Remote access to another user

Is it possible to use Apple's Remote Access to go into another logged in user on the same machine?
Lets say on 1 computer you are logged into the "main" account and then log in with another user account.  Can you the open Apple Remote Desktop and access the other logged in account, for example, to log that user off without having to actually switch to the user account first?

Hi, I had same problem and I was able to resolve by updating the configure information on the mapping. For each of the source tables I entered the schema and db link. Then when I executed the code the table was properly identified with schema and db link. I don't know if this is the correct solution. I would like to know if this is the proper way to resolve the problem. I took the class and we didn't have to do this. Also you will see warnings when you deploy. Hope this helps.
MJ

Similar Messages

  • How can I share the results with limited access to another user

    I am adding another user to be able to see results of forms submitted, I want the user to add some text into the results view but I don't want him to have access the the design view. How can I make that happen?

    Karina Wiggs
    Director of Operations
    Community Lodgings
    Office: (703) 549-4407
    Cell: (301) 412-4407
    Fax: (703) 548-1294
    Facebook <https://www.facebook.com/Community.Lodgings?ref=tn_tnmn> I
    Twitter  <https://twitter.com/CommunityLdgngs>I Instagram
    <http://instagram.com/communitylodgings>
    www.communitylodgings.org
    On Thu, Dec 4, 2014 at 11:43 AM, Vikrantt Singh <[email protected]>

  • 1 user can access inernet, another user on same computer cannot

    I can access the internet, another user on same computer gets the message "connection was reset"

    This article should be of help: http://docs.info.apple.com/article.html?artnum=93195

  • Re:iMac remotely accessed from another computer and location?

    Can you access an iMac remotely from another computer and location if there is knowone to switch it on?

    Barbara,
    Both are legitimate concerns, I'll address each as best I can.
    As for the the power issue, well that's going to be the case with any computer. We have many choices, most of them impractical for example take your house off the grid, put in your own power source (solar or wind powered) which clearly for most of us is totally impractical. The next thing would be a backup-generator like a hospital or other mission critical facilities (police & fire houses) have. While this is more practical again it's stretching the limits again for most of us. So the next thing is a healthy battery back up system that can maintain power to a computer for several hours if necessary. While they are still expensive they are far less expensive than the first two solutions. Of course you can set the energy saver settings to power on your computer after the power comes back on if even the UPS battery goes dead. I haven't tried this remotely however I think it might work.
    Next is security, DropBox and Logmein both address this themselves so I would recommend looking into their solutions. Personally I find them trust worthy and don't have an issue. Even if you use MobileMe you would still have the same concerns, and how about Google, and all the other major players. To me Google while it's a vast resource and extremely helpful if for some reason they decided to become the Evil Empire they have far more access to your information that anything. Anytime you do a simple search they are collecting information about you. For example let's say you are looking for ATM's in a new city, they can capture your search and if they were evil enough they could track your every step. Is this far fetched and ridiculous, of course it is but it is possible. However this is the case with any Internet based computing, if you use some basic common sense for the most part your data is pretty secure. I'm much more nervous about the minimum wage clerk at Taco Bell taking my credit card information than Google, Apple, Logmein or Dropbox doing so.

  • Firefax hangs in remote desktop when another user logs in on the console

    When I work with remote desktop on a windows 7 pc I could always use firefox without any problem, even when someone else was logged in on the same windows 7 machine. Siince the update of firefox to version 13, ff hangs in the remote desktop session as soon as someone else logs in on the wndows 7 console.

    To be specific, this problem occurs in a multiple concurrent user configuration (=hack), where the RDC user and console users are simultaneous users. Firefox will hang, using 50% of the CPU. As soon as the RDC user walks over to the console and switches to that user the hang is released. The behavior is new to v13 and is highly reproducible.
    For more info on multiple concurrent users:
    [http://www.missingremote.com/guide/how-enable-concurrent-sessions-windows-7-service-pack-1-rtm http://www.missingremote.com/guide/how-enable-concurrent-sessions-windows-7-service-pack-1-rtm]

  • Ix4-300d : Remote access logging / unknown user / invalid login attempt

    From time to time a customer of mine is seeing invalid login tries in the log ( mostly 'admin', 'Administrator', but also unconfigured names like 'grigor'?.
    Is there any chance to determine, whether these login attempts (until now not successfull because 'non-common' passwords are used) come from inside or via <my-cloud>.mylenovoemc.com from outside?
    Various PCs / Laptops ( sorry I still really love Dell and Fujitsu ;-))
    Supporting Customers ix2s and ix4s -- Love Networking ( not only technically ).
    I am not a Lenovo Employee.
    If you find a post helpful and it answers your question, please mark it as an "Accepted Solution"!

