Regarding Customization , Access and Protection Levels

Hi All,
I need some information on Customization , Access and Protection Levels.
I need to modify a Oracle Seeded workflow to do some customization wrt approval process.
How do I determine which process can be modified or not.
What is quick check to understand what values should I be looking for Customization , Access and Protection Levels on a process that needs to be modified.
Please help...
Thanks,

Hi All,
We have a requirement to modify the seeded oracle workflow in Purchasing.
I need to add additional levels of validations by creating some custom processes which would be invoked from the seeded oracle process.
Could anyone pls advise how do I make my customizations retain even after an upgrade takes place ?
Thanks,

Similar Messages

  • Information Regarding Essbase Security Except Filter Level and User Level

    I have an requirement to implement data level security in Essbase. For ex: A user can only see those data which are from Asia region or an user will be able to see those data which are from America.
    Asia and America are defined in my location dimension.
    can any one explain about it without using user Level Security and Filter level security.
    Please tell me how to do it?
    Thanks in advance.

    Sandeep's reference the DBAG and the section on filters is the right direction. The filter is created in EAS.
    Let's use an example.
    You create a METAREAD filter (that is, it filters both data and dimensionality) that gives a user limited access to the Location dimension (I think I have that right), e.g., the British Isles, the UK and Ireland. You can also create a READ filter but it only limits data and, in my opinion at least, causes confusion because users can see metadata (the whole world) but only see data for the British Isles.
    NB -- filters can be assigned to individual usernames or to groups that users are members of. For a POC, I'd keep it simple and just assign it to a username, but it's your choice.
    Assign the filter to the user in Shared Services.
    Try connecting to the database in Excel through the Classic Add-In or SmartView to test what the user sees -- it should be: Total Location, British Isles, the UK, and Ireland. You will see Total Location (top of the dimension) because that's how Essbase navigates down -- it has to have the dimension name to find the limited children. You won't see any data there. But you will see data at the Location members that the METAREAD filter allows.
    That's it -- it's been around since the year dot, and is the way access is restricted. You shouldn't need to reinvent the wheel to get this to work in OBIEE. Essbase should do the work.
    Regards,
    Cameron Lackpour

  • I am sonu v s from india...i am a apple id user...now i have a problem regarding this apple ID...i forget my apple ID security Qn...so i can't access and purchase any apps by using my apple ID..4 tms i frwd my reqst using itune apps store bt no solutn

    I am sonu v s from india...i am a apple id user...now i have a problem regarding this apple ID...i forget my apple ID security question...so i can't access and purchase any apps by using my apple ID..4 times i frwd my reqst using itune apps store but i can't get any solution....many times i my try to call u bt there is no response from ur custmr support group...pls kindly give me any solution

    Contact the App store for Apple ID help. Their support link is on the right of the App store window
    LN

  • Questions regarding Outlook Web App, Remote Desktop, Remote Web Access and VPN Access

