Security file comparison
Dear All,
Our security file crashed and we used the backup copy to recover it. The date of the backup copy shows it is the one on the prior day. Which I don't think there will be much defference, and we reviewed the log and can find no security changed during the day.
But our management team asks us to compare the two files and report the difference...
Do you have any good idea to compare the 2 files?
Well, your comparison is always going to be off, isn't it? One file is good, the other corrupt -- they have to be different, don't they?
I would be extra sure to have a backup of the .bak file before I did any of this as Essbase has a tendency to write a copy of Essbase.bak on start up and it would be a shame to overwrite your last good copy.
If the original file will still let you start Essbase up (usually this isn't the case, but you might get lucky), you can dump the contents of the Essbase.sec in three ways:
1) Start Essbase in a window, and issue the DUMP command -- that will write the information out to a text file.
2) I think you can do this from EAS, but for the life of me can't remember how -- right click on the security node and select export? I don't have EAS in front of me.
3) Use MaxL's export security_file command.
One other thing to consider -- if you use externalized to Shared Services security, most of your security is there, not in Essbase.sec, so you might want to think about comparing what was in Shared Services versus what is there today.
Regards,
Cameron Lackpour
Similar Messages
-
Lookout 6.6 - Logon Error: Security file does not exist
I'm trying to run Lookout 6.6 evaluation. It loads fine, I get a message saying that it's running evaluation version. I press OK to clear that box and a logon window opens. It's filled in with the default settings, Administator, local doman, no password. I click Log On and it gives me the error which is in the subject line, security file does not exist.
I've read on here that the lookout.sec file doesn't exist in the System32 folder. In this case, I've found it and it's there.
I've trying different user names, I took the .sec file and copied it in various locations: windows folder, and the programs root folder - obviously there was no effect. I tried editing the lookout.ini file to remove the log on information to see if that clears it up (even deleted the file to see if that work), but to no avail. I also tried re-installing the program, but there is no uninstall button - windows program removal tool cannot even remove, modify, or repair the program. I ran the install a couple of times as well.
Does anyone know what I can do?
Here's what I'm running:
(I bought this computer today)
Windows 7 x64-bit Home Premium
4gb ram
500gb hard drive
It's very minimal, since all the computer is meant to do is run this program and replace the computer Lookout 5.0 was running on (mobo got fried).
- Please - let me know if you have any suggestions.
Solved!
Go to Solution.Hi Mike! Thanks for replying!
I've just tried it in admin mode and it hasn't worked. I've also tried using compatability mode, but to no avail.
I downloaded the lookout 6.2 version to try and it gives me the same error as well.
Another thing to note, I tried uninstalling it (either lookout 6.6 or 6.2 doesn't matter), but all options it gives (modify, repair, and uninstall) are all greyed out.
Any thoughts/ideas? -
Solaris 8, 9 and 10 Security Files
Good Morning:
I am hoping that someone out there can confirm the following scenario:
I want to use a standardized set of security files for all my operating systems Solaris 8, 9, and 10. The files from Solaris 10 and are listed below:
/etc/default/passwd
/etc/default/login
/etc/security/policy.conf
The questions I have are as follows:
1. With the understanding that some of the security features may not work in Solaris 8 or Solaris 9, is there a problem in using these files across the all Operating systems?
2. Are there any known issues with this approach?
Mark K.Lars,
Use ldmp2v to convert existing physical server to VM and
Convert Solaris 8 and 9 physical servers to container in Solaris 10 VM?
Is that what you are saying?
Major constraint I have is, applications running in the current physical servers have no vendor support, vendor doesn't exist any more. Application has been locked to run only on the same OS version. What I am worried is, while running ldmp2v should not prevent the application coming up in the new virtualized environment. Keeping that in mind, I gave a thought like
1. Install and configure the CDOM (control domain)
2. configure and Install LDOMs with Solaris 10 OS
3. Run flar on the existing Solaris 10 physical server
4. Transfer the flar created to Solaris 10 LDOM and configure it as a zone
5. For Solaris 8 and 9, create LDOMs with Solaris 10 OS
6. Install additional patches and packages needed for supporting Solaris 8 and 9 zones
6. create flar images on the existing Solaris 8 and 9 physical servers
7. transfer the images to newly created LDOM and configure the zone.
