What's relation among prod client,login client and non-livecache-relevant?
Experts:
I have some questions about abve concepts:
Can a production client be non-livecache-relevant?
Can some clients that are livecache-relevant but not production client?
How many production client are allowed for SCM (only one like other SAP products?)?
Thanks!
Hi,
1) how to decide which clients should be livecache relevant?
Ans: All the clients should have LiveCache. Because the data will be fetched from livecache, the database and livecace will be having data sincronized.
2) how to decide which one should production client?
Ans: If you are asking about the number of client then it can be any. If you are asking relevant to other testing and QA then the production server will be different from the other and wich connected to OLTP system and having all the relevant business data.
3) how do I know a client is livecache-relevant Or not? Which place to verify?
Ans: as said above all the clients are livecache relevant only. You can check in the Transaction code LC10
We have a SCM PROD system with only one working client :001. We should never make it non-livecache-relevant, right?
Ans: Yes. If livecahe is not installed then SCM system will not work. The data fetch from livecache only.
When you save any data it stores in Livecache and Database.
Regards,
Kishore Reddy.
Similar Messages
-
What type of database operations effectd with Unicode and non unic
Hi Friends,
I want to know what type of database operations effects with Unicode and non Unicode Programing .
Thanks,
Ravi Kumar MukkeraHi ,
Check these links .
http://help.sap.com/saphelp_nw04/helpdata/en/62/3f2cadb35311d5993800508b6b8b11/frameset.htm
https://www.sdn.sap.com/irj/sdn/go/portal/prtoot/docs/library/uuid/ff99cb90-0201-0010-e389 -
What is the programming (ABAP) difference between Unicode and non Unicode?
What is the programming(ABAP) difference between Unicode and non Unicode?
Edited by: NIV on Apr 12, 2010 1:29 PMHi
The difference between programming in Unicode or not Unicode is that you should consider some adjustments to make on the Program "Z" to comply with the judgments Unicode Standard.
In the past, developments in SAP using multiple systems to encode the characters of different alphabets. For example: ASCII, EBCDI, or double-byte code pages.
These coding systems mostly use 1 byte per character, which can encode up to 256 characters. However, other alphabets such as Japanese or Chinese use a larger number of characters in their alphabets. That's why the system using double-byte code page, which uses 2 bytes per character.
In order to unify the different alphabets, it was decided to implement a single coding system that uses 2 bytes per character regardless of what language is concerned. That system is called Unicode.
Unicode is also the official way to implement ISO/IEC 10646 and is supported in many operating systems and all modern browsers.
The way of verifying whether a program was adjusted or not, is through the execution of the UCCHECK transaction. Additionally, you can check by controlling syntax (making sure that this asset verification check Unicode).
The main decisions to adjust / replace are (examples):
ASSIGN H-SY-INDEX TEXT TO ASSIGN <F1> by
H-SY-INDEX TEXT (*) TO <F1>.
DATA INIT (50) VALUE '/'. by
DATA INIT (1) VALUE '/'.
DESCRIBE FIELD text LENGTH lengh2 by
DESCRIBE FIELD text LENGTH lengh2 in character mode.
T_ZSMY_DEMREG_V1 = record_tab by
record_tab TO MOVE-Corresponding t_zsmy_demreg_v1.
escape_trick = hot3. by
escape_trick-x1 = hot3.
itab_txt TYPE wt by
ITAB_TXT TYPE TABLE OF TEXTPOOL
DATA: string3 (3) TYPE X VALUE B2023 '3 'by
DATA: string3 (6) B2023 TYPE c VALUE '3 '.
OPEN DATASET file_name IN TEXT MODE by
OPEN DATASET file_name FOR INPUT IN TEXT MODE ENCODING NON-UNICODE.
or
OPEN DATASET file_name FOR INPUT IN TEXT MODE ENCODING DEFAULT.
CODE FROM PAGE TRANSLATE a_codepage record by
record TRANSLATE USING a_codepage.
