Add under "Setting up groups" RADIUS attributes ACS 4.2

Hi Security Experts,

I need to add RADIUS attributes to a custom under the 'Groups Configuration' page provider ACS 4.2. From now on, I see of Cisco Aironet RADIUS attributes.

IETF RADIUS attributes etc in the page "setting up groups. How can I ensure that the RADIUS attributes for a provider also appear on this page?

PS: I have the useful messages rate

Thank you

Boudou

Under the "Interface", you can set which you want to view the RADIUS attributes. It is probably just a missing check for your provider.

The Options for RADIUS are described here:

http://www.Cisco.com/en/us/partner/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.2/user/guide/A_RADAtr.html

Tags: Cisco Security

Similar Questions

  • ACS 5.2 - Support for RADIUS attributes per user

    Hi all

    Does anyone know if it is possible to configure the RADIUS attributes on a per user in GBA 5.2 basis?

    That was possible under ACS 4.x, however, that I can't seem to find reference if ACS5.2 supports.

    Thank you

    Leon

    You can do this by setting by using attributes and then by substution attribute.

    You can see an example of it to set an internal user attribute to use as the value for the field address-IP-box

    This is just an example and can be applied also to any attribute RADIUS in which set an attribute of the user of the same type. Values can also be taken from an external identity as AD store

  • ACS 5.1 - profile of the authorization, the RADIUS attributes

    Hello

    I am setting up Radius AAA for cat6K switch.

    For the authentication of its work and the user can connect to. But for the assignment of a privilege level, it does not work.
    After loging in, I always get the privilege 1.

    I need your guide on how to Setup GBA 5.1, RADIUS attribute.

    I followed the document to configure the cisco-av-pair to assign 15 privilege and privilege 5, but it does not work.

    This format of the attribute has been shown in document is to define the privilege 15 "shell: priv-lvl = 15.

    Please refer to my screen shot, it's the right way to set it up on ACS 5.1

    Creation date: June 12, 2011 05:56 by: Damiano, Anisha A(ANDAMANI,279917) problem:

    =========

    Authorization does not not as expected

    Resolution:

    ============

    Adding a type of NAS-Prompt service

  • Try to set up authentication RADIUS on ASA5505 8.3

    I set up my firewall with local authentication for a regular dynamic VPN put in place, but I need to change it to authenticate with the server. The server is configured and ready to go, but I want to make sure that the firewall will also be.

    Here is my config:

    ASA # sh run
    : Saved
    :
    ASA Version 8.3 (1)

    ASA host name
    mydomain.local domain name
    activate the encrypted password of GmSL9emLLUC2J7jz
    2KFQnbNIdI.2KYOU encrypted passwd
    names of

    interface Vlan1
    nameif inside
    security-level 100
    IP 192.168.1.1 255.255.255.0

    interface Vlan2
    nameif outside
    security-level 0
    PPPoE client vpdn group pppoe_group
    IP address pppoe setroute

    interface Ethernet0/0
    switchport access vlan 2

    interface Ethernet0/1

    interface Ethernet0/2

    interface Ethernet0/3

    interface Ethernet0/4

    interface Ethernet0/5

    interface Ethernet0/6

    interface Ethernet0/7

    boot system Disk0: / asa831 - k8.bin
    passive FTP mode

    clock timezone CST - 6
    clock to summer time recurring CDT

    DNS server-group DefaultDNS
    mydomain.local domain name

    permit same-security-traffic inter-interface
    permit same-security-traffic intra-interface

    network obj_any object
    subnet 0.0.0.0 0.0.0.0

    object obj-vpnPool network
    192.168.101.0 subnet 255.255.255.0

    the SERVER01 object network
    the host 192.168. *. *

    object obj-internal network - 192.168.1.0
    subnet 192.168.1.0 255.255.255.0

    network of the SERVER02 object
    the host 192.168. *. *

    network of the SERVER03 object
    the host 192.168. *. *

    object obj-OutsideIP network
    Home 74.164.148.6

    splittunnel list standard access allowed 192.168.1.0 255.255.255.0

    access extensive list ip 192.168.101.0 outside_in allow 255.255.255.0 192.168.1.0 255.255.255.0
    access extensive list ip 192.168.1.0 outside_in allow 255.255.255.0 192.168.101.0 255.255.255.0