    Hi there,
    I want to ask a series of questions regarding Outlook Web App, Remote Desktop, Remote Web Access and VPN access and was hoping whether you could help me. Below are my questions to ask you.
    Outlook Web App - What do I need to configure in order to get my Exchange account to work with the OWA app on my iPhone? Is Office 360 required on the server that hosts Outlook Web App in our organisation? When I configure the settings and
    connect I get the following message "couldn't connect -  We couldn't connect to the server. Check your information and make sure it's correct." I can connect with other devices using Outlook Web App.
    Remote Desktop - What do I need to configure in order to connect to my computer at work using Remote Desktop on my Windows Phone? When I configure the settings and connect I get the following message "Connection error - We couldn't connect
    to the remote PC. Make sure the PC is turned on and connected to the network, and that remote access is enabled. Inquiring minds may find this error code helpful: 0x204" I can connect with other devices using Remote Desktop. There are currently no
    RD Server settings in the Remote Desktop app on the Windows Phone and the only way I'm to connect to my PC at work is via Remote Desktop and not to be confused with the one by Microsoft, however the app is on a trial basis and times out every 5 minutes and
    can only be used once every hour unless I purchased the app for £2.99 off the App Store but would ideally like to use the Microsoft Remote Desktop app though.
    Remote Web Access - What do I need to configure in order to get Remote Web Access on my Windows Phone using a URL? When I log in using a URL I get the following message "There is a problem with this Web page. Please contact the person who manages
    the server" I can connect with other devices using Remote Web Access. Also how do you enable the background option for Remote Web Access? I know how to do this in Remote Desktop but not in Remote Web Access. Remote Web Access works on PCs regardless
    being onsite and offsite and on my iPhone, the same issue also occurs with my Nokia 5230s regardless of whether I'm using Opera Mobile or Mini or the latest Nokia Browser.
    VPN access - How do you configure VPN access on a Windows Phone using VPN? I cannot find the protocols PPTP, L2TP, SSTP and IPsec in order to configure VPN access on the Windows Phone apart from IKEv2.
    Many thanks,
    RocknRollTim

    Any help would be much appreciated.
    Kind regards,
    RocknRollTim

  • Regarding the Post Installation and SP Level

    Hi All,
    We have installed NWDI on our existing EP Dev Server.Installation was successful but regarding the post installation we are in a thinking as how best we could patch the newly installed NWDI system.
    As our EP system is on SP 11and NWDI system on sp 9,Do we need get EP and NWDI Patch level in Sync? as there would be developers working from EP and BW as well on this NWDI server.
    Here My doubt is:-
    Do the Nwdi System needs to be in the same patch level as our EP system (as it is installed on EP itself.)
    Do we need to run the Template for the Newly installed NWDI only after the Patch Upgradation?
    Kindly Advice
    Regards
    Santosh.N.G

    the patch level of EP and NWDI should be same

  • Regarding Shared Services and Essbase Access

    Hello,
    I am curious on few things regarding how Essbase and Shared services are interlinked.
    Basically we have created Essbase Filters to limit the User access to specific entities , my concern is if a User is trying to Run a report or retrieve through Smart View and if they don't have access to any one of the list of Filter definitions say if there are X , Y ,Z entities in the Spread sheet for Smart View retrieval or in a report and the user does not have privilege for Z do they still get terminated from the entire Essbase Applications. I encountered similar type of problem with one of the users today.
    Any comments.
    Thanks !

    Thanks for the reply Glenn , yes it should not get disconnected or have any connection issue. But below is what the error we get when using Essbase security filter.
    **** Cannot Open Member Selection. Essbase Error(1001064):You do not have sufficient access to perform read on this database ****

  • Page and Record level Authentication / Access control.

    Hi,
    I hope some of you might have come across this kind of issues. I am trying to setup page level authentication and record level access control. Please see below for the detailed description.
    1. Does APEX have any functionality where I can implement my page level authentication schemes.
    Say there are 5 pages/tabs and 10 users, and I want to restrict access as follows.
    All users can read the data in all the pages.
    User 1 thru 8 can read all the pages and edit page 1 and 2
    User 9 and 10 can read and delete the records inside the page.
    2. Is there any mechanism, that supports record level access control.
    Example : There is a page, it shows a product information of all the products. Is there a mecanism inside APEX wherein this page shows only the products created by it's creater (any end user)
    Is there a way in APEX, we can implement this functionality without having user information stored in the DB. ?
    Thanx in advannce.
    Vijay.

