Question about Container Authentication

I have a very simple question. All the Authentication methods provided by the container requires modification of web.xml or other xml files to add new users, roles etc.lots So it seems unsuitable for a very dynamic application wherein lots of user either join or leave. I wish to know whether it is possible to use database or other sources (other than xml files) in tandem with container authentication thereby eliminating use of xml files for authentication.
regards,
nirvan.

You can use user groups in those XML instead of using directly user names, then even users join or leave you application they will inherite the group autorizations

Similar Messages

  • ACS Radius Question about Request Authenticator Field

    Hi, I did a little bit reading about Radius to understand more in deepth
    if I understand correctly the Request-Authenticator-Field in the Radius-Request Packet is just a random number and has nothing to do with the configured shared secret on AAA-Client.
    That would mean that ACS does not check the shared secret in an incoming request.
    So in case of CHAP Authentication the password in the request is not encrypted with the shared secret, ACS can successfully check the credentials from the request , though the shared secret between ACS and AAA-client does not match and will send a Radius Accept packet
    The Response-Authenticator-Field in the Radius-Accept Packet is a MD5 over (Code+ID+Length+RequestAuth+Attributes+SharedSecret)
    So if the the shared secret does not match the AAA-Client will recongize this and will not grant access.
    Is that true so far.
    I always thougth that shared secret must match, otherwise the ACS will not accept any radius-request?
    Thx
    hubert

    Hi Nicholas,
    pls see attached a packet-capture from 6 Radius-request of a AAA-Client (small Radius-Test-SW) and the answer from ACS
    1 PAP wrong key correct Password -> ACS logs failed auth
    2 PAP correct key correct Password -> ACS logs success auth
    3 CHAP wrong key correct Password -> ACS logs success auth
    4 CHAP correct key correct Password -> ACS logs success auth
    5 CHAP wrong key wrong Password -> ACS logs failed auth
    6 CHAP correct key wrong Password -> ACS logs failed auth

  • Questions about ADF Authentication

    hello guys, first of all.. am wondering, is it possible to connect the adf authentication system with the database, to be able to add users programmatic ?? , the second question is, can i make the authentication on 2 levels??, in my case am having more that company uses our application and each company has many users.. i want the client to log in into the company account, then to his account.. is it possible using the ADF Authentication system ? am using Jdev 12.c thanks in advanced

    Hi,
    first of all.. am wondering, is it possible to connect the adf authentication system with the database, to be able to add users programmatic ?? ,
    something like this. ADF security for dynamic users.
    user can able to do two level of authentication :
    1.configure username and password(encrypted) db. that is DB Authentication.
    2.ADF-security Authentication.
    thanks.

  • Urgent questions about NTLM authentication

    Hi all.
    In our customers side, we have this scenario.
    One windows 2000 active directory as domain controller - server1
    One WAS EP - server2
    WAS EP user database is point to the server1.
    When end user login in windows domain, user open the IE, write on the WAS EP url, user will login in WAS EP automatically and do not needs to input password.
    The problem is now windows AD ldap field - officeName is mapped with WAS EP userid, not windows AD ldap field - userid is mapped with WAS EP userid.
    But currently user login in windows domain using their windows AD ldap field - userid and password, not officeName.
    How can I implement it ?
    When user login in windows domain, the authentication will transfer it to officeName and login in Portal, is this solution can be implemented ?
    Thanks a lot.

    This may not be the exact answer but may put you in the right direction.
    http://help.sap.com/saphelp_nw04/helpdata/en/98/9b2f41893a6e24e10000000a155106/frameset.htm
    http://help.sap.com/saphelp_nw04/helpdata/en/0b/d82c4142aef623e10000000a155106/frameset.htm
    Regards
    Juan

  • Question about Message Authentication Code (MAC)

    Can a MAC detect if someone altered or replace a message? Also, can someone delete a message?

    A MAC can detect tampering, assuming it's a strong MAC (like SHA1), and assuming you use it correctly.
    Frankly, it's the second part that is most likely to stymy you. It's easy to get strong algorithms; using them well is much, much more difficult.
    A MAC is absolutely useless for detecting if a message has been deleted. In fact, detecting missing messages is an intractible problem. You can increase the odds of noticing a missing message, but you can never guarantee it.