CALL FUNCTION 'DOWNLOAD' by
CALL METHOD cl_gui_frontend_services => gui_download
CALL FUNCTION 'WS_DOWNLOAD' by
CALL METHOD cl_gui_frontend_services => gui_download
CALL FUNCTION 'UPLOAD' by
CALL METHOD cl_gui_frontend_services => gui_upload
CALL FUNCTION 'WS_UPLOAD' by
CALL METHOD cl_gui_frontend_services => gui_upload
PERFORM USING HEAD APPEND_XFEBRE +2. by
PERFORM USING HEAD APPEND_XFEBRE +2 (98).
Best Regars
Fabio Rodriguez -
Client based settings and non-client based settings
Can I knwo what is the client based settings and what are the non-client based settings.
Hi,
Slight error in you question:
There are 2 settings:
1. Client specific: These are customising settings which impact only in the client you are making the changes in. Let us say that in an instance you have 2 clients, 800 and 900. When you change a client specific setting in 900, it is not reflected in client 800. This is beacuse the table where this setting is stored contains the client as one of the fields.
2. Cross Client settings: Here, a change in one client is also replected in all the clients in that installation. Needless to say, the tables for these settings will not have client as one of the fields.
Cheers -
What is the difference between authorisation if-authenticated and none
Hello,
I am working on a AAA configuration, and can't determine the practical difference between authorisation none and authorisation if-authenticated.
I realise the obvious difference, that if TACACS is down, with none there is no authorisation if none is used; and if TACACS is down authorisation will allow all commands if if-authenticated is used.
However, since you must always be authenticated, before authorisation commences, in practical terms, there is no difference that I can see between if-authenticated and none? Can anyone please explain if there is a practical difference between them.
#####################Authorisation if-authenticated#############
aaa authorization exec default group tacacs+ if-authenticated
aaa authorization commands 1 default group tacacs+ if-authenticated
aaa authorization commands 15 default group tacacs+ if-authenticated
#####################Authorisation none##################
aaa authorization exec default group tacacs+ none
aaa authorization commands 1 default group tacacs+ none
aaa authorization commands 15 default group tacacs+ none
Many Thanks
Ian PottsOne use I can think of is where you have both AAA and local configured for exec or command authorization. Let's say TACACS+ in the following manner:
aaa new-model
aaa authentication login default tacacs+ local
aaa authorization exec default tacacs+ if-authenticated
username admin password
If you had this configuration without the "if-authenticated" statement and the connection to the TAC+ server goes down or you receive an ERROR in communicating with it such as a mismatched key, then it goes to local for authentication. If you did not want to use local authorization and want it to succeed exec authorization for this local account, then the "if-authenticated" statement would be needed.
Check out the debugs with:
aaa new-model
aaa authentication login default tacacs+ local
aaa authorization exec default tacacs+ local
AND the TAC+ server is down
6d21h: AAA/AUTHOR/EXEC (4150549846): Port='tty2' list='' service=EXEC
6d21h: AAA/AUTHOR/EXEC: (4150549846) user='admin'
6d21h: AAA/AUTHOR/EXEC: (4150549846) send AV service=shell
6d21h: AAA/AUTHOR/EXEC: (4150549846) send AV cmd*
6d21h: AAA/AUTHOR/EXEC (4150549846) found list "default"
6d21h: AAA/AUTHOR/EXEC: (4150549846) Method=TACACS+
6d21h: AAA/AUTHOR/TAC+: (4150549846): user=admin
6d21h: AAA/AUTHOR/TAC+: (4150549846): send AV service=shell
6d21h: AAA/AUTHOR/TAC+: (4150549846): send AV cmd*
core7200-4#
6d21h: AAA/AUTHOR (4150549846): Post authorization status = ERROR
6d21h: AAA/AUTHOR/EXEC: (4150549846) Method=NOT_SET
6d21h: AAA/AUTHOR/EXEC: (4150549846) no methods left to try
6d21h: AAA/AUTHOR (4150549846): Post authorization status = FAIL
6d21h: AAA/AUTHOR/EXEC: Authorization FAILED
NOTE, Post authorization fails because there is no method set for EXEC for the local user. Now, put in "if-authenticated" and test again:
aaa new-model
aaa authentication login default tacacs+ local
aaa authorization exec default tacacs+ if-authenticated
6d22h: AAA/AUTHOR/EXEC (2893174055): Port='tty2' list='' service=EXEC
6d22h: AAA/AUTHOR/EXEC: (2893174055) user='admin'
6d22h: AAA/AUTHOR/EXEC: (2893174055) send AV service=shell
6d22h: AAA/AUTHOR/EXEC: (2893174055) send AV cmd*
6d22h: AAA/AUTHOR/EXEC (2893174055) found list "default"
6d22h: AAA/AUTHOR/EXEC: (2893174055) Method=TACACS+
6d22h: AAA/AUTHOR/TAC+: (2893174055): user=admin
6d22h: AAA/AUTHOR/TAC+: (2893174055): send AV service=shell
6d22h: AAA/AUTHOR/TAC+: (2893174055): send AV cmd*
6d22h: AAA/AUTHOR (2893174055): Post authorization status = ERROR
6d22h: AAA/AUTHOR/EXEC: (2893174055) Method=IF_AUTHEN
6d22h: AAA/AUTHOR (2893174055): Post authorization status = PASS_ADD
6d22h: AAA/AUTHOR/EXEC: Authorization successful
Note, the Post authorization passes because of IF_AUTHEN.
