What's relation among prod client,login client and non-livecache-relevant?

Experts:
I have some questions about abve concepts:
Can a production client be non-livecache-relevant?
Can some clients that are livecache-relevant but not production client?
How many production client are allowed for SCM (only one like other SAP products?)?
Thanks!

Hi,
1) how to decide which clients should be livecache relevant?
Ans: All the clients should have LiveCache. Because the data will be fetched from livecache, the database and livecace will be having data sincronized.
2) how to decide which one should production client?
Ans: If you are asking about the number of client then it can be any. If you are asking relevant to other testing and QA then the production server will be different from the other and wich connected to OLTP system and having all the relevant business data.
3) how do I know a client is livecache-relevant Or not? Which place to verify?
Ans: as said above all the clients are livecache relevant only. You can check in the Transaction code LC10
We have a SCM PROD system with only one working client :001. We should never make it non-livecache-relevant, right?
Ans: Yes. If livecahe is not installed then SCM system will not work. The data fetch from livecache only.
When you save any data it stores in Livecache and Database.
Regards,
Kishore Reddy.

Similar Messages

  • What  type of  database  operations  effectd  with  Unicode  and  non  unic

    Hi  Friends,
       I want  to  know what  type of  database  operations  effects  with  Unicode  and  non Unicode  Programing  .
    Thanks,
    Ravi Kumar Mukkera

    Hi ,
    Check these links .
    http://help.sap.com/saphelp_nw04/helpdata/en/62/3f2cadb35311d5993800508b6b8b11/frameset.htm
    https://www.sdn.sap.com/irj/sdn/go/portal/prtoot/docs/library/uuid/ff99cb90-0201-0010-e389

  • What is the programming (ABAP) difference between Unicode and non Unicode?

    What is the programming(ABAP) difference between Unicode and non Unicode?
    Edited by: NIV on Apr 12, 2010 1:29 PM

    Hi
    The difference between programming in Unicode or not Unicode is that you should consider some adjustments to make on the Program "Z" to comply with the judgments Unicode Standard.
    In the past, developments in SAP using multiple systems to encode the characters of different alphabets. For example: ASCII, EBCDI, or double-byte code pages.
    These coding systems mostly use 1 byte per character, which can encode up to 256 characters. However, other alphabets such as Japanese or Chinese use a larger number of characters in their alphabets. That's why the system using double-byte code page, which uses 2 bytes per character.
    In order to unify the different alphabets, it was decided to implement a single coding system that uses 2 bytes per character regardless of what language is concerned. That system is called Unicode.
    Unicode is also the official way to implement ISO/IEC 10646 and is supported in many operating systems and all modern browsers.
    The way of verifying whether a program was adjusted or not, is through the execution of the UCCHECK transaction. Additionally, you can check by controlling syntax (making sure that this asset verification check Unicode).
    The main decisions to adjust / replace are (examples):
    ASSIGN H-SY-INDEX TEXT TO ASSIGN <F1> by
    H-SY-INDEX TEXT (*) TO <F1>.
    DATA INIT (50) VALUE '/'. by
    DATA INIT (1) VALUE '/'.
    DESCRIBE FIELD text LENGTH lengh2 by
    DESCRIBE FIELD text LENGTH lengh2 in character mode.
    T_ZSMY_DEMREG_V1 = record_tab by
    record_tab TO MOVE-Corresponding t_zsmy_demreg_v1.
    escape_trick = hot3. by
    escape_trick-x1 = hot3.
    itab_txt TYPE wt by
    ITAB_TXT TYPE TABLE OF TEXTPOOL
    DATA: string3 (3) TYPE X VALUE B2023 '3 'by
    DATA: string3 (6) B2023 TYPE c VALUE '3 '.
    OPEN DATASET file_name IN TEXT MODE by
    OPEN DATASET file_name FOR INPUT IN TEXT MODE ENCODING NON-UNICODE.
    or
    OPEN DATASET file_name FOR INPUT IN TEXT MODE ENCODING DEFAULT.
    CODE FROM PAGE TRANSLATE a_codepage record by
    record TRANSLATE USING a_codepage.
    CALL FUNCTION 'DOWNLOAD' by
    CALL METHOD cl_gui_frontend_services => gui_download
    CALL FUNCTION 'WS_DOWNLOAD' by
    CALL METHOD cl_gui_frontend_services => gui_download
    CALL FUNCTION 'UPLOAD' by
    CALL METHOD cl_gui_frontend_services => gui_upload
    CALL FUNCTION 'WS_UPLOAD' by
    CALL METHOD cl_gui_frontend_services => gui_upload
    PERFORM USING HEAD APPEND_XFEBRE +2. by
    PERFORM USING HEAD APPEND_XFEBRE +2 (98).
    Best Regars
    Fabio Rodriguez