  • Question about using container class - Map

    hi all
    i have a question about the following :
    i have two sets of data, both use a common filed as key for the map:
    A = {a,b,d,f,g,h} and B = {a,d,e,g,i,k}, each key has a value associated with.
    i need to find out the commonality, and the difference - i.e fields are in map A but not in Map B, and some fields that are in B but not in A. is there any quick method that comes with the collection class that can calculate this? thanks

    yes, the keyset will be used to access values.
    so, SetA.retainAll(SetB) will modify the SetA so that it contains keys that are in both SetA and SetB - the intersection.
    and SetA.removeAll(SetB) will modify the SetA so that it only contains keys that are in SetA, but not in SetB?
    correct?

  • Question about setting cookies and custom authentication

    I have a question about setting cookies.
    I have two different 'projects' in HTMLDB - we will call them App1 and App2.
    I also have two different connection configurations setup in the DADs.conf file. - we will call them Connect1 and Connect2.
    App1 is setup to use database authentication (no user is specified in the DAD) and uses Connect1. Once the user successfully logs in, we set a username cookie (this is a persistent connection).
    We created a custom authenticatoin scheme for App2 - this scheme checks for the username cookie (set by App1). We would like for App2 to use Connect2 (HTMLDB_PUBLIC_USER is the default user specified and it uses connection pooling).
    Is it possible to set a cookie from App1, Connect1 for App2, Connect2 - then redirect to App2 and pick up that cookie?
    Here is an example of what we are trying to accomplish:
    A user loggs into App1, we set a cookie, and the user is redirected to App2. If the cookie exists, we allow them access to the home page in App2, if no cookie, we redirect back to a 'Login Failed' page in App1. We don't want App2 to use the same database connection as App1 though, we need App2 to use connection pooling.
    Is this possible? OR...Is there a better way to accomplish what we want to do?
    This is an enhancement to an existing app. Our requirements are to use Database Authentication (setup where pass expires after 60 days or so, cannot reuse last 3 passwords, etc.) - which is already setup and being used by other applications in our organization. All of our users have accounts in the database. We don't want users to have a new username/pass - and we don't want to manage a separate group for HTMLDB apps.
    The existing application uses HTMLDB's built in authentication - which uses database username/pass, and it uses connection pooling, but we cannot handle the pass expire stuff in it, unless there's something we're not seeing or understanding - at least that's how our DBA explained it to us.
    Any help with this will be appreciated so much. I can send you the code we have if needed.
    Thanks!

    Same problem here.  I have so many problems with this remote app.  Is there an iTunes API? I would like to write my own remote app that actually works.

  • Questions about using Bitlocker without TPM

    We currently use Bitlocker to encrypt our Windows 7 computers with TPM. Now we are looking at encrypting some Windows 7 computers without a TPM. I see how to change the group policy setting to allow Bitlocker without a TPM. I have looked at a lot of other
    threads and I have a few questions about how the Bitlocker without TPM works.
    1) I see a USB drive containing a key is required for Bitlocker configurations without a TPM, say the end user loses this USB drive, what are the recovery options for their computer? 
    This article seems to indicate that without the USB drive connected, you are unable to even access recovery options http://blogs.technet.com/b/hugofe/archive/2010/10/29/bitlocker-without-tpm.aspx
    We have recovery backed up to AD when Bitlocker is enabled, but how could we do this recovery on a computer on computer where it's USB is lost? Would we have to remove the HD itself and attach it to another computer to access?
    2) After enabling Bitlocker on a computer without a TPM and using the USB Drive for the key, is there a way to also add a PIN or password protection at bootup?

    Hi,
    Sorry for my dilatory reply, 
    Configuring a startup key is another method to enable a higher level of security with the TPM. The startup key is a key stored on a USB flash drive, and the USB flash drive must be inserted every time the computer starts. The startup key is used to provide
    another factor of authentication in conjunction with TPM authentication. To use a USB flash drive as a startup key, the USB flash drive must be formatted by using the NTFS, FAT, or FAT32 file system.
    You must have a startup key to use BitLocker on a non-TPM computer.
    From: http://technet.microsoft.com/de-de/library/ee449438(v=ws.10).aspx#BKMK_Key
    For more Q&A about BitLocker, you can refer to the link above.
    hope this is helpful.
    Roger Lu
    TechNet Community Support

