Publish to Apex - User has no privileges on the selected workspace

Apologies for this novice question,... (re: Apex 4.1.0)
I am trying to publish output from SQL Developer into Apex via the "Publish to Apex" option, but get the error:
ORA-20001: User <XXX> has no privileges on the selected workspace.
ORA-06512: at "APEX_040100.WWV_FLOW_CREATE_APP_FROM_QUERY", line 535
ORA-06512: at "APEX_040100.WWV_FLOW_API", line 14966
ORA-06512: at line 1
Is there an apex privilege I need to grant manually, or somewhere in the front end of APEX to make this work?

I can't say I've ever used that option, but based on the error, I would suggest your particular schema is not associated with the workspace you selected.
This means you need to log into the INTERNAL admin workspace and associate your schema with the desired workspace.
In the same way you can't use the Apex front end to create an application using a schema not associated with the given workspace.
Make sense?

Similar Messages

  • User has no privileges on the APEX_040200 schema.

    Recently upgraded to APEX 4.2, when installing a package application I get the following error 'User has no privileges on the APEX_040200 schema."
    Has anyone encounter this error?
    Thank you,
    Ivan

    Are you installing it through the application builder or through sqlplus?

  • Insufficient privilege: Can't export objects in schema..user has no privilege on the underlying objects

    I'm using SYSTEM user but
    HDBSTUDIO continues on triggering this error when I try to export the catalog:
    SAP DBTech JDBC: [258]: insufficient privilege: Can't export objects in schema DARTEL_TRANSPORTES. Can't export procedure DARTEL_TRANSPORTES.PAL_TRIPLE_SMOOTH_WRAPPER. user has no privilege on the underlying objects
    When trying to grant the SYSTEM user to that particular object  I get a new error : Could not modify user 'SYSTEM'. Several issues occurred
    Have anyone have struggled with this error before, any help will be highly appreciated
    Kind Regards

    rev 69 too
    tomorrow I will have the webex and let you know
    Something happenned after my customer change the suse's server IP, I had to perform a re-installation of SAP Business One only
    We were supposed to install using the hostname but no one of the installers let me use the hostname
    so it Kind of forced me to use the IP.
    After asking Support about that one of the specialists told me that he prefers to use IP instead of the hostname. So I used IP.
    Maybe this changed something I cannot detect yet. but tomorrow we'll see.
    KR

  • User has no privileges on the schema when entering SQL Workshop

    I installed Oracle Apex 4.0 and created a workspace in a new schema called APEX_TEST. Later on I reassigned the workspace to the existing schema TEST and then when an admin or developer user clicks on the SQL Workshop button this error appears :
    Help
    ORA-20000: User FARS has no privileges on the APEX_TEST schema.
    The user still has access to the object browser or SQL Commands pages but there are no object or SQL result showing.
    Did I forget to give a privilege from TEST to APEX ? If I can't resolve the issue I can create another workspace this is only a testing workspace.
    Thank you
    Francis

    I tried to match the APEX user default schema with the workspace new schema and still had the same error. The error appears even if I give access on multiple workspace to the user.
    If I change them both to the APEX_TEST it works but the user cannot access the objects in the TEST schema without synonyms.
    The best thing to do would be to create a new schema and start over again ou export/import the applications.
    Edited by: APQ on Jul 15, 2010 2:16 PM

  • Logon failure; the user has not been granted the requested logon type at this computer (IE App)

    Hello,
    Question of a newbie:
    In Windows Server 2012 I'm using IE10 to simulate numerous different users. But for some of these "fake" users I got the error:
    Logon failure; the user has not been granted the requested logon type at this computer.
    So I opened PowerShell : GPEDIT.MSC
    Computer Configuration / Windows Settings / Security Settings / Local Policies / User Rights Assignment.
    In the detail zone : Double-Clic sur Allow log on locally.
    Dialog box : Allow log on locally properties
    But the Add User or Group
    button is grayed out!
    What can I do?
    Thanks for your help!