    It should not put too much strain on the device, but it would make the dump log a bit longer. If you just got a dump report from the device without detailed logging should be able to get an IP address of the invalid attempt, so it may not be necessary to turn on detailed logging if you can get an IP address. Although if it is someone attempting to hack into the system, they are probably hiding their IP address anyway. Do they have a firewall on their network that could provide information about the source of the attempted login?
    Have questions and need answers?
    Search the database for answers to FAQ's, software/driver downloads, tutorials, news, features and more!
    LenovoEMC Support & Downloads
    LenovoEMC North America Support Contact Page

  • How do I share iTunes access privileges with another user on my mac?

    My wife and I use the same Mac. I recently created a separate user account for her after upgrading to Mountain Lion (so that we can get full functionality out of the new features). I gave her user account full administrator access as well as read & write sharing ability in certain folders... So why can she not purchase content on iTunes? What is the best way to extend the same iTunes account across different users on the same Mac?

    I found the answer on the Quicken Support site. Unbelievable!!!!
    Article ID: GEN82981      Updated: 8/11/2011 |
    Unable to Share a Data File Between Multiple Users on the Same System
    Cause The Quicken Essentials data is a data package that contains multiple files.  Each item in the package has permission set based on the current users profile.  When the Package is moved to a shared folder, the permission in the data package are not changed, therefore cannot be accessed by another user.
    You can change the permissions for each individual file within the data package to be accessed by other users.  However, the first user who opens the file after the permissions have been changed, will take ownership of the data package, and it will no longer be accessible by the other party again.
    SolutionThis issue is currently a product limitation and is expected to be resolved in a future version of Quicken Essentials for Mac.

