User's security level issue

I have an Administrative and a Limited User accounts on my PC. iTunes works fine under the Administrative account, but in Limited User account I get an error everytime I try to change some kind of configuration option at Preference's window (Edit/Preferences). I think iTunes should store the configuration file at user's account folder.
The other problem on my Limited User account is that I'm no longer able to add musics on iTunes. I use the "Keep iTunes Music folder organized" and "Copy files to iTunes Music folder when adding to library" options. WHen I try to add a file, iTunes show an error like "Attempting to copy to the disk 'C:\' failed. The disk could not be read from or written to.". iTunes is configured to store all my musics at an folder like C:\MP3 and even my Limited User account has Full Control to this folder.

Limited user accounts have limited access to folders, I think if you want iTunes to work in a limited access account accessing a folder outside it's own account you will probably need to adjust the the permissions.
This should be straight forward in XP Pro. You need to set the folder permissions so the limited user at least has write/modify access and preferably full control of the iTunes folder and iTunes Music folder.
You can do this from the security tab in the folder's properties.

Similar Messages

  • Users and Security Levels in lookout client

    I would like to setup users with different security levels in my Lookout 6.7 client application. When I try to add a user I get an error message that says "add user operation failed. Check the system drive disk space". There is plenty of drive space, 50GB. Is it possible to have users logon to the client with different security levels?
    Thanks,
    Brad Adams
    Communications Group Inc.
    Solved!
    Go to Solution.

    Run the User Manager in Administrator mode
    C:\Program Files (x86)\National Instruments\Shared\Logos
    Right click "usrmgr.exe", select Run as Administrator
    Forshock - Consult.Develop.Solve.

  • ASA 5505 Interface Security Level Question

    I am wondering if someone can shed some light on this for me. I have a new ASA 5505 with a somewhat simple config. I want to set up a guest VLAN on it for a guest wireless connection.
    I set up the ASA with the VLAN, made a trunk port, set up DHCP (on the ASA) on the guest VLAN, configured NAT, etc. Everything seem to be working with that. Guests are getting address on the correct subnet, etc.
    The only issue I have is that the Guest VLAN (192.168.22.0) can get to the secure (VLAN1 - 172.16.0.0). I set up the guest VLAN (VLAN 5) with a security level of 10, the secure with a level of 100. I figured that would be enough. To stop the guest from accessing the secure, I had to throw on an ACL (access-list Guest-VLAN_access_in line 1 extended deny ip any 172.16.0.0 255.255.255.0)
    Can someone  show me what I did wrong?
    Thank you for any help!
    To create the VLAN, I did the following:
    int vlan5
    nameif Guest-VLAN
    security-level 10
    ip address 192.168.22.1 255.255.255.0
    no shutdown
    int Ethernet0/1
    switchport trunk allowed vlan 1 5
    switchport trunk native vlan 1
    switchport mode trunk
    no shutdown
    below is the whole config.
    Result of the command: "sho run"
    : Saved
    ASA Version 9.1(3)
    hostname ciscoasa
    enable password zGs7.eQ/0VxLuSIs encrypted
    xlate per-session deny tcp any4 any4
    xlate per-session deny tcp any4 any6
    xlate per-session deny tcp any6 any4
    xlate per-session deny tcp any6 any6
    xlate per-session deny udp any4 any4 eq domain
    xlate per-session deny udp any4 any6 eq domain
    xlate per-session deny udp any6 any4 eq domain
    xlate per-session deny udp any6 any6 eq domain
    passwd 2KFQnbNIdI.2KYOU encrypted
    names
    interface Ethernet0/0
    switchport access vlan 2
    interface Ethernet0/1
    interface Ethernet0/2
    switchport trunk allowed vlan 1,5
    switchport trunk native vlan 1
    switchport mode trunk
    interface Ethernet0/3
    interface Ethernet0/4
    interface Ethernet0/5
    interface Ethernet0/6
    interface Ethernet0/7
    interface Vlan1
    nameif inside
    security-level 100
    ip address 172.16.0.1 255.255.255.0
    interface Vlan2
    nameif outside
    security-level 0
    ip address <External IP/Mask>
    interface Vlan5
    nameif Guest-VLAN
    security-level 10
    ip address 192.168.22.1 255.255.255.0
    boot system disk0:/asa913-k8.bin
    ftp mode passive
    object network obj_any
    subnet 0.0.0.0 0.0.0.0
    object network Inside_Server1_80
    host <Inside_server1_IP>
    object network Inside_Server1_25
    host <Inside_server1_IP>
    object network Inside_Server1_443
    host <Inside_server1_IP>
    object network Inside_Server1_RDP
    host <Inside_server1_IP>
    object service RDP
    service tcp destination eq 3389
    object network Outside_Network1
    host <Outside_Network_IP>
    object network Outside_Network2
    host <Outside_Network_IP>
    object network Outside_Network2
    host <Outside_Network_IP>
    object network TERMINALSRV_RDP
    host <Inside_server2_IP>
    object network Inside_Server2_RDP
    host <Inside_Server2_IP>
    object-group network Outside_Network
    network-object object Outside_Network1
    network-object object Outside_Network2
    object-group network RDP_Allowed
    description Group used for hosts allowed to RDP to Inside_Server1
    network-object object <Outside_Network_3>
    group-object Outside_Network
    object-group network SBS_Services
    network-object object Inside_Server1_25
    network-object object Inside_Server1_443
    network-object object Inside_Server1_80
    object-group service SBS_Service_Ports
    service-object tcp destination eq www
    service-object tcp destination eq https
    service-object tcp destination eq smtp
    access-list inside_access_in extended permit ip any any
    access-list outside_access_in extended permit object-group SBS_Service_Ports any object-group SBS_Services
    access-list outside_access_in extended permit object RDP any object TERMINALSRV_RDP
    access-list outside_access_in extended permit object RDP object-group RDP_Allowed object Inside_Server1_RDP
    access-list outside_access_in extended permit object RDP object-group RDP_Allowed object Inside_Server2_RDP
    access-list Guest-VLAN_access_in extended deny ip any 172.16.0.0 255.255.255.0
    access-list Guest-VLAN_access_in extended permit ip any any
    pager lines 24
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    mtu Guest-VLAN 1500
    no failover
    icmp unreachable rate-limit 1 burst-size 1
    asdm image disk0:/asdm-714.bin
    no asdm history enable
    arp timeout 14400
    no arp permit-nonconnected
    object network obj_any
    nat (inside,outside) dynamic interface
    object network Inside_Server1_80
    nat (inside,outside) static interface service tcp www www
    object network Inside_Server1_25
    nat (inside,outside) static interface service tcp smtp smtp
    object network Inside_Server1_443
    nat (inside,outside) static interface service tcp https https
    object network Inside_Server1_RDP
    nat (inside,outside) static interface service tcp 3389 3389
    object network TERMINALSRV_RDP
    nat (inside,outside) static <TerminalSRV_outside)IP> service tcp 3389 3389
    object network Inside_Server2_RDP
    nat (inside,outside) static interface service tcp 3389 3390
    nat (Guest-VLAN,outside) after-auto source dynamic obj_any interface
    access-group inside_access_in in interface inside
    access-group outside_access_in in interface outside
    access-group Guest-VLAN_access_in in interface Guest-VLAN
    route outside 0.0.0.0 0.0.0.0 <Public_GW> 1
    timeout xlate 3:00:00
    timeout pat-xlate 0:00:30
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    user-identity default-domain LOCAL
    aaa authentication ssh console LOCAL
    http server enable
    http 192.168.1.0 255.255.255.0 inside
    http 172.16.0.0 255.255.255.0 inside
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec security-association pmtu-aging infinite
    crypto ca trustpool policy
    telnet timeout 5
    ssh timeout 5
    ssh key-exchange group dh-group1-sha1
    console timeout 0
    dhcpd auto_config outside
    dhcpd address 192.168.22.50-192.168.22.100 Guest-VLAN
    dhcpd dns 8.8.8.8 4.2.2.2 interface Guest-VLAN
    dhcpd lease 43200 interface Guest-VLAN
    dhcpd enable Guest-VLAN
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    ntp server 129.6.15.30 prefer
    username <Username> VAn7VeaGHX/c7zWW encrypted privilege 15
    class-map global-class
    match default-inspection-traffic
    policy-map global-policy
    class global-class
      inspect icmp
      inspect icmp error
      inspect pptp
    service-policy global-policy global
    prompt hostname context
    no call-home reporting anonymous
    Cryptochecksum:7f5d70668ebeb94f49f312612f76c943
    : end