    Several months after...
    I found the solution : the user has to be member of the Server
    Operators in Active Directory. 
    That's all :)
    Thanks

  • Failed to start worker process: Logon failure: the user has not been granted the requested logon type at this computer. (0x80070569

    We just rebuilt our machine with server 2012, and it was working flawlessly and then randomly it started giving me this error if i would try to start up a machine. At first this was just an annoyance but now it is worrying me greatly. I have tried
    everything from logging on as the domain admin account to the actual server administrator account. Nothing seems to start these machines up, and I need them to start.
    'Computer1' failed to start worker process: Logon failure: the user has not been granted the requested logon type at this computer. (0x80070569). 

    Hi,
    As this thread has been quiet for a while, we assume that the issue has been resolved. At this time, we will mark it as 'Answered' as the previous steps should be helpful for many similar scenarios.
    If the issue still persists and you want to return to this question, please reply this post directly so we will be notified to follow it up. You can also choose to unmark the answer as you wish.
    In addition, we'd love to hear your feedback about the solution. By sharing your experience you can help other community members facing similar problems.
    Thanks!
    Lawrence
    TechNet Community Support

  • User is unable to view the selection window in the planning book

    Hi Friends,
    I am able to view the selection window in the planning book.
    User is unable to view the selection window in the planning book.
    Is it authorization issue or any settings issue?
    Please explain me in detail.
    With regards,
    Balu

    HI Balu
    Can you check if ''Selection profile" is checked in the ''view selection" option in the top left of the planning book for the user?
    you can choose the hide/show the Selection profile tab, planning book/data view and macros tab using that function.
    Check if this helps.
    Rgds, Sandeep

  • The user has not been granted the requested logon type at this computer

    Hi,
    I'm running Win Server 2012 R2
    I'm trying to do the following, but the Add User or Group is grayed out!  :-(
    Why? What did I miss?
    Thanks for your help
    To assign the user right Allow log on locally
    On the Telnet server, open the Group Policy Management Editor. To do so, click Start, then in the Start Search box,
    type gpedit.msc, and then press ENTER.
    If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
    In the navigation pane, open Computer Configuration, Windows Settings, Security Settings, Local
    Policies, and User Rights Assignment.
    In the details pane, double-click Allow log on locally.
    Click Add User or Group.
    Find the user or group account you want to add, and then click OK.
    Click OK to save your changes to the Group Policy object (GPO).
    Users that are currently logged on must log off and back on to be affected by the changed GPO setting.

    Sorry, I just forgot to add these new users to the Server
    Operators in Active Directory. 
    Now they can connect.
    Thanks for your help

  • File sharing between two computers;  reg. user has insufficient privileges

    I am trying to transfer a file between a FP iMac and a new iMac, the former running 10.4.11 and the latter 10.5.5. File sharing is enabled on both. I can connect over our AirPort network as a registered user to my user account (which has the same name on both machines.) When I try to copy a folder from one to the other, I get an error message that I have insufficient privileges. When I check ownership for the file to be transferred and the destination folder (Desktop), I have read/write privileges for both.
    What am I doing wrong?

    Pardon my ignorance, but what is "FP?"
    On each computer, one at a time, could you afp mount the other computer and then, in Terminal.app, type
    ls -Talkes (and leave a space after that final "s"),
    then drag-and-drop from the Finder your source folder and and your destination folder (that will contain the copy of the source folder), then hit return?
    As an example, after typing ls -Talkes and dragging the source and destination folders into the Terminal window one at a time and just before striking the return key, the command line in Terminal would read
    ls -Talkes Desktop/Source_folder /Volumes/jv/Desktop 
    the first time on the source computer and
    ls -Talkes /Volumes/jv/Desktop/Source_folder Desktop 
    the second time on the destination computer.
    Please post the results for both cases, "sanitizing" as you see fit any personal identifying information and removing reported data from extraneous files and folders. I am mostly interested in seeing the permissions and ACLs for the entire path going from / (root) to source folder and the files contained therein, and from /Volumes/afpmountpoint to destination directory, relative to one computer, and from /Volumes/afpmountpoint to source folder and the files contained therein, and from / to destination directory, relative to the other computer.

