Allow a role access to a view of the alarm.
Hello
I created a 'my_role' role and adds some groups, and now I want to enable this role to 'see' some views only (This Works) however I need this role can see the alarms related to an agent. And that is the problem, impossible to find the correct view. What is the correct view in order to add "my_role"?... Please see the attachment.
Thank you
Michael.
Since it's viewsI suspect basic upgrade will change things back.
What you can try to do, is copy/deep copy these views to your own module and edit the dashboard to use the copy.
Golan
Tags: Dell Tech
Similar Questions
-
Read only access (to hide part of the config)
Is there a way to allow read-only access to only part of the config. I have clients that require read-only access, but I don't want the portions to the config.
For any help or suggestion would be greatly appreciated. Thank you
If they have a connection to enable level, they will be able to see the entire configuration (absence of passwords encrypted assuming you are using the service encryption password).
You can make more granular connections and prevent customers from, say, the ability to run arbitrary commands such as "show run". For example you could setup a given user to be alllowed to run 'show interface status' etc. NX - OS has this ability almost "cooked in the oven-in." IOS systems, to a little more work.
Here's a guide to how to do if you use GANYMEDE for AAA:
https://supportforums.Cisco.com/docs/doc-15765
If you use local authentication, you can do similar things, using cli views or levels of privilege:
http://www.Cisco.com/en/us/docs/iOS/12_2t/12_2t13/feature/guide/ftprienh.html
http://www.Cisco.com/en/us/docs/iOS/12_3t/12_3t7/feature/guide/gtclivws.html
http://www.NetworkWorld.com/community/node/57553
I hope this helps.
-
Access the views Where the access to the underlying data, through a role
I have a user (say User1) who granted select access to motherlode via a role table
User1 has a bunch of useful views created I want User2 to have access to the. User2 should have access only to these points of view, not to the underlying table.
User1 can grant access to his point of view because it has no direct access granted to motherlode tables.
I managed, based on a technique that I have for the most part, but do not entirely understand, give User2 access to data through a function. The solution is below.
My general question is: y at - it an easier way (other than the grant direct access to the motherlode User1 tables)?
My question is: the definition is possible shorter somehow. I know I can automate the production of the code for some of the statements using metadata, but, for example, is it possible to base the declaration of type (t_p5) on the existing view? (I have about 15 views I need to provide access)
Solution is, where v_p5 is the original view:
User 1:
CREATE or replace type t_p5 as an object
(< columns and data types of v_p5 >
) ;
CREATE or REPLACE TYPE t_p5_tab AS TABLE OF THE t_p5;
FUNCTION to CREATE or REPLACE f_provide_p5 RETURN t_p5_tab
PIPELINED IS
l_cur SYS_REFCURSOR;
l_rec v_p5% rowtype;
BEGIN
L_cur OPEN FOR ' SELECT * FROM v_p5';
LOOP
EXTRACTION l_cur
IN l_rec;
EXIT WHEN l_cur % NOTFOUND;
GUIDELINE (t_p5 (area = > l_rec.region))
, district_name = > l_rec.district_name
, current_month = > l_rec.current_month
, p_current = > l_rec.p_current
, previous_month = > l_rec.previous_month
, p_prev = > l_rec.p_prev
, diffp = > l_rec.diffp
, diff_perc = > l_rec.diff_perc
, previous_year = > l_rec.previous_year
, p_year = > l_rec.p_year
, diffy = > l_rec.diffy
, perc_diffy = > l_rec.perc_diffy
));
END LOOP;
RETURN;
EXCEPTION
WHILE OTHERS THEN
raise_application_error (-20000, SQLERRM |) Chr (10) | l_sql);
END;
And user2:
VIEW to CREATE or REPLACE v_p5 AS
SELECT * FROM TABLE (User1.f_provide_p5);
I can then do a select * from v_p5 in User2 and return the view data.
Thank you.
Hello
Don't bother with the pipeline and PL/SQL functions. Everything will be easier, more effective and more reliable if you use only views.
Privileges through roles do not create a view on a table in another schema.
If user1 can create a view on motherlode.table_x, then user1 should have direct privileges already (or user1 must have a privilege of system as SELECT ANY TABLE).