See the behavior?
Hope this helps. -
What is relation between atc1 (item master attachment) and item master.
hi.
i am having some problem.
ie.
what is the relation between atc1 and item master header....
i want to execute the below query.... and i want to get the line no from the sql.
if u ask what is the difficulty..
one.jpg may be two items can upload ...the same image. i can not filter based on the file name
select Line from atc1 where FileName ='one.jpg'
is it possible like
select Line from atc1 where FileName ='one.jpg' and itemcode='one'Hi,
Try this:
SELECT T1.[Line] FROM OITM T0 left join ATC1 T1 on T1.[AbsEntry] = T0.[AtcEntry] WHERE T1.[FileName] =[%0]
It will displace name of the file which is attached to item master.
Thanks & Regards,
Nagarajan -
Relation among pld pll plx fmb and fmx
Hi,
Im currious in knowing the relationship among the following file types in $APPL_TOP:-
pld pll plx fmb and fmx. Also is there a one-to-one, one-to-many or many-to-one relationship betwween the pl* s and the fm*
Pl let me know
ThanksYou can use General EBS forum General EBS Discussion for these kind of doubts.
--Shiv -
Normally reach a data base through a sign-in panel provided by the
library. When using experienced an interruption, then what was a
different method of accessing the data base appeared. The next
attempt to log in some days later put me in on "terms of use" page
with no further links.
Could sign on correctly using a different browser on my linux account, and using Firefox on my wife's linux account, but not using
Firefox on my account. Clearing cookies under the options given
in the tools "Clear Recent History" did not work. Finally fixed
problem by deleting the tab I had been using when interrupted.
Don't need a fix, as I'm back on track. But would appreciate
some explanation of what my tab was doing.
tools option didNormally reach a data base through a sign-in panel provided by the
library. When using experienced an interruption, then what was a
different method of accessing the data base appeared. The next
attempt to log in some days later put me in on "terms of use" page
with no further links.
Could sign on correctly using a different browser on my linux account, and using Firefox on my wife's linux account, but not using
Firefox on my account. Clearing cookies under the options given
in the tools "Clear Recent History" did not work. Finally fixed
problem by deleting the tab I had been using when interrupted.
Don't need a fix, as I'm back on track. But would appreciate
some explanation of what my tab was doing.
tools option did -
My new IMac and Macbook Pro are each loaded with Mountain Lion. Have Office for Mac also
When I try to see my Grandson on webcam out of state the login will not activate. For PC use I needed Java and Active X to let it run. My Java is checked as ready to go but nothing happens. Otherwise these are great computers. Please help me through the process. The Geniuses at my apple store can't understand what to do.
[email protected] or [email protected]By default, OS X does NOT come with Java installed nowadays. You need to open the Java Preferences app found in Utilities; when you do that the first time, it will inform you of the fact and offer to install the product for you.
Afterwards, due to a major security issue we had back in the first quarter of the year, the plugin is disabled by default. You need to revisit the Preferences and enable manually. It will auto-disable if unused in awhile.
