Security for E61

hi everyone, i'm just asking what if i want to make security on some folders, for example no one open it without a password or i make it hidden???
is that possible???

Create a request set containing 'Program - Financial Statement Generator' and specifying the name of the FSG as a parameter then add the request set to the request group?
I usually just use segment security so that they can run all the FSGs but only for the ranges of acconts and/or cost centres they're authorised to view.
Regards
Jo

Similar Messages

  • Error while "Enabling Security for Oracle Management Service"

    Hi,
    I have installed OEM 10GR1 on Solaris 9. I am using 9.2.0 database for repository.
    My first installation of OEM and agent went smoothly, and everything was working fine.
    Then, I tried to follow configurating security for Grid Control Framework. I got following error:
    /oracle/app/oracle/product/10gEM>cd bin
    /oracle/app/oracle/product/10gEM/bin>./emctl secure oms
    Oracle Enterprise Manager 10g Release 10.1.0.3.0.
    Copyright (c) 1996, 2004 Oracle Corporation. All rights reserved.
    Enter Enterprise Manager Root Password :
    Enter Agent Registration password :
    Enter a Hostname for this OMS :
    Checking Repository... Done.
    Checking Repository for an existing Enterprise Manager Root Key... Done.
    Generating Enterprise Manager Root Key (this takes a minute)... Done.
    Fetching Root Certificate from the Repository... Done.
    Generating Registration Password Verifier in the Repository... Done.
    Generating Oracle Wallet Password for Enterprise Manager OMS... Done.
    Generating Oracle Wallet for Enterprise Manager OMS...Missing /oracle/app/oracle/product/10gEM/sysman/wallets/oms.uxtora1/ewallet.p12
    :/oracle/app/oracle/product/10gEM/bin>
    Please help.

    Thanks for response. I had temp space full issue with repository database. After bouncing database, the temp tablespace became empty, and the secure operation went smooth.

  • " plug-in name does not support the highest level of security for Safari plug-ins" appear for some plugins in Safari Security "Manage Website Settings"?

    Hi,
    Wondering why "<plug-in name> does not support the highest level of security for Safari plug-ins" appear for some plugins in Safari > Security > "Manage Website Settings"?
    Have been trying to get to the root cause of the problem but did not find much on this. I am trying to figure out what can get the warning to go away completely than using the Allow/Always Allow options for the plug-in
    Thanks,
    Shyam

    Hi Linc,
    Thank you for your response. Here is the screenshot of the warning that I am talking about.
    Here is what I do:
    1. Launch Safari and open its Preferences. I have Safari 7.1 installed on my machine.
    2. Click Security Tab and click Manage WebSite Settings
    3. A window opens showing me all the Plug-ins that I have (listed on the left hand side).
    4. One of them is the Adobe Reader plug-in. When I click Adobe Reader, the following details about the plug-in show up on the right
    I was referring to the highlighted section that warns me about this plug-in not using the highest level of security for Safari Plug-ins.
    Note: I do not see this for all my plug-ins (QuickTime, Adobe Flash Player don't give me this warning) which tells me that there is a way to make the warning go away.
    Thanks again,
    Shyam

  • Security for creating web templates using web application designer

    I work for ChevronTexaco as a BW Security Analyst. I have a request to set up roles for web template creation using the Web Application Designer. Where can I get help in setting up the security for these types of roles? My experience is in setting up roles for running and creating queries in BEX. I need to know what additional authorizations will enable web template creation. Setting up a trace in ST01 has been less than helpful since it dumps out tons of RS_COMP tracing that doesn't help me much.
    The user wants to be able to create web templates for existing queries in BEX and restrict by rs_comp infocubes/areas/reportid, etc. and to be able to save to restricted role names. Are there new auth groups specific to this type of activity that I need to code for in addition to the basic end user or report builder authorizations?
    Any help would be greatly appreciated.
    Jeff Ehritt
    925 827-6012
    ChevronTexaco