    Hi,
    To my understanding they should not be able to connect to the more secure network IF you DONT have an interface ACL configured.
    One very important thing to notice and which I think is the most likely reason this happened is the fact that as soon as you attach an interface ACL to an interface then the "security-level" looses its meaning. The "security-level" has meaning as long as the interface is without an ACL. This makes the "security-level" only usable in very simple setups.
    What I think happend is that you have "permit ip any any" ACL on the interface that allowed all the traffic.
    Your option is to either remove the interface ACL completely or have the ACL configured like you have now. I mean first block traffic to your secure LAN and then allow all other traffic which would allow the traffic to Internet
    Hope this helps
    Please do remember to mark a reply as the correct answer if it answered your question.
    Feel free to ask more if needed.
    - Jouni

  • Ms word95 to pdf - "security level too high"?

    I'm a brand new user of Acrobat 9.0 (on XP system) - all kinds of problems (including major file crash and loss during 9.0  installation - more on that later). for now, I need to get started immediately on converting some MS Word doc files to pdfs - What I get from 9.0 is the message that "The Security Level is Too High".   If it's referring to the MS word docs, they are unprotected (I've checked and tried several - Word shows they are not protected, and as far as I know, never have been).  They were originally created on a mac with macWord - but were not protected and converted to windows with MacDrive7.  They show in MS Word in good condition and unprotected.  What do I need to do to get them into acrobat and into pdf format? I've also check the knowledge base here and elswhere without any clues except one chap who seemed to be having similar problems (along with serious crashes) using 8.1. Other than that, I'm mistified.
    I've also tried using the context menu 'covert to pdf' method and also creating a new pdf (blank) and inserting them.  In both cases the security message aborted the process.  Need to do this right away. I'm not technically skilled, so if someone can give me some clear instructions I'd be grateful.  - red