    outside_in list extended access permit tcp any host 192.168. *. * eq www
    outside_in list extended access permit tcp any host 192.168. *. * eq https
    outside_in list extended access permit tcp any host 192.168. *. * eq smtp

    pager lines 24
    asdm of logging of information

    Within 1500 MTU
    Outside 1500 MTU

    IP local pool vpnpool 192.168.101.50 - 192.168.101.100

    ICMP unreachable rate-limit 1 burst-size 1
    ASDM image disk0: / asdm - 524.bin
    don't allow no asdm history
    ARP timeout 14400

    NAT (inside, outside) source static obj-internal - 192.168.1.0 obj-internal - destination 192.168.1.0 static obj-vpnPool obj-vpnPool

    network obj_any object
    NAT dynamic interface (indoor, outdoor)

    the SERVER01 object network
    NAT (inside, outside) interface static tcp smtp smtp service

    network of the SERVER02 object
    NAT (inside, outside) interface static tcp www www service

    network of the SERVER03 object
    NAT (inside, outside) interface static tcp https https service

    Access-group outside_in in external interface

    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00

    dynamic-access-policy-registration DfltAccessPolicy

    the ssh LOCAL console AAA authentication
    AAA authentication LOCAL telnet console
    AAA authentication http LOCAL console

    Enable http server
    http 192.168.1.0 255.255.255.0 inside
    http 0.0.0.0 0.0.0.0 inside

    No snmp server location
    No snmp Server contact

    Community SNMP-server
    Server enable SNMP traps snmp authentication linkup, linkdown cold start

    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
    life crypto ipsec security association seconds 28800
    Crypto ipsec kilobytes of life - safety 4608000 association
    Crypto dynamic-map-RA - VPN 1 set of transformation-ESP-3DES-MD5
    Crypto dynamic-map-RA - VPN 1 set of security association lifetime seconds 28800
    cryptographic kilobytes 4608000 life of the set - the association of security of VPN - RA 1 dynamic-map
    Crypto than VPN-RA - dynamic-map 1jeu reverse-road
    Crypto map 65535 ipsec-isakmp dynamic VPN - RA RA - VPN
    RA - VPN interface card crypto outside
    crypto isakmp identity address
    crypto ISAKMP allow inside
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10
    preshared authentication
    3des encryption
    md5 hash
    Group 2
    life 86400

    crypto ISAKMP policy 65535
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400

    ISAKMP crypto 10 nat-traversal
    crypto ISAKMP ipsec-over-tcp port 1000

    Telnet 0.0.0.0 0.0.0.0 inside
    Telnet 0.0.0.0 0.0.0.0 outdoors
    Telnet timeout 60

    SSH 0.0.0.0 0.0.0.0 inside
    SSH 0.0.0.0 0.0.0.0 outdoors
    SSH timeout 60

    Console timeout 0

    management-access inside

    VPDN group pppoe_group request dialout pppoe
    VPDN group pppoe_group localname [email protected] / * /
    VPDN group ppp authentication pap pppoe_group
    VPDN username [email protected] / * / password *.

