Why do we need to specify Role baseprovider and membership provider in Central Admin and security config files?

Hi,
why do we need to specify role base provider and membership provider files in central admin and securiy config files.
thanks,
gaurav

We use 3 settings in Forms based auth:
1 Membership = This contains Users and groups information. (This table also has username and password)
2 ConnectionString = Connetion details to connect to database is stored here(servername, databasename, username, password, port )
3 Role = This table contains all the Roles (Admin, contibutor, etc of the data source)

Similar Messages

  • Why do i need to enter the credit card information for downloading free apps and redeem the codes?

    getting a message says apple id has not yet been used with the itunes store while trying to download apps
    why do i need to enter the credit card information for downloading free apps and redeem the codes?

    As a security precaution, Apple verifies your billing credentials with every transaction whether paid or free apps or using the balance of a redeemed code.

  • Why do you need to enable http communication with Basic authentication with Exchange Admin IP?

    The pre-reqs for the Exchange Admin IP say you have to make a few changes on your Exchange server (2010 on prem in my case). I have a few questions about those pre-reqs and I'm not able to find documentation online to help:
    Why does http communication with basic authentication for the powershell virtual directory in IIS need to be enabled? In the IP you still specify to connect over an SSL connection. The concern is what is being sent over unencrypted and what impacts are
    there to the security of the Exchange server.
    What role does the IP connect to (MBX/CAS/HT)? I'm not an Exchange guy so I don't know which roles install the PowerShell virtual directory.
    Are there any technet pages or white papers that talk about the MS developed IPs in any more detail than basic config?
    I appreciate any help anyone can offer. Thanks!
    -Raj

    Yeah I find this perplexing as well. I'm guessing it has something to do with Opalis origins perhaps.
    Would be good to understand why.

  • Why do we need UPA for rehydrating users in Sharepoint provider hosted app scenario?

    Our on prem. SPS 2013 environment is configged to authenticate through ADFS against a third party IDP. We know nothing about these users, the returned SAML contains a role and based on this role we authorize user in SPS. This works great.
    No we are investigating high-trust provider hosted apps (on prem, no azure acs). We have created a simple MVC, and configged it to use ADFS. Now if users are authenticated from SPS they can call the MVC and the ADFS token is reused. Works perfect. Only thing
    is that whenever we need to call Sharepoint code through the client objectmodel, we get a 401 and the ULS shows that SPS is not able to map the incoming user to a user in User Profile DB. Off course it can't because the user is not in UPA and cannot be in
    UPA beacuse the users are stored outside our domain and there is no way to sync these to our SPS environment. I read a couple of blogs about this issue and the all say that we ned to sync with the user repository to fill upa; but again that cannot be (suppose
    on of our IDP's was facebook...?)
    The construction works if we use apponly security, but now we lose our SPS security. So my real question is, can we some how workaround User Profile service in the scenario, or at least without needing to sync these users.
    Any help/guidance is much appreciated!
    Sander

    Hi John,
    No we were not able to find a solution. The provider hosted app-model of SPS 2013 just does not take into account that in some cases useraccounts are not available. We could not find a way around user rehydration. Off course you can all ways use another
    security model like app-only policies, but that was not sufficient for us. It was also kind of disappointing there was no way to handle this; th emost problematic for me personal is that I cannot think of a reason why the rehydration can not be skipped in
    some way. If you configure it to run within SPS itself, rehydration is not necessary, so why it seams mandatory in provider hosted app beats me ;-)
    We went back to good old farm-solutions with webparts. 
    Sorry 
    Sander

  • Why do i need three? - Google Talk Plugin, Google talk plugin video renderer and Google talk plugin video accelerator?