    Thanks Marc, I'll check it out. My problem was that I was trying to create the role by granting a userid sap_all, sap_new and s.a_system as well as power user auths for a specific application. I set up a trace in ST01 for authorization cking on the ID while one of our BW Central Support people went into Web Designer to create a template and everything else they wanted to do.
    The resulting trace spewed out so much stuff from S_RS_comp and comp1 as to be virtually useless since it named scores of different cubes and infoareas that the analyst wasn't even interested in. The results puzzled me and made it extremely difficult to pin down the required authorizations. Usually ST01 can be used as a blueprint to create the role,ie; everything that the user touches is traced but no more than that. Have you seen this before? With just the new role I had set up the user could not save to a role unless I coded the fully qualified role name such as YRH_SENDAT_USER. YRH* would not work.
    Thanks,
    Jeff Ehritt
    ERP COE SAP BW Security

  • Security For BW Web Application Designer

    I work for ChevronTexaco as a BW Security Analyst. I have a request to set up roles for web template creation using the Web Application Designer. Where can I get help in setting up the security for these types of roles? My experience is in setting up roles for running and creating queries in BEX. I need to know what additional authorizations will enable web template creation. Setting up a trace in ST01 has been less than helpful since it dumps out tons of RS_COMP tracing that doesn't help me much.
    The user wants to be able to create web templates for existing queries in BEX and restrict by rs_comp infocubes/areas/reportid, etc. and to be able to save to restricted role names. Are there new auth groups specific to this type of activity that I need to code for in adition to the basic end user or report builder authorizations?
    Any help would be greatly appreciated.
    Jeff Ehritt
    925 827-6012
    ChevronTexaco

    Hi Jeff,
    there are no special authorization objects for Web Templates. RS_COMP will still only work for queries, structures.... Saving to roles requires certain authorizations for the role (s_agr_*), here you can define the roles you can save templates to.
    Regards, Klaus

  • I have a 4 yr. old iMac. I recently got a trojan on it that sent out emails to my address book. I got Norton Internet Security for Mac, and now my Mac is running slow, with way too many spinning beach balls of death. Was it a mistake to install Norton?

    I have a 4 yr. old iMac. I recently got a trojan on it that sent out emails to my address book. I got Norton Internet Security for Mac, and now my Mac is running slow, with way too many spinning beach balls of death. Was it a mistake to install Norton?

    yankeecat wrote:
    I have a 4 yr. old iMac. I recently got a trojan on it that sent out emails to my address book.
    There is no such Trojan or other malware known today that will do that using OS X nor has there ever been one. The most probable explanation is that somebody hacked into your e-mail account on the server, so you should change that password to something stronger right away. If it had come from your Mac then there would almost certainly be copies of those messages in your Sent Mail mailbox.

  • Internet security for my macbook pro

    need some advice do i need internet security for my macbook pro it has been sugested that apple devices dont get virises?  if so thats the best one to buy

    You don't need any.

  • Unable to validate security for resource 'EXTRANETLOOK'

    We have UCM 10gR3 installed. We have Extranetlook component installed along with WebDAV. Currently when the users take any action that they don't have privilege to, they come accross Unable to validate security for resource 'EXTRANETLOOK'error message. Before it use to give exact error message so that it was easy for us to troubleshoot. Recently due to some changes in the settings in the system, we started seeing this error message instead of actual error message something like Unable to retrieve page. User 'abc ' does not have sufficient privileges. Is there a way to suppress thie Extrenet look error message so that the actual message comes through?
    thanks,

    Thanks for the response Bernhard. I'd like to address some of the points you mentioned:
    possibly you have not the permissions to add resources
    -I am an owner of both the PWA and the project subsite
    there are no resources inside your project plan (you have to use the "Build Team" in the Ribbon)
    -I checked the "Build Team" list and confirmed there are a dozen users in there
    not each view allows you to edit each field
    -I've tried switching views and noticed that there are other fields that I cannot add values into including: Actual Start, Actual Finish, Baseline Finish, % Work Complete. I am able to change the Task Name, Start, Finish.
    Very strange problem. Im still doing development on it but obviously cant roll this into production when users cannot add information to tasks.