  • Few questions about apex + epg and cookie blocked by IE6

    Hi,
    I would like to ask a few questions about apex and epg.
    I have already installed and configured apex 3.2 on oracle 10g (on my localhost - computer name 'chen_rong', ip address -192.168.88.175 ), and enable anonymous access xdb http server.
    now,
    1. I can access 'http://chen_rong' , 'http://localhost' , 'http://192.168.88.175' without input username / password for realm 'XDB' in IE6;
    2. I can access 'http://localhost/apex/apex_admin' , 'http://192.168.88.175/apex/apex_admin' , and I can be redirected into apex administation page after input admin/<my apex admin password> for realm 'APEX' in IE6;
    3. I can access 'http://chen_rong/apex/apex_admin' in IE6, but after input admin/password , I can not be redirected into administation page, because the cookie was blocked by IE6.
    then, the first question is :
    Q1: What is the difference among 'http://chen_rong' , 'http://localhost' , 'http://192.168.88.175' ? I have already include site 'chen_rong' into my trusted stes! why the cookie was blocked by IE6. I have already tried firefox and google browser, both of them were ok for 'chen_rong', no cookie blocked from site 'chen_rong'!
    and,
    1. I have tried to use the script in attachment to test http authentication and also want to catch the cookie by utl_http .
    2. please review the script for me.
    3. I did:
    SQL> exec show_url('http://localhost/apex/apex_admin/','ADMIN','Passw0rd');
    HTTP response status code: 401
    HTTP response reason phrase: Unauthorized
    Please supplied the required Basic authentication username/password for realm XDB for the Web page.
    Web page http://localhost/apex/apex_admin/ is protected.
    MS-Author-Via: DAV
    DAV: 1,2,<http://www.oracle.com/xdb/webdav/props>
    Server: Oracle XML DB/Oracle Database
    WWW-Authenticate: Basic realm="XDB"
    Date: Tue, 04 Aug 2009 02:25:15 GMT
    Content-Type: text/html; charset=GBK
    Content-Length: 147
    ======================================
    PL/SQL procedure successfully completed
    4. I also did :
    SQL> exec show_url('http://localhost/apex/apex_admin/','ANONYMOUS','ANONYMOUS');
    HTTP response status code: 500
    HTTP response reason phrase: Internal Server Error
    Check if the Web site is up.
    PL/SQL procedure successfully completed
    SQL> exec show_url('http://localhost/apex/apex_admin/','SYSTEM','apexsite');
    HTTP response status code: 401
    HTTP response reason phrase: Unauthorized
    Please supplied the required Basic authentication username/password for realm APEX for the Web page.
    Web page http://localhost/apex/apex_admin/ is protected.
    Content-Type: text/html
    Content-Length: 147
    WWW-Authenticate: Basic realm="APEX"
    ======================================
    PL/SQL procedure successfully completed
    my second questions is :
    Q2: After I entered into realm 'XDB', I still need went into realm'APEX'. how could I change the script show_url to accomplish these two tasks and successfully get the cookie from site.
    the show_url script is as following:
    CREATE OR REPLACE PROCEDURE show_url
    (url IN VARCHAR2,
    username IN VARCHAR2 DEFAULT NULL,
    password IN VARCHAR2 DEFAULT NULL)
    AS
    req UTL_HTTP.REQ;
    resp UTL_HTTP.RESP;
    name VARCHAR2(256);
    value VARCHAR2(1024);
    data VARCHAR2(255);
    my_scheme VARCHAR2(256);
    my_realm VARCHAR2(256);
    my_proxy BOOLEAN;
    cookies UTL_HTTP.COOKIE_TABLE;
    secure VARCHAR2(1);
    BEGIN
    -- When going through a firewall, pass requests through this host.
    -- Specify sites inside the firewall that don't need the proxy host.