User1 needs the same privileges WITH GRANT OPTION in order to grant privileges on his point of view to User2. To do this, have motherlode grant privileges to user1, like this:
GRANT SELECT ON table_x to User1 WITH GRANT OPTION;
GRANT SELECT ON table_y to User1 WITH GRANT OPTION;
Repeat for each table that user1 uses in the views.
Then user1 will be able to grant privileges on views to User2 like this:
GRANT SELECT ON my_view_01 TO user2.
This will NOT allow user2 directly see the motherlode.table_x. User1 will have the power to give privileges to User2, but simply grant privileges on the view does not give User2 these privileges.
If you don't want User1 to have this power, then create the views in the motherlode scheme, or create a new schema only for the putpose to own these views.
-
Cannot get the list of role access
Hi all
I'm new to UCM 11 g. We intend to apply ACLs in 11 g.
I would like to know how to apply ACLs in the Complutense University of MADRID, I configured ACL according to the Oracle documentation, but how do the user of these ACLs.
Still something I am unable to get the values in the list of role access.
Thank you allHello
The value must be added to the view - ExternalRoles.
Add the publication scheme and test it.
Thank you
Srinath -
I can access the Conversation view under the view menu in TB version final candidate 31.4.0. But he don't see under daily 38.0a1 of 64-bit version on different computers. Any help appreciated.
THX
Ok. Do not take into account. Apparently the conversation view is an Extension to tuberculosis, only not part of the base product. Hope that I would not lose too much of your time. Live and learn.
Thank you
Doug -
I'm unable to connect to a live ID which allows me to access my zune of PAID subscription.
Unable to connect
as I'm unable to connect to a live ID that allows me to access my zune of PAID subscription, and microsoft can't stand over these same said subscriptions, I wonder why they can't just to take money from us without giving products. OH, it's what they do already!
Pay a subscription, it locks my live ID and then tell me to come here to get help?
Now, where exactly the help phucking I'm supposed to receive on my PAID SUBSCRIPTION ACCOUNT
Huh
Huh
Huh?
Huh
Hello ParagonOpus1,
The best place to ask your question of Windows Live is inside Windows Live help forums. Experts specialize in all things, Windows Live, and would be delighted to help you with your questions. Please choose a product below to be redirected to the appropriate community:
Looking for a different product to Windows Live? Visit the home page Windows Live Help for the complete list of Windows Live forums to www.windowslivehelp.com.
-
This morning, I got a phone call from an Asian man, saying: he has worked with microsoft, I found it very difficult to understand what he was saying and to rehearse a lot, he mentioned "Alureon" and says that my computer is one of the computers on crash today... He then wen on say that they should do support remotely. to help solve the problem, stupidly and against everything I've known I have allowed him... .it all seemed very alarming... it said my computer was about to crash in a few moments and I had to buy the red shield to protect... I hung up, but they called back... ultimately I told them I wasn't buying any and at this point, he got quite angry and asked me why I was wasting his time. How can I check my computer to make sure they did not hurt? and they can access my computer later? I'm asuming that Microsft had nothing to do with it.
Hello
It's a scam.
If you gave them remote access and you do Internet banking, contact your bank, explain, and change passwords.
If you use your online credit card, cancel and get a new one issued to you.
And the only way that willl you know that you are free to them is to backup your data and do a clean install of your operating system.
Either these so-called "Microsoft" Tech companies want to sell you a worthless software, or remote access to your computer to try to steal your credit card and bank information and also achieve an identity theft on you.
Microsoft does not contact you unless YOU have made prior arrangements with them to do.
There is an article in the link I'm you provide at the end of this one
Read this Information from Microsoft:
"Avoid scams to phone for tech support.
http://www.Microsoft.com/security/online-privacy/avoid-phone-scams.aspx
Don't be fooled of unsolicited calls. Don't provide personal information.
Here are some of the organizations that cyber criminals claim to come:
Helpdesk Windows
Windows repair center
Microsoft technical support
Microsoft technical support
Windows Support Group Technical Department
Microsoft Research and Development Team (team of Microsoft R & D)
See you soon.
-
How to allow access to all users of the connection on my computer?
How to allow access to all users of the connection on my computer?
Your question is hard to understand. I interpret as:
"How to allow all the users on my computer to access some files or folders?
The answer depends somewhat on the question of whether you have XP Pro or XP Home, but a general answer is found the following article.
