Removing user access after hours

All,
We are running Oracle 10g. What is the best way to remove user access after hours say from 5:00 pm to 6:00 am? I have searched this site and the only thread that I found was Can I limit user access to Oracle DB based on time?? which is not helpful to me. My manager wants users to access the Database only during the user's work hours which is M-F 8:00 am - 5:00 pm. Any suggestions would be greatly appreciated.
Seyed                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                       

>
Creating a logon trigger will need a restart of the database, but I think it is the best approach.
Am not sure why restart would be required?
Possibly creating a seperate listener entry on a different port especially for the users could also be a solution.
Then after 05:00 pm, stop that perticular listener only
HTH
What if I know the port number of another listener?
FJFranken
My Blog: http://managingoracle.blogspot.com
If this answer satifies your question, mark the question as answered and award the points. It is appreciated!Regards
Anurag

Similar Messages

  • How to 'Remove' user access from deleted dual boot system's users in existing operating system's folders and files?

    I have Windows 7 Enterprise Professional, accessed earlier from (now deleted) other dual boot operating system (User folder), which shows it's users as unknowns for folder properties in Windows 7 Enterprise Professional's "C:\Users\Aniruddha",
    which causes system not responding, how to 'Remove' these unknown users from folder properties of "C:\Users\Aniruddha"?
    Also "C:\Users\Aniruddha\Application Data" creates many of own folders within eachselfs end folder ("C:\Users\Aniruddha\Application Data" creates a "C:\Users\Aniruddha\Application Data\Application Data", "C:\Users\Aniruddha\Application
    Data\Application Data" creates a "C:\Users\Aniruddha\Application Data\Application Data\Application Data" and many) because of which system stops responding randomly, starts responding only for "ctrl+alt+del", why such self
    creation begins?
    Whether a standby user with same file structure copied from a user would dynamically link it's shortcut folders with Windows user from whom these folders were copied or whether there would be no link and for above said problem I would restore User's file structre
    back to normal just by copying from standby user?

    It seems your PC is infected with some malware. Use a trusted antivirus software with the latest definition updates installed to scan and remove the malware.
    Balaji Kundalam

  • Security Process - Removing User Access Resulting from Job Change

    My question is Security process related specific to internal employee transfers (new job responsibilities).  My organization has typically added requested access to a users' account, and infrequently removed access no longer required.  In the event where there has been a job transfer, the user may have more security capability than required in the new job.  In the current internal process, the security administrator has no visibility to employee transfers.   I'm seeking input on practicle ways to remove access no longer required without impacting the user with downtime should a proactive end of access date be dictated.  Recommendations?

    >
    Sandi Ward wrote:
    > Ideally your HR Admin should notify you of such changes, or the manager responsible for the staff member.
    > We use position based security, but because HR did not always tell the security admin that a user had changed position, we found that users lost access (users were moved to brand new positions with no access assigned). First thing security knew about it was when the user complained.
    >
    > ... So we had our ABAPers whip up an auto generated e-mail whenever a position was changed, the e-mail was sent to security team, and service desk.  They used the HR dynamic actions as the basis of the programme.
    >
    > Even if your access is not linked to positions you could still receive notification of a change of position for a given personnel record.
    Sandi,
    You are correct, ideally the HR admin should inform security but they do not.  However, there is a report that will display all the new positions without security role assignments.  You can use the report to be pro-active with assigning roles to positions.  Of course this is assuming you have basic role assignments for positions (clerks, office managers, directors, etc).  I use the output as a source file for my SECATT scripts to populate roles to positions.
    Regards,
    -John N.

  • ASA5510 - Is it possible to give users access 2 hours per day?

    Hi!
    As the topic say; is it possible to set up so specific users only have, say, 2 hours of internet access per day?
    They should be able to log on any time of the day, and so many times they want, as long as the total usage does not exeed 2 hours per day.
    Is this possible on a ASA5510, or any other device Cisco is selling?
    Thanks.

    You would have to do that with a proxy or web security appliance. Take a look at Cisco's Ironport products.
    http://www.cisco.com/en/US/products/ps10164/index.html

  • User Access after DB migration

    Post Author: ADoinel
    CA Forum: Administration
    I am currently using BOBJ XIr2. W just migrated our DB repository (bo_cms) to a new database server (SQL2000 to SQL2005). After this I have users that can no longer access reports that use prompts. They recieve an error message indicating that they do not have sufficient access to the univers. They have no problems accesing reports without prompts. I checked the users permissions on the universe in CMC and it appears that they should have sufficient priviledges to access these reports with prompts: For example: New List of Values = Granted Data Access = Granted etc. Can anyone help me wiht this issue? Did I miss some permissions while migrating the DB repository? Thanks in advance, Adoinel