    Thank you all for responding so quickly. First, I'll mention the serious message and a warning. DO NOT INSTALL ACROBAT 9.0 IN AN ENVIRONMENT WITH WORD 7.0 (or any old(er) MS Word version before 2k).  The consequences are ghastly, including the deletion of half or more of your program files (including your email clients, av software and other primary programs), the corruption of your browser, registry (including restore points) and other not so nice events - worse than most bad viruses.  That's a problem Adobe and I will probably be taking a look at next week. Mean time, they indicate that they are going to add the matter to their KB and elswhere so that users have a heads-up on the issue.
    As for the conversion problem from Word 7.0 .doc to .pdf - Bill, you just about nailed it. It was, indeed, a problem that could be circumvented by going to the printer dialog and setting the printer to  'Adobe pdf file' (something a novice wouldn't think of, nor line tech-support for that matter.).  As far as Word/pdf 'printer' is concerned you're just printing the file. However, as I understand things, that's how Adobe attaches the Word documents - It does it through the printer interface. Once that setting is changed to 'Adobe pdf printer' the file is simply picked from the print queue (or before) and loaded into A9. Save it from A9, and the job is done.  So, Bill, If Adobe hadn't found the answer, I do believe you would have been telling me exactly how to do it after a few more posts. The credit, though, goes to Neo Johnson, tech-support supervisor in New Delhi.  The last two days (almost 9 hours of phone time) were spent with various tech-support agents at Adobe; but,  he was the one who finely thought about the interaction between A9 and Word and figured it out.
    Ok -that's the brief.  The rest is a little history/background for whomever is interested (skip, otherwise - not important).  The problem begins with failure to install - first, setup can't find the msi file - it was there, and I browsed it, so that was solved. Then 'invalid licensing - process stopped' messages appear. That was a little tougher and http://kb2.adobe.com/cps/405/kb405970.html  and some other articles had me doing repair, reinstall, and other complex (for me) procedures. One of the problems was that flexnet had failed to install, which was a stumper for me (I couldn't find it to download separately - barely knew what it was/did - and finally understood that Adobe was supposed to install it. After that,  I did several uninstalls, to no effect. Finally I did a few moderate and then deep uninstalls (with Revo) and several reinstalls. Things got progressively worse.  On one reboot, my desktop came up and all the program icons were broken links.  I examined targets and such and then went to my 'program files' directory. To my horror, nearly all my primary program (including thunderbird email client, AVG etc.)  files had disappeared. The folders were simply empty.  Firefox still loaded, but the tabs were non functional.  Several checks and some light disc analysis indicated the files vanished. No trace. However, my document folders and data were intact (also backed-up). I went to restore and found that all the old restore points (including the one's Revo sets before uninstalling) were gone.  If it had been a virus, it couldn't have done a better job at making a mess of things.  At that point, I knew the registry had been toasted and I was facing a complete OS reinstall.  Instead, I opted for reinstalling some of the critical programs (and because the document files appeared to be intact).  After the first few - thunderbird, firefox etc.  - I was relieve to find that they were picking up on the old settings and restoring themselves to their previous states. I still have a number of these to do - and a few must be re-configured. But that's going ok. 
    Then the saga of Adobe, several phone calls; several times the phone connection was cut off and I had to call again and start over from the beginning with a new person. The matter always had to be esculated to the next tier - more time, more cues, no solutions.  They went over the firefox settings, the adobe settings. They were puzzled about the broken links.  Attempts to open doc files (after a fresh install of winword) were resulting in 'invalid win32 application'. All kinds of problems made progress difficult.  We cleared up the 'invalid....' messages by reparing the file associations (in XP folder options) and then opening the docs in Word and resaving them as something else.  It was a labor.  Finally, there was simply no answer except, like the post here, Word 7 is simply too old and uses different scripting. The only solution was to either buy (ugh, ouch!) Word 2007 (and hope that it would load them and save them in A9 useable form) or, try installing Word2k (which I have) and processing them through that; and, then using Acrobat 8.x to load those and save the pdfs for A9 to use.  However, when Adobe said they could not provide me with a free (even trial) version of 8.x to do the job - licensing problems etc. -- It seemed like a really ugly solution.  Finally, I'm begging Adobe to give me a free copy of 8.x and in steps Neo.  He can't provide the free copy, but he asks a few questions himself.  We go to Adobe and reset some of the security settings (something other agents didn't know or think of). No dice - still can't load the docs.  But then he says, Open up Word. Ok.  load the file and then hit 'print' - ok, the print dialog comes up. 'Now,' he says, 'open the properties and see what printers are listed.'  Ok I do that, and I'll be... 'Adobe pdf printer' is among them.  "Just what I thought," he said, Adobe was hooking up with word, but didn't have its printer to attach." So we set 'Adobe pdf' as the printer and lo and behold, the docs loaded into Adobe as pdfs.  End of that story. (so bill, you had it too - wish you had answered the phone in the first place!)
    Clean up.  So, there's a few simple solutions, I think (though i'm no techie and you folks will certainly have better ideas). First, I don't buy the story that early versions of Word are either 1) unsupported by MS or, 2) nobody uses them, as valid reasons why not to fix the problem of the "unloadable" docs.  I figure there are at least a couple of aproaches and easy patches that will correct the matter. One is from the Word  side - to is to set the current printer setting to use 'Adobe printer', get the file and then reset the printer back to what it was - default.   The other is to patch A9 to detect legacy source applications and bypass things that would normally make the file unloadable, unless, of course, they were actually protected or, read only files. In that case, Adobe could simply inform the user to 'unprotect' them, the same as it now does with its   'Security Setting too High' message for later versions.  I'm sure there are even better ways. But, that would fix things as far as file loading and conversion.
    As to the installation and crash problems - those need to be addressed. Even if its only a few dozen people that might have the same problem, it needs 1) to be given as a noticable warning and keyword in Adobe documents (which now simply indicate that it can process .doc files);  2) it needs to be examined to  insure systems that have Word 7.x or older can install without problem, and certainly without harming their system.  Adobe has a good reputation and does a good job. That's worth protecting with all customers, even if Marketing can't quite see why and the bean counters can't find much profit in the task.  It's what I expect from professionals and to do less certainly subtracts from Adobe's standing. That should be worth a great deal, I would imagine.
    Anyway, thanks folks - got to get some sleept, and then get those pdfs done and sent to people who are waiting for them. - best to you all, red.