"How to use file sharing Simple to share files in Windows XP"
<>http://support.Microsoft.com/kb/304040 >Click on "level 3: files in shared documents available to local users"
HTH,
JW -
My computer won't allow me to access my files on my portable hard disk without error appear "you must format the E: drive before using it. How can I fix this please!
Try to scan your driver with anti-virus, also try to throw the disc looking for this driver and as you try to run the following tools:
http://support.Microsoft.com/mats/system_maintenance_for_windows/
http://support.Microsoft.com/mats/windows_file_and_folder_diag/
-
Access DENIED to VIEW, COPY or MOVE photos on an external hard drive
Access DENIED to VIEW, COPY or MOVE photos on an external hard drive
Im having problems accessing copy, editing and viewing my photos on my external hard drive, it says I do not have the appropriate permissions to access to the file .and the file belongs to an unknown user account, I am using an administrator account, how can I have access to these files?THE problem started since I have been using windows 7, now I am using windows 8, the problem is still there!
Please help me, its been two years im trying to solve this problem.
Here is the link to additional photos showing all the problems
https://www.Facebook.com/media/set/?set=a.3381541016883.2168211.1220177281&type=1&l=160799ee13
IM using HP530, 2g of RAM, windows 8
the external hard drive is a samsung HD103SI, 1 TB model
You must enter the property of your records - see here:http://social.answers.Microsoft.com/forums/en-us/w7network/thread/24bdf172-2DBC-43b8-995d-a99b6a81413c/ -
I don't like the slide show feature. I'd rather see my attachments separately as before.
The slide show can be disabled and allow me to view attachments the old-fashioned way?
@Paul7177
Windows Live Mail 2011 doesn't have an option to turn off the slide show mode (it is part of the program).
You can click on the image to see (which will open in whatever program is associated with that type of file images) or save (or all of them) and open later in a program of your choice.
.. .Winston
MSFT MVP Mail -
Allowing external IP access via VPN Client
We are looking for our remote VPN users to access an external IP address. Basically once users authenticate when they try to access 202.1.56.19, they should be out nat through the external interface of the firewall. Below is out of the package violated on "vpn ecrypt" tracer and as an extract from the config. On the client, I see that the road to 202.1.56.19 was added, but it does not work.
Please advise more information be required ing. Thank you.
access list INSIDE-OUT scope ip 10.15.160.0 allow 255.255.255.0 any
access OUTSIDE list / allowed extended Interior ip 10.15.160.0 255.255.255.0 any
Access-group OUTSIDE / inside interface OUTSIDE-IDCNONATIDC list of allowed ip extended access all 10.15.160.0 255.255.255.0
NAT (INSIDE) 0-list of access NONATIDC
NAT (INSIDE) 1 10.15.160.0 255.255.255.0
Global (OUTSIDE-IDC) 1 128.15.155.2internal CorpVPN group strategy
attributes of Group Policy CorpVPN
value of server DNS 10.15.155.17
VPN-idle-timeout no
VPN-session-timeout no
Protocol-tunnel-VPN IPSec
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list SplitTunnel
something.com value by default-fieldattributes global-tunnel-group CorpVPN
address pool CorpVPNpool
Group Policy - by default-CorpVPN
IPSec-attributes tunnel-group CorpVPN
pre-shared keyStandard access list SplitTunnel allow 192.168.168.0 255.255.255.0
SplitTunnel list standard access allowed host 202.1.56.19Packet-trace input outside-iDC tcp 10.15.160.18 22 202.1.56.19 22
Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit rule
Additional information:
MAC access listPhase: 2
Type: FLOW-SEARCH
Subtype:
Result: ALLOW
Config:
Additional information:
Not found no corresponding stream, creating a new streamPhase: 3
Type:-ROUTE SEARCH
Subtype: entry
Result: ALLOW
Config:
Additional information:
in 0.0.0.0 0.0.0.0 OUTSIDE-IDCPhase: 4
Type: ACCESS-LIST
Subtype: Journal
Result: ALLOW
Config:
Access-group OUTSIDE / inside interface OUTSIDE-IDC
access OUTSIDE list / allowed extended Interior ip 10.15.160.0 255.255.255.0 any
Additional information:Phase: 5
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional information:Phase: 6
Type: CP-PUNT
Subtype:
Result: ALLOW
Config:
Additional information:Phase: 7
Type: VPN
Subtype: ipsec-tunnel-flow
Result: ALLOW
Config:
Additional information:Phase: 8
Type: VPN
Subtype: encrypt
Result: DECLINE
Config:
Additional information:Result:
input interface: OUTSIDE-IDC
entry status: to the top
entry-line-status: to the top
output interface: OUTSIDE-IDC
the status of the output: to the top
output-line-status: to the top
Action: drop
Drop-reason: flow (acl-drop) is denied by the configured ruleEssentially, the traffic needs to make a u-turn at ASA outside interface if I understand your configuration.
