Using different templates for different user access types.

Hi all,
I have an issue where we have a Page Group with lots of pages/sub-pages.
There are three different User Groups, Internal, Customer and Supplier.
I need to display the same content but with different templates (look and feel), one for the Internal, one for the customer and one for the supplier.
Can this be done using Oracle Portal 10.1.14? If so, how?
Many thanks.

Hi,
Yes you can do what you want to do in 10.1.4.
You can call a procedure in your HTML Layout Template which will write some CSS. This procedure will be executed with the USERID parameter.
Your procedure will check if the current user is a customer or a supplier and your CSS will reflect the differences (with different colors or whatever...)
Good luck,
Max.

Similar Messages

  • Senarious for using different internal table types

    please give scenarios for  using different internal table types?

    Refer to the following.
    Internal table types
    This section describes how to define internal tables locally in a program. You can also define internal tables globally as data types in the ABAP Dictionary.
    Like all local data types in programs , you define internal tables using the TYPES statement. If you do not refer to an existing table type using the TYPE or LIKE addition, you can use the TYPES statement to construct a new local internal table in your program.
    TYPES <t> TYPE|LIKE <tabkind> OF <linetype> [WITH <key>]
    [INITIAL SIZE <n>].
    After TYPE or LIKE, there is no reference to an existing data type. Instead, the type constructor occurs:
    <tabkind> OF <linetype> [WITH <key>]
    The type constructor defines the table type <tabkind>, the line type <linetype>, and the key <key> of the internal table <t>.
    You can, if you wish, allocate an initial amount of memory to the internal table using the INITIAL SIZE addition.
    Table type
    You can specify the table type <tabkind> as follows:
    Generic table types
    INDEX TABLE
    For creating a generic table type with index access.
    ANY TABLE
    For creating a fully-generic table type.
    Data types defined using generic types can currently only be used for field symbols and for interface parameters in procedures . The generic type INDEX TABLE includes standard tables and sorted tables. These are the two table types for which index access is allowed. You cannot pass hashed tables to field symbols or interface parameters defined in this way. The generic type ANY TABLE can represent any table. You can pass tables of all three types to field symbols and interface parameters defined in this way. However, these field symbols and parameters will then only allow operations that are possible for all tables, that is, index operations are not allowed.
    Fully-Specified Table Types
    STANDARD TABLE or TABLE
    For creating standard tables.
    SORTED TABLE
    For creating sorted tables.
    HASHED TABLE
    For creating hashed tables.
    Fully-specified table types determine how the system will access the entries in the table in key operations. It uses a linear search for standard tables, a binary search for sorted tables, and a search using a hash algorithm for hashed tables.
    Line type
    For the line type <linetype>, you can specify:
    Any data type if you are using the TYPE addition. This can be a predefined ABAP type, a local type in the program, or a data type from the ABAP Dictionary. If you specify any of the generic elementary types C, N, P, or X, any attributes that you fail to specify (field length, number of decimal places) are automatically filled with the default values. You cannot specify any other generic types.
    Any data object recognized within the program at that point if you are using the LIKE addition. The line type adopts the fully-specified data type of the data object to which you refer. Except for within classes, you can still use the LIKE addition to refer to database tables and structures in the ABAP Dictionary (for compatibility reasons).
    All of the lines in the internal table have the fully-specified technical attributes of the specified data type.
    Key
    You can specify the key <key> of an internal table as follows:
    [UNIQUE|NON-UNIQUE] KEY <col1> ... <col n>
    In tables with a structured line type, all of the components <coli> belong to the key as long as they are not internal tables or references, and do not contain internal tables or references. Key fields can be nested structures. The substructures are expanded component by component when you access the table using the key. The system follows the sequence of the key fields.
    [UNIQUE|NON-UNIQUE] KEY TABLE LINE
