Question about accessing CIFS with LUM user (permissions)

Hi there,
I have a question related to accessing a CIFS mount throught a user in a linux box.
First of all, its a system based in OES11 sp2 & SLES 11 SP3. I have a cifs mount
in /media/nss, with novell cifs, coming from a NSS Filesystem. This mount is mounted
with a username/password with password policy, etc. I have four users LUM-enabled,
in the Linux box, which should access the CIFS mount, but I have a permission denied.
I have set trustees for the primary group for the 4 lum-enabled users and also I have
addedd permissions for a group in the NSS volume, and add this group to the membership
of the users, but doesnt works.
I guess Im missing something or Im doing something wrong. Could anybody give me a pointer?
Thanks!

Antoniogutierrez,
It appears that in the past few days you have not received a response to your
posting. That concerns us, and has triggered this automated reply.
Has your problem been resolved? If not, you might try one of the following options:
- Visit http://support.novell.com and search the knowledgebase and/or check all
the other self support options and support programs available.
- You could also try posting your message again. Make sure it is posted in the
correct newsgroup. (http://forums.novell.com)
Be sure to read the forum FAQ about what to expect in the way of responses:
http://forums.novell.com/faq.php
If this is a reply to a duplicate posting, please ignore and accept our apologies
and rest assured we will issue a stern reprimand to our posting bot.
Good luck!
Your Novell Product Support Forums Team
http://forums.novell.com/

Similar Messages

  • Question: about accessing Nik collection through Lightroom

    I have recently purchased and installed Nik collection. I have no problem reaching the plug-ins in Photoshopbut can't in Lightroom (except for HDR)

    Thanks!  Technology senses my fear and always makes it difficult for me! Ha! I can use the Nik programs so if I have to, I'll work on them there.
    Date: Sat, 13 Apr 2013 16:27:45 -0700
    From: [email protected]
    To: [email protected]
    Subject: question: about accessing Nik collection through Lightroom
        Re: question: about accessing Nik collection through Lightroom
        created by trihelm2 in Photoshop Lightroom - View the full discussion
    I suspect there are potential issues on some systems with the Google "combined" version, when I installed it I had recieved a copy of the Google complete version free because of my purchase history. I was advised that I could install over the Individual Plugins I had. I never got as far as trying it with Lightroom, only in Elements. The plugins appeared but the load times were abysmal and I mean realy bad , far longer than the Nik individual Installs, so I dumped it and reverted to the originals. Pity cos I wanted the Sharpen Plugin that I have'nt got. After reverting all was back to normal The Nik individual Plugins load very quickly. It was this that convinced me there is a difference in the Google setup.There are people on here with far more knowledge than me, hopefully one of them can help you, alternatively you might try asking Google for help with this.
         Please note that the Adobe Forums do not accept email attachments. If you want to embed a screen image in your message please visit the thread in the forum to embed the image at http://forums.adobe.com/message/5232723#5232723
         Replies to this message go to everyone subscribed to this thread, not directly to the person who posted the message. To post a reply, either reply to this email or visit the message page: http://forums.adobe.com/message/5232723#5232723
         To unsubscribe from this thread, please visit the message page at http://forums.adobe.com/message/5232723#5232723. In the Actions box on the right, click the Stop Email Notifications link.
         Start a new discussion in Photoshop Lightroom by email or at Adobe Community
      For more information about maintaining your forum email notifications please go to http://forums.adobe.com/message/2936746#2936746.

  • Can not assign custom access level with a user login

    Hi,
    I am using Business objects XiR3. When I am loging in with a user having full control access and then I select a folder added a principal from user sercurity and when I am trying to add custom access level it gave me error
    An error occurred at the server during security batch commit: Request 0 of type 38 failed with server error : You do not have sufficient rights to make the requested security changes.
    it allow me to give access to standard access levels. also when I tried to assign custom access level with administrator user, it assigns custom access level to a principal without error.
    Can any body tell me what I am doing wrong?
    Thanks in advance,
    Rajendra

    Hi Rajendra,
    You have to make sure that the user group has the right 'Use access level for security assignment' assigned as granted on the access level you created. You can find this right under System / Access Level. That should do the trick!
    Hope this helps...
    Martijn van Foeken
    Focuzz BI Services
    http://www.focuzz.nl
    http://nl.linkedin.com/in/martijnvanfoeken
    http://twitter.com/mfoeken