    Post Author: TAZ
    CA Forum: Administration
    For the most part security should not change when migrating a database, Did you migrate via Microsoft tools or use the CCM database copy? I'd suggest migrating with the CCM database copy or else results could be unpredictable.
    If you suspect a security issue then try using security viewer.
    http://technicalsupport.businessobjects.com/KanisaSupportSite/search.do?cmd=displayKC&docType=kc&externalId=http--supportbusinessobjectscom-communityCS-FilesandUpdatesNoNav-SecViewerzipasp
    If you migrate via CCM then tables are read using 2000 ODBC and written using the 2005 ODBC connection. It would stand that there would be far less chance of data corruption/misinterpritation using this method if you cannot resolve via security.
    Regards,
    Tim

  • Remove User permissions using VS Workflow

    HI,
    How to remove the list item level permission using Visual studio sequential workflow?
    I have thousands of users in the site, who have permission to the list item. I am looking for Performance as well, while removing users.
    After removing all users, I am giving permission to 5 people (which I already have done). How to remove user permisions from list item effectively and in a faster way using visual studio ( C# )?
    Thanks

    HI,
    I found two ways, but not sure which is performance efficient:
    # Method 1
    CurrentlistItem.BreakRoleInheritance(true);
    SPRoleAssignmentCollection SPRoleAssColn = CurrentlistItem.RoleAssignments;
    for (int i = SPRoleAssColn.Count - 1; i >=0 ; i--)
    SPRoleAssColn.Remove(i);
    # Method 2
    CurrentlistItem.BreakRoleInheritance(true);
    SPRoleAssignmentCollection SPRoleAssColn = CurrentlistItem.RoleAssignments;
    while (CurrentlistItem.RoleAssignments.Count > 0)
    CurrentlistItem.RoleAssignments.Remove(0);
    Please let me know, if there is any other method which can be used.
    Thanks

  • Can we give UNIQUE ACCESS FOR THE SPECIFIC FILE IN THE LIBRARY in SP2013? How can we remove users from SHARED WITH link where files are shared with users?

    Hi,
    Any help on this?
    Thanks
    srabon

    Hi srabon,
    For giving unique access for a specific file in a library, you can go to the library, and select the file , and click FILES->Shared With->ADVANCED, under PERMISSION ribbon, click ‘Stop Inheriting Permissions’, then the file will have unique permissions.
    For removing the shared users for a file, firstly, like the above steps, select the file , and click FILES->Shared With->ADVANCED , make sure the file has unique access, then select the users that you want to remove, and click Remove User Persmissions
    under PERMISSIONS ribbon.
    I hope this helps.
    Thanks,
    Wendy
    Wendy Li
    TechNet Community Support

  • After hours of back-up, downloading and uploading...I am now updated with all the latest Mac software. However, I no longer have access to Excel and Word. Is there a way I can access my documents in either of those? Help, please.

    After hours of back-up, downloading and uploading...I am now updated with all the latest Mac software. However, I no longer have access to Excel and Word. Is there a way I can access my documents in either of those? Help, please.

    If you have older versions of excel and word that previously ran under the Rosetta emulator (allows PowerPC code to run on Intel system), they will no longer work with Lion.
    You can use the Apple programs Pages and Numbers to access the files. They can be bought and downloaded from the App store. NeoOffice is available at http://www.neooffice.org/neojava/en/index.php which has Lion support. OpenOffice doesn't talk to Lion support, it's at http://www.openoffice.org/

  • After recording text using the dragon dictation app, it is converted, it can be copied to the iOS system clipboard for use in any app, how does the user access the clipboard to retrive this information if it is no longer on the screen?

    after recording text using the Dragon dictation app, it can be copied to the iOS systme clipboard for use in any app, how does the user access the clipboard to retrive this information if it is no longer on the screen?

    You need to do a long-press in any data entry field, then select Paste.

  • Remove open workitem from user inbox after the workflow starts again.

    I have heard that there is a possibility to remove a open workitem from the user inbox, after the workflow starts again for the same object (data update), via a termiantion event. I have searched in the sap workflow dokumentation but i could not find out how to use this. Could somebody provide me some detailed documentation or examples how to use this for my problem?
    Thanks,
    Steve

    Hi Sudhir,
    the workitem which should terminate is a decision task with two results. The wolkflow looks as follows:
    Activity: Read Data
    Decision: Approval Check Decision
    Activities: Approve or Reject
    How should it look like in your opinion with the termination? How looks this option to terminate this workitem? The workitem should terminate automatically from the userinbox if the workflow starts again for the same object (with updated data).
    Thanks,
    Steve
    Edited by: Steve Malack  on Mar 13, 2008 10:20 AM

  • Not accessable after a few hours

    I experience that home sharing is not accessable after a few hours (or the next day after a restart etc). The home sharing icon in itunes is visible but when clicking on it sharts loading and stops half way and then time out.

    No 
    Solution may be found if you search in the "More Like This" section over in the right column. 