  • Remote Access VPN strange behavior

    Hello all,
    I have a problem with remote access VPN on a ASA5505 (8.2).
    I can establish a VPN connection and can ping the ASA, but nothing else on the network! Not only ping isn't working, I've also tried RDP, HTTP, and file access.
    Additionally there is a site-to-site VPN to this ASA, which is working perfectly.
    I have another ASA5505 which is almost configured the same and there it's working, so I really don't know where the problem is.
    I hope you guys can help me!
    Many thanks in advance!
    Here's my config:
    Result of the command: "show running-config"
    : Saved
    ASA Version 8.2(1)
    hostname Shanghai
    domain-name *******.local
    enable password 8Ry2YjIyt7RRXU24 encrypted
    passwd 2KFQnbNIdI.2KYOU encrypted
    names
    name 172.20.18.0 network-vpnclient
    name 172.20.16.8 SHDC01
    interface Vlan1
     nameif inside
     security-level 100
     ip address 172.20.16.1 255.255.248.0
    interface Vlan2
     nameif outside
     security-level 0
     ip address ***.***.***.62 255.255.255.252
    interface Ethernet0/0
     switchport access vlan 2
    interface Ethernet0/1
    interface Ethernet0/2
    interface Ethernet0/3
    interface Ethernet0/4
    interface Ethernet0/5
    interface Ethernet0/6
    interface Ethernet0/7
    ftp mode passive
    clock timezone SGT 8
    dns domain-lookup inside
    dns server-group DefaultDNS
     name-server 172.20.16.1
     domain-name *****.local
    same-security-traffic permit inter-interface
    access-list nonat extended permit ip 172.20.16.0 255.255.248.0 network-vpnclient 255.255.255.0
    access-list nonat extended permit ip 172.20.16.0 255.255.248.0 172.20.0.0 255.255.248.0
    access-list split_tunnel standard permit 172.20.16.0 255.255.248.0
    access-list acl-in extended permit icmp any any
    access-list acl-in extended permit tcp any host ***.***.***.190 eq h323
    access-list VPN_acl extended permit ip 172.20.16.0 255.255.248.0 network-vpnclient 255.255.255.0
    access-list outside_cryptomap extended permit ip 172.20.16.0 255.255.248.0 172.20.0.0 255.255.248.0
    pager lines 24
    logging enable
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    ip local pool client-vpn 172.20.18.1-172.20.18.254 mask 255.255.248.0
    icmp unreachable rate-limit 1 burst-size 1
    no asdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 0 access-list nonat
    nat (inside) 1 172.20.16.0 255.255.248.0
    static (inside,outside) tcp interface h323 192.168.0.250 h323 netmask 255.255.255.255
    access-group acl-in in interface outside
    route outside 0.0.0.0 0.0.0.0 ***.***.***.61 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa-server ActiveDirectory protocol ldap
    aaa-server ActiveDirectory (inside) host SHDC01
     server-port 3268
     ldap-base-dn DC=*****,DC=local
     ldap-scope subtree
     ldap-login-password *
     ldap-login-dn CN=Administrator,CN=Users,DC=lap-laser,DC=local
     server-type microsoft
    aaa authentication enable console LOCAL
    aaa authentication ssh console LOCAL
    aaa authentication http console LOCAL
    http server enable
    http 172.20.0.0 255.255.248.0 inside
    http 172.20.16.0 255.255.248.0 inside
    no snmp-server location
    no snmp-server contact
    snmp-server community *****
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    sysopt noproxyarp inside
    crypto ipsec transform-set laplaserset esp-3des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    crypto ipsec security-association lifetime seconds 28800
    crypto ipsec security-association lifetime kilobytes 4608000
    crypto dynamic-map dynmap 20 set transform-set laplaserset
    crypto map laplasermap 1 match address outside_cryptomap
    crypto map laplasermap 1 set pfs group5
    crypto map laplasermap 1 set peer **.***.***.51
    crypto map laplasermap 1 set transform-set ESP-AES-256-SHA
    crypto map laplasermap 65535 ipsec-isakmp dynamic dynmap
    crypto map laplasermap interface outside
    crypto isakmp identity address
    crypto isakmp enable outside
    crypto isakmp policy 5
     authentication pre-share
     encryption 3des
     hash sha
     group 2
     lifetime 86400
    crypto isakmp policy 10
     authentication pre-share
     encryption 3des
     hash md5
     group 2
     lifetime 86400
    crypto isakmp policy 11
     authentication pre-share
     encryption aes-256
     hash sha
     group 5
     lifetime 86400
    crypto isakmp policy 30
     authentication pre-share
     encryption des
     hash sha
     group 2
     lifetime 86400
    telnet timeout 5
    ssh timeout 5
    console timeout 0
    management-access inside
    dhcpd ping_timeout 750
    dhcpd auto_config outside
    dhcpd address 172.20.16.50-172.20.17.1 inside
    dhcpd dns SHDC01 interface inside
    dhcpd option 3 ip 172.20.16.1 interface inside
    dhcpd enable inside
    vpnclient vpngroup lapserver password ********
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
    group-policy DfltGrpPolicy attributes
    group-policy user-vpn internal
    group-policy user-vpn attributes
     wins-server value 172.20.16.8
     dns-server value 172.20.16.8
     vpn-tunnel-protocol IPSec webvpn
     split-tunnel-policy tunnelspecified
     split-tunnel-network-list value split_tunnel
     default-domain value *****.local
    username admin password VQiqjZZuUSQOWz6. encrypted
    username adminlogin password qZwgnR/XebVbOZxI encrypted
    tunnel-group connection2 type ipsec-l2l
    tunnel-group connection2 ipsec-attributes
     pre-shared-key *
    tunnel-group **.***.***.51 type ipsec-l2l
    tunnel-group **.***.***.51 ipsec-attributes
     pre-shared-key *
    tunnel-group user-vpn type remote-access
    tunnel-group user-vpn general-attributes
     address-pool client-vpn
     authentication-server-group ActiveDirectory
     default-group-policy user-vpn
     dhcp-server 172.20.16.1
    tunnel-group user-vpn ipsec-attributes
     pre-shared-key *
    class-map inspection_default
     match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
     parameters
      message-length maximum 512
    policy-map global_policy
     class inspection_default
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect rsh
      inspect rtsp
      inspect esmtp
      inspect sqlnet
      inspect skinny  
      inspect sunrpc
      inspect xdmcp
      inspect sip  
      inspect netbios
      inspect tftp
      inspect dns preset_dns_map
      inspect http
    service-policy global_policy global
    prompt hostname context
    Cryptochecksum:bc5e7b4ca01a2227885487ab3520ea9c
    : end