  • Question about Logon ticket with user mapping at BI-JAVA environment

    We're implementing BI 7.0 including BI Java and SAP EP for end user
    access.
    I have two question about SSO method when we're using BI Java.
    I know we can simply configure SSO logon ticket with BI-Java(EP
    included) and BI-ABAP through BI template installer and we already
    succeeded in that case.
    But the problem is we want to change it to user mapping SSO method for
    some our internal reason.
    After we configure user mapping SSO, we've got SSO failed error when we
    call BI-Java stuff like BEx Web Application iView.
    After many testing implemented, we found SSO Logon ticket with user
    mapping (using SAP reference system). It seems working now.
    But our question is "Is it no problem when we use SSO logon ticket with
    user mapping?" Is there any restriction or issue?
    One more question is we can ONLY use user base mapping when reference
    system used. How can we assign BI-ABAP users to EP Group?

    Using an SAP Reference system is allright. But if the reason u r going for this is because of different usernames in EP and BI, why dont you go for user mapping.
    Anyways, on restriction of reference syetms is that you can have ONLY ONE reference system defined in portal. In you case you can only have the BI system defined.
    Hope this helps!!

  • Questions about Access Manager tutorials available in netbeans site

    Hi
    Thank you for reading my post
    I have some questions about two tutoral which i find in :
    http://www.netbeans.org/kb/55/amsecurity.html and
    http://www.netbeans.org/kb/55/amsecurity-liberty.html
    here is my problem :
    we have some web services, now we want to have authentication applied for consumer who try to access our web services.
    we need to have most possible flexibility because we may deploy the server for a customer with an already established Identity database ( Database Table with user details)
    Also we need to have Transport level security using SSL.
    I read and studied both of them and now i have some questions :
    -I think Securing Web Services Using the SAML or UserNameToken is what we need for authentication and autorization of web service consumers?
    is that right?
    -Does Sun Java System Access Manager provide flexibility to authenticate user/password with a database table content?
    -How we can apply roles in Sun Java System Access Manager when we authenticate users ?
    Thanks

    Imagine that we want to have an end to end security for our web services
    we thought that we could use message level encryption to protect the soap message and also we should protect our web services from un-authenticated acess,
    we will use userName token for this.
    Our customer has large database which contains many user/password and role of those users.
    some of web services should be available to higher role (manager) and not for all users.
    so we should check a user role before we allows him/her to access a web service.
    my question is whether Sun Access manager can help us with this? or there are other configuration or packages that we should apply to have this feature.
    to explain more :
    our client side is a swing application, users enter username/password to login into system. after they loged in, we send user/pass every time user want to request some data from some services. (is it good to send user/pass every time?)
    We want Sun Access Manager to handle users authentication .
    We also need to handle role related authorization, can Sun access manager handle this?
    Thanks

  • DI API - accessing objects with Read only permissions

    Scenario: I have setup a user in B1 with "Read Only permissions" on the Business Partner. When I log into the DI API as this user and try instantiating the BP object, I get a message "Loged on user does not have permissions".
    Why am I getting this? Shouldnt I be able to instantiate the object and read the property values. i understand that I cannot Add or Update because of read only permissions.
    Is there a way we can retreive values for users using the DI API or should the best option be to write a SQL statement.
    Thanks,
    Gopal

    Requiring the user to have full authorization to instantiate an object is a serious limitation for the DI API. It makes it virtually useless. After all it is supposed to be OOP and all the trimmings isn’t it? It also takes a lot of control away from the user.
    +1
    Hi,
    I have confirmation from B1 product definition, the DI API access for objects with Read only permissions will not be included in the 2007A version. It will be considered for the following version after 2007A.
    There is a chapter called "Authorization Checks" in the SDK Help file specifying:
    "SAP Business One performs authorization checks for the business objects and the infrastructure and meta data objects. If a user does not have full authorization to access the objects in SAP Business One, the user will not have permission to access the data belonging to the business objects using the DI API."
    Regards
    Trinidad.
    *sigh*

  • Question about Access Point

    Hello
    In my work, we have two WAP4410N Wireless-N Access Point with Power Over Ethernet, but ¿how many users support each access point? And, somebody knows how I can configure the two access point to be viewed as one in all laptops? Normally, the laptops found access point 1 and acces point 2 but, somebody says me I can configure them as if they are one.
    Thanks

