Allow a role access to a view of the alarm.

Hello

I created a 'my_role' role and adds some groups, and now I want to enable this role to 'see' some views only (This Works) however I need this role can see the alarms related to an agent. And that is the problem, impossible to find the correct view. What is the correct view in order to add "my_role"?... Please see the attachment.

Thank you

Michael.

Since it's viewsI suspect basic upgrade will change things back.

What you can try to do, is copy/deep copy these views to your own module and edit the dashboard to use the copy.

Golan

Tags: Dell Tech

Similar Questions

  • Read only access (to hide part of the config)

    Is there a way to allow read-only access to only part of the config.  I have clients that require read-only access, but I don't want the portions to the config.

    For any help or suggestion would be greatly appreciated.  Thank you

    If they have a connection to enable level, they will be able to see the entire configuration (absence of passwords encrypted assuming you are using the service encryption password).

    You can make more granular connections and prevent customers from, say, the ability to run arbitrary commands such as "show run". For example you could setup a given user to be alllowed to run 'show interface status' etc. NX - OS has this ability almost "cooked in the oven-in." IOS systems, to a little more work.

    Here's a guide to how to do if you use GANYMEDE for AAA:

    https://supportforums.Cisco.com/docs/doc-15765

    If you use local authentication, you can do similar things, using cli views or levels of privilege:

    http://www.Cisco.com/en/us/docs/iOS/12_2t/12_2t13/feature/guide/ftprienh.html

    http://www.Cisco.com/en/us/docs/iOS/12_3t/12_3t7/feature/guide/gtclivws.html

    http://www.NetworkWorld.com/community/node/57553

    I hope this helps.

  • Access the views Where the access to the underlying data, through a role

    I have a user (say User1) who granted select access to motherlode via a role table

    User1 has a bunch of useful views created I want User2 to have access to the. User2 should have access only to these points of view, not to the underlying table.

    User1 can grant access to his point of view because it has no direct access granted to motherlode tables.

    I managed, based on a technique that I have for the most part, but do not entirely understand, give User2 access to data through a function. The solution is below.

    My general question is: y at - it an easier way (other than the grant direct access to the motherlode User1 tables)?

    My question is: the definition is possible shorter somehow. I know I can automate the production of the code for some of the statements using metadata, but, for example, is it possible to base the declaration of type (t_p5) on the existing view? (I have about 15 views I need to provide access)

    Solution is, where v_p5 is the original view:

    User 1:

    CREATE or replace type t_p5 as an object

    (< columns and data types of v_p5 >

    )  ;

    CREATE or REPLACE TYPE t_p5_tab AS TABLE OF THE t_p5;

    FUNCTION to CREATE or REPLACE f_provide_p5 RETURN t_p5_tab

    PIPELINED IS

    l_cur SYS_REFCURSOR;

    l_rec v_p5% rowtype;

    BEGIN

    L_cur OPEN FOR ' SELECT * FROM v_p5';

    LOOP

    EXTRACTION l_cur

    IN l_rec;

    EXIT WHEN l_cur % NOTFOUND;

    GUIDELINE (t_p5 (area = > l_rec.region))

    , district_name = > l_rec.district_name

    , current_month = > l_rec.current_month

    , p_current = > l_rec.p_current

    , previous_month = > l_rec.previous_month

    , p_prev = > l_rec.p_prev

    , diffp = > l_rec.diffp

    , diff_perc = > l_rec.diff_perc

    , previous_year = > l_rec.previous_year

    , p_year = > l_rec.p_year

    , diffy = > l_rec.diffy

    , perc_diffy = > l_rec.perc_diffy

    ));

    END LOOP;

    RETURN;

    EXCEPTION

    WHILE OTHERS THEN

    raise_application_error (-20000, SQLERRM |) Chr (10) | l_sql);

    END;

    And user2:

    VIEW to CREATE or REPLACE v_p5 AS

    SELECT * FROM TABLE (User1.f_provide_p5);

    I can then do a select * from v_p5 in User2 and return the view data.