    If a table has an elementary line type (C, D, F, I, N, P, T, X), you can define the entire line as the key. If you try this for a table whose line type is itself a table, a syntax error occurs. If a table has a structured line type, it is possible to specify the entire line as the key. However, you should remember that this is often not suitable.
    [UNIQUE|NON-UNIQUE] DEFAULT KEY
    This declares the fields of the default key as the key fields. If the table has a structured line type, the default key contains all non-numeric columns of the internal table that are not and do not contain references or internal tables. If the table has an elementary line type, the default key is the entire line. The default key of an internal table whose line type is an internal table, the default key is empty.
    Specifying a key is optional. If you do not specify a key, the system defines a table type with an arbitrary key. You can only use this to define the types of field symbols and the interface parameters of procedures . For exceptions, refer to Special Features of Standard Tables.
    The optional additions UNIQUE or NON-UNIQUE determine whether the key is to be unique or non-unique, that is, whether the table can accept duplicate entries. If you do not specify UNIQUE or NON-UNIQUE for the key, the table type is generic in this respect. As such, it can only be used for specifying types. When you specify the table type simultaneously, you must note the following restrictions:
    You cannot use the UNIQUE addition for standard tables. The system always generates the NON-UNIQUE addition automatically.
    You must always specify the UNIQUE option when you create a hashed table.
    Initial Memory Requirement
    You can specify the initial amount of main memory assigned to an internal table object when you define the data type using the following addition:
    INITIAL SIZE <n>
    This size does not belong to the data type of the internal table, and does not affect the type check. You can use the above addition to reserve memory space for <n> table lines when you declare the table object.
    When this initial area is full, the system makes twice as much extra space available up to a limit of 8KB. Further memory areas of 12KB each are then allocated.
    You can usually leave it to the system to work out the initial memory requirement. The first time you fill the table, little memory is used. The space occupied, depending on the line width, is 16 <= <n> <= 100.
    It only makes sense to specify a concrete value of <n> if you can specify a precise number of table entries when you create the table and need to allocate exactly that amount of memory (exception: Appending table lines to ranked lists). This can be particularly important for deep-structured internal tables where the inner table only has a few entries (less than 5, for example).
    To avoid excessive requests for memory, large values of <n> are treated as follows: The largest possible value of <n> is 8KB divided by the length of the line. If you specify a larger value of <n>, the system calculates a new value so that n times the line width is around 12KB.
    Examples
    TYPES: BEGIN OF LINE,
    COLUMN1 TYPE I,
    COLUMN2 TYPE I,
    COLUMN3 TYPE I,
    END OF LINE.
    TYPES ITAB TYPE SORTED TABLE OF LINE WITH UNIQUE KEY COLUMN1.
    The program defines a table type ITAB. It is a sorted table, with line type of the structure LINE and a unique key of the component COLUMN1.
    TYPES VECTOR TYPE HASHED TABLE OF I WITH UNIQUE KEY TABLE LINE.
    TYPES: BEGIN OF LINE,
    COLUMN1 TYPE I,
    COLUMN2 TYPE I,
    COLUMN3 TYPE I,
    END OF LINE.
    TYPES ITAB TYPE SORTED TABLE OF LINE WITH UNIQUE KEY COLUMN1.
    TYPES: BEGIN OF DEEPLINE,
    FIELD TYPE C,
    TABLE1 TYPE VECTOR,
    TABLE2 TYPE ITAB,
    END OF DEEPLINE.
    TYPES DEEPTABLE TYPE STANDARD TABLE OF DEEPLINE
    WITH DEFAULT KEY.
    The program defines a table type VECTOR with type hashed table, the elementary line type I and a unique key of the entire table line. The second table type is the same as in the previous example. The structure DEEPLINE contains the internal table as a component. The table type DEEPTABLE has the line type DEEPLINE. Therefore, the elements of this internal table are themselves internal tables. The key is the default key - in this case the column FIELD. The key is non-unique, since the table is a standard table.
    http://help.sap.com/saphelp_nw04/helpdata/en/fc/eb35de358411d1829f0000e829fbfe/content.htm

  • I rented a movie. I want to see it using different user on same mac for security reason. How can I do this? Home Sharing fails to do this, so far.

    I rented a movie. I want to see it using different user on same mac for security reason. How can I do this? Home Sharing fails to do this, so far.

    Copy the movie from the current library to the correct library.
    iDevices can only sync to one library at a time.