    When I check my plugins, the following three, very closely related (in my mind) plugins are listed, and the "Renderer" still shows "Research" when checking to see if it is Up-To-Date. It seems to me I don't need all three. I tried removing the Renderer (yes, I know how to do that safely), but Google seems to continue to reinstall it (with one or both of the other two...?)...I'll ask this on a Google Forum too, since it's their product, but wondered if anyone has any insight. I obsess about plugins that need "Research" - Thanks!
    Google Talk Plugin Video Accelerator version:0.1.44.24
    Google Talk Plugin Version 3.15.2.12038
    Google Talk Plugin Video Renderer Version 3.15.2.12038

    Went to Google Talk Help and found advice to remove the "googletalkplugin_port file on [my] computer."
    http://support.google.com/chat/bin/static.py?hl=en&page=known_issues.cs ... and click "Voice and video plug-in unrecognized" under "Currently Known Issues"....
    Now, the only Google Talk plugin I have in Firefox is
    Google Talk Plugin Video Renderer
    Version 3.15.2.12038
    ...but it does indeed remain "Unrecognized" by Mozilla/Firefox...

  • Why do we need a Outlook message header that takes up half the screen and how do we get rid of it?

    Tad Anderson

    This is a joke, when is this going to be fixed?
    We are in the 21st Century, MS is the world's leading software company, we are at the peak of human development, technology and knowledge - and yet someone thinks it is OK to waste 50% of our very expensive standard computer screens with junk!! I am
    partially sight-impaired and I need as much text space as possible. It took me a long time to be able to afford my new ultrabook with 365 and now it is near impossible for me to communicate with the outside world. What were you thinking? Please advise when
    this will be fixed? Mark

  • Why do I need a CC to buy when I have a Mac account AND itunes gc?

    I don't get it, I can't register for a new account WITHOUT a credit card, and I can't return my itunes gift card!!!
    Help!!!

    Open iTunes.
    Select the Store.
    At the top right, click on Redeem.
    Input the card number and it will ask the create a new account or use an existing account. Select Create new account.

  • HT1338 I have a Callaway range finder and need a software update and they provided the following directions and have changed the Java runtime versions several times to get their exe to update.Hello Doug,  Thank you for contacting Callaway uPro Technical S

    Hello Doug,
    Thank you for contacting Callaway uPro Technical Support.
    Please follow the instructions below to sync your upro mx/mx+ with your computer and update to the latest software - 3.1.005.
    1. Ensure the upro sync software is running on your computer (you will see a black icon at the bottom right of your screen by the clock with a Callaway logo in it).
    2. Plug your device into your computer; select Sync then PC.
    3. The sync software should initialize and launch the uxplore website. If you haven't installed the upro sync software you can download it Here:http://www.callawayuxplore.com/downloads/
    4. Download this: http://media.callawaygolf.com/webupdate/callawaygolf/2012/products/accessories/u pro/upro-mx-plus/downloads/3_1_005_launch.jnlp.zip
    5. Double click "3_1_005_launch," then click the green START button
    NOTE: If you get a "Unable to launch application" error please follow the instructions below.
    1a. Navigate to "Control Panel" through the start menu located in the bottom left of your screen.
    2a. Find and uninstall any "Java" applications. After uninstalling please go back to the start menu and right click on "Computer" or "My Computer" and select "Properties". In the right half of the pop up windows it'll say the Operating system your computer is running. If it says x64 bit click: http://tinyurl.com/lhkps2rto download the correct java for your computer. If it doesn't have a number please click: http://tinyurl.com/qysyctb to download the correct Java.
    3a. Once the correct Java is installed please follow steps 1-5 listed above.
    4a. To update your Java back to 7 please click: http://java.com/en/download/index.jsp. Once on the page select "Free Java Download" to run the download (Make sure to uncheck any Mcafee or toolbar installations during the installation).
    Once the update has completed the device will restart itself. At that time you can unplug it or select Sync and PC to launch the uxplore site again to continue syncing courses.
    NOTE: Do not try to sync courses to the unit while the update is running or both processes will fail. 

    Java isn't a part of the Mac OS X anymore, so you will need to install a version of Java. However, I don't know what version of java is required for this software. You need to explain to their support that you are using a Mac and what OS you are running. Download the latest java and see if that works.

  • For adobe acrobat plug in why do I need MacAfee since I already have CA security on my computer?