8. Current servers sun4u which has to be converted to sun4v. -
Error when loading security file .sec
Hi
I am getting error when tried to load security file
Below is extract of security file
!FILE_FORMAT=2.0
!VERSION=11.12
!USERS_AND_GROUPS
Praveen@Native Directory
admin@Native Directory
!SECURITY_CLASSES
[Default]
123
!ROLE_ACCESS
Provisioning Manager;Praveen@Native Directory
Journals Administrator;Praveen@Native Directory
Advanced User;Praveen@Native Directory
Data Form Write Back from Excel;Praveen@Native Directory
Inter-Company Transaction Admin;Praveen@Native Directory
Provisioning Manager;admin@Native Directory
Application Administrator;admin@Native Directory
!SECURITY_CLASS_ACCESS
123;Praveen@Native Directory;All;N
i want to add a user and wan to give provision in the above security file .sec (without doing it in Sharedservices )
for the above security file i have added balaji and loaded it to HFM its not working.
!FILE_FORMAT=2.0
!VERSION=11.12
!USERS_AND_GROUPS
Praveen@Native Directory
balaji@Native Directory
admin@Native Directory
!SECURITY_CLASSES
[Default]
123
!ROLE_ACCESS
Provisioning Manager;Praveen@Native Directory
Journals Administrator;Praveen@Native Directory
Advanced User;Praveen@Native Directory
Data Form Write Back from Excel;Praveen@Native Directory
Inter-Company Transaction Admin;Praveen@Native Directory
Provisioning Manager;balaji@Native Directory
Journals Administrator;balaji@Native Directory
Advanced User;balaji@Native Directory
Data Form Write Back from Excel;balaji@Native Directory
Inter-Company Transaction Admin;balaji@Native Directory
Provisioning Manager;admin@Native Directory
Application Administrator;admin@Native Directory
!SECURITY_CLASS_ACCESS
123;Praveen@Native Directory;All;N
123;balaji@Native Directory;All;N
Can we add users and give provision in security file without creating user in shared services ?
ThanksIf you have your application built using MSAD, then you an load the file the way you built it above, however because you're using the NativeDirectory, you need to create the user in the Directory(HSS) first. Once the user is created, you can then go through and use the .sec method to assign access/roles, but the actual user creation can't be done through a load file.
One of the easiest reasons to understand why this can't be done is that when you load the .sec file, you're not setting up a password for the user. -
How can i remove secure files from the trash? I tried click away the secure notification in info, but still i cann't remove them. Is there a buttoncombination to use?
If you are unable to empty the trash, try holding the Option key while selecting Empty Trash.
Otherwise, some steps in the following link may help you.
http://support.apple.com/kb/ht1526 -
How to configure java.security file to run j2ee programs
Hi,
I am using Sun one application server to run my j2ee programs.
plz tell me how to configure java.security file inside my appserver so that i can run my servlet program that is using jsse API to create SSL sockets.
I am not able to follow whats there in java.security file.Kindly tell how to configure it.
Waiting for ur replies!
Thanks,
AkshathaHi,
I am using Sun one application server to run my j2ee programs.
plz tell me how to configure java.security file inside my appserver so that i can run my servlet program that is using jsse API to create SSL sockets.
I am not able to follow whats there in java.security file.Kindly tell how to configure it.
Waiting for ur replies!
Thanks,
Akshatha -
Is it possible to override Java.security file
Hi,
Is there some property which we can pass with -D argument to JVM to specify a custom java.security file, similar to the way we can specify a custom policy file using "java -Djava.security.policy".
My actual requirement is to insert a new Provider which I do not want to do by adding add/insertProvider in my code, nor do I want to change the file
Any workarounds??Yes:
java -Djava.security.properties=<url> ...
If you use a double equals (==) then you just get the specified property file. If you use a single equals (=) then it appends to the default property file (overwriting duplicate entries with the values in the specified property file). -
when i try to open firefox 4,it wont open but a window opens up saying it couldnt initiate security file....then opens to a blank page and doesnt work...would also freeze up when it worked the very few times
This link should help - https://support.mozilla.com/kb/Could+not+initialize+the+browser+security+component
-
Hey I am curious how can I get the .ipa compiled file for iOS to be able to read all the directories on the iPhone?
I made a file browser but I cant get to the pictures
I tried adding the entitlements in Flash Builder 4.6 in the descriptor file like this:
<key>com.apple.security.files.user-selected.read-only</key>
<true/>
<key>com.apple.security.assets.movies.read-only</key>
<true/>
<key>com.apple.security.assets.pictures.read-only</key>
<true/>
in the
<iPhone>
<Entitlements>
<![CDATA[
I got Push notifications working and accepted in the app store but it can't read the pictures directory when browsing for a file
I know the app id and stuff is set up right or I wouldnt have been able to get it accepted in the app store. In the entitlements area of course I have the application identifier set and aps-environment and keychain access groups and whatnot set up right.