    -- UTL_HTTP.SET_PROXY('proxy.example.com', 'corp.example.com');
    -- Ask UTL_HTTP not to raise an exception for 4xx and 5xx status codes,
    -- rather than just returning the text of the error page.
    UTL_HTTP.SET_RESPONSE_ERROR_CHECK(FALSE);
    -- Begin retrieving this Web page.
    req := UTL_HTTP.BEGIN_REQUEST(url);
    -- Identify yourself.
    -- Some sites serve special pages for particular browsers.
    UTL_HTTP.SET_HEADER(req, 'User-Agent', 'Mozilla/4.0');
    -- Specify user ID and password for pages that require them.
    IF (username IS NOT NULL) THEN
    UTL_HTTP.SET_AUTHENTICATION(req, username, password, 'Basic', false);
    END IF;
    -- Start receiving the HTML text.
    resp := UTL_HTTP.GET_RESPONSE(req);
    -- Show status codes and reason phrase of response.
    DBMS_OUTPUT.PUT_LINE('HTTP response status code: ' || resp.status_code);
    DBMS_OUTPUT.PUT_LINE
    ('HTTP response reason phrase: ' || resp.reason_phrase);
    -- Look for client-side error and report it.
    IF (resp.status_code >= 400) AND (resp.status_code <= 499) THEN
    -- Detect whether page is password protected
    -- and you didn't supply the right authorization.
    IF (resp.status_code = UTL_HTTP.HTTP_UNAUTHORIZED) THEN
    UTL_HTTP.GET_AUTHENTICATION(resp, my_scheme, my_realm, my_proxy);
    IF (my_proxy) THEN
    DBMS_OUTPUT.PUT_LINE('Web proxy server is protected.');
    DBMS_OUTPUT.PUT('Please supply the required ' || my_scheme ||
    ' authentication username/password for realm ' || my_realm ||
    ' for the proxy server.');
    ELSE
    DBMS_OUTPUT.PUT_LINE('Please supplied the required ' || my_scheme ||
    ' authentication username/password for realm ' || my_realm ||
    ' for the Web page.');
    DBMS_OUTPUT.PUT_LINE('Web page ' || url || ' is protected.');
    END IF;
    ELSE
    DBMS_OUTPUT.PUT_LINE('Check the URL.');
    END IF;
    -- UTL_HTTP.END_RESPONSE(resp);
    -- RETURN;
    -- Look for server-side error and report it.
    ELSIF (resp.status_code >= 500) AND (resp.status_code <= 599) THEN
    DBMS_OUTPUT.PUT_LINE('Check if the Web site is up.');
    UTL_HTTP.END_RESPONSE(resp);
    RETURN;
    END IF;
    -- HTTP header lines contain information about cookies, character sets,
    -- and other data that client and server can use to customize each
    -- session.
    FOR i IN 1..UTL_HTTP.GET_HEADER_COUNT(resp) LOOP
    UTL_HTTP.GET_HEADER(resp, i, name, value);
    DBMS_OUTPUT.PUT_LINE(name || ': ' || value);
    END LOOP;
    -- Read lines until none are left and an exception is raised.
    --LOOP
    -- UTL_HTTP.READ_LINE(resp, value);
    -- DBMS_OUTPUT.PUT_LINE(value);
    --END LOOP;
    UTL_HTTP.GET_COOKIES(cookies);
    dbms_output.put_line('======================================');
    FOR i in 1..cookies.count LOOP
    IF (cookies(i).secure) THEN
    secure := 'Y';
    ELSE
    secure := 'N';
    END IF;
    -- INSERT INTO my_cookies
    -- VALUES (my_session_id, cookies(i).name, cookies(i).value,
    -- cookies(i).domain,
    -- cookies(i).expire, cookies(i).path, secure, cookies(i).version);
    dbms_output.put_line('site:'||url);
    dbms_output.put_line('cookies:');
    dbms_output.put_line('name:'||cookies(i).name);
    dbms_output.put_line('value:'||cookies(i).value);
    dbms_output.put_line('domain:'||cookies(i).domain);
    dbms_output.put_line('expire:'||cookies(i).expire);
    dbms_output.put_line('path:'||cookies(i).path);
    dbms_output.put_line('secure:'||secure);
    dbms_output.put_line('version:'||cookies(i).version);
    END LOOP;
    UTL_HTTP.END_RESPONSE(resp);
    EXCEPTION
    WHEN UTL_HTTP.END_OF_BODY THEN
    UTL_HTTP.END_RESPONSE(resp);
    END;
    /