You need the following to make it work.
-permit same-security-traffic intra-interface
-Host202 of the 10.15.160.0 ip access list permit 255.255.255.0 host 202.1.56.19
-nat (OUTSIDE-IDC) 1 access-list Host202
-
Allow VPN users access a VLAN different
I have an ASA 5505. I have configured remote access VPN so that users can connect to the VPN and access my main VIRTUAL local network (inside). I want to set so that when a user s in VPN, they are permitted access only to the CCV vlan (Vlan 2) as seen in my configuration. Please note that there is also a VPN LAN LAN 2, which has been set up as well.
What Miss me?
!
interface Ethernet0/0
switchport access vlan 4
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
switchport access vlan 2
!
interface Ethernet0/7
switchport access vlan 2
!
interface Vlan1
nameif inside
security-level 100
IP 10.240.0.1 255.255.0.0
!
interface Vlan2
prior to interface Vlan1
nameif HVAC
security-level 100
IP address 172.16.128.1 255.255.255.0
!
interface Vlan4
nameif outside
security-level 0
IP address 12.x.x.x 255.255.255.0
!
passive FTP mode
IP 10.240.0.0 allow Access - list extended CDEO 255.255.0.0 10.0.0.0 255.0.0.0
IP 10.240.0.0 allow Access - list extended sheep 255.255.0.0 10.0.0.0 255.0.0.0
IP 10.240.0.0 allow Access - list extended sheep 255.255.0.0 172.16.129.0 255.255
. 255.0
IP 10.102.229.0 allow Access - list extended sheep 255.255.255.0 172.16.129.0 255
. 255.255.0
IP 172.16.129.0 allow Access - list extended sheep 255.255.255.0 10.102.229.0 255
. 255.255.0
access-list sheep extended ip 172.16.128.0 allow 255.255.255.0 172.16.129.0 255
. 255.255.0
IP 172.16.129.0 allow Access - list extended sheep 255.255.255.0 172.16.128.0 255
. 255.255.0
list of inbound icmp permitted access extended throughout entire echo response
list of extended inbound icmp permitted access any source-quench any
list of extended all inbound icmp permitted access all inaccessible
access list entering permit icmp any once extended beyond
coming out to the one permitted all ip extended access list
standard vpn access list allows 10.240.0.0 255.255.0.0
standard vpn access list allows 10.102.229.0 255.255.255.0
list of access allowed standard vpn 172.16.128.0 255.255.255.0
pager lines 24
asdm of logging of information
Within 1500 MTU
Outside 1500 MTU
MTU 1500 HVAC
IP local pool 172.16.129.1 - 172.16.129.5 mask 255.255.255.0 shhfvpnpool
ICMP unreachable rate-limit 1 burst-size 1
don't allow no asdm history
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) 0 access-list sheep
NAT (inside) 1 0.0.0.0 0.0.0.0
Access-group out on the interface inside
Access-group interface incoming outside
Route outside 0.0.0.0 0.0.0.0 12.x.x.x 1
dynamic-access-policy-registration DfltAccessPolicy
the ssh LOCAL console AAA authentication
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set esp - esp-sha-hmac hand
Crypto ipsec transform-set esp - esp-md5-hmac RIGHT
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
Crypto-map dynamic dynmap 10 transform-set RIGHT
life together - the association of security crypto dynamic-map dynmap 10 28800 seconds
Crypto-map dynamic dynmap 10 kilobytes of life together - the association of safety 4608000
Crypto-map dynamic dynmap 10 the value reverse-road
CDEOVPN 35 crypto card matches the address CDEO
CDEOVPN 35 crypto map set peer 64.x.x.x
card crypto CDEOVPN 35 the transform-set hand value
map CDEOVPN 100-isakmp ipsec crypto dynamic dynmap
CDEOVPN interface card crypto outside
crypto isakmp identity address
crypto ISAKMP allow outside
crypto ISAKMP policy 20
preshared authentication
the Encryption
sha hash
Group 1
life 86400
crypto ISAKMP policy 30
preshared authentication
the Encryption
md5 hash
Group 2
life 86400Console timeout 0
management-access insidea basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
attributes of Group Policy DfltGrpPolicy
VPN-idle-timeout no
internal group shhf strategy
attributes of shhf group policy
VPN-idle-timeout 30
VPN-session-timeout 1440
VPN-filter no
Protocol-tunnel-VPN IPSec
Split-tunnel-policy tunnelspecified
Split-tunnel-network-list value vpntunnel-group 64.x.x.x type ipsec-l2l
64.x.x.x group tunnel ipsec-attributes
pre-shared key *.