  • I have 2 point security for AppleID. My iPhone 4S is listed as my trusted phone to text. No tel. no. is given. I am updating to iPhone 6Plus with same tel. no. Do I need to change anything for the sign in verification?

    I have 2 point security for AppleID. My iPhone 4S is listed as my trusted phone to text. No tel. no. is given. I am updating to iPhone 6Plus with same tel. no. Do I need to change anything for the sign in verification?

    Of course You can also add your iPhone telephone # as a trusted device.
    This way when you insert your SIM card into any phone, Apple will automatically recognize your cell phone # as a
    trusted device (may be handy if iphone breaks but you insert SIM card into another phone).
    HOWEVER:
    Having also your iPhone as a trusted device, is convenient if you travel and use a different SIM card
    at destination. This way you can still use the iphone for verification, even though you are using a different
    phone #.
    Regards

  • How to configure Symantec Mail Security for SMTP & Messaging Server 6.3

    Hi!
    I want to install a Symantec Mail Security for SMTP 5.0.1(host1) with Messaging Server 6.3 (in production - host2), but when I try to access to POP protocol to send a message from Internet, the system display a message with a relay problem.
    - Could you help me with this issue?,
    - Do you know some documentation that speaks of this?. I can't find any documentation that explain how to configure and integrate SMS and Messaging Server. Thanks in advance.
    Regards, CR

    ctemp1 wrote:
    I want to install a Symantec Mail Security for SMTP 5.0.1(host1) with Messaging Server 6.3 (in production - host2), but when I try to access to POP protocol to send a message from Internet, the system display a message with a relay problem.I take it that you have configured the symantec software like this?
    internet -> symantec mail security system -> sun messaging server -> recipientA better approach is the following
    internet -> sun messaging server -> recipient
                              |
                             V
                  symantec mail security system(refer here: http://blogs.sun.com/factotum/entry/messaging_server_correctly_deploying_the)
    - Do you know some documentation that speaks of this?. I can't find any documentation that explain how to configure and integrate SMS and Messaging Server. Thanks in advance.There is no documentation specifically for symantec software but we do document how to send emails via the symantec mail security server using the aliasdetourhost channel keyword:
    http://docs.sun.com/app/docs/doc/819-4428/6n6j42615?a=view#bgaqy
    Regards,
    Shane.

  • How do I delete Kaspersky Security for Mac

    I have tried to delete Kaspersky Security for Mac many times but the icon still comes up to tell me to renew. How do I delete the icon and the program?

    You can contact Kaspersky support for uninstall issues here.
    Anti virus software is invasive and difficult to remove. If you can't resolve the problem directly from Kaspersky, backup all important data then reformat the disk and reinstall OS X.
    For v10.7 Lion, v10.8 Mountain Lion, or v10.9 Mavericks:  Startup your Mac while holding down the Command + R keys. From there you should be able to access the built in utilities to reformat the disk and reinstall OS X.
    For OS X prior to v10.7, startup from your install disc while holding down the C key.

  • What is the best internet security for mac

    what is the best internet security for mac

    You may find this User Tip on Viruses, Trojan Detection and Removal, as well as general Internet Security and Privacy, useful: The User Tip seeks to offer guidance on the main security threats and how to avoid them.
    https://discussions.apple.com/docs/DOC-2435

  • Row level Security for BI Author Role

    Hi All,
    We are using OBIEE 11.1.1.5 in our project. We have a requirement where we need to configure row level security on certain column.
    We are currently using external table and session variable approach to configure this. This security works fine for the users with BI Consumer
    roles. But we are facing issue with configuring row level security for BI Author role.
    BI Author can create any analysis in BI Answers and suppose he/she creates a report which does not contain the column on which row level
    security is applied than he can see all the data. For eg.
    We have one dimension Products having two levels Product Division and Brand. I want to configure security based on Product Division column.
    But if BI Author create a report with only Brand and Measures than row level security is not working.
    Does anyone has face this issue before.
    Please let me know if you want any other information from my side.
    Regards,
    Vikas