  • Security design issue

    Hi Folks,
    I've a security design issue using J2EE architecture framework in my
    project..
    Proj Requirement:
    i) User Logs-into a health b2b/b2c portal website...
    ii) Check the user exist in the database or LDAP directory service.
    iii) If exist user then check the role Patient/Insurance Provider/Physician?
    iv)If Patient then display his personal health record history.
    else Insurance Provider then display about Insurance Policy information,
    which he can update/create insurance for entered patient id. If patient has
    granted access to Insurance Provider
    and if Physician then display about hospital information like
    waiting patients,sending appointments,etc..
    The above security access control role & policy has to be implemented
    very strong. so that other user cannot view/update someone health records..
    Development tool:WebLogic Server/Oracle/LDAP.. on Linux
    Security Problem:
    i)What is the best security solution for the above requirement?
    ii)How do I authenticate/validate user using J2EE security framework?
    Can anyone explain in details or steps to implement?
    Thanks,
    -raj-

    I'm assuming that your using WLS 6, if so check out (I know we cover this in
    the documentation but I'm guessing at the title) the "securing your site"
    guide. Some of what you're planning the WLS server can protect through good
    ACL usage. I'd recommend creating at least three groups (patient, provider,
    physician), clearly the danger lies in having a user who is a member of more
    than one group. I'd recommend implementing your own role checking at both
    the servlet and EJB levels to fully enforce information access, using
    servlet state and stateful session beans should help.
    Alex
    Raj <[email protected]> wrote in message
    news:[email protected]..
    Hi Folks,
    I've a security design issue using J2EE architecture framework in my
    project..
    Proj Requirement:
    i) User Logs-into a health b2b/b2c portal website...
    ii) Check the user exist in the database or LDAP directory service.
    iii) If exist user then check the role Patient/InsuranceProvider/Physician?
    iv)If Patient then display his personal health record history.
    else Insurance Provider then display about Insurance Policy information,
    which he can update/create insurance for entered patient id. If patienthas
    granted access to Insurance Provider
    and if Physician then display about hospital information like
    waiting patients,sending appointments,etc..
    The above security access control role & policy has to be implemented
    very strong. so that other user cannot view/update someone healthrecords..
    >
    Development tool:WebLogic Server/Oracle/LDAP.. on Linux
    Security Problem:
    i)What is the best security solution for the above requirement?
    ii)How do I authenticate/validate user using J2EE security framework?
    Can anyone explain in details or steps to implement?
    Thanks,
    -raj-

  • The security level is set to High

    Windows 2008R2 terminal Server
    Office 2013
    Adobe Acrobat XI update 9
    When trying to create a PDF from a word document (have not tried other files yet), Adobe hangs for about 2 mins and then gives the following message
    The Security Level is set to High
    Please run the application which created this document, in the "Security Warning" dialog select the check box "Always trust macros from this source" and enable macro's created by Adobe Systems inc
    No 1. There is absolutely no need for an apostrophe in the second instance of the word macros
    Have deployed the Adobe Acrobat Administrative template and enabled the following setting
    'Automatically Trust Sites for Win OS Security Zones' (Elevates the trusted sites list in Internet Explorer to privileged locations so that they may bypass enhanced security restrictions. When enabled, the trust list is a union of IE's trust list and Acrobat's privileged locations list. GUI mapping: Edit > Preferences > Security (Enhanced) > Automatically trust sites for my Win OS security zones)
    - not a fix
    Have exported every digital signature from the pdf office dlls and imported to the computer certificate store - not a fix
    Have disabled every office macro and security setting - not a fix
    Does not matter if the file being converted is on a UNC path, mapped drive, or local drive
    Have added all file locations containing office docs to trusted folders in Word and Adobe - not a fix
    R-Click context menus for combining and conversion work fine however I understand that this uses the Adobe PDF Printer and not the office addons
    Opening a file in Word and converting to a PDF using the Addon is fine as is printing to the PDF Printer
    This issue only occurs from within the Adobe Acrobat Application 'Create file from PDF' and currently only seems to affect Office documents
    I cannot see how to give Adobe any more trust

    Solved
    I was running Office in a 'RunVirtual' environment. This man explains it best
      http://ppe.blogs.technet.com/b/gladiatormsft/archive/2014/02/05/app-v-5-on-run-virtual-rds -run-virtual-virtualizable-ext…
    Essentially Office and Acrobat are installed Natively however all Office Apps are configured to run in a Virtual environment so that Office Addins which are true AppV applications can be linked into Office.
    My 'Empty' 'RunVirtual Office package did not have 'Com Integration' enabled
    Adobe Acrobat makes use of a Com Addin for Office, so Office was unable to expose that to Adobe Acrobat until the 'Empty' 'RunVirtual Office package was updated accordingly