    dhcpd dns 192.168. *. * 4.2.2.2
    dhcpd lease 8400
    dhcpd ping_timeout 750
    dhcpd mydomain.local domain
    dhcpd outside auto_config

    dhcpd address 192.168.1.2 - 192.168.1.33 inside
    dhcpd allow inside

    priority queue inside
    priority-queue outdoors

    a basic threat threat detection
    Statistics-list of access threat detection

    no statistical threat detection tcp-interception
    WebVPN

    internal examplevpn group policy
    attributes of the strategy of group examplevpn
    value of server DNS 192.168. *. * 4.2.2.2
    Protocol-tunnel-VPN IPSec
    Split-tunnel-policy tunnelspecified
    value of Split-tunnel-network-list splittunnel
    mydomain.local value by default-field

    vicky 9fO.vlLc77pAFoHp of encrypted privilege 15 password username
    username otherusers encrypted password privilege 10 hhckff6QokyoRdar
    examplevpn IKg0RMHfprF6Ya3u username encrypted password

    admin DwCTJcBn.Q0dDe9z encrypted privilege 15 password username
    attributes of user admin name
    VPN-group-policy examplevpn

    type tunnel-group RA - VPN remote access
    type tunnel-group examplevpn remote access
    tunnel-group examplevpn General-attributes
    address vpnpool pool
    authorization-server-group (outside LOCAL)
    Group Policy - by default-examplevpn

    examplevpn group of tunnel ipsec-attributes
    pre-shared key *.

    Global class-card class
    match default-inspection-traffic

    class-map class_sip_tcp
    sip port tcp eq game

    class-map inspection_default
    match default-inspection-traffic

    type of policy-card inspect dns preset_dns_map
    parameters
    message-length maximum 512

    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect the skinny
    inspect sqlnet
    inspect the tftp
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the icmp
    inspect the amp-ipsec
    Review the ip options
    class class_sip_tcp
    inspect the sip

    global service-policy global_policy
    context of prompt hostname
    Cryptochecksum:3edb25d4a550f0394e8c1936ab3326ad

    Did I all I have to add / is this correct?

    RADIUS protocol AAA-server RADIUSvpn
    Max - a attempts failed 5
    AAA-server vpn (DMZ) host 172.16.1.1
    interval before new attempt-1
    timeout 30
    key cisco123

    type tunnel-group RA - VPN remote access
    General-attributes of RA - VPN Tunnel-group
    address vpnpool pool
    authentication-server-group RADIUSvpn

    I'm still relatively new to firewalls and find the overwhelming online help sometimes. Help, please

    Vicky

    Can you comapre the config with the doc and see if something may be missing?

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a00808c3c45.shtml

    Use the troubleshooting area in the doc to find the DN, I think that you are missing a part of the DN string. Sorry for the late response

  • 802. 1 x with dACL - prefix of an invalid attribute: "ACS."

    Dear all,

    I spent half an update to fix this problem without success, I hope you could help me.

    I configured a simple solution of 802. 1 x on a PC driver who must authenticate through PEAP-MSCHAPv2 users against my user database internal GBA.

    Version of the switch:

    Model number: WS-C3750V2-48PS-S

    Software: c3750-ipbasek9 - mz.122 - 52.SE.bin

    ACS:

    C1121 with version 5.3.0.40

    The problem occurs when the ACS sends within the radius Authentication accept packet the following attribute:

    Cisco-AV-pair=ACS:CiscoSecure-defined-ACL=#ACSACL#-IP-auth-4eb90704

    On the side of the switch, I see the following debug log:

    002558: 8 Nov 14:31:35.586: % AUTHMGR-5-START: start "dot1x' for the client (0022.680b.da7b) on the Interface Fa1/0/1 AuditSessionID AC1FFE4E0000003105BCDE19

    002559: 14:31:35.703 8 Nov: AAA/ATTR: prefix of an invalid attribute: "ACS."

