Setup proxy access

Is there a way to setup email proxy access on somebody elses account,
without logging into that groupwise account? That is, I need to assign some
people proxy access on somebody elses account.

"Michael Bell" <[email protected]> wrote in message
news:25Lws.574$[email protected]..
> On 12/7/2012 8:30 AM, Renee Keller wrote:
>> Is there a way to setup email proxy access on somebody elses account,
>> without logging into that groupwise account? That is, I need to assign
>> some
>> people proxy access on somebody elses account.
>>
Alright, let's try a different angle.
In Console One (current version), if I click on a user account, then select
the Groupwise tab, then select the [View Client Options] button which is
next to the [Change GroupWise Password] button, and on the window that comes
up I select the PASSWORD tab, about half way down is a box to use eDirectory
authentication instead of password. I understand what that does, but to the
right of that is a box with the picture of a unlocked padlock, followed by
the picture of a domain (globe), but SOME accounts it shows the unlocked
padlock, followed by the User symbol (little red person). What is the
difference and how is it changed?

Similar Messages

  • How to setup the access duration for user

    Dear experts,
    As requrement of users, we need to setup the access duration for all users of our company . It's mean users only access into SAP on defined duration
    Ex : Working time is 8h00 am to 17h00 pm, after 17h00 pm, users cannot access into system
    Please help.
    Thanks,
    Neo

    Hi all,
    Thanks for your solution
    We want to set the access duration for end-user but sometimes, we need to flexible to allow user access to system in some special case.
    Let me detail users's requirements
    - Users can access to SAP fom 8h00 to 16h00
    - At 16h00, system will send the warning message to user to inform that system will aunomatic turn offf after 15 minutes, it's mean system will automatic kick out users after 15 minutes
    - From 16h00 to 8h00, users can not access to SAP
    - However, in some special case, we can grant the acess to system to specific user.
    Can we setup these steps on SAP ?
    Thanks,
    Neo

  • How to setup the access privilege of flash file in Web Intelligence?

    How to setup the access privilege of flash file in Web Intelligence?   WEBI can set access privilege for single WEBI report file, but it seem cano not set access privilege for one flash file.

    Thank you Maksim,
    I did set the "selectionMode" to "Auto". I don't understand where In supply function I have to set lead selection of nested node to first element. Please elaborate on this. Are you talking about the context attribute bound to the second table? OR do I have to change the Importing parameters "Node" and "Parent_Element" of my supply function?
    Thanks for your time.

  • How to setup proxy for Apple TV if I cannot get a micro USB cable for Configurator app? thanks.

    as titled

    the micro usb cable is a pretty common one all smart phones but apples use them for charging and connecting to computers most supermarket have them
    that being said if it can be used to setup proxy on appetvs it's news to me only believed it could restore failed firmware on appletv's

  • How to setup external access in VM?

    We need to setup a Microsoft VM and allow external access without using my company VPN as we need to test the web services integration with other vendors. could you please help how to setup external access? Thanks

    Hi Wilson,
    As a prerequisite , that VM need to access the gateway .
    It means that you need to
    create an external virtual switch then connect that VM to external virtual switch then allocate a LAN IP for VM .
    http://technet.microsoft.com/en-us/library/jj647786.aspx
    After this you may think of this VM as a physical machine in your LAN then do what you need .
    Best Regards
    Elton Ji
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • How to Setup another Access Policy 5.3

    hi everyone,
    Thank you for your help in advance. I am new to v5.3, and I am not good at VPN. So hope you can help.
    I just have my consultant to configure this correctly just today. Currently, there is only one rule for the access policy (Single Result Selection). That rule is to use Active Directory as the source for the authentication. And by default will deny any other access which is not found in the rule.
    Now... I just got an order that I need to setup a new user who will need to access to our network by using Cisco IPSec VPN (the software one). But that user is not setup in our Active Directory, and we do not want him to access our domain anyway. He only needs to access non-domain resourse...such as airconditioning controller by IP. So I am thinking to setup his account by using "internal identtity". If I do this way, what do I need to do to setup another access policy? May you give me some steps with little more details?
    OR... if it is not the way I should do...what else can I do to achieve this goal? Also, he said he could provide his static IP trying to access from.
    I have a ASA 5520.
    Thank you very much for your help.
    Takami Chiro