  • Easy Access Favorites - Remove user generated favorites

    Is there a way to remove User generated favorites on an enterprise level?  We're hoping that each User doesn't have to remove their own favorites.  Could a script be written to remove them at a system client level?
    CRM Release 610  -  Sap GUI 720
    Thanks,
    Steve

    Of course.
    Favorites are stored in tables as for everything in the SAP system.
    And as always there is someone asking these questions before:
    Check this thread:
    Table for SAP Menu and Favourites
    So write an ABAP that manages this table per user-name and your issue should be solved!

  • Multiple User access in ATP

    I am designing custom ATP for our client. Actually, this logic accesses batch classification data and the calculation logic also differs.
    The concern that I have is if one user (say A) creates a sales order item and runs a successful Availability check and goes on to create second sales order item. simultaneously if another user (say B) comes to create new sales order item for same material. now the ATP quantity that second user gets should be less than the quantity confirmed by user A. But both the sales order have not been saved. so how do I block the quantities confirmed by A but yet not saved.
    Is there any special method for multiple user access at runtime.

    Thanks for ur reply. it was really helpful to gain more insights in my issue.
    1. For performance-related reasons, the only time when it makes sense to set the material block with quantity transfer is when it is common for several users to work on the same material simultaneously. And in VA01 there are many parallel Sales order creation
    2.You create a sales order for a material. During the availability check, this material is blocked. After the availability check is completed, the block is removed. The quantity reserved for this transaction is recorded in the blocking table. This information can be assessed by all others who are working with this material. If you save the order, the blocked entries are cancelled. this how Material block with quantity transfer in SD works.
    The concern that I have now is how to get Blocking Tables for transaction VA01.

  • Looking for Suggestions on granting all users access to an application *except a subset of users*

    This might not be the right forum for this question, but since it is related to an App-V application I figured I would try since this may have come up for some of you.  I am looking for the best way to grant all Domain Users access to an application
    except for Domain Admins.  Using the Full App-V infrastructure, I want to grant access to the App-V UI via User Targeting, but I don't want to allow Domain Admins access.  The reason for this is because when we make updates to provisioned
    server cores (stateless), we login with our Admin accounts to make modifications to the cores, and I would like to reduce the steps that need to be taken at the end to ensure that all AppV applications are removed before sealing up the core. 
    Currently, Domain Admins do not have access to any App-V applications, so this process is fairly clean.  All applications are User Targeted. 
    Packages are cached on a persistent D drive on each server, so the issue is that the registry, programdata, and packageinstallationroot become out of sync if packages are pulled down during core modifications after the core is attached to other servers (hence
    other D drives).  Because of this, Machine Targeting is not an option for this either.
     

    This would be so much easier with a "Configuration Manager" like feature where you could create a collection query to accomplish the same thing.  Are there other tools out there that will do the same thing?

  • Removed ip access-list & lost network connectivity

    An access-list was removed to edit and replace. Once the access-list was removed we lost network connectivity to the remote router. This list is an extensive one. But when we remove on other remote routers network connectivity remained. Can anyone tell me why? Is this a typical of access-list, and good practice is to wait until after business hours?

    No problem.
    I am sure that we have all had experiences of looking at things we have written, or questions answered, and realized that what we wrote was not quite what we were thinking as we created it.
    Your main point is well taken that it is good practice to remove the access-group before removing and changing the content of access lists.
    Sometimes I take a slightly different approach: I will build a new version of the access list using a different number (if I am changing access list 101, I may create list 102) which is the modified version of the list. I then change the access-group to reference the new version of the list. This may have a couple of advantages including the fact that the interface is always protected by some access list. Also it makes backing out changes easier if we discover that there was some flaw in our list modification.
    HTH
    Rick

Maybe you are looking for

  • Performance Issue with Selection Screen Values

    Hi, I am facing a performance issue(seems like a performance issue ) in my project. I have a query with some RKFs and sales area in filters (single value variable which is optional). Query is by default  restricted by current month. The Cube on which

  • Book marks in PDF

    Hi, I would like to convert a Word document into a PDF file.  But only chapter headings not their chapter numbers form this WORD document schould be converted in book marks in the PDF file. I use WORD 2002 and Adobe Acrobat 8. For example: chapter he

  • Fonts in iBooks.

    Hello! Can I change  the font on PDF books on iBooks as well as highlight words?

  • Changing the Sequence of the Access Sequence for Pricing Condition Type

    Hi Friends, We have an access sequence to determine the pricing. We have 8 key combinations for the same. Customer/Plant/Material/Batch Sales Org/ Dist Ch/ Cust Region/Plant/Material/ Batch Price List Type/Currency/Plant/Material/ batch Plant/Materia

  • Archiving of Purchasing Documents

    Hi Flocks, I am trying to Archiving of Purchasing Documents but i am getting the following error. please suggest << removed >>. "Delivery completed" indicator set No provision for IR Thanks in Advance you all, Saleem. Edited by: Saleem Shaik on Apr 1