    Eliana,
         The rule of thumb is a typical Ap can handle 20 users each, but the actual capacity could be more or less, alot of it depends on the traffic the users are generating and the bands/protocols.
    for example if you are using 802.11g @ 54mbps, in reality your getting roughly 36 mbps of actual throughput, so then you have 20 users each using 100k of bandwidth which is about 2mb of traffic, you could handle more, but if you have 10 users that are pulling 1.5mbps then your cumlative traffic is 15mbps; so load is traffic dependant.  Retries and other issues can affect this as well but are hard to calculate.
    Also make sure the 2 access points you setup are on different channels.
    Null or limited connectivity?? do you mean low signal strength or no network access?
    Hope this helps.
    Please rate useful posts

  • A question about a method with generic bounded type parameter

    Hello everybody,
    Sorry, if I ask a question which seems basic, but
    I'm new to generic types. My problem is about a method
    with a bounded type parameter. Consider the following
    situation:
    abstract class A{     }
    class B extends A{     }
    abstract class C
         public abstract <T extends A>  T  someMethod();
    public class Test extends C
         public <T extends A>  T  someMethod()
              return new B();
    }What I want to do inside the method someMethod in the class Test, is to
    return an instance of the class B.
    Normally, I'm supposed to be able to do that, because an instance of
    B is also an instance of A (because B extends A).
    However I cannot compile this program, and here is the error message:
    Test.java:16: incompatible types
    found   : B
    required: T
                    return new B();
                           ^
    1 errorany idea?
    many thanks,

    Hello again,
    First of all, thank you very much for all the answers. After I posted the comment, I worked on the program
    and I understood that in fact, as spoon_ says the only returned value can be null.
    I'm agree that I asked you a very strange (and a bit stupid) question. Actually, during recent months,
    I have been working with cryptography API Core in Java. I understood that there are classes and
    interfaces for defining keys and key factories specification, such as KeySpec (interface) and
    KeyFactorySpi (abstract class). I wanted to have some experience with these classes in order to
    understand them better. So I created a class implementing the interface KeySpec, following by a
    corresponding Key subclass (with some XOR algorithm that I defined myself) and everything was
    compiled (JDK 1.6) and worked perfectly. Except that, when I wanted to implement a factory spi
    for my classes, I saw for the first time this strange method header:
    protected abstract <T extends KeySpec> T engineGetKeySpec
    (Key key, Class<T> keySpec) throws InvalidKeySpecExceptionThat's why yesterday, I gave you a similar example with the classes A, B, ...
    in order to not to open a complicated security discussion but just to explain the ambiguous
    part for me, that is, the use of T generic parameter.
    The abstract class KeyFactorySpi was defined by Sun Microsystem, in order to give to security
    providers, the possibility to implement cryptography services and algorithms according to a given
    RFC (or whatever technical document). The methods in this class are invoked inside the
    KeyFactory class (If you have installed the JDK sources provided by Sun, You can
    verify this, by looking the source code of the KeyFactory class.) So here the T parameter is a
    key specification, that is, a class that implements the interface KeySpec and this class is often
    defined by the provider and not Sun.
    stefan.schulz wrote:
    >
    If you define the method to return some bound T that extends A, you cannot
    return a B, because T would be declared externally at invocation time.
    The definition of T as is does not make sense at all.>
    He is absolutely right about that, but the problem is, as I said, here we are
    talking about the implementation and not the invocation. The implementation is done
    by the provider whereas the invocation is done by Sun in the class KeyFactory.
    So there are completely separated.
    Therefore I wonder, how a provider can finally impelment this method??
    Besides, dannyyates wrote
    >
    Find whoever wrote the signature and shoot them. Then rewrite their code.
    Actually, before you shoot them, ask them what they were trying to achieve that
    is different from my first suggestion!
    >
    As I said, I didn't choose this method header and I'm completely agree
    with your suggestion, the following method header will do the job very well
    protected abstract KeySpec engineGetKeySpec (Key key, KeySpec key_spec)
    throws InvalidKeySpecException and personally I don't see any interest in using a generic bounded parameter T
    in this method header definition.
    Once agin, thanks a lot for the answers.