  • Client based settings and non-client based settings

    Can I knwo what is the client based settings and what are the non-client based settings.

    Hi,
    Slight error in you question:
    There are 2 settings:
    1. Client specific: These are customising settings which impact only in the client you are making the changes in.  Let us say that in an instance you have 2 clients, 800 and 900.  When you change a client specific setting in 900, it is not reflected in client 800.  This is beacuse the table where this setting is stored contains the client as one of the fields.
    2.  Cross Client settings:  Here, a change in one client is also replected in all the clients in that installation.  Needless to say, the tables for these settings will not have client as one of the fields.
    Cheers

  • What is the difference between authorisation if-authenticated and none

    Hello,
    I am working on a AAA configuration, and can't determine the practical difference between authorisation none and authorisation if-authenticated.
    I realise the obvious difference, that if TACACS is down, with none there is no authorisation if none is used; and if TACACS is down authorisation will allow all commands if if-authenticated is used.
    However, since you must always be authenticated, before authorisation commences, in practical terms, there is no difference that I can see between if-authenticated and none? Can anyone please explain if there is a practical difference between them.
    #####################Authorisation if-authenticated#############
    aaa authorization exec default group tacacs+ if-authenticated
    aaa authorization commands 1 default group tacacs+ if-authenticated
    aaa authorization commands 15 default group tacacs+ if-authenticated
    #####################Authorisation none##################
    aaa authorization exec default group tacacs+ none
    aaa authorization commands 1 default group tacacs+ none
    aaa authorization commands 15 default group tacacs+ none
    Many Thanks
    Ian Potts

    One use I can think of is where you have both AAA and local configured for exec or command authorization. Let's say TACACS+ in the following manner:
    aaa new-model
    aaa authentication login default tacacs+ local
    aaa authorization exec default tacacs+ if-authenticated
    username admin password
    If you had this configuration without the "if-authenticated" statement and the connection to the TAC+ server goes down or you receive an ERROR in communicating with it such as a mismatched key, then it goes to local for authentication. If you did not want to use local authorization and want it to succeed exec authorization for this local account, then the "if-authenticated" statement would be needed.
    Check out the debugs with:
    aaa new-model
    aaa authentication login default tacacs+ local
    aaa authorization exec default tacacs+ local
    AND the TAC+ server is down
    6d21h: AAA/AUTHOR/EXEC (4150549846): Port='tty2' list='' service=EXEC
    6d21h: AAA/AUTHOR/EXEC: (4150549846) user='admin'
    6d21h: AAA/AUTHOR/EXEC: (4150549846) send AV service=shell
    6d21h: AAA/AUTHOR/EXEC: (4150549846) send AV cmd*
    6d21h: AAA/AUTHOR/EXEC (4150549846) found list "default"
    6d21h: AAA/AUTHOR/EXEC: (4150549846) Method=TACACS+
    6d21h: AAA/AUTHOR/TAC+: (4150549846): user=admin
    6d21h: AAA/AUTHOR/TAC+: (4150549846): send AV service=shell
    6d21h: AAA/AUTHOR/TAC+: (4150549846): send AV cmd*
    core7200-4#
    6d21h: AAA/AUTHOR (4150549846): Post authorization status = ERROR
    6d21h: AAA/AUTHOR/EXEC: (4150549846) Method=NOT_SET
    6d21h: AAA/AUTHOR/EXEC: (4150549846) no methods left to try
    6d21h: AAA/AUTHOR (4150549846): Post authorization status = FAIL
    6d21h: AAA/AUTHOR/EXEC: Authorization FAILED
    NOTE, Post authorization fails because there is no method set for EXEC for the local user. Now, put in "if-authenticated" and test again:
    aaa new-model
    aaa authentication login default tacacs+ local
    aaa authorization exec default tacacs+ if-authenticated
    6d22h: AAA/AUTHOR/EXEC (2893174055): Port='tty2' list='' service=EXEC
    6d22h: AAA/AUTHOR/EXEC: (2893174055) user='admin'
    6d22h: AAA/AUTHOR/EXEC: (2893174055) send AV service=shell
    6d22h: AAA/AUTHOR/EXEC: (2893174055) send AV cmd*
    6d22h: AAA/AUTHOR/EXEC (2893174055) found list "default"
    6d22h: AAA/AUTHOR/EXEC: (2893174055) Method=TACACS+
    6d22h: AAA/AUTHOR/TAC+: (2893174055): user=admin
    6d22h: AAA/AUTHOR/TAC+: (2893174055): send AV service=shell
    6d22h: AAA/AUTHOR/TAC+: (2893174055): send AV cmd*
    6d22h: AAA/AUTHOR (2893174055): Post authorization status = ERROR
    6d22h: AAA/AUTHOR/EXEC: (2893174055) Method=IF_AUTHEN
    6d22h: AAA/AUTHOR (2893174055): Post authorization status = PASS_ADD
    6d22h: AAA/AUTHOR/EXEC: Authorization successful
    Note, the Post authorization passes because of IF_AUTHEN.
    See the behavior?
    Hope this helps.