  • ORA-20100: AppDomain could not be created for the specified security level

    We recently updated our development environment to Visual Studio 2010. We have previously deployed (with success) .Net stored procedures from Visual Studio 2005 to our Oracle 10gR2 database. I am currently trying to configure a local instance (called local) of Oracle 10gR2 database to test deployment of .Net stored procedures to Oracle 10gR2 via Visual studio 2010 and ODT version 11.2.0.1.2. I have built the demo from the ode developer guide and gotten as far as deploying it but executing the stored procedures from VS 2010 or SQL*Plus produces the following error...
    ORA-20100: AppDomain could not be created for the specified security level
    ORA-06512: at "SYS.DBMS_CLR", line 152
    ORA-06512: at "SCOTT.GETDEPTNO", line 7
    Here is what I have done.
    (Server)
    1. Installed oracle 10gR2 with ODE.Net
    2. Installed Oracle 10gR2 patch set 22
    3. Installed ODE upgrade from Oracle Developer Tools for Visual Studio .NET with Oracle 10g Release 2 ODAC 10.2.0.2.21
    (Client)
    4. Installed Oracle Developer Tools for Visual Studio .NET with Oracle 10g Release 2 ODAC 10.2.0.2.21 (In new client home).
    5. Installed patch set 22 on 10g client home.
    6. Installed Oracle 11g Release 2 ODAC 11.2.0.1.2 with Oracle Developer Tools for Visual Studio(in new 11g client home, only for VS 2010)
    I have made some minor changes (GAC) etc. per the following threads...
    ODE.NET 11.1.0.7.20 on 10g Database?!
    Re: Error: System.TypeInitializationException
    The database appears to be fully functional via TOAD - SQL plus etc. I can't find much on this error but it appears Oracle needs some permissions to launch an ASP.Net application that it does not have. Any help would be GREATLY appreciated, don't hesitate to ask for additional details.

    The KB article is almost what we have apart from theitalic underlined
    part
    Consider the following scenario:
    You use a domain administrator account to log on to a computer that is running Windows 7 or Windows Server 2008 R2.
    You use the Active Directory Users and Computers Microsoft Management Console (MMC) snap-in to connect to a domain controller.
    You open the Properties dialog box of a user account.
    The user account has sole access to a shared folder path that cannot be accessed by the administrator account.
    You set the Remote Desktop Services Home Folderattribute to the shared folder path.
    NoteThis attribute is located on the
    Remote Desktop Services Profiletab.
    You click Apply or OK.
    In this scenario, you receive the following error message:
    The home folder could not be created because: The network name cannot be found.
    Note If you click Apply or OK again, no error message is returned. However, the setting is not saved.
    I think the important bit is
    The user account has sole access to a shared folder path that cannot be accessed by the administrator account.
    We manually create the shares on our NAS and then just want to enter the path in the profile tab, I suppose the question is how to we stop it trying to create the shares ?