    Vijay,
    When a user creates the product why not store the user who created it in a column in the same table. That way you can write something like this:<BR>
    CREATE TABLE products_tab
      productid NUMBER PRIMARY KEY,
      product_name VARCHAR2(200),
      user_created VARCHAR2(30)
    );<br>
    SELECT
      productid,
      product_name,
      ( CASE
          WHEN user_created = :F_USER THEN
            --link to edit page goes here
          ELSE '<nbsp>'
        END ) edit_link,
      ( CASE
         WHEN user_created = :F_USER THEN
           --link to delete page goes here
         ELSE '<nbsp>'
        END ) delete_link
    FROM products_tab<br>
    I don't believe you can use an authorization scheme on a button the way you desired. It either displays the column or it doesn't.<br><br>
    Hope this helps.<br><br>
    chet<br><br>

  • Permit SharePoint group to have contribute access at Folder level only and read permission at library level.

    Is it possible to Permit SharePoint group to have contribute access at Folder level only and read permission at library level.
    Ashish Baranwal To know what you know and what you do not know, that is true knowledge

    Hi Ashish,
    You can have special permissions for individual lists or libraries (or folders within a library) what you have to do is to go
    to the manage permissions list or document library for the appropriate item or folder and stop inheriting permissions from Parent and then you can add any sorts of permissions you want uniquely to that item or folder.
    Check for further reference.
    http://social.technet.microsoft.com/wiki/contents/articles/18203.sharepoint-2013-break-document-library-permissions-inheritance.aspx
    you have to break the inheriting permission of document library and assign the permission you want again you have to set the same for folder
    level.
    For your better understaning the concept check here
    http://blog.pentalogic.net/2010/11/sharepoint-permissions-what-why-and-how-part-1-basic-principles/
    While you probably won't come across this in your case, be careful when breaking security permission inheritance on the items in a a document
    library or list. There are big performance hits. If you have inherited permissions on a library or list SharePoint only has to do one permissions check for all the contents. If you have unique permissions SharePoint has to check every document's permissions
    before returning the contents of the library.  This tends to become an issue when you have thousands of items, rather than
    hundreds.
    Krishana Kumar http://www.mosstechnet-kk.com
    Please mark the replies and Proposed as answer if they help and solve your issue

  • Protected access and Default access

    hi all,
    Can you tell exact difference between protected access and default access.
    Thanks in advance.

    default (for classes*), also known as "package" or "package private": accessible from within that class and other classes in the same package.
    protected: accessible from within that class, other classes in the same package, and subclasses.
    *Note that for interfaces, the "default" access is pubic, not "package private".                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       

  • Is there a major flaw with Iphoto in regards to organizing and backing up?

    Is there a major flaw with Iphoto in regards to organizing and backing up? And how should I proceed??
    Here is my story. I have moved roughly 15,000 photos from 7 computers (4 PCs and 3 Macs - basically everyone's computer in the family) onto one external hard drive. The photos were taken by many different digital cameras, are sparsely labeled, and have the most random names and folders. There are a LOT of duplicates. MY MISSION - label and back them up.
    The way I normally deal with photos/DATA is this: I plug my camera into my Mac and immediately think about organizing and backing them up. With "Preview" I look at photos (and decide which one I like), create a folder called "where-ever I took these photos" and drag them into that folder. The problem with Iphoto is that you have no ability to control folders, unlike many other applications.
    For example, in Itunes you can rename an artist, or even an album, and it will automatically appear in an updated folder. If you alter a photo in Photoshop, it makes you save it is a new file. In Iphoto you cannot make the same "root level" changes without making duplicates. From what I understand, you can place photos into an Album and then export that album (which makes duplicates). Iphoto will rename each duplicate file and then place it in the correct folder. The problem here is I have no idea where the original is to delete it.
    Basically I want to create folders called "Trip to Italy 2003" or "Rachel's Wedding" and place all the photos associated with that event in those folders. The problem I run into is that I have a bunch of duplicates. I have heard of a program called Duplicate Annihilator which has gotten favorable reviews. If I import them into Iphoto all the photos are placed in random named folders. I say random because some of the photos were taken on cameras that didn't have the date set correctly. Hence some of my photos will appear in a labyrinth of folders called "Modified / 2001 / Roll 17 / DCM482 / Image25874654.jpg"
    I am totally willing to wipe my Iphoto library clean and start again if there is a way to organize the photos as described above. Eventually I will take these folders and save them on a data DVD.
    Thanks to anyone who can help.
    Gary