    Thank you.

    Hello

    Don't bother with the pipeline and PL/SQL functions.  Everything will be easier, more effective and more reliable if you use only views.

    Privileges through roles do not create a view on a table in another schema.

    If user1 can create a view on motherlode.table_x, then user1 should have direct privileges already (or user1 must have a privilege of system as SELECT ANY TABLE).

    User1 needs the same privileges WITH GRANT OPTION in order to grant privileges on his point of view to User2.  To do this, have motherlode grant privileges to user1, like this:

    GRANT SELECT ON table_x to User1 WITH GRANT OPTION;

    GRANT SELECT ON table_y to User1 WITH GRANT OPTION;

    Repeat for each table that user1 uses in the views.

    Then user1 will be able to grant privileges on views to User2 like this:

    GRANT SELECT ON my_view_01 TO user2.

    This will NOT allow user2 directly see the motherlode.table_x.  User1 will have the power to give privileges to User2, but simply grant privileges on the view does not give User2 these privileges.

    If you don't want User1 to have this power, then create the views in the motherlode scheme, or create a new schema only for the putpose to own these views.

  • Cannot get the list of role access

    Hi all

    I'm new to UCM 11 g. We intend to apply ACLs in 11 g.
    I would like to know how to apply ACLs in the Complutense University of MADRID, I configured ACL according to the Oracle documentation, but how do the user of these ACLs.
    Still something I am unable to get the values in the list of role access.

    Thank you all

    Hello

    The value must be added to the view - ExternalRoles.

    Add the publication scheme and test it.

    Thank you
    Srinath

  • Can't access Conversation view under the view menu. With the help of 38.0a1 every day. Any ideas?

    I can access the Conversation view under the view menu in TB version final candidate 31.4.0. But he don't see under daily 38.0a1 of 64-bit version on different computers. Any help appreciated.

    THX

    Ok. Do not take into account. Apparently the conversation view is an Extension to tuberculosis, only not part of the base product. Hope that I would not lose too much of your time. Live and learn.

    Thank you
    Doug

  • I'm unable to connect to a live ID which allows me to access my zune of PAID subscription.

    Unable to connect

    as I'm unable to connect to a live ID that allows me to access my zune of PAID subscription, and microsoft can't stand over these same said subscriptions, I wonder why they can't just to take money from us without giving products.  OH, it's what they do already!

    Pay a subscription, it locks my live ID and then tell me to come here to get help?

    Now, where exactly the help phucking I'm supposed to receive on my PAID SUBSCRIPTION ACCOUNT

    Huh

    Huh

    Huh?

    Huh

    Hello ParagonOpus1,

    The best place to ask your question of Windows Live is inside Windows Live help forums. Experts specialize in all things, Windows Live, and would be delighted to help you with your questions. Please choose a product below to be redirected to the appropriate community:

    Windows Live Mail

    Windows Live Hotmail

    Windows Live Messenger

    Looking for a different product to Windows Live? Visit the home page Windows Live Help for the complete list of Windows Live forums to www.windowslivehelp.com.

  • How can I check if my computer is ok? I got an unsolicited phone call and allowed them to access my computer

    This morning, I got a phone call from an Asian man, saying: he has worked with microsoft, I found it very difficult to understand what he was saying and to rehearse a lot, he mentioned "Alureon" and says that my computer is one of the computers on crash today... He then wen on say that they should do support remotely. to help solve the problem, stupidly and against everything I've known I have allowed him... .it all seemed very alarming... it said my computer was about to crash in a few moments and I had to buy the red shield to protect... I hung up, but they called back... ultimately I told them I wasn't buying any and at this point, he got quite angry and asked me why I was wasting his time. How can I check my computer to make sure they did not hurt? and they can access my computer later? I'm asuming that Microsft had nothing to do with it.

    Hello

    It's a scam.

    If you gave them remote access and you do Internet banking, contact your bank, explain, and change passwords.