    002560: 8 Nov 14:31:35.703: % DOT1X-5-FAIL: failure of authentication for the client (0022.680b.da7b) on the Interface Fa1/0/1 AuditSessionID AC1FFE4E0000003105BCDE19

    002561: 8 Nov 14:31:35.703: % AUTHMGR-7-RESULT: result of the "dead server" authentication of 'dot1x' for the client (0022.680b.da7b) on the Interface Fa1/0/1 AuditSessionID AC1FFE4E0000003105BCDE19

    802.1 x switch associated config:

    GLOBAL:

    Group AAA dot1x default authentication RADIUS

    Group AAA authorization network default RADIUS

    start-stop radius group AAA accounting dot1x default

    RADIUS-server host 172.31.254.140 auth-port 1645 acct-port 1646

    RADIUS-server host 172.31.254.141 auth-port 1645 acct-port 1646

    RADIUS server key 7 123415ASFASFAS55512

    RADIUS vsa server send accounting

    RADIUS vsa server send authentication

    analysis of IP device

    IP access-list extended by DEFAULT, ALL

    allow an ip

    SPECIFIC PORT

    interface FastEthernet1/0/1

    Description model Port 802. 1 x

    switchport access vlan 244

    switchport mode access

    IP access-group by DEFAULT, while

    authentication event fail following action method

    open authentication

    authentication priority dot1x mab

    Auto control of the port of authentication

    periodic authentication

    MAB

    dot1x EAP authenticator

    dot1x tx-time 10

    end

    Next to the ACS authentication ends successfully, but for some reason, the switch cannot understand attribute was sent by the ACS:

    Why Authentication translates as 'server-dead?

    Hereby, I have attached the authorization profile, the downloadable ACLs and the detail of the RADIUS authentication for the request...

    Any idea?

    Thank you very much!

    Yes, I came across the same issue and ended up as a bug with the 3750

    CSCtj28883 dACL attribute the parsing failed when debug "author of aaa" on

    Description is

    The DACL processing fails when the following debug settings are turned on.

    1 debug aaa attr

    2 debug aaa authorization

    The same works very well when they are turned down. Set the switch of newspaper.

    I believe has been resolved in version 3750-Build 12.2 (55) as to the next note, attached to the bug as proved to be irreparable on later constructions

    The issuer has confirmed that the bug is not seen on the image of 55SE.

    The issue is only seen in 53SE

    can also try and switch debug off

  • IOS Easy VPN Server / Radius attributes

    Hello

    I made an easy VPN server installation with a running 12.2 2621XM router (15) output T5. VPN Clients/users are authenticated against Cisco ACS 3.2 by RADIUS.

    It works fine, but there is a problem that I can't solve. Each user must have the same VPN assigned IP address whenever it is authenticated.

    The ACS sends the right radius attribute (box-IP-Address) back to square of IOS, but this address is not assigned to the client. The customer always gets the next available IP address in the local set on the router.

    How can I solve this problem?

    You will find the relevant parts of the configuration and a RADIUS "deb" below.

    Kind regards

    Christian

    AAA - password password:

    AAA authentication calls username username:

    RADIUS AAA authentication login local users group

    RADIUS AAA authorization network default local group

    crypto ISAKMP policy 1

    Group 2

    !

    crypto ISAKMP policy 3

    md5 hash

    preshared authentication

    Group 2

    ISAKMP crypto identity hostname

    !

    ISAKMP crypto client configuration group kh_vpn

    mypreshared key

    pool mypool

    !

    Crypto ipsec transform-set esp-3des esp-sha-hmac shades

    !

    mode crypto dynamic-map 1

    shades of transform-set Set

    !

    users list card crypto mode client authentication

    card crypto isakmp authorization list by default mode

    card crypto client mode configuration address respond

    dynamic mode 1-isakmp ipsec crypto map mode

    !

    interface FastEthernet0/1

    IP 192.168.100.41 255.255.255.248

    crypto map mode

    !

    IP local pool mypool 172.16.0.2 172.16.0.10!

    Server RADIUS attribute 8 include-in-access-req

    RADIUS-server host 192.168.100.13 key auth-port 1645 acct-port 1646 XXXXXXXXXXXXXXXX

    RADIUS server authorization allowed missing Type of service

    deb RADIUS #.