    Hello,
    Instead of creating a separate rule for the credentials validation you can edit the existing one that points to AD1 (only) and change it to a result on the ACS that checks both AD1 and Internal Users. In that case we need to use Identity Store Sequence. Refer to the steps below:
    On the ACS GUI > Users and Identity Stores > Identity Store Sequences > Create > Select "Password Based" and on the first box move AD1 and Internal Users to the right. Please do the same on the box at the bottom.
    The option "Internal User/Host Advanced Option: If internal user/host not found or disabled then exit sequence and treat as "User Not Found" should stay unchecked. Click submit.
    After creating the ID Store Sequence you need to change the Identity Result where you had AD1. Now the name of the ID Store will display as an available option. Please select that one and save the changes.
    With the above configuration, the expected behavior would be:
    1) ACS receives a request from the Internal User.
    2) ACS tries to validate the credentials against AD.
    3) AD returns an "User Unkown" response.
    4) ACS moves to the Internal Users.
    5 ACS successfully authenticates the user validating the provided credentials against Internal Users.
    Hope this helps.
    Regards.

  • How to setup Mobile Access Server

    Hi,
    I am trying to setup Mobile Access Server on my Mac Mini Server. The setup I have is a small network behind a Airport Extreme. I would like to give all users access to services using Mobile Access Server and was hoping initial setup was going to take care of that....no such luck.
    What do I fill in for the local servers? How do I access this service from the outside the lan? How do I need to configure my Airport (with the other services, it happened almost automatically from the security pane).
    Thanks,
    Ian

    Hi,
    In the field for local server you just type in the local dns name for your calendar server, mail server etc... Also select which port you want publish externally and the the correct port your service is actually using on your lan (Selected under advanced tab). Make sure your mobile access server can resolv your hostnames correctly. It should point to an local ip. If an nslookup shows your public ip, you have to correct your local dns server (This is often called split dns configuration.)
    To access this from outside your LAN you have setup NAT and permit the port you have configure your mobile access server to be the incomming port. How exactly you do that on the airport I am not sure, but I am sure it is explained in the user manual for the airport.
    I found this video about the mobile access server on youtube: http://www.youtube.com/watch?v=_VRgl2bncZU
    Hope this helps.
    Bernt

  • Proxy access: Missing session string

    Hello:
    I am having some trouble trying to configure proxy access for all users. When I try to add a user this message appears:
    "[EA10] Missing session string"
    Notice that I updated the webaccess to sp1 but the poa still remains in the 2012 without sp1. Could be that the reason?
    Version of webaccess: novell-groupwise-webaccess-12.0.1-103731
    Version of agents: novell-groupwise-agents-12.0.0-98586
    Best Regards,

    Originally Posted by randolf_carter
    Hello:
    I am having some trouble trying to configure proxy access for all users. When I try to add a user this message appears:
    "[EA10] Missing session string"
    Notice that I updated the webaccess to sp1 but the poa still remains in the 2012 without sp1. Could be that the reason?
    Version of webaccess: novell-groupwise-webaccess-12.0.1-103731
    Version of agents: novell-groupwise-agents-12.0.0-98586
    Best Regards,
    Yes, you need the POA to also be at SP1.
    At least for us, that was the only resolution (regardless of whether "all user" proxy access was given or not. NOBODY could proxy anywhere with the released GW2012 code, once WebAccess was at SP1 level).

  • Setup Guest access to WLAN

    I have 8 Cisco 1230AP's providing access to my LAN for laptop users. The encryption is via WPA. I now need to setup unencrypted access to the internet for guests/visitors - keeping them away from my LAN and internal network. How can I do this? Do I just setup a 2nd SSID and allow access to be wide open or do I need to implement some type of VLAN? My switch is unmanaged and it is not a Cisco brand. Thanks for your help...

    I saw your other post and you can ignore that, since you have an unmanaged switch. No matter what you do, all traffic will be dumped out the ap to you lan. This is due to the fact that you can't create a trunk between the ap and the switch which will allow you to have multiple vlans. If you only need guest access in a certain location, you can just add an access point and set that up to go out to a dsl or broadband connection.

  • Restrict SCEP Proxy access using %machineid%/AD?