  • Questions about PDF exporting with InDe CS5.5

    Hey all,
    A couple questions about exporting to PDF from the latest version of InDe.
    First, I have noticed that it seems to take a lot longer to get to a PDF. Any suggestions for how to speed up the process? It took 8 minutes or so to generate a low-res PDF (for print) of a 24pp document with a few placed images and vector graphics. Wow, that's a long time to wait, especially for a proof.
    Second, the background task... if I get it going on making that 8-minute PDF and then work some more on the document, what exactly is in the PDF? Usually I save before making a PDF or printing. So, is the last version saved what will be in the PDF?
    (As an aside, this ability to work on the doc while generating a PDF seems kind of weird. Generally one makes a PDF for proofing, or even for printing, when all the changes have been made and everything is "final". So, I see no benefit to being able to work on my document while it's making a PDF, as I'm probably finished making revisions for the time being. I have to say that I kind of like the progress bar you get when you make an interactive PDF, as you know you can't work on the document when that's on the screen... )
    Thanks as always.

    First, I have noticed that it seems to take a lot longer to get to a PDF. Any suggestions for how to speed up the process? It took 8 minutes or so to generate a low-res PDF (for print) of a 24pp document with a few placed images and vector graphics. Wow, that's a long time to wait, especially for a proof.
    Yes, this is abnormally long (and too long), something is wrong. What's the full version of InDesign you are running, as reported by holding down Cmd or Control and selecting About InDesign?
    Second, the background task... if I get it going on making that 8-minute PDF and then work some more on the document, what exactly is in the PDF? Usually I save before making a PDF or printing. So, is the last version saved what will be in the PDF?
    Saving is not related. InDesign makes a database snapshot of your document the moment you begin the PDF export, and makes the export relative to that snapshot, regardless of edits you continue to make during the export process, and regardless of saving. Of course saving first is a good idea, for several reasons, not the least of which it sounds like something's fairly seriously wrong with your document or your InDesign installation.
    We recommend you trash your preferences and export your document to IDML and see if either of those things changes this 8-minute behavior...err, assuming you're running 7.5.2.318.
    (As an aside, this ability to work on the doc while generating a PDF seems kind of weird. Generally one makes a PDF for proofing, or even for printing, when all the changes have been made and everything is "final". So, I see no benefit to being able to work on my document while it's making a PDF, as I'm probably finished making revisions for the time being. I have to say that I kind of like the progress bar you get when you make an interactive PDF, as you know you can't work on the document when that's on the screen... )
    Yeah, I think the primary benefit is if you are likely to work on 2 or more files in parallel, so you can finish A and export A and then switch to B. If you'd like a dialog box to pop up when export is done, check out my exportPop script from this post: ANN: automatic dialog after background export (exportPop.jsx.

  • Questions about supporting TLF with Halo components in Flex 4.1

    We recently decided to upgrade to the Flex 4.1 SDK after a year or so at 3.2.  We have been asked to not use the new SPARK components yet because our products would then have a mistmatch of Halo and Spark components in the UI.  We have built support for our Halo components to display html through the ".htmlText" property for the Text components.  For example, we can display strings such as "<p>Choose <b>one</b> option:</p>".  With the upgrade to Flex 4.1 a couple of questions about supporting bi-directional text have come up.  My understanding is that in order to support bi-directional text we need to use the Text Layout Framework.  Does anyone have a suggestion on how we can utilize the TLF with the Halo components in Flex 4.1?    Can we still use the ".htmlText" property somehow or is there a new property that understands the TextFormat markup?  We would love to still be able to use the limited html tags that are supported for the "htmlText" property.  Is there an option where that syntax is still understood?
    Thanks in advance!
    David

    The halo components use TextField, and the spark components use TLF. Both sets have support for some html markup to import and export text. To use bidi text, you have to use TLF; TextField won't work properly.
    It is possible to use TLF to build your own components, and this can work well particularly for applications with specialized needs. But if you need bidi support for advanced components like DataGrid and List, then you should use the spark components.
    Thanks!
    - robin

  • A few questions about using PS3 with 27" iMac display...

    Hey people, I had a few questions about how I could possibly get my ps3 connected to the iMac's 27" screen. First of all, could you guys list some adapters that would be able to convert the HDMI to Mini displayport? That would be great. The only one I know of is that Dr. Bott Digital Video link.
    Okay secondly, I was wondering if I do get the the ps3 connected with the iMac's display with an adapter to convert HDMI to mini DisplayPort, would it be in HD? Would I be able to play ps3 games or watch blu-ray movies in 1080p HD format?
    Thanks!