  • What is relation between atc1 (item master attachment) and item master.

    hi.
    i am having some problem.
    ie.
    what is the relation between atc1 and  item master header....
    i want to execute the below query.... and i want to get the line no from the sql.
    if u ask what is the difficulty..
    one.jpg may be two items can upload ...the same image. i can not filter based on the file name
    select Line from  atc1  where  FileName ='one.jpg'
    is it possible like
    select Line from  atc1  where  FileName ='one.jpg' and itemcode='one'

    Hi,
    Try this:
    SELECT T1.[Line] FROM OITM T0 left join ATC1 T1 on  T1.[AbsEntry]  =  T0.[AtcEntry] WHERE T1.[FileName]  =[%0]
    It will displace name of the file which is attached to item master.
    Thanks & Regards,
    Nagarajan

  • Relation among pld pll plx fmb and fmx

    Hi,
    Im currious in knowing the relationship among the following file types in $APPL_TOP:-
    pld pll plx fmb and fmx. Also is there a one-to-one, one-to-many or many-to-one relationship betwween the pl* s and the fm*
    Pl let me know
    Thanks

    You can use General EBS forum General EBS Discussion for these kind of doubts.
    --Shiv                                                                                                                                                                                                                                               

  • Not realizing clearing cookies didn't effect some tab history - couldn't reach a previously accessable site regardless of what route I got to the login window and only cured by removing offending tab - Is there a better way?

    Normally reach a data base through a sign-in panel provided by the
    library. When using experienced an interruption, then what was a
    different method of accessing the data base appeared. The next
    attempt to log in some days later put me in on "terms of use" page
    with no further links.
    Could sign on correctly using a different browser on my linux account, and using Firefox on my wife's linux account, but not using
    Firefox on my account. Clearing cookies under the options given
    in the tools "Clear Recent History" did not work. Finally fixed
    problem by deleting the tab I had been using when interrupted.
    Don't need a fix, as I'm back on track. But would appreciate
    some explanation of what my tab was doing.
    tools option did

    Normally reach a data base through a sign-in panel provided by the
    library. When using experienced an interruption, then what was a
    different method of accessing the data base appeared. The next
    attempt to log in some days later put me in on "terms of use" page
    with no further links.
    Could sign on correctly using a different browser on my linux account, and using Firefox on my wife's linux account, but not using
    Firefox on my account. Clearing cookies under the options given
    in the tools "Clear Recent History" did not work. Finally fixed
    problem by deleting the tab I had been using when interrupted.
    Don't need a fix, as I'm back on track. But would appreciate
    some explanation of what my tab was doing.
    tools option did

  • HT5268 Just purchased Imac and Macbook pro and upgrades to Mountain Lion. Java will not run with one important site where my Grandson is in Kindergarten out of state with in room camera. What to do. This is very disappointing and non of apple geniuses kno