  • Help with asp ... security levels

    I made a change to the security level for the end user. i add
    a security feature by adding 12345 to their security level.
    <%@LANGUAGE="VBSCRIPT"%>
    <%Option Explicit%>
    <%
    'check to see if the page is submitted
    Dim validLogin
    Dim strErrorMessage
    Dim intLevel
    Dim sLevel
    If (Request.Form("uname")<>"") Then
    'user has submitted the form
    'get the entered values and hit the database
    Dim strUserName
    Dim strPassword
    'going to use an implicit connection, no connection object
    needed
    Dim objRS
    strUserName = UCase(Request.Form("uname"))
    strPassword = UCase(Request.Form("pwd"))
    response.write("strUserName")
    'prepare the RS
    Set objRS = Server.CreateObject("ADODB.Recordset")
    'set the sql statement
    objRS.Source = "SELECT * FROM tblEmployee WHERE
    strEmpUserName = '" & strUserName & "' AND strEmpPassword =
    '" & strPassword & "'"
    ' heres the implicit connection
    objRS.ActiveConnection =
    "Provider=Microsoft.Jet.OLEDB.4.0;Data
    Source=c:\Inetpub\db\IMPCustomers.mdb"
    objRS.CursorType = 0
    objRS.CursorLocation = 3
    objRS.Open
    'check for EOF
    If(objRS.EOF) Then
    'no records matched, invalid login
    Response.Redirect("invalidLogin.asp")
    'strErrorMessage = "Invalid Login. Try Again."
    validLogin = false
    Else
    'added intLevel to add more security on 3/29/07
    intLevel = Cint(objRS("intEmpSecurityLevel"))
    intLevel = intLevel + 12345
    sLevel = intLevel
    'valid login, set session variables
    Session("username") = UCase(strUserName)
    Session("userpass") = UCase(strPassword)
    Session("sLevel") = sLevel
    'Session("sLevel") = objRS("intEmpSecurityLevel") - changed
    to add more security on 3/29/07
    Session("fn") = objRS("strEmpFN")
    'release the RS
    Set objRS.ActiveConnection = Nothing
    Set objRS = nothing
    'redirect off this page
    Response.Redirect("custSearch.asp")
    End If
    End If
    %>
    I'm now having trouble removing the 12345 from their security
    level in the custSearch.asp.
    <%@LANGUAGE="VBSCRIPT"%>
    <%Option Explicit%>
    <%
    Dim strUserName
    Dim strPassword
    Dim intSLevel
    Dim isum
    Dim intS
    Dim intNewSLevel
    Dim sLevel
    Dim strFN
    Dim strErrorMessage
    Dim strError
    'get pass parameters
    strUserName = Session("username")
    strPassword = Session("userpass")
    intSLevel = Session("sLevel")
    'add on 3/29/07 for security
    'get the security level
    isum = sLevel
    'take isum which contains sLevel and subtract 12345 from it
    isum = isum - 12345
    'now intS equals security level in the db
    intS = isum
    'put into a session
    Session("intS") = intS
    strFN = Session("fn")
    strErrorMessage = ("strError")
    'If strErrorMessage = "" Then
    'strError = "There is no customer with that last name."
    'End If
    %>
    <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0
    Transitional//EN" "
    http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
    <html xmlns="
    http://www.w3.org/1999/xhtml">
    <head>
    <title>Employee Intranet - Customer Database, Search
    for a particular customer.</title>
    <meta http-equiv="content-type" content="text/html;
    charset=utf-8" />
    <link rel="stylesheet" type="text/css"
    href="../css/pop_style.css" />
    <link rel="stylesheet" type="text/css"
    href="../css/forms.css" />
    <style type="text/css">
    /* HMTL selectors start here */
    h2 {
    margin-bottom:15px;
    p {
    margin-bottom:20px;
    hr {
    border:thin;
    border-color:#CCCCCC;
    border-style:dotted;
    width:100%;
    text-align:center;
    table {
    width:300;
    align:center;
    cellpadding:2px;
    cellspacing:2px;
    margin-left:30%;
    td {
    font-size:14px;
    font-style:normal;
    font-weight:normal;
    border:0;
    padding:0;
    /* HMTL selectors start here */
    /* ID selectors start */
    #mainText {
    height:400px;
    font-family:Arial, Helvetica, sans-serif;
    font-size:14px;
    text-align:left;
    margin-left:1%;
    margin-right:1%;
    padding: 10px 5px;
    word-spacing:1px;
    letter-spacing:1px;
    /* id ends here */
    </style>
    <script language="JavaScript" type="text/JavaScript">
    <!-- function MM_reloadPage(init) { //reloads the window
    if Nav4 resized if (init==true) with (navigator) {if
    ((appName=="Netscape")&&(parseInt(appVersion)==4)) {
    document.MM_pgW=innerWidth; document.MM_pgH=innerHeight;
    onresize=MM_reloadPage; }} else if (innerWidth!=document.MM_pgW ||
    innerHeight!=document.MM_pgH) location.reload(); }
    MM_reloadPage(true); //-->
    </script>
    </head>
    <body>
    <!-- CASCADING POPUP MENUS v5.2 by Angus Turnbill
    http://www.twinhelix.com -->
    <script language="javascript" type="text/javascript"
    src="../js/pop_core.js"></script>
    <script language="javascript" type="text/javascript"
    src="../js/pop_data.js"></script>
    <!-- border begins here -->
    <div id="border">
    <!-- second nav start here -->
    <div id="secNavBar"><a
    href="../index.htm">Home</a>  |  <a
    href="../htm/quality.htm">Quality</a> 
    |  <a href="../htm/contactUs.htm">Contact
    Us</a>  | <a
    href="../htm/siteMap.htm"> Site
    Map</a></div>
    <!-- logo starts here -->
    <div id="logo">
    <img src="../art/NewLogo.jpg" alt="Logo of IMPulse NC,
    INC." usemap="#Map" />
    <map name="Map" id="Map">
    <area shape="rect" coords="5,3,280,74"
    href="../index.htm" alt="Return to home page" />
    </map>
    </div>
    <!-- primary navigation div tags starts here -->
    <div id="priNav">
    <a id="home" name="home"
    style="visibility:hidden;">Home</a>
    <!-- primary navigation div tags ends here -->
    </div>
    <!-- main text starts here -->
    <div id="mainText">
    <h2>Customer Database </h2>
    <p
    style="font-size:14px;font-style:normal;font-weight:normal;">Welcome
    <%=strFN%></p>
    <p
    style="font-size:14px;font-style:normal;font-weight:normal;">Please
    search for a customer by using the fields below. You can use one
    field or multiple fields for your search.</p>
    <!-- signIn form starts here -->
    <div id="signIn">
    <div id="CSearch">
    <table>
    <form action="results.asp" method="post" name="search"
    id="search">
    <tr>
    <td width="98" height="29">Last Name:</td>
    <td width="150" tabindex="1"><input type="text"
    name="clname" size="25" maxlength="25" /></td>
    </tr>
    <tr>
    <td height="30">First Name:</td>
    <td tabindex="2"><input type="text" size="25"
    maxlength="25" name="cfname" /></td>
    </tr>
    <tr>
    <td height="30">Company:</td>
    <td tabindex="3"><input type="text" size="25"
    maxlength="25" name="ccomp" /></td>
    </tr>
    <tr>
    <td height="48" colspan="2" tabindex="4">
    <input type="submit" name="login" value="Submit" />
    <input type="reset" name="Reset" value="Reset" />
    <a href="logOut.asp">
    <input type="button" name="logOut" value="Log Out" />
    </a> </td>
    </tr>
    </form>
    </table>
    <!-- customer search form ends here -->
    </div>
    <blockquote> </blockquote>
    <!-- signIn form ends here -->
    </div>
    <!-- main text ends here -->
    </div>
    <div id="btm_Bar">
    100 IMPulse Way • Mount Olive, North Carolina 28365
    • Main (919) 658-2200 • Fax (919) 658-2268<br />
    &copy;2006 IMPulse NC, Inc. All Rights Reserved. </div>
    </div>
    <script language="javascript" type="text/javascript"
    src="../js/pop_events.js"></script>
    <!-- Places text blinker in the uname text box thru
    javascript -->
    <script language="javascript" type="text/javascript">
    document.search.clname.focus();
    </script>
    <!-- javascript ends here -->
    <%
    Response.Write(Session("username")) & "<br />"
    Response.Write(Session("userpass")) & "<br />"
    Response.Write(Session("sLevel")) & "<br />"
    Response.Write(Session("intS")) & "<br />"
    %>
    </body>
    </html>
    What am I doing wrong?

    "pqer" <[email protected]> wrote in message
    news:eugsik$kt5$[email protected]..
    > What am I doing wrong?
    1. You're allowing unfiltered user input into your SQL query.
    I could do
    some horrible damage to your system.
    2. You have SELECT * in your query.
    3. You're doing something that doesn't make any sense. Why
    add a constant
    to the security level just to subtract it again when you
    actually want to
    use it? You're just making more work for yourself. There is
    no benefit
    there.

  • The best way to implement user's access level via Servlet & JSP (or more)?