    00:03:28: RADIUS: Pick NAS IP for you = tableid 0x83547CDC = 0 cfg_addr = 0.0.0.0 best_a

    DDR = 192.168.100.26

    00:03:28: RADIUS: ustruct sharecount = 2

    00:03:28: RADIUS: success of radius_port_info() = 0 radius_nas_port = 1

    00:03:28: RADIUS (00000000): send request to access the id 192.168.100.13:1645 21645.

    4, len 73

    00:03:28: RADIUS: authenticator 89 EA 97 56 12 B1 C5 C2 - C0 66 59 47 F7 88 96

    68

    00:03:28: RADIUS: NAS-IP-Address [4] 6 192.168.100.26

    00:03:28: RADIUS: NAS-Port-Type [61] Async 6 [0]

    00:03:28: RADIUS: username [1] 10 "vpnuser1".

    00:03:28: RADIUS: Calling-Station-Id [31] 13 "10.1.14.150".

    00:03:28: RADIUS: User-Password [2] 18 *.

    00:03:28: RADIUS: receipt of 192.168.100.13:1645, Access-Accept, id 21645/4 l

    in 108

    00:03:28: RADIUS: authenticator C1 7 29 56 50 89 35 B7 - 92 7 b 1 has 32 87 15 6

    A4

    00:03:28: RADIUS: Type of Service [6] 6 leavers [5]

    00:03:28: RADIUS: connection-ip-addr-host [14] 6 255.255.255.255

    00:03:28: RADIUS: Tunnel-Type [64] 6 01:ESP [9]

    00:03:28: RADIUS: Tunnel-Password [69] 21 *.

    00:03:28: RAY: box-IP-Netmask [9] 6 255.255.255.0

    00:03:28: RADIUS: Framed-IP-Address [8] 6 172.16.0.5

    00:03:28: RADIUS: [25] the class 37

    00:03:28: RADIUS: 43 49 53 43 4F 41 43 53 3 A 30 30 30 30 30 31 30 [CISCOACS:0

    000010]

    00:03:28: RADIUS: 2F 33 63 30 61 38 36 34 31 61 76 70 75 73 [3/c0a8641a 6F 2F

    /vpnus]

    00:03:28: RADIUS: 65 72 31 [1]

    00:03:28: RADIUS: saved the authorization for user 83547CDC to 83548430 data

    00:03:29: RADIUS: authentication for data of the author

    00:03:29: RADIUS: Pick NAS IP for you = tableid 0x82A279FC = 0 cfg_addr = 0.0.0.0 best_a

    DDR = 192.168.100.26

    00:03:29: RADIUS: ustruct sharecount = 3

    00:03:29: RADIUS: success of radius_port_info() = 0 radius_nas_port = 1

    00:03:29: RADIUS (00000000): send request to access the id 192.168.100.13:1645 21645.

    5, len 77

    00:03:29: RADIUS: authenticator 13 B2 A6 CE BF B5 DA 7th - 7B F0 F6 0b A2 35 60

    E3

    00:03:29: RADIUS: NAS-IP-Address [4] 6 192.168.100.26

    00:03:29: RADIUS: NAS-Port-Type [61] Async 6 [0]

    00:03:29: RADIUS: username [1] 8 'kh_vpn '.

    00:03:29: RADIUS: Calling-Station-Id [31] 13 "10.1.14.150".

    00:03:29: RADIUS: User-Password [2] 18 *.

    00:03:29: RADIUS: Type of Service [6] 6 leavers [5]

    00:03:29: RADIUS: receipt of 192.168.100.13:1645, Access-Accept, id 21645/5 l

    in 94

    00:03:29: RADIUS: authenticator C4 F5 2F C3 EE 56 DA C9 - 05 D6 F5 5 d EF 74 23

    AF

    00:03:29: RADIUS: Type of Service [6] 6 leavers [5]

    00:03:29: RADIUS: connection-ip-addr-host [14] 6 255.255.255.255

    00:03:29: RADIUS: Tunnel-Type [64] 6 01:ESP [9]

    00:03:29: RADIUS: Tunnel-Password [69] 21 *.