    If you are using a multidimensional cube you can use the "permit" command to control access to dimension members or provide cell level security within the cube. The OLAP database documentation provides on how to use the PERMIT command.
    If you are using relational tables and/or views with additional CWM metadata mapped using OEM then you need to refer to the database documentation relating to Virtual Private Databases and Label Security
    Business Intelligence Beans Product Management Team
    Oracle Corporation

  • SQL Developer Feature Request :: Tool Security for DBAs

    TOAD has a feature that our DBAs like. It is called TOAD Security. In effect the tool looks at a table (on a per instance, per schema basis) to determine what menu options and features should be enabled/disabled. DBA's are provided with a GUI interface to manage the permissions, however once the table changes are noted, then the activity can be scripted for other schema/instances.
    If it is not already in the plans, then it would be an excellent feature to add to SQL Developer. With something like this in place, we could defintely consider moving to SQL Developer as our tool of choice.

    thats understandable. The expense of TOAD is small peanuts compared to the larger sums of monies being spent in IT, however, IMHO there is no sense spending it if a proper match can be found. I am just watching and waiting as the Oracle product continues to mature. Having the ability for tool to be controlled via an external security model, would be a plus.
    To give an idea, DBA's basically took away abilities that were too easy to accidentally do but had bad results..
    * Drop an object.... they prefer us to physically write the statement... no oops click the button accidentally. This applies to a test environment as well as production.
    * Kill a Session..... again, test (not in production) we can kill a process thread, but they didn't want it to be so easy as a click of a button.
    ... I could go on... but you get the idea. At first they went overboard, and essentially turned our TOAD tool into an expensive Notepad clone. After working with them, the permissions were readjusted and we have been fine since then. The feature makes a good companion to the database level security for things that the Database Security setup does not cover.

  • Implementing security for the Projects in OWB

    Hi,
    Can we able to implement the security for the individual projects?
    Thanks
    Vinay

    Hi,
    do not know exactly what kind of security you want to implement. But the below is the excerption from OWB User guide about implementing security at Project level...
    You should be able to find more info in OWB User Guide.
    Freezing Projects
    If you want to freeze the project MY_PROJECT and prevent access to all its contents,
    the following restrictions will apply:
    You cannot create, edit, or delete any objects under a frozen project.
    You cannot invoke any of the services that modify objects within this frozen
    project. For example, you cannot perform an MDL import, a source import, or a
    snapshot restore in this project.
    You can deploy, export, and execute runtime procedures within a frozen project.
    You can validate and generate within a frozen project.
    You cannot add or remove any objects from a frozen project to a snapshot.
    The frozen project security policy is implemented within Warehouse Builder through
    the following files. These files are located on your installation CD under:
    samples/security_feature/frozenproject.
    frozenProject.pkb: Holds the implementation of the security policy.
    frozenProject.sql: Contains a table of the structure as shown in Table 19–2. The
    administrator can freeze projects by inserting them into this table and setting the
    isFrozen flag to 1.
    HTH
    mahesh

Maybe you are looking for

  • How do I print from a specific point in booklet

    Hi, cannot work this out. I have printed the first two spreads of a book then on the third spotted a mistake as it was coming out so cancelled printing. For the life of me I cannot make indesign understand I want to print from the third spread which

  • PO Not updating in POWL

    Hi Experts, Iu2019ve managed to delete a PO, but when I refresh the POWL itu2019s still showing as ordered and canu2019t get it to appear in the deleted PO list. we are having standalone scenario.Could any guide me on this. <<Text removed>> regards s

  • Scene selection only allows first chapter to play in previews

    In the scene selection screen, iDVD will show each chapter in the movie and allows you to play a short movie clip as a preview. I would think that each chapter would allow you to play a portion of video from that chapter. But instead, iDVD only allow

  • Sequence values

    I have a sequence whose max value with the help of a trigger is inserted in a table column. I've noticed that sometimes the consecutive values of the sequence differ not by one but by variable number. I have Increment by 1 and Cache 20 in the sequenc

  • Info on Service procurement and Material procurement in Purchasing

    hi we are dealing with a purchase register for services report and a purchase register for material report. Can anyone explain in detail about material procurement and service procurement in MM  and what are all the documents created/ involved in the