    I note in your config that the pool of addresses for remote access VPN is a group of addresses included within the range of addresses on the inside interface. I have seen situations where this caused problems and so have a couple of suggestions:
    - do the devices connected on the inside network have routes to the vpn pool of addresses?
    - if you change the vpn address pool to use addresses that do not overlap with your inside network, does the behavior change?
    HTH
    Rick

  • ASA Remote Access VPN Clients - Multiple DNS Suffixes?

    Hi community!
    I am setting up a new remote access VPN using the traditional IPSec client via ASA 5515-X runnning OS 8.6.1(5).
    We require to provide each client multiple DNS suffixes, but are only to provide a single DNS suffix in the grouip policy.
    I have tested using an external DHCP server, but using our Windows Server 2008 infrastructure and Option 119 the list is not provided to clients, and I have read that Windows 7 clietns may ignore this option anyway.
    Other than umanually configuring the clients , does anybody have any other suggestions on how we may get this to work?
    Full marks for helpful posts!
    Kind regards, Ash.

    Hi
    I am looking into the same issue, and I am finding conflicting documentation about this and wondered if you got the answers you were looking for.
    I have a remote access requirement for users from separate AD's to authenticate through an ASA.
    I was reading about Global Catalogue Server but this is not specifically what I want; and also creating a new AAA server group but the user would need to accept which group to use when they log in
    Regards

  • Can you add delegate access to a user's calendar or mailbox folder via powershell?

    Basically I want to know if you can grant a user delegate access to another user's calendar or meeting room using native  powershell commands?
    I know you can do this via method 1, listed below, however when you grant permissions in this way and if a user wants to see who has delegate access to their calendar or inbox by going to delegate access in outlook they will not see user's who have access
    to their calendar or inbox.
    Method 1:
    Add-MailboxFolderPermission -Identity "userA:\Calendar" -User UserB -AccessRights editor
    The above is a nice and simple way of granting userB EDITOR access to UserA's calendar.
    But as stated above as you are using mailboxFolderPermissions and not DelegateAccess, this applies directly to this folder and if userA goes to their delegate access view in Outlook, they will not see that userB has access to their calendar.
    I know that you can use the below commands to see a list of user's who have delegate access to you calendar:
    Get-Mailbox userA | Get-CalendarProcessing | select resourcedelegates
    I am new to powershell and don't know if there is a way of setting delegate access to a user's calendar or inbox/folder via powershell commands, similar to the above.
    Any help with this query would be much appreciated!
    thanks

    Delegate access is simply a combination of folder rights (which you've described) and Send As right, which is conferred by Add-MailboxPermission or Send On Behalf of right, which I'm not sure if you can confer with PowerShell. Set-CalendarProesssing applies
    to resource mailboxes like conference rooms, not to user mailboxes.
    Update: "Send on Behalf of" is conferred this way:
    Set-Mailbox UserMailbox -GrantSendOnBehalfTo UserWhoSends
    Ed Crowley MVP "There are seldom good technological solutions to behavioral problems."

  • IPhoto is currently a shared file with another user on my Mac and I am the Admin and no longer want to share it. How do i undo this completely?

    Iphoto is currently a shared file on my Mac and I no longer want to share it. How do I completely remove access to it if i am the Admin to the computer? Thanks in advance...