    Hello,
    we want to use AnyConnect w/ SCEP Proxy enrollment to provision machine certificates to devices wich are not members of a windows domain. We use hostscan set the CN of the request to %machineid%. This works so far and the certificate gets downloaded to the device.
    The next step would be to restrict access to the provisioning VPN-group, so that only already "known" devices are allowed to load certificates. It would be nice, if this could be done by secondary authentication if there were also a way to pre-fill the username with %machineid%, but pre-filling seems only possible based an already existing certificate.
    Some configuration guides suggest, that it should be possible to restrict the SCEP Access via AD, but so far I haven't found any detailed instructions.
    Has anyone succeded in such a setup? Any hints are much appreciated.
    Thank you,
         J.

    Hi Bora,
    I guess that you are having a username/password for directory manager on OUD proxy (let's say cn=proxymgr / proxypwd), and another username/password for directory manager your ODSEE servers (let's say cn=odseemgr / odseepwd).
    When you connect to OUD proxy using cn=proxymgr to perform a search on your backend, OUD proxy creates a connection to the ODSEE backend with the same credentials (because the proxy is configured in use-client-identity mode), i.e. cn=proxymgr / proxypwd. If this user does not exist on ODSEE (or has the same name with a different password), you get an error 49.
    To avoid this issue, OUD proxy offers configuration parameters in the proxy-workflow-element: the exclude-list and remote-ldap-server-bind-dn / remote-ldap-server-bind-password. You have to add cn=proxymgr to the exclude-list, and set remote-ldap-server-bind-dn to cn=odseemgr, remote-ldap-server-bind-password to odseepwd.
    This way, when connecting with cn=proxymgr, the proxy will know that he should not use the client credentials, but rather cn=odseemgr when discussing with ODSEE backend.
    This concept is explained in OUD admin guide, Configuring the Bind Mode.
    HTH,
    Flo.

  • HP Deskjet 3054A Wireless setup without access to router.

    Hey everyone,
    I own an HP Deskjet 3054A, and I would like to be able to print wirelessly. When I go through the wireless setup, it tells me to either: 1) enter a PIN on the wireless router or 2) Use WPS (Wireless protected setup). The problem is that I don't have access to my building's router (I'm a student, afterall).
    I know some HP printers have a feature where you can plug it into your computer via USB, and have it set it up for wireless; mine does not seem to have that, as when I open up the HPLIP (HP printing software for Linux--- yes, I do use Linux), and add the device, and select "Wireless/802.11 (requires a temporary USB connection and is only available for select devices)", and connect the computer to the printer, and click "Next", but it says "No wireless capable devices found". I assume that this is because the printer is not one of the aformentioned "select devices". Is there anyway of enabling this feature? I'm not afraid of loading custom firmware or writing some C code if neccessary I'm a nerd afterall!
    I'm using Ubuntu 12.10.
    Thanks,
    Jordan

    OK, this model does support an ad-hoc style wifi connection, however only for the first hour after its first power on sequence (or a reset of the network settings).
    So, sorry, I think you are stuck with a USB connection.
    Say thanks by clicking "Kudos" "thumbs up" in the post that helped you.
    I am employed by HP

  • How to setup remote access with E4200?

    Hi,
    I am new to this and I need help from you all on how to setup the E4200 so that I can access the media server when I am in office?  Is there a guide or step by step procedure on this?  I was browsing on the Cisco website and unable to find it. 

    The purpose of using DDNS is it substitutes the public/WAN ip address provided by your ISP.We all know that the ip address provided by our ISP(if we are not subscribe to a premium static ip address) is basically public and will always change from time to time.So it will be difficult for us to know what's the ip address our ISP has provided us and this will lead us problems accessing our router or ftp server remotely. Thus by using DDNS' it will now allow us to access the router remotely without knowing what's the WAN ip address.

  • How to setup Proxy in new environment?