  • Query to get objects list for which the current user has 'SELECT' privilege

    Hi,
    I want to get tables and views list for which the current user has 'SELECT' privilege excluding sytem tables and views. The privilege information for the current user is scattered in more than one system views. I have following system views
    USER_TAB_PRIVS_RECD - Object grants for which the current user is the grantee
    ROLE_TAB_PRIVS - describes table privileges granted to roles. Information is provided only about roles to which the user has access.
    If the object privilege is granted explicitly like "GRANT ALL ON TABLE_NAME TO "USERNAME" then this privilege entry goes to USER_TAB_PRIVIS_RECD
    If the object privilege is granted by ROLE. Role is created with certain object privileges. this role is assigned to user "GRANT ROLE_NAME TO "USERNAME"", then this entry goes to ROLE_TAB_PRIVS
    From these findings, I have composed below query
    (SELECT DISTINCT TABLE_NAME FROM USER_TAB_PRIVS_RECD) UNION (SELECT DISTINCT TABLE_NAME FROM ROLE_TAB_PRIVS WHERE PRIVILEGE = 'SELECT')
    Have I got user's all prvilege details? should I look some other system views?
    How to exclude system table privileges details?
    (SELECT DISTINCT TABLE_NAME FROM USER_TAB_PRIVS_RECD) UNION (SELECT DISTINCT TABLE_NAME FROM ROLE_TAB_PRIVS WHERE PRIVILEGE = 'SELECT' AND OWNER NOT IN ('SYS','SYSTEM') Is this right?
    What about Public role in Oracle? Should I consider public role here?
    Oracel Version :11g
    I want make this query to work on Oracle 8i or above version
    Thanks

    >
    I want to get tables and views list for which the current user has 'SELECT' privilege excluding sytem tables and views.
    >
    You will need a hierarchical query to do that.
    Try this script for Listing privileges recursively for Oracle users
    http://www.adp-gmbh.ch/ora/misc/recursively_list_privilege.html

  • Checking if user has selected or deselected a tree node

    Hello,
    In the event handler of the On Action event of a tree node, I need to decide whether the user has selected the element or deselected it.
    I thought to use the following:
    data:  lo_node type ref to if_wd_context_node,
             lo_element type ref to if_wd_context_element,
             l_element_selected type abap_bool.
    first I tried
    * need to find out if this element was selected or deselected!
      l_element_selected = context_element->is_selected( ).
    but it didn't work - so I tried
    lo_node = context_element->get_node( ).
      lo_element = lo_node->get_lead_selection( ).
      if lo_element = context_element.
        l_element_selected = abap_true.
      else.
        l_element_selected = abap_false.
      endif.
    This did work.
    I'm slightly confused as to why the two did not give the same result?
    I can see in the implementation why - gotta love being able to see how the engine works - but why is the node selection table not set? For future reference, is there some flow that has to happen before the selection gets set but after the lead selection is made? Or is this just an error in the handling of the tree node element?
    Cheers,
    Chris

    One would wonder why there is no is_Lead_Selected method. Having just the is _ Multi_  Selected method is quite confusing. Especially when the method description is "True, if element is selected in the node". One would assume that this would include lead selection.
    Then again - when you consider the mismatch between methods that return values and methods that export values, this lack of a is_Lead_Selected method would be low down on my list of things to fix to make WDA more consistent.
    Having Get_Static_Attributes return the data rather than export it would be much higher on my list - ( get_static_attributes_ref does actually return the reference to the data - talk about inconsistent! )

  • How can I know the name of the file that the user has currently open ?