    For adobe acrobat plug in why do I need to agree to also have McAfee since I already have CA security on my computer?

    hello, i think this an optional bundling added by adobe - you should uncheck that download option when you don't need it.

  • Why do I need brarchive ?

    Hi,
    Few questions about db2 log archiving.
    We have TSM server in our enterprise and use it to store db2 backups and db2 logs. We have "TSM for Enterprise Resource Planning" software installed. As I understand this is like TSM client and we use it for full backups (db2 backup standard command contains path to this software directory), also there is "TSM for Enterprise Resource Planning" tool called backom which allows to backup, restore, view full backups and logs.
    Having all this software looks enough to backup logs - but our log backup script uses brarchive command. Few questions.
    1. Why do we need brarchive if we have "TSM for Enterprise Resource Planning" software and it's interface backom ? Maybe brarchive does something extra ?
    2. Does brarchive uses "TSM for Enterprise Resource Planning"  client or connects to TSM server using other methods ?
    3. What is relation of ADMPRODDB database which resides in the same db directory as PRODDB, and brarchive ?
    4. Where can I find any brarchive documentation ?
    thanks
    Vilius
    Edited by: Vilius Mockunas on Apr 2, 2009 3:04 PM
    Edited by: Vilius Mockunas on Apr 2, 2009 3:07 PM

    If you use DB2 UDB 8.2 or higher with the new logfile management [https://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/280b4546-0a01-0010-7d8c-82abb2296e1c|https://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/280b4546-0a01-0010-7d8c-82abb2296e1c] you do not need to care about brarchive.
    brarchive existed to archive logfiles that were already moved off the online directory (to another directory named ~db2<sid>/log_archive/...) to tape / external storage. As of version 8.2, Db2 includes a logfile management that makes the use of brarchive obsolete.
    Malte

  • Why are Symmetric keys shorter than ASyemmetric keys and provide the same level of security.

    Hello
    Can someone please help me with the following question.
    Can someone please give me a brief (if possible) why Symmetric Keys which are much shorter than Asymmetric keys provide a similar level of security (e.g. take as long to crack).
    I understand RSA and can to the math with a piece of paper and the Windows advanced calculator (e.g. encrypt and decrypt a sort message using a couple of small prims likes 53 and 59).
    I also understand ( to a very basic level) AES e.g. 128bit block cypher (I believe a CBC cypher using an unpredictable IV)
    Is there a simple answer if someone says why are Symmetric keys shorted and just as secure or it is just how it is? due to the different math?
    Thank you
    AAnoterUser__
    AAnotherUser__

    Symmetric Key is used for same key for encrypsion & decryption but ASyemmetric key is used two keys (Public & private key) for
    encrysion & decryption.
    ASyemmetric
    1. If Public key is used for  encrypsion then private key is used for decryption
    2. If private key is is used for  encrypsion then public key is used for decryption.
    3. It is more secure than Syemmetric
    Regards,
    Biswajit
    MCTS, MCP 2003,MCSA 2003, MCSA:M 2003, CCNA, Enterprise Admin, ITIL F 2011
    Blog:
      Script Gallary:
      LinkedIn:
    Note: Disclaimer: This posting is provided & with no warranties or guarantees and confers no rights..

  • Why does RMI client needs to specify codebase

    Anyone,
    I'm trying out a dynamic class loading tutorial.
    my question is why does the client need to define
    java.rmi.server.codebase.
    I can understand why the server needs it, as it is downloading classes
    it does not have information about. But why does the client need to specify the codebase

    The client has to annotate the codebase property if it is calling remote methods with parameters, whose subtypes are not defined in the server. This way server has a change to dynamically locate and load those classes from specified codebase.