    I use oracle database enterprise edtion 10.2.0.3. I have already figured out the epg on 10.2.0.3 to support apex 3.2.
    And as I described above, the apex site works fine for ip address , and localhost. but the cookie will be blocked by IE6, if I want to access the site by 'http://computername:port/apex/apex_admin'. This problem does not occured in firefox and google browser. Could someone give me answer?

  • Questions about Access Manager tutorials available in netbeans site

    Hi
    Thank you for reading my post
    I have some questions about two tutoral which i find in :
    http://www.netbeans.org/kb/55/amsecurity.html and
    http://www.netbeans.org/kb/55/amsecurity-liberty.html
    here is my problem :
    we have some web services, now we want to have authentication applied for consumer who try to access our web services.
    we need to have most possible flexibility because we may deploy the server for a customer with an already established Identity database ( Database Table with user details)
    Also we need to have Transport level security using SSL.
    I read and studied both of them and now i have some questions :
    -I think Securing Web Services Using the SAML or UserNameToken is what we need for authentication and autorization of web service consumers?
    is that right?
    -Does Sun Java System Access Manager provide flexibility to authenticate user/password with a database table content?
    -How we can apply roles in Sun Java System Access Manager when we authenticate users ?
    Thanks

    Imagine that we want to have an end to end security for our web services
    we thought that we could use message level encryption to protect the soap message and also we should protect our web services from un-authenticated acess,
    we will use userName token for this.
    Our customer has large database which contains many user/password and role of those users.
    some of web services should be available to higher role (manager) and not for all users.
    so we should check a user role before we allows him/her to access a web service.
    my question is whether Sun Access manager can help us with this? or there are other configuration or packages that we should apply to have this feature.
    to explain more :
    our client side is a swing application, users enter username/password to login into system. after they loged in, we send user/pass every time user want to request some data from some services. (is it good to send user/pass every time?)
    We want Sun Access Manager to handle users authentication .
    We also need to handle role related authorization, can Sun access manager handle this?
    Thanks

  • Two questions about Risk Management 2.0

    hi experts,
    Please find below two questions about Risk Management:
    -In SPRO, Risk Management>Create top node: after completing information and executing I have this error:
    Error in the ABAP Application Program
    The current ABAP program "/ORM/ORM_CREATE_TOP_NODES" had to be terminated
    because it has
    come across a statement that unfortunately cannot be executed.
    The following syntax error occurred in program "/ORM/SAPLORM_API_SERVICES " in
    include "/ORM/LORM_API_SERVICESU10 " in
    line 97:
    "Bei PERFORM bzw. CALL FUNCTION "GET_ORGUNIT_THRESHOLDS" ist der Aktual"
    "parameter "I_ORGUNIT_ID" zum Formalparameter "IV_ORGUNIT_ID" inkompati"
    "bel."
    The include has been created and last changed by:
    Created by: "SAP "
    Last changed by: "SAP "
    Error in the ABAP Application Program
    The current ABAP program "/ORM/ORM_CREATE_TOP_NODES" had to be terminated
    because it has
    come across a statement that unfortunately cannot be executed.
    Do you know where it could come from?
    -On the Portal>Risk Management
    when I click in a link under the risk management menu(activities and risks, risk report, document risk,...) i alway have an internal server error:
    While processing the current request, an exception occured which could not be handled by the application or the framework.
    If the information contained on this page doesn't help you to find and correct the cause of the problem, please contact your system administrator. To facilitate analysis of the problem, keep a copy of this error page. Hint: Most browsers allow to select all content, copy it and then paste it into an empty document (e.g. email or simple text file).
    Do we have to set up some customizing points before accessing these links?
    Thank you !
    Regards,
    Julien

    Hi Julien ,
    I have the same error what u described as :-
    -On the Portal>Risk Management
    when I click in a link under the risk management menu(activities and risks, risk report, document risk,...) i alway have an internal server error:
    While processing the current request, an exception occured which could not be handled by the application or the framework.
    If the information contained on this page doesn't help you to find and correct the cause of the problem, please contact your system administrator. To facilitate analysis of the problem, keep a copy of this error page. Hint: Most browsers allow to select all content, copy it and then paste it into an empty document (e.g. email or simple text file).
    Do we have to set up some customizing points before accessing these links?    "
    Are you able to solve this. Please let me know how to resolve this???
    Thanks
    Regards,
    Atul

