your choice.
    The examples below are from www.thawte.com:
    - Click on 'request your free trial'.
    - Fill in the necessary name and address details etc. and 'Submit'.
    - Paste in the certificate request into the box under the
    'Certificate Signing Request' Section.
    - Select "Test X509v3 SSL Cert" and hit "Generate Test Certificate"
    - Once submitted the Trial Certificate will appear on screen similar to below:
    -----BEGIN CERTIFICATE-----
    MIICnDCCAgWgAwIBAgIDD9m+MA0GCSqGSIb3DQEBBAUAMIGHMQswCQYDVQQGEwJa
    QTEiMCAGA1UECBMZRk9SIFRFU1RJTkcgUFVSUE9TRVMgT05MWTEdMBsGA1UEChMU
    VGhhd3RlIENlcnRpZmljYXRpb24xFzAVBgNVBAsTDlRFU1QgVEVTVCBURVNUMRww
    GgYDVQQDExNUaGF3dGUgVGVzdCBDQSBSb290MB4XDTAxMTAyNDE0MDIxOVoXDTAx
    MTExNDE0MDIxOVowdzELMAkGA1UEBhMCR0IxEjAQBgNVBAgTCUJlcmtzaGlyZTEQ
    MA4GA1UEBxMHUmVhZGluZzEPMA0GA1UEChQGT3JhY2xlMRAwDgYDVQQLFAdTdXBw
    b3J0MR8wHQYDVQQDFBZ1a3AxNTkxOC51ay5vcmFjbGUuY29tMIGfMA0GCSqGSIb3
    DQEBAQUAA4GNADCBiQKBgQDiQbg8KHjQ8hazvFe+OFhQa6ka+i5oShUty1MhlH+/
    /xXP+j82h4VlyPG6IGKeQdXLhnKXgLuxTZ8/VDtLZyucmpIB95o2A3Betjp7UdIm
    C572rKrQTA+1mCt/KLWcNE+fQuCmhloaERh3jsWTng0TKsDpJeAJdW2F4tCy/E/E
    MwIDAQABoyUwIzATBgNVHSUEDDAKBggrBgEFBQcDATAMBgNVHRMBAf8EAjAAMA0G
    CSqGSIb3DQEBBAUAA4GBACffzyC3qvAlvNWc6mBPMjFu6XWUGZBuNawFCz8qGw5/
    ce3rWFNI4zOjc1OncoJg7FjDJgAWqiJFHgdV4gwQm/8lTJX6wD1FhMtrJDXf29ei
    1DAe8kBOBWiFMio8Qjp24TdxoI6/53/32ydl91CPtTKAix3SaC2bBS5lG73AbKRr
    -----END CERTIFICATE-----
    - Copy the certificate to a file called server.crt
    - Get the Trusted CA Root certificate by accessing:
    https://www.thawte.com/roots/index.html
    - Copy the certificate that appears on the screen to a file called
    servertest.crt
    - Ftp or move the files to a directory on your server
    - In Wallet Manager select Operations -> Import User Certificate.
    - It will then ask you if you want to Paste the certificate or load
    from a file. Choose 'Select a file that contains a certificate'.
    - Select the file server.crt and hit OK.
    - At this point, the Wallet Manager may complain that the Trusted CA Root
    Certificate does not exist in the wallet. It will ask if you want to
    import it now. Select Yes. See Below
    - Select 'Select a file that contains a certificate' and select the
    servertest.crt file.
    - If this completes successfully you should see Certificate:[Ready] and the
    Thawte Test CA Root will appear in the list of trusted certificates.
    - If you desire Oracle HTTP Server to AutoLogin to the Wallet, then select
    AutoLogin. (Wallet Manager must have been started as the owner of the
    httpd parent process for this to work).
    - From the menu, File -> Save
    Save the Wallet in a directory where the 9iAS user has permission to access
    * If you generated your test certificate via www.verisign.com there is an additional
    step required if OWM is not accepting the Trusted CA Root Certificate. The step is
    as follows:
    In OWM, at the point of message "User certificate import has failed because the
    CA certificate does not exist". You are expected to import the CA certificate.
    For Verisign, that would be the 'Test CA Root' for the Trial version. Verisign's
    email has instructions on how to download the Test CA Root. One problem with the
    Test CA Root is that it is saved as DER encoding, but OWM expects BASE64 encoding.
    Please do following, using Internet Explorer 5.X as example.
    1. Following Verisign instructions and install Test CA Root
    certification into IE.
    2. Export 'Test CA Root' from IE in BASE64 format
    Tools -> Internet Options -> Contents -> Certificates
    -> Trusted Root Certificate Authorities
    Select CA issued by Versign with following Description in 'Issued to' column
    "For Versign authorized testing only ....."
    Export -> Next -> select Base-64 encoded X.509(.cer)
    The file saved must me accessible to OWM
    3. When prompted to load 'CA certificate ', provide the Base64 encoded file.
    Then, continue where you left off when OWM did not accept your Trusted CA
    Root Certificate.
    STEP II: Configuring Oracle HTTP Server (OHS)
    Please review the default directives in the httpd.conf file that relate to SSL by
    opening the file in a text editor and search on "SSL". If you have not already
    done so, please make a back up of this file. Do NOT hand edit this file without reading
    the precautions in the 9iAS Documentation. You should use the Enterprise Manager (EM)
    Website to modify this file. For SSL to work, the SSL 'listen' port must match the
    "VirtualHost _default_" directive within the file. All other SSL parameters are
    set to the default, and you can modify at a later time, depending on your needs.
    ## SSL Support
    Listen 80
    Listen 443
    #443 is the SSL port number.
    ##Further down in file:
    <VirtualHost default:443>
    For the purposes of a basic SSL configuration, you should only need to
    change the following directives:
    SSLWallet
    SSLWalletPassword
    - Change the SSLWallet directive to the path where you saved your wallet, i.e:
    SSLWallet file:/tmp/wallets
    - If you get an error, ADMN-906025 with exception 806212, when starting OHS
    after modifying httpd.conf, it is because you need to supply this password.
    You may also see errors such as the following:
    Error Failed to restart HTTP Server.
    Timeout has been reached. Timeout has been reached.
    If you did not select AutoLogin, then you need to change the SSLWalletPassword
    to your clear text Wallet password by adding the following into your httpd.conf
    SSLWalletPassword <yourPassword>
    - If you wish to encrypt the SSLWalletPassword refer to the following:
    [NOTE:184677.1]
    How to Use IASOBF to Encrpyt a Wallet Password Within 9iAS Release 2
    - Save the configuration, and restart Oracle HTTP Server
    - Test a URL to Oracle HTTP Server in SSL mode:
    https://<hostname.domainname>:<port>