    You do not need to delve into the folders within the iPhoto Library via the finder to access any photo. That is all done within iPhoto itself. If you need a photo for use outside of iPhoto read Terence Devlin's treatise on file access. iPhoto is a DAM application - Digital Asset Management, not a folder manager. There's a big difference. You can use keywords, album and smart albums to organize your photos.
    If you still have the original files you might consider what I do. I rename each file with the date it was taken using the international date format: YYYY-MM-DD-001.jpg. You can download the demo version ofMedia Expression and automatically rename each folder of photos with the EXIF date and a sequential number. This makes chronological searching and sorting much easier both in iPhoto and the Finder.
    If you want to not only manage the photos but the folders then Expression Media will let you do both. It will let you rename files after being imported into a catalog, move them between folders, add ITPC metadata to the files, create virtual albums called Supplemental categories, and much, much more. I use it as my primary DAM and iPhoto for special projects like books, slideshows, calendars, etc.

  • Questions regarding xft fonts, and awesome wm

    Hi, I just tried ArchLinux yesterday and loving it!
    I use JWM, but am very interested in dwm/awesome wm. I do have some questions:
    1. On a thread in the forum, it is mentioned that dwm has no Xft support. How useful exactly is Xft? Would it impact on design work involving GIMP/Inkscape/Scribus?
    2. Does awesome have Xft support?
    3. I installed awesome, but I have no idea on what keys to use. The shortcuts are different from dwm. I tried to look for quick tutorial just to get the basics (dwm has one on their website), but seems like all documentation I found have none of that section and go straight to configuration.
    Do I actually have to configure the wm before I can use it at a very basic level?
    4. I would like to do some more comparison between wms, trying to find a good balance for me in regards of lightness and functions I need. However, I have no idea on what to use to keep track of cpu/memory usage for all the wms. What's a good way to do this?
    Thank you in advance.

    Welcome to Arch!
    1. The lack of xft support in dwm mostly just means that you won't get anti-aliased fonts in the status bar. Individual applications will still have the same font support they had before you used dwm.
    2. Awesome uses pango for font rendering, which is even better than xft.
    3. Look at the man page for default key bindings. It's more or less usable out of the box, but you will definitely want to customize it somehow.
    4. A good system monitor is htop. Install it from the repos and run it from a terminal.
    Last edited by fflarex (2009-02-23 18:44:45)

  • My account was accessed and unauthorized changes made by We R Wireless

    I recently became a ware of a very serious issue and have been getting little assistance from Verizon.  My account was password protected and had only 3 people identified as having the ability to make changes on my account.  I received a notice from Verizon regarding a change made on one of my lines.  Upon review it was an unauthorized change to add "Total Mobile Protection" to one of my lines for $9.00 a month.  Also in this notice was a credit which I was entitled to for a $10.00 Active Promotion.  I believe this credit was placed on the account so that the change might slip by unnoticed.   When I looked into the change it was made by a Representative from We R Wireless in Ship Bottom NJ.  I have never been to this store nor have I spoken with anyone ever at this store.
    After calling the store and confirming my account was accessed and unauthorized changes made, I was told by the manager that an employee had in fact accessed my account and made those changes.  I still could not understand how it was possible for the changes to have been made without my password.  The activity certainly looked very suspicious and I figured it had to do with commission to the representative for adding the insurance plan.  This was denied multiple times by the manager of the store as well as the District Manager.  In the meantime I had received multiple emails from We R Wireless in their attempts to "Make this go away"
    What came next was the most disturbing and upsetting part of this situation.  I was told by the District Manager of WE R Wireless that my information they had collected years ago during a purchase of a phone and activation INCLUDING MY PASSWORD and that they had kept it in their system!!
    WE R Wireless had shared my personally identifiable information and Password to my account with Sales representatives at the Ship Bottom WE R Wireless store  and that was how they accessed my account!!
    As you can imagine I have now been receiving multiple calls from The Director of Retail Operations, Musafa as well as the Director of Operations, Jimmy.  They are attempting to sweep this under the carpet and it is inexcusable and unacceptable.  The reason for this post is to WARN others who may have made purchases at anytime at a We R Wireless store that they KEEP YOUR PASSWORD and employees are given the Passwords and have made changes to accounts.  I cannot believe that I am the only one that this has happened to and I am concerned this is a widespread breech and more importantly is ILLEGAL.
    I will keep this Board updated with developments but can tell you so far Verizon has not been very responsive to my concerns but this is unacceptable and I am thinking of contacting the FCC as well as an Attorney.  In this day and age of Identity Theft this situation must be addressed by Verizon whether or not this was one rogue employee or not our PASSWORDS and other Information should never be shared nor kept without our knowledge.
    >> Edited to comply with the Verizon Wireless Terms of Service <<
    Message was edited by: Verizon Moderator