  • Is it possible to do message mapping using different namespace message type

    Hi all,
    Is it possible to do message mapping using different namespaces message types
    Example :
    i am having message type MT_1 in namespace http://sap.com/abc
    and second message type MT_2 in namespace http://partner.com/xyz
    so MT_1 can be mapped with MT_2 or not having different namespace.
    Thanks

    Read through my reply in this thread for Defining Software component dependencies.
    Though it explains this for Improted Archives, it also holds true for Message Types to be used in message mappings.
    Re: Payload Extraction
    Regards
    Bhavesh

  • I have a production mobile Flex app that uses RemoteObject calls for all data access, and it's working well, except for a new remote call I just added that only fails when running with a release build.  The same call works fine when running on the device

    I have a production mobile Flex app that uses RemoteObject calls for all data access, and it's working well, except for a new remote call I just added that only fails when running with a release build. The same call works fine when running on the device (iPhone) using debug build. When running with a release build, the result handler is never called (nor is the fault handler called). Viewing the BlazeDS logs in debug mode, the call is received and send back with data. I've narrowed it down to what seems to be a data size issue.
    I have targeted one specific data call that returns in the String value a string length of 44kb, which fails in the release build (result or fault handler never called), but the result handler is called as expected in debug build. When I do not populate the String value (in server side Java code) on the object (just set it empty string), the result handler is then called, and the object is returned (release build).
    The custom object being returned in the call is a very a simple object, with getters/setters for simple types boolean, int, String, and one org.23c.dom.Document type. This same object type is used on other other RemoteObject calls (different data) and works fine (release and debug builds). I originally was returning as a Document, but, just to make sure this wasn't the problem, changed the value to be returned to a String, just to rule out XML/Dom issues in serialization.
    I don't understand 1) why the release build vs. debug build behavior is different for a RemoteObject call, 2) why the calls work in debug build when sending over a somewhat large (but, not unreasonable) amount of data in a String object, but not in release build.
    I have't tried to find out exactly where the failure point in size is, but, not sure that's even relevant, since 44kb isn't an unreasonable size to expect.
    By turning on the Debug mode in BlazeDS, I can see the object and it's attributes being serialized and everything looks good there. The calls are received and processed appropriately in BlazeDS for both debug and release build testing.
    Anyone have an idea on other things to try to debug/resolve this?
    Platform testing is BlazeDS 4, Flashbuilder 4.7, Websphere 8 server, iPhone (iOS 7.1.2). Tried using multiple Flex SDK's 4.12 to the latest 4.13, with no change in behavior.
    Thanks!

    After a week's worth of debugging, I found the issue.
    The Java type returned from the call was defined as ArrayList.  Changing it to List resolved the problem.
    I'm not sure why ArrayList isn't a valid return type, I've been looking at the Adobe docs, and still can't see why this isn't valid.  And, why it works in Debug mode and not in Release build is even stranger.  Maybe someone can shed some light on the logic here to me.

  • Policy for using a licence for 2 users and technical restrictions

    Dear All,
    With the 2007 version, my customer was accustomed to using a licence for 2 users.
    Before the migration in 8.81 PL08, I warned him that that would not be possible any more with this new version because that had been said to us by SAP.
    All the users work remotely via TSE and the double login still seems to function properly
    I did not find SAP documentation relating to this question. Does somebody know it?
    Which is the rule for using a ID with two users on two different workstations? Which are the technical restrictions?
    Thanks in advance

    Hi,
    Welcome you post on the forum.
    The rule is: a same user code is allowed to open two sessions concurrently. This is not changed. This function is for the need a user may need both session to complete certain tasks.
    RSP has a new function to detect such case if the same B1 user are from two work stations. That is a sign to indicate this feature may be abused.
    Thanks,
    Gordon

  • Widgets for Business User Access to SC Approval

    We learnt with SRM 7.0, widgets would have been one of the distincting features. Does anyone know what it takes to setup one ? Widgets Features.
    Widgets for Business user access (pre-packaged and custom)
    Process controlled SRM Business Workflow
    Harmonized, UI for seamless usability across ERP and SRM
    Robust mobile and desktop support
    Non-disruptive innovation via EhP
    Easy, low-cost customization with WebDynpro