    Hello
    I'm developing a module for x3dv.
    http://hiperia3d.blogspot.com/search/label/X3DV%20Module%20For%20Netbeans
    I am going to add a button to open the files when I click it.
    I just need to know how can I know the name of the file that the user has currently open in the editor. What variable holds it in Netbeans?
    Thank you
    Jordi

    If you are using the JFileChooser to open the document, I would create another class with this included:
    //initiate class variables
    private File f;
    //create JFileChooser
    JFileChooser fc = new JFileChooser();
    fc.setMultiSelectionEnabled(false);
    fc.setFileSelectionMode(JFileChooser.FILES_ONLY)
    //set the chooser to initialise File f with the file selected
    int status = fc.showOpenDialog(null);
    if (status == JFileChooser.APPROVE_OPTION)
         f = fc.getSelectedFile();
    public File getFile()
         return f;
    }

  • How to check if the user has only the display authority of a message

    hi,
    How to check if the user has only the display authority of a message but does not have the change authority for a certain message?
    Best regards,

    hi blake
    though i am an application consultant and for authorisation u need to have help of BASIS person if u r not the one but still i can guide u regarding the same,
    Basically Authorization Management 
    Use
    You can use the following authorization objects to control the authorizations for maintaining business partner data:
    •        Authorization objects for the Business Partner:
    •     &#61601;        B_BUPA_GRP
    •     &#61601;        B_BUPA_ATT
    •     &#61601;        B_BUPA_FDG
    •     &#61601;        B_BUPA_RLT•       
    Authorization objects for relationships:
    •     &#61601;        B_BUPR_BZT
    •     &#61601;        B_BUPR_FDG
    In addition, you can assign an authorization group to a business partner in the dialog. The authorization group controls which users may maintain data for this business partner.
    You can also define authorizations for fields and field groups using the Business Data Toolset (BDT). Depending on the settings you have made, the system carries out the relevant authorization checks.
    In the dialog in the SAP GUI, you can display an overview of the authorizations assigned to you by pressing the button Settings.
    For more information on authorization management, see the Implementation Guide (IMG) of the Business Partner, as well as in the Developer’s Handbook for the BDT under  Authorizations.
    IntegrationAuthorization management for the Business Partner forms part of the  SAP authorization concept.
    Prerequisites
    You have made the necessary settings in Customizing of the Business Partner under Basic Settings--> -Address Management.
    Moving over
    AS ABAP Authorization Concept 
    The ABAP authorization concept protects transactions, programs, and services in SAP systems from unauthorized access. On the basis of the authorization concept, the administrator assigns authorizations to the users that determine which actions a user can execute in the SAP system, after he or she has logged on to the system and authenticated himself or herself.
    To access business objects or execute SAP transactions, a user requires corresponding authorizations, as business objects or transactions are protected by authorization objects. The authorizations represent instances of generic authorization objects and are defined depending on the activity and responsibilities of the employee. The authorizations are combined in an authorization profile that is associated with a role. The user administrators then assign the corresponding roles using the user master record, so that the user can use the appropriate transactions for his or her tasks.
    Authorization Checks 
    To ensure that a user has the appropriate authorizations when he or she performs an action, users are subject to authorization checks.
    The following actions are subject to authorization checks that are performed before the start of a program or table maintenance and which the SAP applications cannot avoid:
    •        Starting SAP transactions (authorization object S_TCODE)
    •        Starting reports (authorization object S_PROGRAM)
    •        Calling RFC function modules (authorization object S_RFC)
    •        Table maintenance with generic tools (S_TABU_DIS)
    Checking at Program Level with AUTHORITY-CHECK
    Applications use the ABAP statement AUTHORITY-CHECK, which is inserted in the source code of the program, to check whether users have the appropriate authorization and whether these authorizations are suitably defined; that is, whether the user administrator has assigned the values required for the fields by the programmer. In this way, you can also protect transactions that are called indirectly by other programs.
    AUTHORITY-CHECK searches profiles specified in the user master record to see whether the user has authorization for the authorization object specified in the AUTHORITY-CHECK. If one of the authorizations found matches the required values, the check is successful.
    Starting SAP Transactions
    When a user starts a transaction, the system performs the following checks:
    •        The system checks in table TSTC whether the transaction code is valid and whether the system administrator has locked the transaction.
    •        The system then checks whether the user has authorization to start the transaction.
    The SAP system performs the authorization checks every time a user starts a transaction from the menu or by entering a command. Indirectly called transactions are not included in this authorization check. For more complex transactions, which call other transactions, there are additional authorization checks.