    My new IMac and Macbook Pro are each loaded with Mountain Lion. Have Office for Mac also
    When I try to see my Grandson on webcam out of state the login will not activate. For PC use I needed Java and Active X to let it run. My Java is checked as ready to go but nothing happens. Otherwise these are great computers. Please help me through the process. The Geniuses at my apple store can't understand what to do.
    [email protected] or [email protected]

    By default, OS X does NOT come with Java installed nowadays. You need to open the Java Preferences app found in Utilities; when you do that the first time, it will inform you of the fact and offer to install the product for you.
    Afterwards, due to a major security issue we had back in the first quarter of the year, the plugin is disabled by default. You need to revisit the Preferences and enable manually. It will auto-disable if unused in awhile.
    Lastly, you may have to adjust which Java instance is being used, the 32-bit or the 64-bit. Default is 64-bit, but some applets crash & burn or outright refuse to run in such a platform. You can prioritize which version you prefer by dragging on top in the Preferences.

  • Relation between Prod. Hierarchy and Profit Centre

    Dearest all,
    does anybody know what the relation between prod. hierarchies and profit centre?
    actually, i am trying to display total of actual line items (table GPCPT, if i am not wrong). The total value grouped by Profit Centre?
    But I want to display them per Product hierarchies...
    Question:
    1. More than 1 product hierarchies could be assigned to 1 profit center, right ? (I checked in the matl master, checking all matl)
    2. Could I find other way to do this ? any suggestion ?
    thanks in advance,
    me

    Hi Barry,
    I have tried MCSI, it displayed "no data found", what does it mean ?
    Thanks in advance,
    me

  • Leopard client login problem (Tiger server)... why can't I authenticate?

    I look after a number of Macs and PCs at my company. Most Macs are running the latest version of Tiger but the newest machine came with Leopard. All users log into network accounts on our Xserve, running OSX Server (Tiger). However, the Leopard client machine refuses to log in to any network account, including the one I set up specifically for the machine's user, shaking its login window at me.
    Users connect using Open Directory Master on the server and none of the Tiger clients have ever had problems logging in.
    On the troublesome client machine, I have bound to the server correctly in Directory Utility which declares that the server is responding normally. At the login screen I get a green light and "Network Accounts Available" when I click through the options above the user name field so I know the machine can see the server.
    I can successfully log in to a local account and subsequently mount the server volumes using the new name and password I've set up for the user.
    What have I missed?
    So far, in my attempts to resolve this I have done the following:
    Removed the password from the new account;
    Unbound from the server, changed the short name of the computer, re-bound to the server;
    Tried logging in to other accounts known to be working;
    In WGM checked that the NFSHomeDirectory entry shows the complete path for the user's home directory;
    Trawled through endless forums for clues.
    Kerberos is not running. Does it need to be for authenticating Leopard users?
    Is there an issue with clear text passwords in Leopard? Seemingly eliminated through a no-password test account.
    I'm sure that I logged in successfully once after setting up the machine but, after installing Leopard updates, logging in has consistently failed.
    Anyone else having similar problems? Better yet, anyone have any answers?

    No need to apologize. I learned the same way you are...
    I think you may end up re-binding the 10.4 clients if you kerberize the server.
    You may want to go to the server forum for folks with more definitive annswers.
    http://discussions.apple.com/category.jspa?categoryID=96
    In any case, make sure you have a reliable backup before you do anything.
    Jeff
    Message was edited by: Jeff Kelleher

  • Client Login Procedure

    Our business involves sending out topical economic and financial research in multiple daily e-mails to our clients. We wish to prevent e-mail forwarding of this research to non-clients. While there seems to be nothing to prevent e-mail forwarding itself, we hope to control access to our research by using attached PDF files.
    The solution seems to be Policy Server, but I have an initial question about client login. What exactly does it mean that clients must log in to Policy Server before they are allowed to view a PDF sent to them? Is this done automatically when the client tries to open a PDF, or must they do this prior to attempt opening the file, and must they do this before every PDF file sent to them (we send several every day). If the latter, most of our clients would object to this extra step each time. And does this mean we need to open our firewall to the server for all clients?
    Thanks