    I can only tell you that the Verizon rep from the Fraud department as well as Verizon's legal department contacted me and said under no circumstances are these companies to retain Customer Passwords.  As you can see look at the potential for issues as evident in this situation.
    As far as the FCC and their responsibilities this is directly from the website
    The Federal Communications Commission regulates interstate and international communications by radio, television, wire, satellite and cable in all 50 states, the District of Columbia and U.S. territories. An independent U.S. government agency overseen by Congress, the commission is the United States' primary authority for communications law, regulation and technological innovation. In its work facing economic opportunities and challenges associated with rapidly evolving advances in global communications
    The agency investigates consumer issues such as Cramming which has occurred here if you go to the site you will see some of the recent fines for cramming levied by the FCC and it is a huge issue.  A consumer does not get involved in legal fees the FCC is responsible to investigate consumer claims of fraud and regulates the industry.  The Attorney General also takes this very seriously as well.
    Cramming - Unauthorized Charges on Your Phone Bill
    Cramming Settlement for Consumers Announced
    Dec. 19, 2014: The FCC, along with the FTC and state attorneys general, announced a $90 million settlement with T-Mobile regarding unauthorized charges - commonly known as "cramming" - on phone bills.
    Current and former T-Mobile wireless customers should review their bills and apply for refunds if they suspect third party charges were wrongly added to their bills at www.t-mobilerefund.com/
    Sent from my iPad

  • How to create a new field for Q3 - QM notification in Header and item level

    Dear All,
    l
               Sub: How to create a new field for Q3 - QM notification in Header and item level
    Ref. the link --> Quality Notification
    We want to create a new field in header level and item level.
    As per the thread the solution is given below.
    In the IMG Config: Quality Management -> Quality Notification -> Notification Types -> Define screen areas for notification types Then Choose 'Define screen areas' Then Click on 'New entries' button Now, select the relevant Notification Type and click in 'Enter'. Select the 'Iten Cases' register and remember to setup the Tabstrip Header, Icon, etc. Set the 'Tabstrip active' flag. Then Save.
    Quality Notification -> Notification Types -> Define screen areas for notification types
    WE ARE UNABLE TO FIND IN CUSTOMIZATION PATH --> DEFINE SCREEN AREAS FOR NOTIFICATION TYPES.
    Please help.
    Question No. 2 :
    THE REQUIREMENT IS GIVEN BELOW.
    We want to hide the field in Q3 - QM Notification
    In header --> Reference tab --> Item (sub heading) --> "DEFECT LOCATION" FIELD TO BE ELIMINATED (HIDE)
    Ref the link --> Quality notification
    The solutiion is given below.
    Hi Sami,
    We can hide the collumns using the Transaction OQM1 and Program Name SAPLIQS0.
    Lets say Defect location need to be hidden, the field TXTCDOT need to have the radio button HIDE.
    Hope this will suffice your requirement.
    Kindly ask me if you need any other details.
    Thanks & Regards,
    Srinivas.D
    Hi Sami,
    We can hide the collumns using the Transaction OQM1 and Program Name SAPLIQS0.
    Lets say Defect location need to be hidden, the field TXTCDOT need to have the radio button HIDE.
    Hope this will suffice your requirement.
    Kindly ask me if you need any other details.
    Thanks & Regards,
    Srinivas.D
    By double clicking the "DEFECTIVE QUANTITY (EXTERNAL), WE COULD NOT GET --> field TXTCDOT .
    Plese do the needful.
    We are using ECC6.0 Ehp3 and Ehp4.
    With Best Regards,
    Raghu Sharma