  • Questions about using a PDF form online

    I have a client who wants to create an online version of a PDF form that they are currently using. I am currently trying to explain to them that this would be best done as an HTML web form, but I may not win this argument. I have only used PDFs for printed forms (either hand-written or using form fields) so I am not familiar with any problems that converting the form for use online would entail.
    When the 'Submit' button is pressed on the form, is there a way to redirect to another web page after the data is submitted? (i.e. does the PDF have access to it's outer 'environment'?)
    Are there any security issues submitting data using the PDF form as opposed to using a standard web form? (There may be sensitive data being submitted)
    I'm not sure how they plan to handle the data that is submitted, but there are several options in the submitForm parameters - I am assuming that using the HTML option would submit the data in the same format as a web form would. Am I correct here?
    Can the PDF be prevented from being downloaded or printed? This form should only be used to submit data to their server, not as a printed form.
    Are there any other 'gotchas' that I need to look out for? Does anyone have a recommendation for a site which contains any tutorials or guidelines for using PDF forms online?

    Thanks for the information.
    Yes, I agree that there is less reason for it to be a PDF form (Actually, no real reason other than the original form already exists in PDF), but I am unfortunately in the position that my input in this project is not necessarily being considered (my company is following direct -and inconsistent- directions from the client, and I have no contact with the client to ask questions about what their actual needs are). I have been told to give the client the 'Tomato' that they are asking for, even though they are describing an 'Apple'.
    The reason this form is not meant to be printed is that we have replaced the 'Signature' fields from the original form with checkboxes that the user must check to confirm they have 'signed' the document. If they are to print/fax/whatever the document, they should use the original form, not this one. And I am still trying to explain to them that this would be better served with an HTML web form, but I fear I am losing that battle.
    I have brought up the fact that it is not 100% guaranteed that Acrobat will be available in the browser, although I can only guess that it is less than likely that anyone will not have some sort of PDF viewer available to their browser.
    I will also mention that issues may arise if the file is not submitted from within the browser.

  • Legality questions about Home Sharing

    I have some legality questions about Apple's Home Sharing technology.
    As I understand it, you can share (that is, copy it from one computer to another) your music, movies, applications and other iTunes-managed files amongst five computers. The only 'trick' is that each computer must have an iTunes Store account and must be logged in in order for it to work.
    My question concerns the copying aspect and the legality of it. For content that was purchased through the iTunes Store I can see how Home Sharing can provide a limitation on content sharing, since all of the machines would need to be connected to Apple's servers in order for the validation process to happen. But what about content that was added to iTunes through other means, e.g., ripping my own CDs or converting my DVDs? These items can still be copied via Home Sharing and as there's no DRM on them there's no way they can be protected against "illegal" or "unauthorized" use.
    It was my understanding that if I gave a copy of a song to someone else, that's illegal. Apple's Home Sharing technology seems to facilitate this action. If I rip a CD or DVD into iTunes and someone copies it out, isn't that making an illegal copy? Can I be held liable for distribution of content?
    And how far does this extend? If I live in a house with four unrelated people, are they legally (?) allowed to copy music and media amongst each another? Is there a perceived or actual difference between using Home Sharing to copy a movie versus, say, using a USB flash drive? And what if one of them moves out? Am I legally obligated to go through that person's hard drive and remove content that they copied from me before they leave the building?
    Does Home Sharing somehow retroactively change the copyright application on a given CD or DVD? Most of my CDs and DVDs contain notices and warnings against distributing copies. Can these warnings now be ignored, or at least amended with "...unless you're using iTunes Home Sharing" at the ends of them?
    I am not trying to stir up a hornet's nest here. I'm only trying to better understand the legal issues surrounding Home Sharing and particularly how they relate to unprotected content. It seems very contradictory that the RIAA and MPAA would be fighting so hard against peer-to-peer services like BitTorrent and Gnutella while apparently allowing peer-to-peer services through iTunes Home Sharing.
    Furthermore, I also understand that the intention of this system was to allow families who are living together to have common access to all of the "household" music, but my issues aren't about this. I envision, for example, a college dorm building where there's several hundred people living together on the same network subnet, and all of them have Home Sharing enabled and everyone is copying thousands and thousands of songs to/from one another. Is this now legal?
    Any insights would be appreciated. Thanks.