  • Oracle wallet installation

    Hi All,
    Is Oracle Database Vault to be installed to install Oracle wallet ?
    Is Database Vault is a prerequisite to use Oracle Wallet.Please help.

    No - Database Vault and Oracle Wallets are independent products.
    Oracle Wallet is used to store certificates (and can be used with Database Vault).
    Database Vault locks out the DBA from Tablespaces/Tables.
    cu
    Andreas

  • Required Oracle FND tables for Discoverer Install (Oracle App user)

    Hi does anyone know of set documentation or, via SQL Trace, which existing tables Discoverer looks for when setting up an EUL? For instance, our install requires you select the Oracle Apps User Schema and put in the password for that schema where your FND tables reside.
    Assuming some are missing in our current setup, what would be required in order for Discoverer to work in conjunction with the Oracle applications roles and responsibilities, etc.
    I found this list in Discoverer documentation and confirmed I know have that setup correctly with proper grants, etc.. The EUL is created but does return an error of "Table or View does not Exist" which can be passed over and you can proceed into the EUL - but there is an error upon logging into EUL.
    grant select on FND_USER to &EULOWNER
    grant select on FND_APPLICATION to &EULOWNER
    grant select on FND_USER_RESPONSIBILITY to &EULOWNER
    grant select on FND_RESPONSIBILITY_VL to &EULOWNER
    grant select on FND_ORACLE_USERID to &EULOWNER
    grant select on FND_DATA_GROUP_UNITS to &EULOWNER
    This is Discoverer 10g and Oracle 10g database.
    Thanks,
    Mike

    Rod,
    I have confirmed that the Discoverer Administrator Responsibility has Administration, Desktop & Plus privelages.
    Furthermore, the account I am trying to login as - DSCADMIN has those permissions and is assigned that responsibility as well.
    It should be noted that when logging into the EUL as the DSCADMIN account, it prompts me to create a new EUL as one does not exist....however under the EUL ADMIN account (where the EUL was created), it recognizes the EUL since it is the owner.
    Am I missing something further - I've been through the documentation several times and can't figure this out - I have continually made progress but then hit a speed bump each time.
    It should also be noted that DSCADMIN is a database user schema account and also an Apps user as well - but this is how it was setup in our old enviornment so I wouldn't think this would make a difference.

Maybe you are looking for