    Hi all,
    I am trying to implement user's access level in an application to allow certain access to certain page or components within a page (buttons, etc.). From my experience with JSP, Java, servlet, I am think of having the jsp/servlet to check for user's access level to decide what jsp components or forward page to go to next but that doesn't seem clean or elegant way to handle it.
    Any suggestions of how to do this? Are there other technologies (Struts) out there that can handle this?
    Thanks so much in advance for your feedback or suggestion,
    Thong Bui

    I haven't experienced a lot in defining security roles before, and there is probably a lot to learn about this area. However I might be able to assist you in some way. Whenever I have 2 or more objects that need to be stored in the session, I create a class called UserContainer. Say you have three properties:
    empSsn (String) , isAdmin (Boolean), isAgent (Boolean), then:
    public class UserContainer implements Serializable  {
    private String empSsn = null;
    private Boolean isAdmin = null;
    private Boolean isAgent = null;
    public UserContainer() {
    super();
    public void setIsAdmin(Boolean isAdmin) {
    this.isAdmin = isAdmin;
    public Boolean getIsAdmin() {
    return this.isAdmin;
    // getters and setters for the other properties
    Of course after you decide (in your sevlet) whether the app user is an administrator or an agent, you can set the corresponding property in the user container, and then save it in the session. Afterwords, in any jsp, you can decide to display a certain element (e.g a button) after you check the user's role. Example:
    // Welcome.jsp
    <% UserContainer userContainer = (UserContainer) session.getAttribute("userContainer");
    boolean isAdmin = userContainer.getIsAdmin().booleanValue();
    boolean isAgent = userContainer.getIsAgent.booleanValue();
    if(isAdmin) { %>
    <!-- HTML/Code corresponding to an administrator -->
    <% } if(isAgent) { %>
    <!-- HTML /Code corresponding to an agent -->
    <% } >Of course, this is a very simple way of doing such a task, you will find more secure ways if you look at LDAP or something of that matter.
    Cheers

  • SOAP Adapter with Security Levels - HTTP & HTTPS

    We have a successfully working interface scenario where SAP XI is hosting a web service and the partner systems calling it using SOAP Adapter URL http://host:port/XISOAPAdapter/MessageServlet?channel=:service:channel with Security Level HTTP on the SOAP Sender Communication channel.
    Going forward, for other similar interfaces (SAP XI hosting Web Service and partner systems calling it), we would like to use HTTPS and/or certificates.
    If we enable HTTPS on XI J2EE server as per the guide How to configure the [SAP J2EE Engine for using SSL - Notes - PDF|https://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/964f67ec-0701-0010-bd88-f995abf4e1fc]....
    can partner systems still use the URL http://host:port/XISOAPAdapter/MessageServlet?channel=:service:channel or should they switch to https://host:port/XISOAPAdapter/MessageServlet?channel=:service:channel?
    can we continue to have the existing interface working using HTTP Security Level i.e. partners not having to send the certificate with each message?
    If we use HTTPS security level, is it mandatory for the partner system need to send the certificate? Is it possible to have an HTTPS scenario w/o certificates?
    What is the difference between Security Levels  'HTTPS Without Client Authentication' & 'HTTPS with Client Authentication'?
    I appreciate your inputs on this.
    thx in adv
    praveen
    PS: We are currently on SAP PI 7.0 SP17

    Hi Praveen,
    There is no need to change the interface and It is manditory for the partners to send certificates in order to validate each other. Use the https in url.
    HTTPS With Client authentication:
    The HTTPS client identifies itself with a certificate that is to be verified by the server. To validate the HTTPS clientu2019s certificate, the HTTPS server must have a corresponding CA certificate that validates this certificate. After validation of the clientu2019s certificate, the server maps the certificate to an actual system user executing the HTTP request.
    and check this link.
    http://help.sap.com/saphelp_nw04/helpdata/en/14/ef2940cbf2195de10000000a1550b0/frameset.htm
    Regards,
    Prasanna

  • Essbase Security Filter issue.

    Hi,
    Its regarding the security filter issue.
    The major problem is whosoever user is provisioned under that security filter, if the user is trying to connect to Application using Excel Addin / Smartview, it crashes the essbase server [Network Error [10061], timed out error)]
    When we figured out because of this filter essbase server is crashing, we tried to edit the filter. sometimes if we click on edit, it crashes the server or sometimes we can see some junk characters in the filter.
    We have applied the security on Entities dimension and problematic filter is ASP.
    Now the hirerachy is like this.
    Entities dimesnsion and then ASP member and under ASP we have our several members.
    Filter is like this:
    Write : @Idescendants("ASP")
    It was working fine for almost 15 days.
    Now if i edit the filter, i can see like this:
    Write : @Idescendants("ASP")
    Metaread:@Idescendants("*&^%?)
    Junk characters are coming in and no idea from where they are coming.
    I can't delete the filter also, again it crashes the essbase server.
    As a workaround i have created a temp filter and dome the assignation for this group, according to that.
    Everything is working fine.
    I just wanted to know, has anybody faced such kind of problem earlier.
    What cud be the root cause for this.
    How could I delete the filter.
    I have also get messages like security file is corrupted (we have restored it from old backup) but really worried about security file as we are moving the whole thing to production server this weekend.
    Please advise me on this, Please help me. Any help would be highly appreciated.
    I am really in trouble.
    Thanks,
    Pankaj Mehta.

    Try to edit the filter from MaxL command line using
    alter filter sample.basic.filt7 add write on '@IDescendants("ASP")';
    here sample=application
    basic=database
    filt7=filtername
    have good luck

  • How to setup TACACS to drop a user directly into level 15 on ASA?

    Is there a way to drop a user directly into level 15 on ASA just like it on router/switch, meanwhile keep its username as original (don't change to enable_15)?