    If you use your online credit card, cancel and get a new one issued to you.

    And the only way that willl you know that you are free to them is to backup your data and do a clean install of your operating system.

    Either these so-called "Microsoft" Tech companies want to sell you a worthless software, or remote access to your computer to try to steal your credit card and bank information and also achieve an identity theft on you.

    Microsoft does not contact you unless YOU have made prior arrangements with them to do.

    There is an article in the link I'm you provide at the end of this one

    Read this Information from Microsoft:

    "Avoid scams to phone for tech support.

    http://www.Microsoft.com/security/online-privacy/avoid-phone-scams.aspx

    Don't be fooled of unsolicited calls. Don't provide personal information.

    Here are some of the organizations that cyber criminals claim to come:

    • Helpdesk Windows

    • Windows repair center

    • Microsoft technical support

    • Microsoft technical support

    • Windows Support Group Technical Department

    • Microsoft Research and Development Team (team of Microsoft R & D)

    See you soon.

  • How to allow access to all users of the connection on my computer?

    How to allow access to all users of the connection on my computer?

    Your question is hard to understand.  I interpret as:

    "How to allow all the users on my computer to access some files or folders?

    The answer depends somewhat on the question of whether you have XP Pro or XP Home, but a general answer is found the following article.

    "How to use file sharing Simple to share files in Windows XP"
      <>http://support.Microsoft.com/kb/304040 >

    Click on "level 3: files in shared documents available to local users"

    HTH,
    JW

  • My computer won't allow me to access my files on my portable hard disk without error appear "you must format the E: drive before using it. How can I fix this please!

    My computer won't allow me to access my files on my portable hard disk without error appear "you must format the E: drive before using it. How can I fix this please!

    Try to scan your driver with anti-virus, also try to throw the disc looking for this driver and as you try to run the following tools:

    http://support.Microsoft.com/mats/system_maintenance_for_windows/

    http://support.Microsoft.com/mats/windows_file_and_folder_diag/

  • Access DENIED to VIEW, COPY or MOVE photos on an external hard drive

    Access DENIED to VIEW, COPY or MOVE photos on an external hard drive

    Im having problems accessing copy, editing and viewing my photos on my external hard drive, it says I do not have the appropriate permissions to access to the file .and the file belongs to an unknown user account, I am using an administrator account, how can I have access to these files?

    THE problem started since I have been using windows 7, now I am using windows 8, the problem is still there!

    Please help me, its been two years im trying to solve this problem.

    Here is the link to additional photos showing all the problems

    https://www.Facebook.com/media/set/?set=a.3381541016883.2168211.1220177281&type=1&l=160799ee13

    IM using HP530, 2g of RAM, windows 8

    the external hard drive is a samsung HD103SI, 1 TB model

    You must enter the property of your records - see here:
    http://social.answers.Microsoft.com/forums/en-us/w7network/thread/24bdf172-2DBC-43b8-995d-a99b6a81413c/
  • Webcam Live Mail 2011 slide show: the slide show can be disabled and allow me to view attachments the old-fashioned way?

    I don't like the slide show feature.  I'd rather see my attachments separately as before.

    The slide show can be disabled and allow me to view attachments the old-fashioned way?

    @Paul7177

    Windows Live Mail 2011 doesn't have an option to turn off the slide show mode (it is part of the program).

    You can click on the image to see (which will open in whatever program is associated with that type of file images) or save (or all of them) and open later in a program of your choice.

    .. .Winston
    MSFT MVP Mail

  • Allowing external IP access via VPN Client

    We are looking for our remote VPN users to access an external IP address.  Basically once users authenticate when they try to access 202.1.56.19, they should be out nat through the external interface of the firewall.  Below is out of the package violated on "vpn ecrypt" tracer and as an extract from the config.  On the client, I see that the road to 202.1.56.19 was added, but it does not work.