    00:03:29: RADIUS: [25] class 35

    00:03:29: RADIUS: 43 49 53 43 4F 41 43 53 3 A 30 30 30 30 30 31 30 [CISCOACS:0

    000010]

    00:03:29: RADIUS: 2F 34 63 30 61 38 36 34 31 61 2F 6 b 5F 68 76 70 [4/c0a8641a

    [/ kh_vp]

    00:03:29: RADIUS: 6 [n]

    00:03:29: RADIUS: saved the authorization for user 82A279FC to 82A27D3C data

    Assignment of an IP address via a server Raidus is currently not supported, even if your Radius Server is through an IP address, the router will ignore it and just assign an IP address from the pool locla. In fact, the pool room is the only way to assign IP addresses currently.

    On the only way to do what you want right now is to create different groups VPN, each reference to a local IP pool with an address in it. Then ask each user connect to the appropriate by their VPN client group.

    Yes, messy, but just try to provide a solution for you.

  • ACS5.1 - AD and mapping of RADIUS attributes

    Hello

    I am trying to dynamically assign IP addresses for users of VPN of AD (without IAS service). Is it possible?

    I know that there is a restriction that "Dial-in users are not taken in charge by announcement in ACS (note in 'acsuserguide51') but I'm not exacly sure, which may or may not do with it."

    "Authorization profiles" RADIUS attributes tab I try manually add a specific attribute (box-IP-Address).

    I have no problem (everything works fine) with the award of a static in a way as address below:

    AD is already integrated with ACS and I managed to download the directory attributes particular msRADIUSFramedIPAddress

    When I change the ' attribute value 'static to the dynamic type I see to select AD (but "Select" which should list all of the available attributes is empty).

    Is it possible in this way or my concept wrong?

    I know I can do it directly (ASA <->AD attribute mapping), but I want to ACS to make

    best regards and thx for all help

    Przemek

    Your baisc approach is

    fix. However, when you dynamically assign the IP address of type RADIUS attributes in an authorization profile you get only presented for the selection of attributes in the store identities (in this case AD) which are also a type IP address. In your example, it is of the type "integer64.

  • Add contacts to a group in Windows Live Mail

    Groups set up in Vista Home Premium still exist after the installation of Windows 7. However, can't understand how to add another individual to groups now.

    [Original title: Windows Live Mail]

    Open WLM, click left down Contacts, click All Contacts at the top and drag the names to add to the group.

  • How to edit several groups in Secure ACS?

    I have 20 or if groups of users with GBA and I want to edit a field in each of them (say I want to change the primary [3076\005] DNS domain in each of them having the same). Is there a way to do this only once (either through download a txt using csutils?), or I have to edit this group at the same time?

    There is a Code of Action (163 - ADD_RADIUS_ ATTR) RDBMS, but it would change only the IETF RADIUS attributes.

    http://www.Cisco.com/en/us/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.2/user/guide/A_RDBMS.html#wp78074

    I do not believe there is no option to accomplish what you are trying to do...

    You must enter one by one each group and make the necessary changes.

  • Why do we establish oinstall under the main group of oracle and grid users?

    IM and RDBMS version: 11.2.0.4

    Platform: RHEL/OL 6.5

    Why do we set oinstall under the main group for OS proprietary oracle software and grid?

    I would say "The Central stock" is the watchword here.

    orainstall is actually called the "oraInventory group." Member of (oracle and grid) users who belong to this group must read, write and execute privileges on the directory Central inventory which will serve as a catalogue of all oracle related software installed on the server. Whenever users put oracle or grid to level, the patches from the software they own, they should be able to update the respective news in this catalogue.

  • Groups of attributes in the guided Navigation

    Hello

    Is it possible to add other groups of attributes for the component of guided Navigation in addition to view basic attributes groups?