    I found the answer on the Quicken Support site. Unbelievable!!!!
    Article ID: GEN82981      Updated: 8/11/2011 |
    Unable to Share a Data File Between Multiple Users on the Same System
    Cause The Quicken Essentials data is a data package that contains multiple files.  Each item in the package has permission set based on the current users profile.  When the Package is moved to a shared folder, the permission in the data package are not changed, therefore cannot be accessed by another user.
    You can change the permissions for each individual file within the data package to be accessed by other users.  However, the first user who opens the file after the permissions have been changed, will take ownership of the data package, and it will no longer be accessible by the other party again.
    SolutionThis issue is currently a product limitation and is expected to be resolved in a future version of Quicken Essentials for Mac.

  • Why can't I share a Quicken file with another user on my mac?

    I have a new mac. Used to have a pc  with ms money. it was set so that both my wife and I could open Money and work on the same file (our checkbook).
    I get a "can't open file....no permission" message from Quicken if I try to open from my wife's login.
    I have the file in the Shared folder and I manually went into File Sharing and set her up to read& write on that folder and file but I still get "no permission"
    There has to be a way for 2 people to work on the same file, yes?

    I found the answer on the Quicken Support site. Unbelievable!!!!
    Article ID: GEN82981      Updated: 8/11/2011 |
    Unable to Share a Data File Between Multiple Users on the Same System
    Cause The Quicken Essentials data is a data package that contains multiple files.  Each item in the package has permission set based on the current users profile.  When the Package is moved to a shared folder, the permission in the data package are not changed, therefore cannot be accessed by another user.
    You can change the permissions for each individual file within the data package to be accessed by other users.  However, the first user who opens the file after the permissions have been changed, will take ownership of the data package, and it will no longer be accessible by the other party again.
    SolutionThis issue is currently a product limitation and is expected to be resolved in a future version of Quicken Essentials for Mac.

  • How to create a spreadsheet and share it with another users?

    Hello.
    I want to create a weekly report spreadsheet, like excel file, for me and my colleagues. Therefore it is needs to have a public access among another users.
    Is it possible?
    Thank you !

    If you mean create the Excel file and then email it to others, just create and save the file to your drive. Then attach the file to an email and send it.
    If you mean having a file somewhere and several people being able to access and work on the file, that is not in the scope of Thunderbird or any other email client. You might get help with a solution from Microsoft support forum.

  • CAD Remote Access/IPC connect messaging

    Within the CAD documentation, there is reference to being able to enable CAD to receive IPC Events over UDP (ref: "Remote Access" within CAD user guide.
    Two of the actions that can be sent to CAD via XML are the "Make Call" action and the "Set Variable" action.
    We would like to confirm if it's possible to either bundle multiple actions together under a single "IPCActions" command or to send multiple "IPCActions" commands in the context of a single call (eg; send a MakeCall, then send multiple SetVariable commands).

    You would need to do the latter.   I'm not sure on the timing of this - I don't know if the CTI server will accept the set variable commands prior to establising the connnection.  (Since this is UDP, the CAD servers are just passing this data along to CTI - there is not confirmation.)  This is something you'd need to play around with. 
    regards,
    Tom

  • After installing Mountain Lion, why is there Yahoo access for one user but not another?--both are administrators.

    After installing Mountain Lion, why is there Yahoo access for one user but not another?--both are administrators.

    We've had several instances where we have had to run chkdsk on arrays with over 1m files. Average completion time is approximately 72 hours. The maximum downtime window they have available is the 64 hour weekend window. File sizes and number of files were
    much smaller then than they are now.
    The idea, in theory, was to use VHDs to compartmentalize the data into smaller volumes which could be more easily managed. It would also improve performance when transferring these compartments of data as they would use sequential read/write rather than
    fragmented/random. This idea was never fleshed out in entirety, they don't split data up into little containers, but simply into big ones per project. Hence the 11m files in one container that I am currently trying to diagnose.
    Some other important facts: The VHD in question is mounted in B:/project/ as this server also allows remote workers to log in, but they are restricted to see only data in E:. Disks A-D are hidden via group policy.
    Update: icacls is failing on a large number of files within this dataset. I counted the path characters to ensure it wasn't the 255 character limit I was encountering and verified that the paths being blocked are only about 150 characters long. Once it finishes,
    I'll have to try taking ownership and then re-running it. At this point I still have no idea how long to expect. I'm running out of time as the environment will be in use again at 9AM tomorrow morning.

Maybe you are looking for