    I did not try this, but maybe I've got an idea...
    You can catch the onload event of the BP form and the switch record event (First, Previous, Next & last record button in the data menu). The first (onload) do you need when someone enters the BP form by clicking elsewhere on a linked button. The other you need when someone is walking through the records on the BP form. (by accessing the form using the menu)
    Catching those two events, you can get the value of the BP Code field, and check if the current user is allowed to see it. If not, disable (if they are not allowed to edit) or hide (when not allowed to see) the items on the screen (that are a lot of items, I know) and display a nice message that they are not allowed to edit/view that BP.
    The ID's of the form and the buttons:
    - FormUID BP: 134
    - MenuUID First record: 1290
    - MenuUID Previous record: 1288
    - MenuUID Next record: 1289
    - MenuUID Last record: 1291
    Hope it helps...

  • How do i use the bundle for ms office to type my documents?

    how can i start using the bumdle for ms office to type my document with normal features of the pages.

    Sorry, but that adds to my confusion. The iTunes Store is for purchasing Apps for iPad/iPhone. The Mac App Store is for purchasing Mac compatible apps.

  • How to set a customized search results template for all users

    Hi.
    I know the customized search results views are stored in a file called pne_portal.hda that resides on every user's subfolder in data/users/profiles/...
    Is there a way to set a customized search results template for all users? If it's impossible, is there a way to modify the Headline view? I'm not able to find the resource or template where this view is.
    Thanks in advance.

    I wasn't able to understand what was meant by this post. Therefore, I modified the standard template HeadLine View.
    Columns for this template are defined in the include slim_search_result_table_header_setup (in std_page.htm).
    Here is the modification of the code:
    <$if customTemplateId and not (baseTemplateId like customTemplateId)$>
              <$columnsString = utGetValue("customlisttemplates/" & strLower(customTemplateId), "columns")$>          
              <!-- Modify START by Oracle-->
         <$else$>
    <!-- here add default fields -->
              <$columnsString="dDocName,dDocTitle,dInDate,dDocAuthor"$>
    <!-- here add your custom fields -->
              <$columnsString=columnsString&",xComment"$>
              <!-- Modify END by Oracle-->
         <$endif$>

  • Approval Templates for the User Defined Object(UDO)

    Hi,
    I just wanted to check whether the Approval Templates for the User Defined Object(UDO)...i.e. Said to the User Defined Form..
    if possibe how it can be done.....
    Thanks in Advance,
    With Regards,
    MadhuSudhana Rao.G

    Hi MadhuSudhana Rao,
    The function you requested is not available yet.
    Thanks,
    Gordon

  • How to create server 2012 R2 image to be used as template for cloud?

    Hi,
    I need help to create windows server 2012R2 image that can be used as template for AWS or Azure or any other cloud provider.
    VM created from that template must
    1) be syspreped
    2) answer all setup questions
    3) must change computer name to unique name
    4) must automatically join VM to on-premise domain.
    I need Microsoft supported way to do that. Does creating unattended answer file will help? But, I don't want to provide domain joining credentials in plain text. Where should I keep that answer file so that it can be used during setup process.
    Is there any other ways to achieve that.
    Thank you.

    Hi ninenince,
    You can refer the following KB to hide the sensitive data in answer file, this is more about the MDT issue there have a specific forum to support the MDT question, more further
    about the MDT question please post to the MDT support forum.
    MDT support 
    forum:
    https://social.technet.microsoft.com/Forums/en-US/home?forum=mdt
    The related KB:
    Hide Sensitive Data in an Answer File
    https://technet.microsoft.com/en-us/library/cc722019%28v=ws.10%29.aspx?f=255&MSPPError=-2147217396
    How To encrypt a password in unattendend.xml
    https://social.technet.microsoft.com/Forums/windows/en-US/5e6a97b5-186c-40dd-a165-2cc3e7eb2682/how-to-encrypt-a-password-in-unattendendxml
    Additional, we can use a low permission account for the domain join action.
    The related third party article:
    Minimum Permissions Required for Account to Join Workstations to the Domain During Deployment
    https://jonconwayuk.wordpress.com/2011/10/20/minimum-permissions-required-for-account-to-join-workstations-to-the-domain-during-deployment/
    I’m glad to be of help to you!
    *** This response contains a reference to a third party World Wide Web site. Microsoft is providing this information as a convenience to you. Microsoft does not control these
    sites and has not tested any software or information found on these sites; therefore, Microsoft cannot make any representations regarding the quality, safety, or suitability of any software or information found there. There are inherent dangers in the use
    of any software found on the Internet, and Microsoft cautions you to make sure that you completely understand the risk before retrieving any software from the Internet. ***
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Support, contact [email protected]