tunnel-group shhf type remote access
tunnel-group shhf General attributes
address shhfvpnpool pool
strategy-group-by default shhf
shhf group tunnel ipsec-attributes
pre-shared key *.
tunnel-group vpnclient type remote access
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect esmtp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
Review the ip options
!
global service-policy global_policy
context of prompt hostname
no remote anonymous reporting call
Cryptochecksum:1cbd55e987f9b41cd2ebcb320fa2e3b2
: endThis route to be applied on the switch, if your port eth0/7 on SAA is connected to a switch of later3.
"Route ip 172.16.129.0 255.255.255.0 172.16.128.1.
So, don't worry on this route, if you can not apply on the SAA.
So are you saying that a PC is directly connected to eth0/7 on the SAA.
What is the IP address, mask and gateway address on the PC connected on eth0/7?
The trace package seems good.
-
ESXi allows to directly access the disk?
Two quick questions...
(1) ESXi allows to directly access the disk?
.. .and associated with what precedes :)
(2) Let's say I want to use Windows Home Server as a guest within ESXi operating system. It formats the disks using standard NTFS that can be read by any Windows machine. (eg. you can remove the hard drive of the server and paste it into any other computer and you can read it). How would this work in ESXi? ESXi would force first all of the disk formatted to VMFS and then have NTFS below? (so you could not "access the drive except in other machines on ESXi)
Thanks for any help!
However, if I create a virtual disk (using VMFS) that even if the virtual disk is formatted NTFS by the client operating system that he still cannot be read in another computer because it is in a 'container' of VMFS.
Yes, I would say that's pretty accurate, there are a few exceptions of course... but overall, Yes.
-
Access to the view of the Oracle Applications via Dblink
Hi gurus,
Here's my problem:
I installed on my local machine to apex and I created dblink to my applications remote oracle DB. Now, if I try to access all the views in the db to oracle applications, iam not getting data from the org context is not set.
I tried to set the org context using below:
exec dbms_application_info.set_client_info@appsdblink ('100');
but still iam not received all data. I hope that there should be a way to do it.
Thank you
SirotSK:
What return the test script?
You will need to run the context give code as a process before header or have the query of the report be returned by a pl/sql function in which you can set the context.CITY
Maybe you are looking for
-
I can't click on the tabs on my firefox, firefox 30 desk, how to fix this?
I have reset and always get this question, I would like to go and click Open a new tab, and then I see the tab on the toolbar. I would go in trying to open the tab by clicking on it and it wouldn't work. How to fix this? I know about the shortcut but
-
Conditions:2 windows of firefox open 21.0, showing 2 different pages, which comes from the same server.One of the 2 pages it active, having shot on it with the mouse.If I try to zoom on active windows, is enlarged also another one that is not active.
-
No additional data in the address book
Even if my AddressBook is connected to my ICloud, where all my contacts When I opened AB, it is empty. All my contacts have disappeared
-
HP Recovery Manager - software list missing
When I open my HP Recovery Manager and select 'Yes' to reinstall the software program, the select a window installer appears (as it should) EXCEPT that it's EMPTY! Where is the list of all the programs that we have installed on my computer when I use
-
Laptop Hp extended warranty regarding
To, support for Hp Tehnician My Hp Envy 15 laptop is still under warranty, but it will soon expire. You please help me to get the procedure how or can hp technician can please send me the link of guarantee package so I can scope. Help please.