    If I rip a CD or DVD into iTunes and someone copies it out, isn't that making an illegal copy?
    RIPping of commercial, encrypted DVDs (most of them) is illegal to begin with. Or rather, breaking the encryption on a DVD is illegal and in order to RIP the DVD, you must break the encryption. SO you have already "broken the law" by having a copy on your computer.
    Most of my CDs and DVDs contain notices and warnings against distributing copies.
    Most of your DVDs have a notice about even simply making a copy, not only distributing copies.
    Much of your post has been cussed and discussed by many, many people (lawyers, corporations, organizations, individuals, etc.) and no one has come (or likely ever will come) to a complete agreement.
    Generally, "sharing" in the same house hold amongst family members seems to be okay. Outside the same household/family is almost always not okay.
    I envision, for example, a college dorm building where there's several hundred people living together on the same network subnet, and all of them have Home Sharing enabled and everyone is copying thousands and thousands of songs to/from one another. Is this now legal?
    No.
    This is exactly what Napster was and why they were sued & shut down.
    I imagine Apple lawyers have done their homework as well as consulted with the labels to discuss these exact issues.
    And it's called "Home Sharing" to indicate that it is not "Dorm Sharing" or "Workplace Sharing", or even simply "Library Sharing"etc. even though it may be possible to use it in other places than the Home.
    Users on other computers need to know your iTunes ID and password to enable it Home Sharing. Likely this is how Apple got the lables to be okay with it.
    Are you gonna give (and get) dozens/hundreds/thousands/any other users your iTunesID & password?
    You can contact Apple Legal here -> http://www.apple.com/legal

  • EBS 12.1.3: a few questions about cloning

    Hi,
    We have EBS 12.1.3 on AIX 7.1.
    A few questions about cloning from shared application tier environment to non-shared application tier environment. We have been following "Cloning Oracle Applications Release 12 with Rapid Clone [ID 406982.1]"
    Source environment (shared app tier):
    - Two active application nodes and LB
    - One active database and one passive database setup with Oracle Data Guard.
    - SSL termination at the load balancer
    - PCP implemented
    Target environment (non-shared app tier):
    - One active application node
    - One active database node
    - No SSL
    - No PCP
    After the cloning was completed we noticed the following problems in the target system:
    1) Home page cannot be accessed as application tier $CONTEXT_FILE still contains "https" and ssl termination settings.
    Workaround:
    Modify (with text editor) Application Tier $CONTEXT_FILE as follows.
    <webentryurlprotocol oa_var="s_webentryurlprotocol" customized="yes">http</webentryurlprotocol>
    <sslterminator oa_var="s_enable_sslterminator">#</sslterminator>
    <login_page oa_var="s_login_page" customized="yes">http://myhost.mydomain.com:8000/OA_HTML/AppsLogin</login_page>
    <externURL oa_var="s_external_url" customized="yes">http://myhost.mydomain.com:8000</externURL>
    Run AutoConfig and start application tier.
    Is there a better and supported solution for this?
    2) Concurrent managers do not work correctly as they have still old node names (used in PCP in the source system). Workaround used:
    1. Logon to EBS web GUI and remove all nodes from all concurrent managers.
    2. Shutdown application tier. Verify that all concurrent managers have been shutdown. If not, kill the processes manually
    3. As apps user run cmclean.sql
    4. Restart application tier
    Is there a better solution for this?
    3) Database changes from ARCHIVELOG mode to nonarchivelog mode in the target system. Is there anyway to prevent this?
    4) Also, we would like to perform a full clone (app + db tiers) from production without shutting down the application. Is this possible? What would be the best documents to describe this? In Production, we have Oracle Data Guard setup with physical standby as per "Oracle Tech Note: Business Continuity for Oracle E-Business Release 12 Using Oracle 11g Physical Standby Database [ID 1070033.1]". This can be used when performing a hot clone for the database, right? What about the application tier? Steps described in 406982.1 include running AutoConfig in which application tier should be down. Does the application need to be down when running "Maintain Snapshot Information"?
    5) One final question (not related to cloning). Oracle Enterprise Manager console webUI has recently stopped working in IE8. E.g. https://myhost.mydomain.com:5501/em gives "Page cannot be displayed". This was working correctly last week. In Firefox, the same link is working fine. Any ideas how to fix this?
    Thanks for your answers in advance.
    BR,
    TH