    Please advise more information be required ing.  Thank you.

    access list INSIDE-OUT scope ip 10.15.160.0 allow 255.255.255.0 any
    access OUTSIDE list / allowed extended Interior ip 10.15.160.0 255.255.255.0 any
    Access-group OUTSIDE / inside interface OUTSIDE-IDC

    NONATIDC list of allowed ip extended access all 10.15.160.0 255.255.255.0

    NAT (INSIDE) 0-list of access NONATIDC
    NAT (INSIDE) 1 10.15.160.0 255.255.255.0
    Global (OUTSIDE-IDC) 1 128.15.155.2

    internal CorpVPN group strategy
    attributes of Group Policy CorpVPN
    value of server DNS 10.15.155.17
    VPN-idle-timeout no
    VPN-session-timeout no
    Protocol-tunnel-VPN IPSec
    Split-tunnel-policy tunnelspecified
    value of Split-tunnel-network-list SplitTunnel
    something.com value by default-field

    attributes global-tunnel-group CorpVPN
    address pool CorpVPNpool
    Group Policy - by default-CorpVPN
    IPSec-attributes tunnel-group CorpVPN
    pre-shared key

    Standard access list SplitTunnel allow 192.168.168.0 255.255.255.0
    SplitTunnel list standard access allowed host 202.1.56.19

    Packet-trace input outside-iDC tcp 10.15.160.18 22 202.1.56.19 22

    Phase: 1
    Type: ACCESS-LIST
    Subtype:
    Result: ALLOW
    Config:
    Implicit rule
    Additional information:
    MAC access list

    Phase: 2
    Type: FLOW-SEARCH
    Subtype:
    Result: ALLOW
    Config:
    Additional information:
    Not found no corresponding stream, creating a new stream

    Phase: 3
    Type:-ROUTE SEARCH
    Subtype: entry
    Result: ALLOW
    Config:
    Additional information:
    in 0.0.0.0 0.0.0.0 OUTSIDE-IDC

    Phase: 4
    Type: ACCESS-LIST
    Subtype: Journal
    Result: ALLOW
    Config:
    Access-group OUTSIDE / inside interface OUTSIDE-IDC
    access OUTSIDE list / allowed extended Interior ip 10.15.160.0 255.255.255.0 any
    Additional information:

    Phase: 5
    Type: IP-OPTIONS
    Subtype:
    Result: ALLOW
    Config:
    Additional information:

    Phase: 6
    Type: CP-PUNT
    Subtype:
    Result: ALLOW
    Config:
    Additional information:

    Phase: 7
    Type: VPN
    Subtype: ipsec-tunnel-flow
    Result: ALLOW
    Config:
    Additional information:

    Phase: 8
    Type: VPN
    Subtype: encrypt
    Result: DECLINE
    Config:
    Additional information:

    Result:
    input interface: OUTSIDE-IDC
    entry status: to the top
    entry-line-status: to the top
    output interface: OUTSIDE-IDC
    the status of the output: to the top
    output-line-status: to the top
    Action: drop
    Drop-reason: flow (acl-drop) is denied by the configured rule

    Essentially, the traffic needs to make a u-turn at ASA outside interface if I understand your configuration.

    You need the following to make it work.

    -permit same-security-traffic intra-interface

    -Host202 of the 10.15.160.0 ip access list permit 255.255.255.0 host 202.1.56.19

    -nat (OUTSIDE-IDC) 1 access-list Host202

  • Allow VPN users access a VLAN different

    I have an ASA 5505.  I have configured remote access VPN so that users can connect to the VPN and access my main VIRTUAL local network (inside).  I want to set so that when a user s in VPN, they are permitted access only to the CCV vlan (Vlan 2) as seen in my configuration.  Please note that there is also a VPN LAN LAN 2, which has been set up as well.

    What Miss me?