    •     &#61601;        The authorization object S_TCODE (transaction start) contains the field TCD (transaction code). The user must have an authorization with a value for the selected transaction code.
    •     &#61601;        If an additional authorization is entered using transaction SE93 for the transaction to be started, the user also requires the suitable defined authorization object (TSTA, table TSTCA).
    If you create a transaction in transaction SE93, you can assign an additional authorization to this transaction. This is useful, if you want to be able to protect a transaction with a separate authorization. If this is not the case, you should consider using other methods to protect the transaction (such as AUTHORITY-CHECK at program level).
    •        The system checks whether the transaction code is assigned an authorization object. If so, a check is made that the user has authorization for this authorization object.
    The check is not performed in the following cases:
    You have deactivated the check of the authorization objects for the transaction (with transaction SU24) using check indicators, that is, you have removed an authorization object entered using transaction SE93. You cannot deactivate the check for objects from the SAP NetWeaver and HR areas.
    This can be useful, as a large number of authorization objects are often checked when transactions are executed, since the transaction calls other work areas in the background. In order for these checks to be executed successfully, the user in question must have the appropriate authorizations. This results in some users having more authorization than they strictly need. It also leads to an increased maintenance workload. You can therefore deactivate authorization checks of this type in a targeted manner using transaction SU24.
    •     &#61601;        You have globally deactivated authorization objects for all transactions with transaction SU24 or transaction SU25.
    •     &#61601;        So that the entries that you have made with transactions SU24 and SU25 become effective, you must set the profile parameter AUTH/NO_CHECK_IN_SOME_CASES to “Y” (using transaction RZ10).
    All of the above checks must be successful so that the user can start the transaction. Otherwise, the transaction is not called and the system displays an appropriate message.
    Starting Report Classes
    You can perform additional authorization checks by assigning reports to authorization classes (using report RSCSAUTH). You can, for example, assign all PA* reports to an authorization class for PA (such as PAxxx). If a user wants to start a PA report, he or she requires the appropriate authorization to execute reports in this class.
    We do not deliver any predefined report classes. You must decide yourself which reports you want to protect in this way. You can also enter the authorization classes for reports with the maintenance functions for report trees. This method provides a hierarchical approach for assigning authorizations for reports. You can, for example, assign an authorization class to a report node, meaning that all reports at this node automatically belong to this class. This means that you have a more transparent overview of the authorization classes to which the various reports are transported.
    You must consider the following:
    •     •         After you have assigned reports to authorization classes or have changed assignments, you may have to adjust objects in your authorization concept (such as roles (activity groups), profiles, or user master records).
    •     •         There are certain system reports that you cannot assign to any authorization class. These include:
    •     •         RSRZLLG0
    •     •         STARTMEN (as of SAP R/3 4.0)
    •     •         Reports that are called using SUBMIT in a customer exit at logon (such as SUSR0001, ZXUSRU01).
    •     •         Authorization assignments for reports are overwritten during an upgrade. After an upgrade, you must therefore restore your customer-specific report authorizations.
    Calling RFC Function Modules
    When RFC function modules are called by an RFC client program or another system, an authorization check is performed for the authorization object S_RFC in the called system. This check uses the name of the function group to which the function module belongs. You can deactivate this check with parameter auth/rfc_authority_check.
    Checking Assignment of Authorization Groups to Tables
    You can also assign authorization groups to tables to avoid users accessing tables using general access tools (such as transaction SE16). A user requires not only authorization to execute the tool, but must also have authorization to be permitted to access tables with the relevant group assignments. For this case, we deliver tables with predefined assignments to authorization groups. The assignments are defined in table TDDAT; the checked authorization object is S_TABU_DIS.
    You can assign a table to authorization group Z000. (Use transaction SM30 for table TDDAT) A user that wants to access this table must have authorization object S_TABU_DIS in his or her profile with the value Z000 in the field DICBERCLS (authorization group for ABAP Dictionary objects).
    please See also:
    •        SAP Notes 7642, 20534, 23342, 33154, and 67766
    guess this info will help you,there is one graphic which actually explain the hierarchy of authorisation,i will find some time out to let u know more info about the authorisation
    but if u sit with ur BASIS guy then u can learn lot of things in PFCG
    i guess u r a basis guy,then its not a problem
    best regards
    ashish