    1) Home page cannot be accessed as application tier $CONTEXT_FILE still contains "https" and ssl termination settings.
    Workaround:
    Modify (with text editor) Application Tier $CONTEXT_FILE as follows.
    <webentryurlprotocol oa_var="s_webentryurlprotocol" customized="yes">http</webentryurlprotocol>
    <sslterminator oa_var="s_enable_sslterminator">#</sslterminator>
    <login_page oa_var="s_login_page" customized="yes">http://myhost.mydomain.com:8000/OA_HTML/AppsLogin</login_page>
    <externURL oa_var="s_external_url" customized="yes">http://myhost.mydomain.com:8000</externURL>
    Run AutoConfig and start application tier.
    Is there a better and supported solution for this?No, you need to edit the context file manually and run AutoConfig.
    2) Concurrent managers do not work correctly as they have still old node names (used in PCP in the source system). Workaround used:
    1. Logon to EBS web GUI and remove all nodes from all concurrent managers.
    2. Shutdown application tier. Verify that all concurrent managers have been shutdown. If not, kill the processes manually
    3. As apps user run cmclean.sql
    4. Restart application tier
    Is there a better solution for this?You are following the best approach. You could update the node details from the backend if you want.
    3) Database changes from ARCHIVELOG mode to nonarchivelog mode in the target system. Is there anyway to prevent this?By default, Rapid Clone will create the target database in noarchivelog mode.
    4) Also, we would like to perform a full clone (app + db tiers) from production without shutting down the application. Is this possible? What would be the best documents to describe this? In Production, we have Oracle Data Guard setup with physical standby as per "Oracle Tech Note: Business Continuity for Oracle E-Business Release 12 Using Oracle 11g Physical Standby Database [ID 1070033.1]". This can be used when performing a hot clone for the database, right? Correct.
    What about the application tier? Steps described in 406982.1 include running AutoConfig in which application tier should be down. Does the application need to be down when running "Maintain Snapshot Information"?You can copy the application tier node files while the application is up. And, you do not need to shutdown the application to run "Maintain Snapshot Information".
    5) One final question (not related to cloning). Oracle Enterprise Manager console webUI has recently stopped working in IE8. E.g. https://myhost.mydomain.com:5501/em gives "Page cannot be displayed". This was working correctly last week. In Firefox, the same link is working fine. Any ideas how to fix this?
    If it is working from one browser, then it should not be an EM issue. Have you tried from a different client and see if this works? Have you changed any setting in your IE browser? Please make sure you add the EM URL to the trusted sites list.
    Thanks,
    Hussein

  • Questions about 1003051 - TDMS 3.0 corrections - Composite SAP Note

    Experts:
    We, from a big SAP shop, want to set up TDMS for ERP,  BI, HCM and CRM.
    We have some questions about note 1003051:
    1) Is this note about ERP (and HCM)  only?  If so, what are the notes for TDMS on BI and CRM?
    2) Should we apply this note to all systems involved: sender, controller (SM7.0 in our case) and receiver?
    3) We have enhp1...enhp4 in our ERP (and HCM), enhp1 on BI and perhaps enhp1 on CRM (not sure yet).
        a)  What is the impact of enhp on TDMS?
        b) should we install TDMS before applying enhp OR the sequence does not matter?
    Thanks for your help!

    1) Is this note about ERP (and HCM) only? If so, what are the notes for TDMS on BI and CRM?
    >This is a composite note, and contains information about various other notes related to TDMS. Refer to each note mentioned in this note individually to assess the same.
    2) Should we apply this note to all systems involved: sender, controller (SM7.0 in our case) and receiver?
    >Depends from note to note, Each note contains the necessary information about the system it has to be installed on.
    3) We have enhp1...enhp4 in our ERP (and HCM), enhp1 on BI and perhaps enhp1 on CRM (not sure yet).
    a) What is the impact of enhp on TDMS?
    >TDMS in standard supports Basis 7.0 systems. However it generally works fine with 7.01 too.
    b) should we install TDMS before applying enhp OR the sequence does not matter?
    >As TDMS 3.0 is only available for systems with basis 4.6C to 7.0. So install TDMS first and then the EHP.
    I hope these answers help.
    Regards
    Pankaj.

Maybe you are looking for