    !
    interface Ethernet0/0
    switchport access vlan 4
    !
    interface Ethernet0/1
    !
    interface Ethernet0/2
    !
    interface Ethernet0/3
    !
    interface Ethernet0/4
    !
    interface Ethernet0/5
    !
    interface Ethernet0/6
    switchport access vlan 2
    !
    interface Ethernet0/7
    switchport access vlan 2
    !
    interface Vlan1
    nameif inside
    security-level 100
    IP 10.240.0.1 255.255.0.0
    !
    interface Vlan2
    prior to interface Vlan1
    nameif HVAC
    security-level 100
    IP address 172.16.128.1 255.255.255.0
    !
    interface Vlan4
    nameif outside
    security-level 0
    IP address 12.x.x.x 255.255.255.0
    !
    passive FTP mode
    IP 10.240.0.0 allow Access - list extended CDEO 255.255.0.0 10.0.0.0 255.0.0.0
    IP 10.240.0.0 allow Access - list extended sheep 255.255.0.0 10.0.0.0 255.0.0.0
    IP 10.240.0.0 allow Access - list extended sheep 255.255.0.0 172.16.129.0 255.255
    . 255.0
    IP 10.102.229.0 allow Access - list extended sheep 255.255.255.0 172.16.129.0 255
    . 255.255.0
    IP 172.16.129.0 allow Access - list extended sheep 255.255.255.0 10.102.229.0 255
    . 255.255.0
    access-list sheep extended ip 172.16.128.0 allow 255.255.255.0 172.16.129.0 255
    . 255.255.0
    IP 172.16.129.0 allow Access - list extended sheep 255.255.255.0 172.16.128.0 255
    . 255.255.0
    list of inbound icmp permitted access extended throughout entire echo response
    list of extended inbound icmp permitted access any source-quench any
    list of extended all inbound icmp permitted access all inaccessible
    access list entering permit icmp any once extended beyond
    coming out to the one permitted all ip extended access list
    standard vpn access list allows 10.240.0.0 255.255.0.0
    standard vpn access list allows 10.102.229.0 255.255.255.0
    list of access allowed standard vpn 172.16.128.0 255.255.255.0
    pager lines 24
    asdm of logging of information
    Within 1500 MTU
    Outside 1500 MTU
    MTU 1500 HVAC
    IP local pool 172.16.129.1 - 172.16.129.5 mask 255.255.255.0 shhfvpnpool
    ICMP unreachable rate-limit 1 burst-size 1
    don't allow no asdm history
    ARP timeout 14400
    Global 1 interface (outside)
    NAT (inside) 0 access-list sheep
    NAT (inside) 1 0.0.0.0 0.0.0.0
    Access-group out on the interface inside
    Access-group interface incoming outside
    Route outside 0.0.0.0 0.0.0.0 12.x.x.x 1
    dynamic-access-policy-registration DfltAccessPolicy
    the ssh LOCAL console AAA authentication
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp - esp-sha-hmac hand
    Crypto ipsec transform-set esp - esp-md5-hmac RIGHT
    life crypto ipsec security association seconds 28800
    Crypto ipsec kilobytes of life - safety 4608000 association
    Crypto-map dynamic dynmap 10 transform-set RIGHT
    life together - the association of security crypto dynamic-map dynmap 10 28800 seconds
    Crypto-map dynamic dynmap 10 kilobytes of life together - the association of safety 4608000
    Crypto-map dynamic dynmap 10 the value reverse-road
    CDEOVPN 35 crypto card matches the address CDEO
    CDEOVPN 35 crypto map set peer 64.x.x.x
    card crypto CDEOVPN 35 the transform-set hand value
    map CDEOVPN 100-isakmp ipsec crypto dynamic dynmap
    CDEOVPN interface card crypto outside
    crypto isakmp identity address
    crypto ISAKMP allow outside
    crypto ISAKMP policy 20
    preshared authentication
    the Encryption
    sha hash
    Group 1
    life 86400
    crypto ISAKMP policy 30
    preshared authentication
    the Encryption
    md5 hash
    Group 2
    life 86400