    Welcome to the Apple Discussions!
    This has been asked a number of times here since the intro of the 27" iMac. The answer is very expensive US$149 or more converters and sometimes even more expensive to maintain the resolutions that you seek.
    http://lowendmac.com/ed/bashur/09db/dvi-to-mini-displayport.html
    Dah•veed

  • No Access Error with Locked User iView

    Hi
    We are running EP6SP2 Patch 35
    I’m trying to give access to the Locked User iView to a group of users (I don’t want them to have full User Management functionality)
    I’ve created a role and added Locked User iView to it.  The role has the same property values as the standard User Admin role (eg UME Action ID: UME.Manage_All = Yes), but when I try to access the Locked User iView I get:
    No Access
    You have no permission to perform this action.
    Can anybody advise what else I need to do to get this to work?
    Thanks.

    Hi Mike,
    just to make sure: did you restart the server after assigning the UME Action to the role???
    Unfortunately, this has to be done in order for your changes to take effect.
    Best regards,
    Robert

  • Question about 360 movieclip with cursor action

    Hello Flash Forum
    We have a question about a 360 flash / movieclip which comes
    to a halt or jumps to whereever the cursor is moved horizontally
    while any vertical movements is ignored. We are having difficulties
    to implement this and would like to ask whether someone can point
    us into the right direction in Flash 8 - read somewhere that this
    is extremely easy in Flash 8 but we cannot find out how!?
    An example would be:
    http://www.kswiss.com/cgi-bin/kswiss/store/product_detail.html?mv_arg=x&pid=01190:177
    and then chosing 'Go 360'
    Thank you for any assistance and/or direction.
    Alex

    Alex, took a look at your sample - looks to me like
    start_drag and stop_drag on mouse_over. Hope this helps. ash

  • Have a question about how to set up users and what they access

    I have just loaded logic studio on my computer on my admin account but i dont want it on the any other account and when i log in to another account on the same computer the program shows up. How do you **** let the admin account use the program and not the users? what do i have to set and where? do i need to go into users accounts or sharing? i cant seem to find anything. thanks for the help.

    Try looking at Parental Controls, in >System Preferences...>Accounts.
    Alternatively, you could put Logic in your user folder (/Users/your user name/Applications) (you'll most likely have to make that Applications folder, as well as make sure permissions are set so only you can access it, by using the "Get Info" window.

  • Some questions about accessing Oracle from another machine with OEM

    I followed this great tutorial on how to get oracle8i installed and working on rh6.2. http://jordan.fortwayne.com/oracle/
    Great job to the writer)))
    Know I need a little more info on where to go after it is up and running...
    I downloaded the client for NT and I would like to access the Linux box using OEM from a Win2000 laptop however I really have no clue what I am doing and how to make this happen can someone please point me to a tutorial simular to the install tutorial I found?
    Thanks
    [email protected]

    You need to install OEM on your Windows box. From there go to your OEM configuration assistant in the start menu. Run it and point it to one of your instances on your DB server. You must provide a user name and password for the DB it will then connect and build a repository for OEM. After that run the OEM console application and connect to OEM using sysman for your login and oem_temp as your password. This should get you going.

Maybe you are looking for

  • Can not view music listed on ipod in itunes

    I use to be able to view what music I had on my Ipod Touch in itunes now that does not seem to be the case.  I ipod says i have about 200 songs but when i connect to itunes an click music under devices or under ipod itself no music is shown.  Is ther

  • Need Help Binding Windows Xp clients to 10.5 server for a beginner

    Hi I've setup 10.5 server as a standard config. Which turns out it is a Open Directory Master and SMB role is Standalone Server. I have been able to bind my 10.4 clients to the server domian using Directory Access and choosing automatic under LDAPv3/

  • Double-click to create method/attribute in EHP2 Netweaver 7.0 does not work

    Hi, this makes me wonder: I'm used to create new attributes or methods by simply double-clicking the new name and the system will ask me to create. Now I am new in EHP2 and for methods it just says 'wrong cursor position or object not in navigation',

  • Csv files!

    is there a way of exporting the results of a survey to a csv file? and how is it possible?

  • Network Link Conditioner installed successfully but doesn't have an effect

    Hi community, i installed Network Link Conditioner while Mountain Lion has been Beta. I see the Network Link Conditioner Pane in my Preferences but if i turn on the effect with the toggle nothing happens. I setup a no connectivity profile to test it