Security Setting for a User

Hi,
Can we invoke and revoke security settings for a particular user at any time?What i mean by this is,
For a particular document user1 can add/modify the document and user 2 and user3 cannot,but in another moment user2 can see the same document but user3 cannot.And finally when user3 add/modifies it all three of them can view the same document.
Is there a possible way to do such kind of operation using UCM?

Hi,
I think the answer for the most part is yes, though security is not mapped to the document level, rather access is granted to groupings that contain documents.
So in the scenarios you listed, theoretically the document would be contained in a grouping which user1 has access to and users 2 and 3 do not. In the next "moment" the document could either be moved to a new grouping or user2's access could change allowing them to see the document while still hiding it from user3.
The third scenario is a little trickier, because user3(who did not have access to the document in scenario 2) modifies it and then everyone can see it. I'm not sure if you were inferring a series of actions on the same document, or three seperate scenarios, but if it was a series of steps, then that one probably wouldn't fly without a customization at least.
Hope that helps
David

Similar Messages

  • Install security updates for all users

    I am using the a form with digital signatures fields, and when a user logs onto a pc and opens the form Adobe asks if you would like to install new security settings. I tell my user to click yes, but there are multiple users on multiple PCs that will be using this form. Is there a way to install this same setting for all users? I am using Adobe reader 9.3, and the form was deisgned with Designer. Any help would be very appreciated.
    Thanks!

    It would seem like that article ''should'' solve the problem, but it doesn't seem to have had any effect. I extracted the contents of the .xpi file into the browsers\extensions folder using the extension ID, yet that doesn't seem to have done anything. I ran firefox after copying the uncompressed files with an administrator account with no luck. Any thoughts?

  • How to know whether a vacation rule is set for a user

    Hi,
    How to know whether a vacation rule is set for a user or not in the BPM process. Can anyone help me in this.
    Thanks,

    In Linux a user has to have read permission on a file to even see that it exists. As a result, if a user (or a group to which they belong) doesn't have read access to the file File.exists() will return false. Windows which doesn't have as tightly controlled access to files will admit that a file exists whether it can be read or not.
    PS.
    This is proof that I should never answer a question off the top of my head when I haven't had my red bull yet. This is wrong. You will be able to see it if you have read and execute on the directory.
    thumps self in head
    Message was edited by:
    puckstopper31

  • Default account setting for this user is incomplete

    Hi,
    I have created a user and gave rights(connect and resource) to that user. i have logged in and when i trying to open form module im getting a message.
    default account setting for this user is incomplete. Contact system administrator
    How to resolve this?
    skud.

    default account setting for this user is incomplete. Contact system administratorThis is an application error not an Oracle Forms error. Contact your system administrator to determine what is missing from the user account you created.
    Hope this helps,
    Craig B-)
    If someone's response is helpful or correct, please mark it accordingly.

  • Form setting for perticuler user

    Hi Friends,
    how to fix form setting for perticuler user.
    Thank you
    saman

    Dear Saman,
    If you want to set form setting for particular user than first gave him authorized for form setting, and than log on through particular user and than open the document (PO,SO.DO,A/R,A/P)and set the form.
    if you want the copy form setting form of particular user than log through user and go -to  Admin-setup-genaral-User and copy the form setting.
    Regards
    Mangesh Pagdhare

  • ON RESTORING 1601 ERROR COMING HOE WE SET SECURE SETTING FOR RESTORE AND UPDATE

    ON RESTORING 1601 ERROR COMING HOE WE SET SECURE SETTING FOR RESTORE AND UPDATE

    If you don't have a sim card in the phone, you won't be able to activate it. You can't activate any GSM iPhone without a valid sim card installed in the phone. The sim itself need not be activated, but it must be valid & present.

  • How to Define Workbook / Business Ares Security Correctly for new Users

    Hi All,
    Please could you help me understand the Security Model for Workbooks and business Areas as I believe I am very close to understanding it, but missing something important.
    Background Information:
    We are using the predefined Oracle Business Areas (Payables, Receivables, Purchasing & General Ledger) to build our reports on. These are the steps I am taking to try and assign a new user & responsibility access to the existing report.
    1. I create the Report in Discoverer Desktop under the ‘General Ledger Responsibility’ logged in as myself – assume report name = ‘Report_1’.
    2. I create a new Responsibility in Oracle Apps called ‘Discoverer Resource Coordinators’.
    3. I create a new User in Oracle Apps called ‘Joe Bloggs’ and assign the responsibility ‘Discoverer Resource Coordinators’ to the Joe.
    4. Logged in as myself in Discoverer Desktop, Responsibility ‘General Ledger’ I Share the Report (Report_1) to the new Responsibility I just created ‘Discoverer Resource Coordinators’.
    5. In Discoverer Administration, Security, I assign the new Responsibility ‘Discoverer Resource Coordinators’ to the predefined Oracle Business Areas (Payables, Receivables, Purchasing & General Ledger).
    6. In Discoverer Administration I set privileges so that the Responsibility ‘Discoverer Resource Coordinators’ can do all tasks, query data, administer. .etc. etc..
    7. I therefore believe everything has been done and attempt to Login and run the report under Joe Bloggs, but am unable to retrieve any data.
    Help… what am I missing!
    Thanks,
    Lance
    Message was edited by:
    Lance