    Console timeout 0
    management-access inside

    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    attributes of Group Policy DfltGrpPolicy
    VPN-idle-timeout no
    internal group shhf strategy
    attributes of shhf group policy
    VPN-idle-timeout 30
    VPN-session-timeout 1440
    VPN-filter no
    Protocol-tunnel-VPN IPSec
    Split-tunnel-policy tunnelspecified
    Split-tunnel-network-list value vpn

    tunnel-group 64.x.x.x type ipsec-l2l
    64.x.x.x group tunnel ipsec-attributes
    pre-shared key *.
    tunnel-group shhf type remote access
    tunnel-group shhf General attributes
    address shhfvpnpool pool
    strategy-group-by default shhf
    shhf group tunnel ipsec-attributes
    pre-shared key *.
    tunnel-group vpnclient type remote access
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    !
    global service-policy global_policy
    context of prompt hostname
    no remote anonymous reporting call
    Cryptochecksum:1cbd55e987f9b41cd2ebcb320fa2e3b2
    : end

    This route to be applied on the switch, if your port eth0/7 on SAA is connected to a switch of later3.

    "Route ip 172.16.129.0 255.255.255.0 172.16.128.1.

    So, don't worry on this route, if you can not apply on the SAA.

    So are you saying that a PC is directly connected to eth0/7 on the SAA.

    What is the IP address, mask and gateway address on the PC connected on eth0/7?

    The trace package seems good.

  • ESXi allows to directly access the disk?

    Two quick questions...

    (1) ESXi allows to directly access the disk?

    .. .and associated with what precedes :)

    (2) Let's say I want to use Windows Home Server as a guest within ESXi operating system.  It formats the disks using standard NTFS that can be read by any Windows machine.  (eg. you can remove the hard drive of the server and paste it into any other computer and you can read it).  How would this work in ESXi?  ESXi would force first all of the disk formatted to VMFS and then have NTFS below?  (so you could not "access the drive except in other machines on ESXi)

    Thanks for any help!

    However, if I create a virtual disk (using VMFS) that even if the virtual disk is formatted NTFS by the client operating system that he still cannot be read in another computer because it is in a 'container' of VMFS.

    Yes, I would say that's pretty accurate, there are a few exceptions of course... but overall, Yes.

  • Access to the view of the Oracle Applications via Dblink

    Hi gurus,

    Here's my problem:

    I installed on my local machine to apex and I created dblink to my applications remote oracle DB. Now, if I try to access all the views in the db to oracle applications, iam not getting data from the org context is not set.

    I tried to set the org context using below:

    exec dbms_application_info.set_client_info@appsdblink ('100');

    but still iam not received all data. I hope that there should be a way to do it.

    Thank you
    Sirot

    SK:

    What return the test script?
    You will need to run the context give code as a process before header or have the query of the report be returned by a pl/sql function in which you can set the context.

    CITY

Maybe you are looking for

  • I can't click on the tabs on my firefox, firefox 30 desk, how to fix this?

    I have reset and always get this question, I would like to go and click Open a new tab, and then I see the tab on the toolbar. I would go in trying to open the tab by clicking on it and it wouldn't work. How to fix this? I know about the shortcut but

  • with 2 windows open, if I zoomed in Windows Active, expanded as this one. How to avoid this?

    Conditions:2 windows of firefox open 21.0, showing 2 different pages, which comes from the same server.One of the 2 pages it active, having shot on it with the mouse.If I try to zoom on active windows, is enlarged also another one that is not active.

  • No additional data in the address book

    Even if my AddressBook is connected to my ICloud, where all my contacts When I opened AB, it is empty. All my contacts have disappeared

  • HP Recovery Manager - software list missing

    When I open my HP Recovery Manager and select 'Yes' to reinstall the software program, the select a window installer appears (as it should) EXCEPT that it's EMPTY! Where is the list of all the programs that we have installed on my computer when I use

  • Laptop Hp extended warranty regarding

    To, support for Hp Tehnician My Hp Envy 15 laptop is still under warranty, but it will soon expire. You please help me to get the procedure how or can hp technician can please send me the link of guarantee package so I can scope. Help please.