  • Which user has what permissions in AD

    Greeting Folks
    , is there a way to find out which user has what permissions in the entire domain? Are there any tools / software
     that can be leveraged to get such information.

    Hi,
    Based on my knowledge, you need to use PFDavAdmin Tool to open mailboxes and verify the folder permission of calendar on Exchange 2007. Since the Get-MailboxFolderPermission cmdlet is unavailable for Exchange 2007.
    In Exchange 2010, the most suitable command should be "MailboxFolderPermission" for calendar permission. If you would like to check the permissions that user2 has to view user1's calendar, you can use the following cmdlet:
    Get-MailboxFolderPermission -Identity "User1:\Calendar" -User User2
    What's more, you can use the Get-Mailbox | Get-MailboxfolderPermission cmdlet to query the permissions of all the folders.
    Get-Mailbox | Get-MailboxfolderPermission
    Hope it helps.
    Best regards,
    Amy
    Amy Wang
    TechNet Community Support

  • Login error: user has expired

    Hello!
    I just install solaris 11.1 on my server and wanna go to install Sun Ray Software install. I`m twice reboot my server while installing soft. And after last reboot I can`t login into my account. I catch message error what my user account has expired. I can`t find any info about this trouble. Can you help me, please?

    Helios- Gunes EROL wrote:
    Hi;
    As mention please share how you create your user, What is os and DB version? your other user has same problem? The user has any role?
    Also see:
    How to Keep the Same Password when Expiry Time is Reached and Change is Required [ID 98481.1]
    Regard
    Helioscreate user abc identified by abc default tablespace USERS temporary tablespace TEMP;
    Linux 2.6.18-238.el5 #1 SMP Sun Dec 19 14:22:44 EST 2010 x86_64 x86_64 x86_64 GNU/Linux
    Oracle Database 11g Enterprise Edition Release 11.2.0.3.0 - 64bit
    Other users don't have problem at this moment.
    He has the roles which granted him select privilges on some tables.

Maybe you are looking for

  • Index Usage in 9i changed  when used rownum

    Hi List,My Application is in RBO Here is one more brain twister ? Assume following I Have table SHRI with a single column COL I have created Index on COL column say IND_COL. Now when I run Following query on 8i with AUTOTRACE ON I can see that 8i Use

  • How can I get an Airport Extreme card to recognize a Nintendo DS WiFI?

    With an Airport Extreme Base Station the Airport Admin Utility lets you enter the hexidecimal code for the DS (Nintendo calls this the "MAC Address".). The Airport Admin Utility will not open because I do not have a base station. My iMac is connected

  • FCP shuts down when trying to import

    I recently upgraded from standard definition to high def by purchasing a sony HDR-FX7 video camera. i adjusted all my final cut pro presets in the audio/video preset menu in accordance with m owners manuel. however. now when i try to do log and captu

  • Portal URL's rename

    Hi Guys, We have a requirement from the client where we need to change/rename the current portal url's. And also our's is federated portal where we use EP portal as SSO to connect to BI , SRM & ECC reports. EP portal: https://ep.abc.uk.net to be chan

  • Diamond Plus- Silicon Image controller set up single SATA 2 non raid "HELP"

     Could somebody please tell me what drivers exactly do you have to load for Windows install off of the floppy? I loaded the silcon image 32 drivers at the install but the boot into windows takes a long time ! In bios SATA 1 SATA 2  are enabled -non r