    Dear All,
    This has now been adjusted according to your recommendations but to no avail.
    Myself and Lance have ensured that this new responsibility has unlimited access to all the existing Business areas to eliminate joins within folders not being recognised, we have also ensured that the workbooks that have been created are shared with the correct responsibility.
    I have thoroughly tested this set up by logging in as this new responsibility within Disco. Client to try and retrieve data in a new Workbook, but even for the simplest of queries this fails.
    It seems that there may be a problem with the Responsibility linking to the EUL, could this be due to the new responsibility being created after the Current EUL was set up?
    Does anyone have any information or knowledge where this could happen?
    Regards
    Si

  • How to suppress a Security Notifcation for all users

    How can we suppress the notification If you open this document, anonymous usage data will be sent securely to this remote server: To learn more about what this means for you, please click on the 'Privacy and Security' button. check box - Allow collection of detailed usage data check box - Do not show again _________________________________________________________________________________________ __________________________________ I'm looking for a way to tick the box 'Do not show again' for all users perhaps through a registry setting that can be set via GPO? Thanks, Brian

    Well as a workaround you can create an email address/folder and provide this in SOCT and then from this mail folder , setup a rule to forward the mail to all receipients.

  • Security settings for all users

    I recently developed a document that requires digital signatures and have been testing it. The only downside is that when a user opens the document, Adobe prompts for the installation of new security settings, and it installs it for that user only. I need to add a registry key to the new security settings, but it is only available to be added to the current user hive. Does anyone know how to install the new settings for all users?
    Here is the registry key I need to add.
    [HKEY_CURRENT_USER\Software\Adobe\Adobe Acrobat\9.0\Security\cPubSec]
    "bSelfSignCertGen"=dword:00000000
    Im using Adobe Reader 9.3 and Win XP.
    Any help would be terrific!
    Thanks.

    Hi,
    There are really two separate issues. First, is Adobe pushing updates to the Acrobat Address Book (i.e. adding certificates as trust anchors) and the second issue is how you can push your own update to disable the creation of self-signed digital IDs. Although the two issues share an underlying mechanism, they are separate and you cannot leverage one for the other.
    First issue first. Adobe has entered into partnership with certain Certificate Authorities and has created a mechanism to add their certificates to the Acrobat Address Book (aka Manage Trusted Identities) using http to send a copy of the Security Settings file that contains only digital IDs. There are two ways to trigger the download process. One is to go into the Preferences, select Trust Manager, and click the Update Now button in the Automatic Updates group box. The other method is to load the DigSig plug-in (beginning with Acrobat 9, plug-ins no longer load a launch in order to speed up the launch process). As I'm sure you have deduced, opening a file with a signature field cause the DigSig plug-in to load which in turn triggers the automatic download. The reason we have limited the automatic download to DigSig being loaded is because the vast majority of people viewing PDFs are not using the digital signature functionality (much to my personal chagrin because the more people use digital signatures, the better my job security ) and we didn't want to bother them with an update they would never need. People already complain that there are too many updates, and we are trying to limit the irritability factor. To close the loop on this function, once the download process has been triggered the Acrobat check two more things before it does the update, 1) has it been a month since I checked and, 2) if it has been a month is there a new file to download. This way we are not pestering people with unneeded updates, or if they do need the update, at least not too often. And finally, Address Book management has to be on a per user basis. A certificate that you may elect to trust could be a certificate that the next person want to specifically keep untrusted. The Windows Certificate Store, Mac Keychain and Firefox Certificate Manager all work on a per user basis.
    That brings us to what you would like to do. The good news is you can use the Export Security Settings featrue to create a distributable file that will set the preference. The real question is how will you distribute the file, but before we get to that, here is how to create the file.
    With Acrobat closed, set the registry setting you noted in the message above
    Launch Acrobat
    Select the Advanced > Security > Export Security Settings menu item
    Click the Deselect All button on the Export Security Settings dialog
    Select the Signing Preferences Settings checkbox
    Click the OK button on the Export Security Settings dialog
    Select Signature Creation Settings and note "Allow creation of self-signed Digital IDs" is set to No
    Click the Export button on the toolbar
    Follow the on screen dialogs. You don't have to encrypt the file, but you must sign it with a certifying signature
    At this point you have the file available for distribution. You could e-mail it to your intended recipients with import instructions, or you could post if for download, or you could set the Preference the to automatically push the file from a server. To check this feature out select the Edit > Preferences menu item and then select Security from the Categories list box. You would need to select the Load security settings from a server checkbox and then set up the URL. As an aside, you can also export these settings by selecting the Automatic Update Settings checkbox on the Export Security Settings dialog noted in the bullet points above. You have a chicken and egg problem in that you have to get the users to first manually import the file in order to set up the automatic import. That I can't help you with, you're just going to have to decide what works best for you.
    Good luck,
    Steve