  • Help !!! why does the client need to specify codebase

    Anyone,
    I'm trying out a dynamic class loading tutorial.
    my question is why does the client need to define
    java.rmi.server.codebase.
    I can understand why the server needs it, as it is downloading classes
    it does not have information about. But why does the client need to specify the codebase

    Lets say you have a Remote interface with a method:
    void compute(Task task);
    Now, the clients of this remote interface want supply
    a zillion of custom tasks to be executed on the
    server, but how the hell the server knows where to get
    the actual classes for those tasks?You fool. its for the server to hand the client the reference to a stub, or to specify FOR the client where the stubs are, so that the CLIENT can get a reference to them, to make the call.
    This is where the
    client codebase comes to the scene. Client codebase......you mean codebase info that is sent TO the client, so it can find the classes.
    A client annotates
    it and it gets written to the manifest part of any
    serializable object (Task implentation) being passed
    over then net so the server could find and download
    the actual class of the object.
    Rubbish.
    I hope I made myself clear. as mud.
    You might want to check
    out this link also:
    http://java.sun.com/products/jdk/1.2/docs/guide/rmi/cod
    base.htmlI read this and i still dont see anything about CLIENT codebase. I see stuff about codebase, and the server trying to make the client aware of where it can get the relevant classes.
    What a fool you are. Dont bother replying. I have had enough of your autocratic rubbish.
    >

  • Why do I need to pass params. to getConnection when using OracleDataSource?

    Hi,
    I've been experimenting with Tomcat 5.5 and using Oracle proxy sessions. After many false starts, I finally have something working, but I have a question about some of the code.
    My setup:
    In <catalina_home>/conf/server.xml I have this section:
    <Context path="/App1" docBase="App1"
    debug="5" reloadable="true" crossContext="true">
    <Resource name="App1ConnectionPool" auth="Container"
    type="oracle.jdbc.pool.OracleDataSource"
    driverClassName="oracle.jdbc.driver.OracleDriver"
    factory="oracle.jdbc.pool.OracleDataSourceFactory"
    url="jdbc:oracle:thin:@127.0.0.1:1521:oddjob"
    username="app1" password="app1" maxActive="20" maxIdle="10"/>
    </Context>
    In my App directory, web.xml has:
    <resource-ref>
    <description>DB Connection</description>
    <res-ref-name>App1ConnectionPool</res-ref-name>
    <res-type>oracle.jdbc.pool.OracleDataSource</res-type>
    <res-auth>Container</res-auth>
    </resource-ref>
    And finally, my java code:
    package web;
    import oracle.jdbc.pool.OracleDataSource;
    import oracle.jdbc.driver.OracleConnection;
    import javax.naming.*;
    import java.sql.SQLException;
    import java.sql.ResultSet;
    import java.sql.Statement;
    import java.util.Properties;
    public class ConnectionPool {
    String message = "Not Connected";
    public void init() {
    OracleConnection conn = null;
    ResultSet rst = null;
    Statement stmt = null;
    try {
    Context initContext = new InitialContext();
    Context envContext = (Context) initContext.lookup("java:/comp/env");
    OracleDataSource ds = (OracleDataSource) envContext.lookup("App1ConnectionPool");
    message = "Here.";
    if (envContext == null)
    throw new Exception("Error: No Context");
    if (ds == null)