    Dear Pushpa,
    Transaction Code :SHD0 is working fine.
    Please accept my sincere thanks for your sharing your Knowledge.
    I am able to fulfill my
    Regarding the enhancement, I have not tried.
    Once I will complete, I will award the fulll marks to you.
    With Best Regards,
    Raghu Sharma

  • HTTP 403 when trying to access a protected resource

    I'm setting up a very simple enviornment to test the basic functionalities of Access Manager 7.1 but I keep on getting an "HTTP 403 forbidden" error when trying to access a protected resouce. I think I've set the required policies, rules, etc., but still, I may have missed a step. Any ideas / advice will be greatly appreciated. Thanks.
    Here's my setup and steps I took.
    iamsys05.iamtest.com ¡V policy server, Access Manager 7.1 Update 1
    iamsys06.iamtest.com ¡V protected resource, Apache 2.2.8 web server
    On Policy Server (iamsys05):
    1.     Created ¡§Apache Policy 1¡¨ on top-level realm.
    2.     Under Apache Policy 1, created rule ¡§apache root¡¨ with service type = URL Policy agent and resource name: http://iamsys06.iamtest.com:8080/*
    3.     Under Apache Policy 1, created subjects ¡§all users¡¨ with type=Acess Manager Identity Subject and selected all users under the realm. One of these users is amAdmin.
    4.     Created agent profile user ¡§webagent¡¨ on top-level realm (amserver) [amserver „³ Subjects „³ Agent ].
    5.     Created user ¡§webagent¡¨ on top-level realm [amserver „³ Subjects „³ User].
    6.     Created role ¡§webagentrole¡¨ on top-level realm [amserver „³ Subjects „³ Role].
    7.     Assigned user ¡§webagent¡¨ to role ¡§webagentrole¡¨.
    8.     Set the privileges for webagentrole to ¡§Read and write access to all realm and policy properties¡¨
    9.     Added the webagent user account to com.sun.identity.authentication.special.users in AMConfig.properties file.
    com.sun.identity.authentication.special.users=
    cn=dsameuser,ou=DSAME Users,dc=sun, dc=com|cn=amService-UrlAccessAgent,ou=DSAME Users,dc=sun,dc=com |uid=dmgr,ou=people,dc=sun,dc=com|uid=webagent,ou=People,dc=amserver,dc=com
    10.     Restarted amserver application.
    On Protected Resource (iamsys06):
    1.     Installed Apache 2.2.8 web server and set listening port to 8080. Tested by opening http://iamsys06.iamtest.com:8080. Home page displayed (It works!)
    2.     Installed Policy Agent for Apache 2.2.
    3.     Restarted apache 2.2 web server
    4.     Opened http://iamsys06.iamtest.com:8080.
    5.     Browser redirected to http://iamsys05:9080/amserver/UI/Login?goto=http%3A%2F%2Fiamsys06.iamtest.com%3A8080%2F
    6.     Access Manager login page displayed
    7.     Entered a valid ID and password (amadmin). This is the Access manager admin account I use to login to the AM Admin console so I know the id and password are valid. Hit Login.
    8.     After about 30 seconds, browser is redirected to http://iamsys05:9080/amserver/UI/Login?AMAuthCookie=AQIC5wM2LY4SfcyNiM%2B36w9DDhY5NmKc2PF6%2Fx4x2%2FUJ18M%3D%40AAJTSQACMDE%3D%23. Brwser displays "HTTP 403 Forbidden. This error (HTTP 403 Forbidden) means that Internet Explorer was able to connect to the website, but it does not have permission to view the webpage." I get this with IE6.
    9.     Using Firefox, I get a ¡§Redirect Loop¡¨ error message ¡§Firefox has detected that the server is redirecting the request for this address in a way that will never complete.¡¨
    Thanks
    -Armand