    [email protected] wrote:
    > Thanks Justin
    >
    > This helps a lot for us to move forward with this solution. I'm wondering, however, just how stable a server is going to be outside a firewall. I wonder if there is a port forwarding solution that would open up the firewall just to policy server requests, but still, it sounds like a not very secure situation. There must be something within an LDAP server that will secure the server.
    >
    > Thanks for your help!
    >
    > Carl Steen
    One other thing...the web application should be configured to run SSL (https). This is a
    requirement of Policy Server and will encrypt all communication between the client and server.
    Regarding your security concerns...Policy Server doesn't need to be running on a computer outsite
    the firewall...it just needs to be accessible from outside the firewall. This is how many corporate
    websites are set up.
    Justin Klei
    Cardinal Solutions Group
    www.cardinalsolutions.com

  • Client login +cms

    Hi,
    Maybe I bite more than I can chew but this is what I want to make. On a
    small site I have to create a client login. On this website my client must
    be able to generate a log&pass that sends his clients to a specific page where
    they can read a comment and review 1 or 2 video clips. So he must be able to add some text and to hook up the clips.
    The whole setup is small. We're talking around 5 clients logging in to 5
    unique pages. Maybe even 3 will do. So client1 > can only view secure page1, client 2 >
    can only view secure page 2, etc.
    What is the best solution for this situation? I have little experience with
    creating a secure area (only MyLocked Area) but no experience with a cms
    yet. The site is hosted on a server which supports php, perl, cgi-bin and
    mysql. I'm working with GL CS2, OS 10.4.11.
    TIA, Stoli

    Since it's only a few required pages it might be easiest to use an .htaccess file. If your server supports them. They are supported by Apache servers and can be created by hand or through a c-panel interface. What your doing is simply password protecting some directories. Here's a tutorial on how to do it by hand.
    Set up pages like this:
    main_page
          subdir1/index.html
         subdir2/index.html
         subdir3/index.html
         subdir4/index.html
         subdir5/index.html
    Then make htaccess files to give each each subdir it's own username/passwords.
    Someone enters the main page and selects who they are. This links them to the appropriate subdir where they are asked for their proper username/password to enter.

  • Web Rich Client Login

    Hi,
    I'm having problems accessing BO Web Intelligence Rich Client. Here is our setup:
    - SAP BO 4.1 SP2
    - Two SAP BW backends
    - Authentication for the 2 BW backends configured, users and roles imported
    - Two OLAP connections configured, one for each BW backend.
    My problem is configuring access to our 2 backends from the WebI Rich Client. I cannot choose what backend system i want to login to.
    Therefore, the system automatically logs in to one of the backends, and I cannot open objects belonging to the other backend.
    What I want is something like BI Launch PAD:
    It has input fields for SAP system, and therefore I can choose what backend I want to login.
    I tried to deactivate the "Default System" authentication option, hoping that some popup asking for system info would show up:
    CMC Home -> Authentication -> SAP -> Options
    But no system popup appears, and login failed.
    Any help?
    Thanks

    Your reply was indeed very helpful, and I've already configured my systems, and its working fine.
    However its not completely what I wanted, because for one system there will be a generic backend authentication, not user specific. Maybe what I want is not possible.
    I will wait to see if anyone can dig further into this, but I will definitely give points.
    Thanks

  • ESM Client login does not appear

    Hello,
    It seems somethings not working as expected.
    When a new user log to a workstation the ESM Client login does not appear. So the user inherits policy applied to the first user that log in with ESM Client.
    On properties of the ESM client I have:
    Authenticated user: [first] user that login (Local User: [Actual user logged in the workstation).
    Any idea?
    Thanks in advance.

    micgra,
    It appears that in the past few days you have not received a response to your
    posting. That concerns us, and has triggered this automated reply.
    Has your problem been resolved? If not, you might try one of the following options:
    - Visit http://support.novell.com and search the knowledgebase and/or check all
    the other self support options and support programs available.
    - You could also try posting your message again. Make sure it is posted in the
    correct newsgroup. (http://forums.novell.com)
    Be sure to read the forum FAQ about what to expect in the way of responses:
    http://forums.novell.com/faq.php
    If this is a reply to a duplicate posting, please ignore and accept our apologies
    and rest assured we will issue a stern reprimand to our posting bot.
    Good luck!
    Your Novell Product Support Forums Team
    http://support.novell.com/forums/

Maybe you are looking for