  • Site Studio 11g: Different security access for each user

    Hi,
    I want to limit access for some contributors and grant full access to others.
    I set up different users on the content server, assign a different contributor data file to each region, and assign unique security metadata to those files.
    As result it still display the graphic icon for those data file with only read access. The contributor is not able to edit the data file but still capable to switch or remove the data file.
    +According to the documentation only the files that a particular contributor has permission to edit will display the contribution graphic icon on the web page when in contribution mode.+
    I need that the contributor should not be able to switch the data file or remove it if he doesn't have edit access to those data files.
    I've applied the metadata security to the placeholder definition unsuccessfully.
    I am using Account Security model.
    Thanks
    al
    Edited by: user8859325 on 20-Jun-2011 08:21

    Hi,
    I want to limit access for some contributors and grant full access to others.
    I set up different users on the content server, assign a different contributor data file to each region, and assign unique security metadata to those files.
    As result it still display the graphic icon for those data file with only read access. The contributor is not able to edit the data file but still capable to switch or remove the data file.
    +According to the documentation only the files that a particular contributor has permission to edit will display the contribution graphic icon on the web page when in contribution mode.+
    I need that the contributor should not be able to switch the data file or remove it if he doesn't have edit access to those data files.
    I've applied the metadata security to the placeholder definition unsuccessfully.
    I am using Account Security model.
    Thanks
    al
    Edited by: user8859325 on 20-Jun-2011 08:21

  • High (Maximum) Security Setting for FIOS Firewall

    If you set the maximum security setting on the Verizon FIOS Firewall then whenever Verizon decides to swap its IP's you are screwed; the unit will not get the new IP.
    To compensage for the maximum settings I have enable all of the verizon unit (SBU's) to have unrestricted access aka ANY but this does not do the trick.
    Verizon in its ultimate wisdom has not bothered to document anywhere what are the minimum outbould settings should be that would enable this communication in the High (Maximum) security mode.
    Does anyone from Verizon read this stuff?

    So, I'm pretty much convinced now that the problem with low-quality LR previews seems to be mostly isolated to the previews that LR generates after you make edits in the 'Develop' module.
    Upon first import, this image looked fine in the 'Library' & 'Slideshow' modules. After making some edits (color, tone, etc.) in the 'Develop' module, I ended up getting this hideous preview in the 'Library' & 'Slideshow' modules:
    http://web.mac.com/rishisanyal/Lightroom/07-0310_BandingBlocking.jpg
    You people with LCDs will be able to see the JPEG artifacts better than those with CRTs, since LCDs tend to be sharper.
    So, the obvious question is this:
    Does LR, when *re-generating* previews for edited images, ignore the quality-setting for JPEG previews (which I have set to 'high')??

  • Best security setting for TC? WPA, WPA2 clarification?

    I am using TC just as a wireless hard drive. What would the best security setting be? I am confused by WPA Personal and WPA/WPA2 Personal?
    Thanks in advance!

    With the TC the choices are: WPA/WPA2 Personal, WPA2 Personal, WPA/WPA2 Enterprise, and WPA2 Enterprise.
    The basic difference between WPA & WPA2 is the encryption type. WPA uses Temporal Key Integrity Protocol (TKIP), whereas WPA2 uses either TKIP or the stronger Advanced Encryption Standard (AES) encryption.
    WPA/WPA2 Personal allows for both types of clients to connect, whereas, WPA2 Personal only allows clients that support AES.
    The strongest security of the two would be to use WPA/WPA2 Personal with all clients (Mac and PC) running WPA2.