    Installed tamper data and from what I can tell, the requests go back and forth between AM server and protected resource. Here's the Request Graph output.
    http://iamsys06.iamtest.com:8080/ 302 103
    http://iamsys05.iamtest.com:9080/.../Login?goto=http%3A%2... 302 16
    http://iamsys05:9080/.../Login?goto=http%3A%2F%2Fiams... 200 16
    http://iamsys05:9080/favicon.ico 404 50
    http://iamsys05:9080/.../Login?AMAuthCookie=AQIC5wM2LY4Sfcz... 302 183
    http://iamsys06.iamtest.com:8080/ 302 30
    http://iamsys05.iamtest.com:9080/.../Login?goto=http%3A%2... 302 17
    http://iamsys05:9080/.../Login?goto=http%3A%2F%2Fiams... 302 10711
    http://iamsys06.iamtest.com:8080/ 302 23
    http://iamsys05.iamtest.com:9080/.../Login?goto=http%3A%2... 302 15
    http://iamsys05:9080/.../Login?goto=http%3A%2F%2Fiams... 302 16
    http://iamsys06.iamtest.com:8080/ 302 18
    http://iamsys05.iamtest.com:9080/.../Login?goto=http%3A%2... 302 17
    http://iamsys05:9080/.../Login?goto=http%3A%2F%2Fiams... 302 13
    http://iamsys06.iamtest.com:8080/ 302 13
    http://iamsys05.iamtest.com:9080/.../Login?goto=http%3A%2... 302 10
    http://iamsys05:9080/.../Login?goto=http%3A%2F%2Fiams... 302 10
    http://iamsys06.iamtest.com:8080/ 302 16
    http://iamsys05.iamtest.com:9080/.../Login?goto=http%3A%2... 302 11
    http://iamsys05:9080/.../Login?goto=http%3A%2F%2Fiams... 302 12
    http://iamsys06.iamtest.com:8080/ 302 12
    http://iamsys05.iamtest.com:9080/.../Login?goto=http%3A%2... 302 10
    http://iamsys05:9080/.../Login?goto=http%3A%2F%2Fiams... 302 12
    http://iamsys06.iamtest.com:8080/ 302 12
    http://iamsys05.iamtest.com:9080/.../Login?goto=http%3A%2... 302 10
    | | | | |
    URI Status Duration 20:59:52.542 20:59:56.512 21:00:00.482 21:00:04.451 21:00:08.421

  • Logical database PSJ:   How to access and link tables inside that???

    Hi,
    I have a requirement like :
    I have to write one report which will display project statuses (PSmodule) using the LDB PSJ.. I am using LDB because I neeed dynamic selection screen.
    I need to acees the data from table like 1. PROJ, prps_r and JCDS under the LDB PSJ.. but when I found the hirarchy of these table in the LDB , then all 3 tables are at same level.
    then How to access and link data from theses 3 tables using GET and LATE command.
    I did like below, but wrong number of records are coming
    START-OF-SELECTION.
    GET proj.
    GET prps_r.
    GET  elm_ps .
    GET jcds.
    can anyone tell me, what 's wrong here.
    points will be rewarded
    for proper answer.
    Regards,
    Mrunal

    hi ...get is like a loop in ldb. then if you use the 3 get statements then it will loop with in a loop with different data..

Maybe you are looking for