    Thank you

    Andrés

    Hi Andres,

    This looks like it. I also found this topic: Configure the behavior of guided Navigation to display basic attributes

    http://docs.Oracle.com/CD/E37502_01/Studio.300/studio_users/TOC.htm#configuring%20The%20Guided%20Navigation%20behavior%20For%20Base%20VIEW%20attributes

    Because this topic is only for display of Base attributes (and not the attributes of the other points of view), this suggests that only groups of the Base view attributes can be added to the guided Navigation.

  • ESBase Studio question - how to set up the dim attribute?

    I installed Essbase Studio, but has not found a place to create the dimensions of the attribute and rather than associate the dimension attributes to standard dimension? Please notify. Any expert can tell me? JohnGoodwin? GlennS_2? CL?

    Published by: user2571802 on January 9, 2010 20:10

    Hello

    Create a hierarchy as usual and add your columns for your dimension attribute, overview make sure your hierarchy is correct.
    Change the hierarchy you want to map the dimension attributes to add the mapping of attributes to the hierarchy. (then member of attribute maps to the dimension member)
    (don't forget to do a relational ship between members of dimension for the attribute members in your source)
    There is an example of adding the mapping to a hierarchy on page 126 of the user's guide of the Regional (multistring with Dimensions of the attribute hierarchy) service
    In the dimension of some model > essbase properties > click the attribute member, and then select the attribute settings. (this will not appear until you have successfully added the mapping of the attributes in the hierarchy to set up)

    See you soon

    John
    http://John-Goodwin.blogspot.com/

  • How to stop the Radius/Ganymede ACS 5.2?

    Hi, is it possible to stop the Radius/Ganymede ACS 5.2 from the GUI?

    The command line, you can stop the ACS instance itself - but I don't think you can even components.  It simulate an instance ACS failed.

    I think that his:

    request stop acs

    or

    judgment of the ACS

    To start, it's the same thing with the start of keyword.

  • Radius on ACS 5.2 accounting command

    order accounting for RADIUS supported ACS 5.2? status of implementation of radius of the provider supports this feature.

    Well radius account management is supported on ACS so if your aaa client's accounting controls, they will appear on ACS without problem.

  • Is there a way to get all the names of collection under which an entity is attributed?

    Is there a way to get all the names of collection under which an entity is attributed?

    Hello

    For a list of the collections which make reference to a specific entity, please refer to the following API request (see documentation of swagger producer-Service-entity ):

    GET /publication/ {publicationID} / {entityType} / {entityName} / {referencingEntityType}

    This request has been added to the content producer DPS2015 API examples, you can now use the getReferencing()function. Please see /article/get_referencing_entity.php for the complete example.

    You can download the latest examples of producer API Content DPS2015 and swagger documentation from here, all the resources are in a file single zip.

    -Mike

Maybe you are looking for

  • Double sims does not at the same time.

    I live in the United Kingdom, has recently purchased the bike G XT1068 new dual sim. I've been on for ages from 3 mobile and get a very good reception where I live. So I chose 3 for the second sim card like I need separate work/personal numbers. Howe

  • Pavilion H8 1213c: upgrade my computer

    I want to improve my computer GPU, but I don't know if she will be able to manipulate.I want to spend my GPU of a Nvidia GeForce GT of 620 to a GTX 750 TI.Any suggestions?Thank you

  • Block diagram is broken

    Hi all I have a very frustrating problem. The block diagram of my VI has become perhaps a bit too large (though I tried to keep it as small as possible, there is a lot of stuff going on there) and after my last diagram cleanup some objects have disap

  • Search string in variable

    Hello I'm trying to search for a string in a variable. He works to match the case when the string begins with the word you are looking for. Unfortunately his does not work through the complete chain. var title = "Hello World"; var value = "world"; va

  • Curve of defective 9380 of blackBerry Smartphones

    I understand that my Blackberry curve 9380 comes with a 2 years manufacturer warranty. It does not work and I can't get it fixed, how I go back to Blackberry under the terms of the warranty? I posted the question here but not been successful in getti