    throw new Exception("Error: No DataSource");
    if (ds != null) {
    message = "Trying to connect...";
    conn = (OracleConnection ) ds.getConnection("app1","app1");
    Properties prop = new Properties();
    prop.put("PROXY_USER_NAME", "xxx/yyy");
    if (conn != null) {
    message = "Got Connection " + conn.toString() + ", ";
              conn.openProxySession(OracleConnection.PROXYTYPE_USER_NAME,prop);
    stmt = conn.createStatement();
    //rst = stmt.executeQuery("SELECT 'Success obtaining connection' FROM DUAL");
    rst = stmt.executeQuery("SELECT count(*) from sch_header");
    if (rst.next()) {
    message = "# of NJ schools: " + rst.getString(1);
    rst.close();
    rst = null;
    stmt.close();
    stmt = null;
    conn.close(); // Return to connection pool
    conn = null; // Make sure we don't close it twice
    } catch (Exception e) {
    e.printStackTrace();
    } finally {
    // Always make sure result sets and statements are closed,
    // and the connection is returned to the pool
    if (rst != null) {
    try {
    rst.close();
    } catch (SQLException e) {
    rst = null;
    if (stmt != null) {
    try {
    stmt.close();
    } catch (SQLException e) {
    stmt = null;
    if (conn != null) {
    try {
    conn.close();
    } catch (SQLException e) {
    conn = null;
    public String getMessage() {
    return message;
    My question concerns this line of code:
    conn = (OracleConnection ) ds.getConnection("app1","app1");
    Why do I need to pass in the user name/password? Other examples, that I see simply have:
    conn = (OracleConnection ) ds.getConnection();
    But when I use this code, I get the following error:
    java.sql.SQLException: invalid arguments in call
         at oracle.jdbc.driver.DatabaseError.throwSqlException(DatabaseError.java:112)
         at oracle.jdbc.driver.DatabaseError.throwSqlException(DatabaseError.java:146)
         at oracle.jdbc.driver.DatabaseError.throwSqlException(DatabaseError.java:208)
         at oracle.jdbc.driver.T4CConnection.logon(T4CConnection.java:236)
         at oracle.jdbc.driver.PhysicalConnection.<init>(PhysicalConnection.java:414)
         at oracle.jdbc.driver.T4CConnection.<init>(T4CConnection.java:165)
         at oracle.jdbc.driver.T4CDriverExtension.getConnection(T4CDriverExtension.java:35)
         at oracle.jdbc.driver.OracleDriver.connect(OracleDriver.java:801)
         at oracle.jdbc.pool.OracleDataSource.getPhysicalConnection(OracleDataSource.java:297)
         at oracle.jdbc.pool.OracleDataSource.getConnection(OracleDataSource.java:221)
         at oracle.jdbc.pool.OracleDataSource.getConnection(OracleDataSource.java:165)
         at web.ConnectionPool.init(ConnectionPool.java:32)
    ... more follows, but I trimmed to keep posting shorter :-)
    Is there anyway that I can avoid having to pass the user/password to getConnection()? It seems that I should be able to control the user/password used to establish the connection pool directly in the server.xml file and not have to supply it again in my java code. In earlier experiments when I was using "import java.sql.*" and using it's DataSource, I can use getConnection() without having to pass user/password, but then the Oracle Proxy methods don't work.
    I'm a java newbie so I guess that I should be happy that I finally figured out how to get proxy connections working. However it seems that I am missing something and I want this code to be as clean as possible.
    If anyone can point me to a better method of using connection pools and proxy sessions, I would appreciate it.
    Thanks,
    Alan