When I try to put the app onto the iPhone with iTunes it just says 'Entitlements are not valid' (does not mention anything about mismatched ids) I can't find anything about how to add this entitlement and I could have sworn I saw a thing that said I can just use the descriptor file to add entitlements in some of the documentation I have it set to use air 3.4
Is there something I am doing wrong, how do I get apple to just put these entitlements in the mobileprovision file, I cant seem to edit it, if I do I also get an error in itunes that is some hex code...Did you ever solve your problem?
I just transfered my web hosting and e-mail to bluehost. I had some of the same problems you are having. I noticed you have your incoming server set to bluehost.
Incoming mail server: (SSL) box610.bluehost.com (sever requires authentication which I already have done)
If bluehost is your server this is what worked for me:
Account Information
Account type— POP
Description—anything you want
Email Address—in your case would be [email protected]
Full name— first and last name
Incoming server—mail.magnus.com
User name—[email protected] Notice it is the @ symbol not a +
password— your password . Remember they are case sensitive
Outgoing Mail server—select edit smpt server list from the drop down window
select the + to add a server
Account Information
Description—may be left blank
Server name—mail.magnus.com
TSL Certificate—None
Advanced
Use default ports
Check Use SSL
Authenticate—password
Username—[email protected]
passowrd—your password
Click ok
In the accounts window
Outgoing SMTP— select the server you just created.
Check—use only this server
Select the Advance tab next to the Mailbox Behaviors
Check use SSL— it will be port 995
Authenticate —use password
Ann -
Data loss in the secure file transfer using java
Hi,
My java Appllication uses the sftp(secure file transfer protocol) for file transferring. when the load is high like 150 GB , data loss occuring for some files especially last chunk of data is missing.
Core file transfer code
while (true)
int read = bis.read(buffer); //Reading bytes into the byte array (buffer) from network stream (bis).
if (read==-1) {
break; //Break the loop, if there are no more bytes available in the InputStream.
bos.write(buffer,0,read); //Writing the same number of bytes what we read into buffer byte array into OutputStream
complete.update(buffer,0,read); //Giving the same number of bytes what we read above to the checksum calculation.
bytesSoFar += read; //Incrementing the bytes that we have read from the source.
//if the bytes transferred are equal to the source file size
If (bytesSoFar == fileInfo.getFileSize().intValue())
// Calculate the file checksum.
// Update DbAuditLog with checksum and no. of bytes read
else
// Update DbAuditLog with no. of bytes read
bos.flush();
Please help , why the data loss is happening when the big size files transfer
Note:
1.150 gb not a single file multiple files.
2.SFTP no java specific API, So connection is happening through java .io.sockect connectionso, if you are not getting any exceptions, yet the data is incorrect, it sounds like you are having actual network issues. i'd start looking at things like the actual network cards in the computer as well other equipment involved in the transfer. since you are not getting exceptions, the network stack obviously thinks nothing was lost over the wire, so either the actual hardware has issues, or the network stack, or the issue is on the sending end. the last possibility is that the client is somehow munging the data it is sending. do you control the client code? if so, i'd start checking the client side code for bugs (and/or post it here).
also, i'm assuming that all of the variables included in your original code are thread local (you aren't sharing any of those buffers/streams/etc between multiple threads). -
Getting an error when Importing a security file
Hi,
Im struggling to import a security file into planning..this is the error i get
Enter password: Tue Mar 30 09:30:53 SAST 2010 :: Validating the Secfile.txt...
Tue Mar 30 09:30:53 SAST 2010 :: ---------------FILE NOT FOUND EXCEPTION COMING-------
The server is running unix: I'm running the command from the directory where the ImportSecurity.sh utility is...I have also copied the secFlie.txt file into the same directory. But still get the same error.There is a slight issue with the unix versions
If you use the exportsecurity utility it will create a file called :- secFile.txt
When you use the importsecurity utility it looks for a file called :- Secfile.txt
As it is case sensitive you have to update the exported secFile.txt
Cheers
John
http://john-goodwin.blogspot.com/ -
Script to export Security file using maxl script
can anyone provide me the Script to export Security file using maxl script.It should create a log file and a batch file should also be there to schedule the Maxl script.Please help me with this
Hi,
You can use something like
[b]login admin password on localhost;
[b]spool on to 'c:\temp\log.txt';
[b]export security_file to data_file C:\temp\sec_file.txt;
[b]spool off;
[b]logout;
Then you can have a batch file that just calls the maxl script
essmsh name_of_maxl_script.mxl
The batch script can then be scheduled.
Cheers
John
http://john-goodwin.blogspot.com/ -
Do integrity checks by file comparison really work?