    Hi All,
              We have implemented a new ECC and PI environment. When we try to regenerate the Inbound proxy in ECC for a proxy message already defined in new PI Integration repository, we get the following error message:
    Diagnosis
    The object currently selected references objects from other namespaces. However, there are no proxy objects for these objects in the current system.
    You cannot create proxy objects while editing the object currently selected for the following reasons:
    Objects are possibly located in different packages to the object currently being edited
    Objects are possibly subject to different naming conventions to the object currently being edited
    Objects are possibly located in different software components and cannot be created or changed in this system
    Procedure
    Contact the development area responsible for these external namespaces and do the following:
    Regenerate the objects concerned in the relevant original system
    Transport the objects to this system
    You can display the number of objects when you check this proxy: all entries in the check list after the entry "Objects to be changed from external namespaces".
    Please advice what we need to do. This is the first time proxy is being setup in new environment...
    Regards,
    XIer
    Edited by: XIer on Mar 27, 2008 2:16 AM

    Check whether the interface you're trying to generate proxy for have any underlying basis components. If yes, make sure they're active in in the IR (and that the proxies refering to these basis software components are in the ECC box).
    Regards,
    Henrique.

  • ESS testing - JCO Setups force access to only 1 client?

    Hi ... did anyone solve this issue with setup of ESS?
    We have J2EE Standalone with portal, XSS and ESS business package.
    The ESS WebDynpros on this system require JCO setups (e.g. SAP_R3_HumanResources) to the ERP6 backend.
    The issue is that users want to test in different backend clients.  However, the JCO setups seem to map this portal to one and only one client.
    Anyone have a workaround to this problem?
    TIA!
    Bart

    Ashutosh,
    Thanks for your input on this.  We have found that link you recommened very helpful.
    If I got it right, it describes a way to redirect any individual WebDynpro JCO calls to an alternate backend.
    We tried it two different ways.  One by calling the WD explicitly in a URL outside the portal.  And also by updating the URL paramters of an individual WD Iview within the portal ... and both work.
    The problem we are actually tying to solve, was to be able to setup one portal for two different client such that different users could simultaneously access the different clients.   The operation we are striving for is the same as what we have today with ITS.   The user can specify the client on the URL call.
    I am about to conclude that this kind of operation is not possible ... without making copies of all the WD Iviews and maintaining each WD's URL parameters in the portal.
    Is this the way you see it also?   Either you have to make all the copies and do the maintencance to access another client ... or you have to have a separate portal.
    I must be missing something!
    Cheers ... Bart

  • Exchange 2007 - Setup POP3 access

    We are currently running Exchange 2007 server. Users request for access via Outlook from home computers. Can someone point me in the direction to accomplish this? I've enabled POP and IMAP on the server, but not sure where to setup Incoming and Outgoing
    mail server settings.