Lastly, you may have to adjust which Java instance is being used, the 32-bit or the 64-bit. Default is 64-bit, but some applets crash & burn or outright refuse to run in such a platform. You can prioritize which version you prefer by dragging on top in the Preferences. -
Relation between Prod. Hierarchy and Profit Centre
Dearest all,
does anybody know what the relation between prod. hierarchies and profit centre?
actually, i am trying to display total of actual line items (table GPCPT, if i am not wrong). The total value grouped by Profit Centre?
But I want to display them per Product hierarchies...
Question:
1. More than 1 product hierarchies could be assigned to 1 profit center, right ? (I checked in the matl master, checking all matl)
2. Could I find other way to do this ? any suggestion ?
thanks in advance,
meHi Barry,
I have tried MCSI, it displayed "no data found", what does it mean ?
Thanks in advance,
me -
I look after a number of Macs and PCs at my company. Most Macs are running the latest version of Tiger but the newest machine came with Leopard. All users log into network accounts on our Xserve, running OSX Server (Tiger). However, the Leopard client machine refuses to log in to any network account, including the one I set up specifically for the machine's user, shaking its login window at me.
Users connect using Open Directory Master on the server and none of the Tiger clients have ever had problems logging in.
On the troublesome client machine, I have bound to the server correctly in Directory Utility which declares that the server is responding normally. At the login screen I get a green light and "Network Accounts Available" when I click through the options above the user name field so I know the machine can see the server.
I can successfully log in to a local account and subsequently mount the server volumes using the new name and password I've set up for the user.
What have I missed?
So far, in my attempts to resolve this I have done the following:
Removed the password from the new account;
Unbound from the server, changed the short name of the computer, re-bound to the server;
Tried logging in to other accounts known to be working;
In WGM checked that the NFSHomeDirectory entry shows the complete path for the user's home directory;
Trawled through endless forums for clues.
Kerberos is not running. Does it need to be for authenticating Leopard users?
Is there an issue with clear text passwords in Leopard? Seemingly eliminated through a no-password test account.
I'm sure that I logged in successfully once after setting up the machine but, after installing Leopard updates, logging in has consistently failed.
Anyone else having similar problems? Better yet, anyone have any answers?No need to apologize. I learned the same way you are...
I think you may end up re-binding the 10.4 clients if you kerberize the server.
You may want to go to the server forum for folks with more definitive annswers.
http://discussions.apple.com/category.jspa?categoryID=96
In any case, make sure you have a reliable backup before you do anything.
Jeff
Message was edited by: Jeff Kelleher -
Our business involves sending out topical economic and financial research in multiple daily e-mails to our clients. We wish to prevent e-mail forwarding of this research to non-clients. While there seems to be nothing to prevent e-mail forwarding itself, we hope to control access to our research by using attached PDF files.
The solution seems to be Policy Server, but I have an initial question about client login. What exactly does it mean that clients must log in to Policy Server before they are allowed to view a PDF sent to them? Is this done automatically when the client tries to open a PDF, or must they do this prior to attempt opening the file, and must they do this before every PDF file sent to them (we send several every day). If the latter, most of our clients would object to this extra step each time. And does this mean we need to open our firewall to the server for all clients?
Thanks[email protected] wrote:
> Thanks Justin
>
> This helps a lot for us to move forward with this solution. I'm wondering, however, just how stable a server is going to be outside a firewall. I wonder if there is a port forwarding solution that would open up the firewall just to policy server requests, but still, it sounds like a not very secure situation. There must be something within an LDAP server that will secure the server.
>
> Thanks for your help!
>
> Carl Steen
One other thing...the web application should be configured to run SSL (https). This is a
requirement of Policy Server and will encrypt all communication between the client and server.
Regarding your security concerns...Policy Server doesn't need to be running on a computer outsite
the firewall...it just needs to be accessible from outside the firewall. This is how many corporate
websites are set up.
Justin Klei
Cardinal Solutions Group
www.cardinalsolutions.com -
Hi,
Maybe I bite more than I can chew but this is what I want to make. On a
small site I have to create a client login. On this website my client must
be able to generate a log&pass that sends his clients to a specific page where
they can read a comment and review 1 or 2 video clips. So he must be able to add some text and to hook up the clips.