  • Can we use AD authentication for SPoint users to access Portal behind OID?

    Hi,
    We have Oracle Portal with OID-AD sychronization set up, and are currently implementing SharePoint in our organization.
    We would like to provide links to a few pages on our Portal to some of the SharePoint users.
    The SharePoint users are authenticated by the Active Directory SSO and the Portal users are authenticated by our OID SSO setup.
    What we want to do is to let some SharePoint users access our Portal using their AD login. The SharePoint users should not have to login again to get to our Portal pages.
    Is there a way to let the AD authentication to pass through the OID setup so that SharePoint users can directly access our Portal?
    We don't have any external authentication plug-ins set up for our Portal.
    Currently we are on Portal version 9.0.4.1 but may be upgrading to version 10.1.4.2 in the near future.
    Any help would be greatly appreciated.
    Thanks.
    CV

    Hi,
    Thanks for the quick reply.
    But I have a different scenario.
    I want to establish it in such a way that certain users are stored in the LDAP and certain users are stored in the Portal Database.

  • Problem using different Map key types in one class

    I'm running Kodo 2.3.3. It seems I can only have one Map key types for all
    maps in a class. For example, if I have two maps in a class, their keys
    must be of the same type.
    Is there a plan to remove this limitation soon?
    Thanks,

    Abe White wrote:
    Kodo should generate a separate table for each Map. We have internal tests
    that use classes with Map fields using a lot of different key/value type
    combinations, so there shouldn\'t be a problem.It looks like two maps (keyValues and versions) are sharing the same
    table. Here is the table generated by schematool (db: Oracle 8.1.7):
    desc persistentmotiveresourcebean_x;
    Name Null? Type
    ID_JDOIDX VARCHAR2(255)
    JDOKEYX NUMBER
    KEYVALUESX VARCHAR2(255)
    VERSIONSX VARCHAR2(255)
    ==========================================================================
    Following is the simplified code I run:
    -----------internal.jdo--------------------------------------
    <?xml version=\"1.0\"?>
    <jdo>
    <package
    name=\"com.motive.services.resourceManagementService.internal\">
    <class name=\"PersistentMotiveResourceBean\"
    identity-type=\"application\"
    objectid-class=\"com.motive.model.PrimaryKey\">
    <field name=\"id\" primary-key=\"true\"/>
    <field name=\"versions\">
    <map key-type=\"java.lang.Float\"
    embedded-key=\"true\" value-type=\"java.lang.String\"
    embedded-value=\"true\"/>
    </field>
    <field name=\"keyValues\">
    <map key-type=\"java.lang.String\"
    embedded-key=\"true\" value-type=\"java.lang.String\"
    embedded-value=\"true\"/>
    </field>
    </class>
    </package>
    </jdo>
    Java source:
    -----------PersistentMotiveResourceBean.java---------
    package com.motive.services.resourceManagementService.internal;
    import java.util.HashMap;
    public class PersistentMotiveResourceBean
    private String id;
    private String name;
    private HashMap versions;
    private HashMap keyValues;
    public PersistentMotiveResourceBean()
    public String getId() { return id; }
    public void setId(String id) { this.id = id; }
    public String getName() { return name; }
    public void setName(String name) { this.name = name; }
    public HashMap getVersions() { return versions; }
    public void setVersions(HashMap versions) { this.versions = versions; }
    public HashMap getKeyValues() { return keyValues; }
    public void setKeyValues(HashMap keyValues) { this.keyValues =
    keyValues; }
    ----------------PrimaryKey.java-------------------------------------
    package com.motive.model;
    import java.io.Serializable;
    public class PrimaryKey implements Serializable
    public String id;
    public PrimaryKey ()
    public PrimaryKey (String id)
    this.id = id;
    public boolean equals (Object ob)
    if (this == ob) return true;
    if (!(ob instanceof PrimaryKey)) return false;
    PrimaryKey o = (PrimaryKey) ob;
    return (this.id == o.id);
    public int hashCode ()
    return id.hashCode();
    public String toString ()
    return id;