    Testing Outlook connectivity.
     The Outlook connectivity test failed.
     Additional Details
     Elapsed Time: 22449 ms.
     Test Steps
     The Microsoft Connectivity Analyzer is attempting to test Autodiscover for
    [email protected].
     Testing Autodiscover failed.
     Additional Details
     Elapsed Time: 22448 ms.
     Test Steps
     Attempting each method of contacting the Autodiscover service.
     The Autodiscover service couldn't be contacted successfully by any method.
     Additional Details
     Elapsed Time: 22448 ms.
     Test Steps
     Attempting to test potential Autodiscover URL
    https://co.hernando.fl.us:443/Autodiscover/Autodiscover.xml
     Testing of this potential Autodiscover URL failed.
     Additional Details
     Elapsed Time: 21291 ms.
     Test Steps
     Attempting to resolve the host name co.hernando.fl.us in DNS.
     The host name resolved successfully.
     Additional Details
     IP addresses returned: 24.129.129.232 Elapsed Time: 238 ms.
    Testing TCP port 443 on host co.hernando.fl.us to ensure it's listening and open.
     The specified port is either blocked, not listening, or not producing the expected response.
      Tell me more about this issue and how to resolve it
     Additional Details
     A network error occurred while communicating with the remote host.
    Elapsed Time: 21053 ms.
    Attempting to test potential Autodiscover URL
    https://autodiscover.co.hernando.fl.us:443/Autodiscover/Autodiscover.xml
     Testing of this potential Autodiscover URL failed.
     Additional Details
     Elapsed Time: 655 ms.
     Test Steps
     Attempting to resolve the host name autodiscover.co.hernando.fl.us in DNS.
     The host name resolved successfully.
     Additional Details
     IP addresses returned: 24.129.129.220 Elapsed Time: 305 ms.
    Testing TCP port 443 on host autodiscover.co.hernando.fl.us to ensure it's listening and open.
     The port was opened successfully.
     Additional Details
     Elapsed Time: 120 ms.
    Testing the SSL certificate to make sure it's valid.
     The SSL certificate failed one or more certificate validation checks.
     Additional Details
     Elapsed Time: 230 ms.
     Test Steps
     The Microsoft Connectivity Analyzer is attempting to obtain the SSL certificate from remote server autodiscover.co.hernando.fl.us on port 443.
     The Microsoft Connectivity Analyzer successfully obtained the remote SSL certificate.
     Additional Details
     Remote Certificate Subject: CN=webmail.co.hernando.fl.us, OU=COMODO SSL Unified Communications, OU=Domain Control Validated, Issuer: CN=COMODO SSL CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB. Elapsed Time: 174 ms.
    Validating the certificate name.
     Certificate name validation failed.
      Tell me more about this issue and how to resolve it
     Additional Details
     Host name autodiscover.co.hernando.fl.us doesn't match any name found on the server certificate CN=webmail.co.hernando.fl.us, OU=COMODO SSL Unified Communications, OU=Domain Control Validated. Elapsed Time: 1 ms.
    Attempting to contact the Autodiscover service using the HTTP redirect method.
     The attempt to contact Autodiscover using the HTTP Redirect method failed.
     Additional Details
     Elapsed Time: 338 ms.
     Test Steps
     Attempting to resolve the host name autodiscover.co.hernando.fl.us in DNS.
     The host name resolved successfully.
     Additional Details
     IP addresses returned: 24.129.129.220 Elapsed Time: 32 ms.
    Testing TCP port 80 on host autodiscover.co.hernando.fl.us to ensure it's listening and open.
     The port was opened successfully.
     Additional Details
     Elapsed Time: 139 ms.
    The Microsoft Connectivity Analyzer is checking the host autodiscover.co.hernando.fl.us for an HTTP redirect to the Autodiscover service.
     The Microsoft Connectivity Analyzer failed to get an HTTP redirect response for Autodiscover.
     Additional Details
     An HTTP 403 forbidden response was received. The response appears to have come from Unknown. Body of the response: You do not have permission to view this directory or page.HTTP Response Headers:
    Content-Length: 58
    Content-Type: text/html
    Date: Mon, 28 Jul 2014 20:46:30 GMT
    Server: Microsoft-IIS/7.5
    X-Powered-By: ASP.NET
    Elapsed Time: 166 ms.
    Attempting to contact the Autodiscover service using the DNS SRV redirect method.
     The Microsoft Connectivity Analyzer failed to contact the Autodiscover service using the DNS SRV redirect method.
     Additional Details
     Elapsed Time: 80 ms.
     Test Steps
     Attempting to locate SRV record _autodiscover._tcp.co.hernando.fl.us in DNS.
     The Autodiscover SRV record wasn't found in DNS.
      Tell me more about this issue and how to resolve it
     Additional Details
     Elapsed Time: 80 ms.
    Checking if there is an autodiscover CNAME record in DNS for your domain 'co.hernando.fl.us' for Office 365.
     Failed to validate autodiscover CNAME record in DNS. If your mailbox isn't in Office 365, you can ignore this warning.
      Tell me more about this issue and how to resolve it
     Additional Details
     There is no Autodiscover CNAME record for your domain 'co.hernando.fl.us'. Elapsed Time: 81 ms.

Maybe you are looking for

  • Corrupted files on External HD - crashing iPhoto6

    Hi I've been using a Maxtor One Touch II external FW HD for my iPhoto library. It had been working fine until I tried to download photos yesterday onto it. I tried to rebuild the library, but it kept hanging. The only way to shut down was to hold dow

  • How to decrypt data when you can't get the private key in Windows?

    I'm very confuse. My english is poor, but I try to say my question clearly. When browser connects to a https website which needs client certificate to authenticate the identity, the browser will send client certificate to web server. Then the web ser

  • How to Sort Print Presets in IDCS3

    Hello I have a long list of print presets, and I would like to sort them. Is there a way??? I would hate to manually recreate like 30 of them. Thanks, Art

  • HT1296 cannot sync my own music to my i-pod

    Cannot sync my own music to my i-pod touch

  • Changing text in a Captivate slide?

    I thought I saw a demonstration in the past that showed to the text within a Captivate slide could be modified. The slide were imported from PowerPoint originally. Would I have to delete the slide and recreate another one in PowerPoint and import it?