The whole setup is small. We're talking around 5 clients logging in to 5
unique pages. Maybe even 3 will do. So client1 > can only view secure page1, client 2 >
can only view secure page 2, etc.
What is the best solution for this situation? I have little experience with
creating a secure area (only MyLocked Area) but no experience with a cms
yet. The site is hosted on a server which supports php, perl, cgi-bin and
mysql. I'm working with GL CS2, OS 10.4.11.
TIA, StoliSince it's only a few required pages it might be easiest to use an .htaccess file. If your server supports them. They are supported by Apache servers and can be created by hand or through a c-panel interface. What your doing is simply password protecting some directories. Here's a tutorial on how to do it by hand.
Set up pages like this:
main_page
subdir1/index.html
subdir2/index.html
subdir3/index.html
subdir4/index.html
subdir5/index.html
Then make htaccess files to give each each subdir it's own username/passwords.
Someone enters the main page and selects who they are. This links them to the appropriate subdir where they are asked for their proper username/password to enter. -
Hi,
I'm having problems accessing BO Web Intelligence Rich Client. Here is our setup:
- SAP BO 4.1 SP2
- Two SAP BW backends
- Authentication for the 2 BW backends configured, users and roles imported
- Two OLAP connections configured, one for each BW backend.
My problem is configuring access to our 2 backends from the WebI Rich Client. I cannot choose what backend system i want to login to.
Therefore, the system automatically logs in to one of the backends, and I cannot open objects belonging to the other backend.
What I want is something like BI Launch PAD:
It has input fields for SAP system, and therefore I can choose what backend I want to login.
I tried to deactivate the "Default System" authentication option, hoping that some popup asking for system info would show up:
CMC Home -> Authentication -> SAP -> Options
But no system popup appears, and login failed.
Any help?
ThanksYour reply was indeed very helpful, and I've already configured my systems, and its working fine.
However its not completely what I wanted, because for one system there will be a generic backend authentication, not user specific. Maybe what I want is not possible.
I will wait to see if anyone can dig further into this, but I will definitely give points.
Thanks -
ESM Client login does not appear
Hello,
It seems somethings not working as expected.
When a new user log to a workstation the ESM Client login does not appear. So the user inherits policy applied to the first user that log in with ESM Client.
On properties of the ESM client I have:
Authenticated user: [first] user that login (Local User: [Actual user logged in the workstation).
Any idea?
Thanks in advance.micgra,
It appears that in the past few days you have not received a response to your
posting. That concerns us, and has triggered this automated reply.
Has your problem been resolved? If not, you might try one of the following options:
- Visit http://support.novell.com and search the knowledgebase and/or check all
the other self support options and support programs available.
- You could also try posting your message again. Make sure it is posted in the
correct newsgroup. (http://forums.novell.com)
Be sure to read the forum FAQ about what to expect in the way of responses:
http://forums.novell.com/faq.php
If this is a reply to a duplicate posting, please ignore and accept our apologies
and rest assured we will issue a stern reprimand to our posting bot.
Good luck!
Your Novell Product Support Forums Team
http://support.novell.com/forums/
Maybe you are looking for
-
I recently rented a movie using Apple TV and it said it was going to take 7-14 hours to download so I let it run. I also received a message from apple telling me that there was a request for this movie and they took the funds. But when I tried to fin
-
Connection Error between ITS and SAP: R/3 system
Dear All, Recently we have migrated our Backend SAP: R/3 Servers to AIX/Oracle platform. The server landscape is running on two application servers and one central instance with load balancing. We have changed all RFC destinations from the SAP:R/3 an
-
Addition of a header line to a flat file using Custom Adapter Module?
Is the header that you want to add to the input file always a constant? In that case why go for a module. Directly map the required constants during the mapping to your IDoc. My suggestion is to avoid the module
-
Do I use bytes when I download music
How many bytes are used when you download music from the clouds
-
How do I get an application (Missing Sync Pocket PC) to stop launching whenever I start up my computer? I checked my preferences for startup items and it doesn't appear in that box. I also checked the preferences for the application and it's not conf