    Hi,
    Thanks for the replies.
    Avi, I'm not really sure what you are getting at with the setConnectionProperties. I looked at the javadoc and saw that I can specify user/password, but since I'm using a connection pool, shouldn't my Datasource already have that information?
    Maro, your comment about not having set the user/password for the Datasource is interesting. Are you referring to setting it in the server.xml configuration file? As you can see I did specify it in addition to setting the URL. In my code example, I'm not having to respecify the URL, but maybe I have a typo in my config file that is causing the username/password not to be read properly??
    The other weird thing is that I would have expected to see a pool of connections for user App1 in V$SESSION, but I see nothing. If I use a utility to repeatedly call a JSP page that makes use of my java example, then I do see v$session contain brief sessions for App1 and ADAVEY (proxy). The response time of the JSP seems much quicker than I would have expected if there wasn't some sort of physical connection already established though. Maybe this is just more evidence of not having my server.xml configured properly?
    Thanks.

  • Why do I need to use GIMP to batch process?

    Dear Adobe,
    I'm grinding through thousands of display and template images for an online retailer. Photoshop layering and masks came in quite handy when I was making the templates
    but now that it's got down to reusing those templates, I have to look elsewhere.
    1 Why does every other piece of software on the market have a batch processing section, and yet you hide yours?
    2. Why does Image Processor refuse to resize both horizontal and vertical, although it claims to? It actually refuses to distort the image to resize, which I actually want it to do. I had
    to download GIMP to get this capability, as well as to specify the output file and change the dpi. These are all included in GIMP but not Pshop. Thanks for that. And don't tell
    me to go to Actions. THat may be useful for something things, but it's hardly the optimal way to do it, recording your exact actions, and then saving or not saving, and then
    seeing what happens. The way I wanted it was in GIMP, and its pathetic that 20 years in, Pshop still doesnt have a credible batch processor, or tell me where it is now.
    Charge extra for that perhaps?
    3.What has changed in Bridge CS6 since CS4? I see absolutely nothing different, but then output is still limited to PDF and 'WEB GALLERY' a dysfunctional glob
    of code bested easily by jquery, but maybe you've impoved that end. My last experience with web gallery was so dysfunctional that I'll just stick to fixing what's
    under the hood myself. I mean web gallery used to be flash, then something else that's not current. Let's just agree its a hobbyist option. Of course,
    I don't know why 'output' might include other options for the batch processing of files, since batch rename does actually work, but you guys are the deciders.
    4. Its too bad. This job has taught me a lot of new stuff about layering, masks, and the functionality of the pattern section, which I have no great qualms with, though,
    considering how many companies you've bought, you could include tons of patterning capabilities that used to exist in these programs, but that would be too much
    expenditure from MGMT. Maybe let's just fix the window views we broke in CS4, and call it a new version.
    5. Thanks for forcing me to discover GIMP, who dont ask a thing. I dont really like being in there yet, but we'll see if that changes with time. They actually have some
    different filters and rendering options that Adobe could've included years ago for gun, but again, there's just not enough money to go around at Adobe.

    Antinet wrote:
    Thanks for both of you proving both that the function doesnt exist.
    When the Image Processor resizes image it used the Photoshop Plug-in Fit Image to do the resize.  Both height and width are resized and the image aspect ratio is preserved so the image is not distorted.  That means the image will fit within the height and width  used in the dialog.  Only image with the same aspect ratio will fill the area.  It sounds to me like you want the image the size id the height and width you entered in the dialog.  In which case you need to use Photoshop features the can accomplish that.  If you do not care the the image is distorted you use Image size check resample uncheck constrain as set the height and width you want to resize to.  If you do not want to much distortion you can try content aware resize. That will still distort the image some what but try to maintain some areas perspective it finds object in.  You can also help that process by selecting areas.  If You want no distortion you need to resize the image to fill the area and mask off  the excess to virtually crop the image the the areas aspect ratio. To automate that you need to use some Photoshop scripting. Knowledge is required to get the most out of Programs like Gimp and Photoshop.  The function doesn't exist because of your lack of knowledge.

Maybe you are looking for

  • My Firefox 6.0.1 keeps crashing over and over.

    Sometimes it will stay open and let me browse for 5 or 10 minutes. Other times it crashes after only a few seconds. It also is VERY SLOW and hangs for a long time before loading pages. This just started out of the blue. HELP!

  • Internet is working but router is not

    Hi... I just changed yesterday from Road Runner Cable internet to a local company that services my community called "EnTouch Systems." The internet works fine when I plug directly from the wall to the computer (modem that does the phone and internet

  • ClassCastException casting CallableStatement to OracleCallableStatement

    Im trying to create a ViewObject based on a REF_CURSOR returned by PL/SQL stored procedure OUT parameter. I casted the normal CallableStatement to OracleCallableStatement so I can call the OracleCallableStatement.getCursor(index); CallableStatement s

  • CS4 upgrade to CS6: where did Version Cue go?

    Ok, please pick up your jaw and clear out the cobwebs. Yes, I'm moving from CS4 to CS6. Searching has drawn no results, and guess-and-click is killing time. How does CS6 version files? Is there a utility to get CS4 Version Cue projects into CS6? I wo

  • How to remove CM movies ads

    Hi there Lately on google chrome and sometimes safari my windows are constantly being plagued with these 'CM movies ad'. They random appear on most websites and sometimes they are even video commercials that run on the side. Does someone know how to