Hello,
I use a program (Beyond Compare) which has a Folder Compare module, with a function for doing a binary comparison between the files inside two folders. I use it to check the integrity of my backups, by comparing my main hard disk files, with the ones on
the backup hard disks. If two files get recognized as being different, then one of them should be corrupt (if they didn't get modified "normally").
My question is: will this method work to detect real file corruptions? Will it detect any kind of corruption, both copy corruptions, and "bit rot" corruptions? Will there be no problem regarding read cache? I mean: if the first file to compare gets read
from disk, and is kept in a read cache (by Windows or by the hard disk, or by something else), will the second file get read from the same cache (if Windows or the hard disk think they are identical files)? Do Windows and hard disks have some kind of procedure
to detect if a file to read from disk is already available in cache, even if it is in a different folder than the "original" one? Perhaps some kind of file-checksum-system which decides that the files are same? (And this system would not notice if the file
to compare is corrupt). If this would be true, then integrity checks by file comparison would not work, because in practice the same file would be read twice (first from disk, and then from cache), instead of reading both the two files to be compared from
disk.
I have already done tests by manually "corrupting" files (changing slightly the contents, while keeping size and timestamp the same), and it works (the files get recognized as different). But I'm not sure if it will work also with "real" corrupt files.
I'm interested mostly about Windows 8 Pro 64bit and NTFS (but would like to know also in general).
Thanks.I also have Beyond Compare and have used it to check backup data.
Yes, Windows does RAM caching. If you have a comparison program read enough file data that you
can be sure the RAM cache is flushed, then you can be sure that reading the file data back and comparing it with the original data is a valid way to ensure you have uncorrupted backups.
Note that NTFS now does online recovery, so just the act of reading back the data can trigger processes inside the file system implementation that will recover the data if it should start to experience "bit rot" (weakening or failure of the
storage medium). But this is not strictly necessary as other operations, such as defragmentation etc., will occasionally access the disk data as well.
Some time back I wrote a small utility that calculates a CRC-32 on all the data from all the files in a set of folders. This is another way that re-reading all the data can be triggered, as well as producing a summary number that can be easily
compared to determine that all is well - though one doesn't need my software to do it... There are hash programs available that can accomplish the same things. Search for SHA-1 programs, but beware there can be malware associated with free programs
and download sites.
It's good that people think about data integrity. There's all too little of that nowadays.
-Noel
Detailed how-to in my eBooks:
Configure The Windows 7 "To Work" Options
Configure The Windows 8 "To Work" Options -
Is the java.security file the only file that specify the default key store type?
I am building a web services using netbeans. While an error came out saying "invalid keystore format". I think that is because I used to change the default key store type to "jceks" in the java.security file in the [java installation path]\jre\lib\security folder.
I changed it back to "jks". However, the error still exist. I wonder if the java.security file is the only file that defines the default key store type?
Thanks in adv!!!Hi Rohit,
For more info on java security policy file, please refer
http://java.sun.com/products/jdk/1.2/docs/guide/security/PolicyFiles.html
Hope this helps!
Senthil Babu J -
Hi
PDDocInsertPages is failing to insert page into a secured file in the following scenario,
In Password Security settings
Changes Permissions Allowed : Insert , Delete & Rotate
Kindly help me on thisDoes the file have a digital signature? Is it PDF/A compliant? There are
various other reason that a file is "read only"..
Maybe you are looking for
-
Generating PDF from Microsoft Word with C#
Hello, We have created web-based system for a customer that stores/handles Microsoft word documents and provides these to users as PDF versions. Unfortunately some problems appear with our third-party component that generates PDF from Word. Our custo
-
How can I copy and relink home and group folders?
Hi, I'm upgrading our server from Tiger to Leopard Server. My main concern about doing the upgrade is that in the process I am swapping the secondary drive that holds the OD account list and all the home folders for our students (1000 odd folders) fo
-
I stripped the old iPad (the one I gave my wife), so now she only has the contacts and photos "suitable" for her. When Iwoke up this morning my iphone and my new iPad had only the photos and contacts that I left her on her old iPad!! That really ***
-
Hi My customer give one text file which have information of which table export or not . like --- table export table 1 , y table 2 , n table 3 , y table 100, y this file change time to time . they want i take export of all table , y export . of all th
-
Is the Asus G60VX about to be replaced by a new model? Possibly G51J?
I've been interested in getting an Asus G series for about 5 months now. My birthday is coming up friday and I will be able to pick out a laptop to get. At first I wanted the G51, which was $999 about 5 months ago, but about a month or two after I fi