  • What is the 'bwuser' under security setting for SAP DB

    Forum,
    Could anyone advise what the 'bwuser' is and what it's purpose is. This is something which has been found under the security settings for a SAP database. This data has recently been migrated across to a new SQL 2008 STD server.
    Regards,
    Juan

    Hi Juan,
    This user is only used in connection between SAP B1 and Business Warehousing. It should not be deleted without purpose.
    Thanks,
    Kumar

  • WRT54G Security setting for an HP iPAQ 210 wireless

    I'm try to setup an HP iPAQ 210 wireless to connect to a WRT54G (Version 8.00.2)
    If the PDA and modem are set for WEP and a simple key, then the PDA connects OK.
    If I set the modem to WPA Personal + TKIP and set the PDA to WPA-PSK + TKIP, then the PDA fails to connect. I've tried other modes like WAP2 but to no avail.
    HP says it's the LinkSys WRT54G?
    Any ideas?
    Ed..

    When I checked out your iPAQ manual, I see that it was published just 10 days ago.  Since HP apparently just finished (or is still working on) the manual for your device, it would not supprise me if they were still working on the software for your device also.
    My first suggestion is to make sure you have all the latest updates and drivers for your iPAQ, especially any wireless drivers.
    Next, make sure that if the iPAQ has a software firewall, that you temporarily turn it off, and see if that will allow you to connect wirelessly.
    Next, make sure your WPA or WPA2 password or passphrase does not have any spaces in it.  Some Linksys routers have had trouble with spaces.
    Make sure the iPAQ is set to "Obtain an IP address automatically"  (sometimes called "DHCP automatic" )  and also set to "Obtain a DNS server address automatically".
    If the above does not fix your problem, then the next step would be to download and install (or re-install) the latest firmware into your router.  After a firmware upgrade, you must reset the router to factory defaults, then setup the router again from scratch.  If you saved a router configuration file, DO NOT use it.
    If you still cannot connect, then the next step would be to set your iPAQ to a fixed LAN IP address.  Try the following settings in the iPAQ:
    IP address:   192.168.1.2   (this assumes that your router is 192.168.1.1 and that you are not using the .2  address elsewhere in your network)
    Subnet Mask:  255.255.255.0
    Default Gateway:   192.168.1.1
    DNS server:  192.168.1.1  (if this does not work, then use your true Internet DNS server address  -- this info can be found in your router.)
    Hope this helps.
    Please report back with your results.
    Message Edited by toomanydonuts on 01-31-2008 02:11 AM

  • Can I alter security settings for multiple users of fingerprint reader on iphone 5 - i.e. if i allow my daughter to set her fingerprint, can I stop her from accessing itunes store to make purchases???

    My daughter wants to access my iphone 5 by adding her fingerprint. Can I alter the security settings so that she cannot make itunes purchases etc?

    Not if you want to be able to continue to make iTunes purchases too. You can lock out access to iTunes store using Restrictions (which always needs a passcode to change, Touch ID won't work for changing/removing Restrictions) but that means no one can use any of the restricted features.
    iOS has no concept of multiple users with differing access levels like this. Touch ID stores multiple fingerprints, but they're supposed to be all from the same person, the device's owner, not multiple users.
    You're going to have to buy your daughter her own iPhone... ;-)

Maybe you are looking for

  • Taking a long time to export a report to PDF in web app

    Hi, I downloaded CR for Eclipse 2.0 to integrate a "Create PDF Report" option into our web application. The original .rpt files were created using CR 2008. I used the sample online code to do this: ReportClientDocument reportClientDoc = new ReportCli

  • Payment Clearing: Use of Main & Sub Transation on Payment Items.

    Hi. I have been given a requirement to use a different main/sub-transaction (HVORG/TVORG) value for payment items depending on whether the payment item is cleared or whether it results in an overpayment. Eg A customer has an outstanding invoice of EU

  • Production Order Type In Costing.

    Hi Gurus, i have some Doubts in Costing, i have Run The Ck11n and Released it it is updated in MM Costing View. 1. i have completed All the Production process andAfter the Goods Recipt I tried to settle the Order in ko88.i got error that variance shu

  • Rebate Accounting Entries.

    Dear Sd gurus, I have done whole senarion of rebate bt i wan tto know std accounting entries in rebate process like wht goes cr or dr like accurals g/l etc. and want to know abt manual accuals doc & rebate correction req doc. hope u will solve my iss

  • Multiple XY Graph grid

     I have a XY Graph with multiple Y axis and I want the grid lines from the 3 Y axis to line up. But I also want to keep the auto scale function. Is this possible? Solved! Go to Solution.