  • Manage AUDIT using  different user

    Dear Friends ,
    I have to run audit trail in my production database which only gathered user session related information . I just run following two lines as 'SYS' user :
    SQL> conn sys/password as sysdba
    SQL> audit session whenever successful;
    Audit succeeded.
    SQL> audit session whenever not successful;
    Audit succeeded.
    Now, I get all audit related information in AUD$ table as SYS user . But I dont want to use AUD$ table in system tablespace .
    Instead of using the AUD$ table , I like to use a different user like AUDIT1 (which is created in different tablespace) who holds a different table like AUD$ and also keeps all the session realted information like AUD$ table . Is it possible to do ?
    Plz inform me .. ..

    Shipon,
    If you are going to make auditing via Database than the records will go in AUD$ table only. There is a metalink note that talks about the movement of AUD$ to another tablespace and also for related objects. You may want to check that note,*Metalink notes 72460.1 "Moving AUD$ to Another Tablespace and Adding Triggers to AUD$" and 1019377.6: "Script to move SYS.AUD$ table out of SYSTEM tablespace".*
    On the other hand, you may want to look around for other options to enable Auditing, for example, o/s based.
    HTH
    Aman....

  • IMac - can it work with 2 people using different user names?

    My wife and I each have IPhone and IPad.  We are buying a new IMac.  We have different user names.  Will we both be able to download pictures but keep our email and messages separate?

    Keep in mind that only one user who has Administrative rights is the Master Account holder on your Imac. I thought it would have been whomever is the original account signed into the machine... Wrong!
    My Imac was a birthday gift from my husband who I later learned had full Root Account control of my Imac, and everything I do, type, or surf on the Internet. Wish someone would have warned me. Later after several blocked menu and program issues and after finding parental controls set on my own user name, and several other glitches I was informed by Apple Care tech support that I was NOT the Master Account holder for my Imac and they refuse to give me the Account Master's name! My husband adamantly denies that he is behind this criminal act and the issues have only grown worse with time? Go figure as to how one can begin to resolve this all but after reading your question I just wanted to put this out here for your awareness in this situation, as it does apply.

Maybe you are looking for

  • Can 10.1 and 10.2 database servers be installed on same machine?

    This is probably a daft question, with the obvious answer of "of course you can't", but I'll ask it anyway. We are currently running an Oracle 10.1g database server on a Linux machine (CentOS4 = RHEL4). The next phase of our development requires that

  • HP xb3000 Notebook Expansion Base

     {title edited for clarity-SunshineF} I just got a xb3000 and I hooked up the component red green and blue to my HD tv and I can not get it to work? The touchsmart TX2Z-1000 on the other hand works great with the XB 3000.What drivers do I need? Where

  • ISight works only with non-Apple applications

    So maybe this is a weird one. Since updating to 10.6.5, anything made by Apple isn't recognizing my iSight camera. Skype works, online Flash applications work...but no dice for the FaceTime beta, iChat, PhotoBooth, or iMovie. It simply states that th

  • How to decide implementation way for share point site ?

    Hi, I am developing new share point site where i want to manage more hierarchical data with its own business requirements and flows. lets assume following scenario  there are multiple companies at very top level Every company contains multiple depart

  • Reading/editing/writing midi files

    Hi, does anyone experienced how to read, edit and write midi file back to the JAR file with J2ME /MIDP 2.0? All I can do is playing the file, that's not much and not what I need :-( Thanks