    You can't do that, it's considered a second level of security.
    Hope that helps.

  • Changing Default Security Levels

    I have several Windows 7 Enterprise machines that have already been deployed via image and need to lower the security settings for use on internal web based applications.
    Is there an easy way to manipulate the configuration (a file) so that I may simply make the changes by overwriting the current configuration settings instead of, having to go to each device, opening the Java console, and changing the security settings that way?
    I have attempted to login as the machine administration, make the changes on the Java console with the hopes this configuration would have migrated to all user profiles that log into the PC. Is there a "public profile" configuration file I can change and if so, what should I do.
    Thank you in advance for the assistance

    Create a "deployment.properties" file with the line "deployment.security.level=HIGH" (or what ever level you need that is supported by your version of Java) and save it in "C:/Windows/Sun/Java/Deployment/" (assuming windows client device). 
    More in depth info found below:
    Deployment Configuration File and Properties

  • Security Level Medium is not working for PO initial version

    Hi ,
        We have maintained security level as Medium in Purchaser user personalization. In order to restart the PO SAVED event workflow only there is a value changed while the PO is awaiting for approval..  Here is the scenario and how the start condition maintained for PO - WS 14000145 - SAVED event.
    Start condition maintained for event SAVED for WF template WS14000145 as below
    &_EVT_OBJECT.POTotalValue& GE 0.00
    Security level(BBP_WFL_SECURITY) maintained as Medium in personalization of SU01.
    my requirement is when the PO create first time ( Initial Version ) and route for approval. Three level approval is determined for the PO and first approval approved. while the PO is awainiting for second level of approval the purchaser changed the quantity. based on above start condition my expectation is , the PO has to restart and route from beginning. but that is not happening. when i see the approval preview the approval path shows the workitem is waiting in second level of approval.
    I tried the below start conditions also
    &_EVT_OBJECT.SimpleListOfChanges&CE TOTAL_VAL, but no result..
    What is the Medium functionality?
    here is the help i found from help.sap.com, but i am not clear about this..
    MEDIUM It is possible to change the document The system evaluates the workflow start conditions and starts the approval workflow again if the change necessitates a new approval If this is not the case, the approval workflow continues.
    Regards,
    John

    Hi John,
    The security level works differently for PO's.                                                                               
    In the function 'BBP_PDH_WFL_CHECK_RESTART is a desription how the    
    system should work:                                                                               
    The workflow will be RESTARTED in the following cases: 
    a) One has a standard workflow with the usual type of approval (not a 
       'back&forth' one). It will always be restarted independent on the  
       authorization levels of the user and whether the user is a PO      
       creator or not;               
    b) One has the 'back&forth' type of approval but the user reordering  
       the PO is not the PO creator (this could be another purchaser from 
       the same purchasing group);    
    c) It is the 'back&forth' type of approval and the user reordering the
       PO is the PO creator but he has the authorization levels that are  
       less then 2, i.e '0'(not defined') or '1' (no changes allowed);    
    That means the security level must be below '2' to force a restart.   
    I hope that this clarifies how the system is working.
    Kind regards,
    Siobhan

  • Port forwarding & security level

    [was orig sent to fios internetforum in error- I'm on a dsl line]
    I've set up port forwarding for various services (mIRC, ftp, etc) on my Versalink gateway (Westell 327W router/modem). Ports are OK, Still, I can't access these when my firewall is set to "Typical Security" - I have to go down to Minimum for anything to get through. Is this the way it's supposed to work? I thought that port forwarding opened my selected ports in the firewall without compromising security otherwise. If I have to choose min. security, what's the point of port forwarding? Thanks for any feedback - ed

    At this time I can't tell you about the Security Level setting, but I can answer this question
    eda wrote:
    What's the point of port forwarding?
    I point to the info at
    grc.com's pure CSS menu (Research -> Recent -> NAT Router Security)
    Direct URL: http://www.grc.com/nat/nat.htm
    But, it gets kind of weird.
    For example, I point to the info at
    DSLR (dslreports.com) ->  FAQs -> Verizon Online FiOS FAQ -> Troubleshooting -> What is the NAT Table problem in the Actiontec?
    Direct URL: http://www.dslreports.com/faq/16233
    ^^^
    If you are the original poster (OP) and your issue is solved, please remember to click the "Solution?" button so that others can more easily find it. If anyone has been helpful to you, please show your appreciation by clicking the "Kudos" button.

Maybe you are looking for

  • My podcasts on itunes are not ordered correctly ... how to fix?

    As you can see in the screenshot above, my uploaded podcasts are not appearing in the order they were uploaded/released but in a seemingly random order ... how can I get the iTunes store to sort them based on release date so that the most recently re

  • Joining two fact tables with different dimensions into single logical table

    Hi Gurus, I try to accomplish in Oracle Business Intelligence 11.1.1.3.0: F1 (D1, D2 and D3) F2 (D1 and D2 and D4) And we want to build a report F1 F2 D1 D2 D3 D4 to have data for: F1 that match only for D1-D2-D3 and data for F2 that match only D1-D2

  • Cleaning track pad button

    Ok im an idiot, I spilt a small ammount of fruit juice on the track pad of my Mac Book. now the button sticks it still works though. Is there a safe, relatively easy way to clean this?

  • Merging of same records in columns while printing

    Dear All, Kindly let me know how to merge same records in a column while printing. I used ALV_GRID_DISPLAY and merged using sort in LIST but not able to get the same while printing. Regards, Karthik

  • Major.minor version

    Im getting unsupported major.minor version exception while doing web applications using both tomcat5.0 and weblogic8.1, on the JVMs 1.4 and 1.5. Where did i do mistake???