Authentication and access using UTL_HTTP II

I am using the PL/SQL and UTL_HTTP to connect to site from a provider (URL).  My initial connection attempt is done by a simple GET request, but ultimately I have to spend using http and POST to transfer a file.  I was delivered with a URL by the seller.  If I plug the URL into a browser, I get the following response:

" < = Xmlns:ns2 LiaisonServiceResponse ' http://foo.URL.com/XSD/request/ "xmlns =" http://foo.URL.com/XSD/Response/ ">
Service < ServiceName > router < / ServiceName >
< > 13420 ServiceVersion < / ServiceVersion >
< ServiceRequestDate > 2014-10-21T 09: 34:53 < / ServiceRequestDate >
< ServiceRequestID > VB16811843 < / ServiceRequestID >
< ServiceResult >
< success > true < / success >
< message > the document successfully submitted to the DXP: messageID = UG16811844 < / Message >
< / ServiceResult >
< / LiaisonServiceResponse >

When I try this using PL/SQL based on the sample code posted by Billy ~ involving an error of the output ACL Verreynne I get the following:

--

URL: http://foo.URL.com/SOI/rest/marvwd01409301219039/eastman_cust/service-router/Marvin-Eastman-to-DXP
Ref 1
DETAILED ACL_ERROR: SQL ERROR CODE:-24247
DETAILED SQL ERROR MSG ACL_ERROR: ORA-24247: access denied by access control (ACL) of network list
Call stack:-stack of calls to PL/SQL
the line object
serial number of handle
0x65a33e70 anonymous 62
block


Stack error: ORA-24247: access denied by access control (ACL) of network list


Trace of the error: ORA-06512: at "SYS." UTL_HTTP", line 1128
ORA-06512: at line 25

Here's the code used.  Line 25 equals the BEGIN_REQUEST function. The seller is looking for beaches of specific IP addresses on our part and I confirmed that, regarding the IP addresses that we send you this they expect.  I know, there is no other authentication involved.

Set serveroutput size unlimited;
TOGETHER TO DEFINE
echo setting
DECLARE
C_USER_AGENT constant varchar2 (4000): = ' Mozilla / 5.0 (Windows + NT + 6.3; + WOW64) + AppleWebKit / 537.36 + (KHTML, + as + Gecko) +Chrome/33.0.1750.154+Safari / 537,36';
Resp_v UTL_HTTP. RESP;
RespOut XMLTYPE.
Req_v UTL_HTTP. REQ;
CLOB ReadResp;
URL_v VARCHAR2 (500);
BOOLEAN FExist;
FLen NUMBER;
FNamePath VARCHAR2 (750);
Directory of BSize;
Buffer_v VARCHAR2 (32767).
Milling BOOLEAN;
BEGIN
  URL_v       := ' http://foo.url.com/soi/rest/marvwd01409301219039/eastman_cust/service-router/marvin-eastman-to-dxp';
--
DBMS_OUTPUT. PUT_LINE ('URL: ' |) URL_v);
UTL_HTTP. SET_RESPONSE_ERROR_CHECK (TRUE);
UTL_HTTP. SET_DETAILED_EXCP_SUPPORT (TRUE);
UTL_HTTP. SET_COOKIE_SUPPORT (TRUE);
UTL_HTTP. SET_TRANSFER_TIMEOUT (10);
UTL_HTTP. SET_FOLLOW_REDIRECT (3);
UTL_HTTP. SET_PERSISTENT_CONN_SUPPORT (TRUE);
DBMS_OUTPUT. Put_line ('Ref 1');
Req_v: = UTL_HTTP. BEGIN_REQUEST (url = > URL_v, method = > 'GET', http_version = > utl_http.) HTTP_VERSION_1_0);
--
DBMS_OUTPUT. PUT_LINE('2');
UTL_HTTP. SET_HEADER (Req_v, "User-Agent", C_USER_AGENT);
UTL_HTTP. SET_HEADER (' Req_v, 'Content-Type', ' text/xml; charset = utf-8 ');
-UTL_HTTP. SET_HEADER (Req_v, "Content-Length", FLen);
Resp_v: = UTL_HTTP. GET_RESPONSE (Req_v);
DBMS_OUTPUT. PUT_LINE('5');

DBMS_LOB. CREATETEMPORARY (ReadResp, TRUE);
Milling: = FALSE;
LOOP
WHEN the EXIT milling;
BEGIN
UTL_HTTP. READ_LINE (Resp_v, Buffer_v);
IF LENGTH (Buffer_v) > 0 THEN
DBMS_LOB. WRITEAPPEND (ReadResp, LENGTH (Buffer_v), Buffer_v);
END IF;
EXCEPTION WHEN UTL_HTTP. END_OF_BODY THEN
DBMS_LOB. WRITEAPPEND (ReadResp, LENGTH (Buffer_v), Buffer_v);
UTL_HTTP. END_RESPONSE (Resp_v);
Milling: = TRUE;
END;
END LOOP;
UTL_HTTP. END_RESPONSE (Resp_v);
-UTL_HTTP. END_REQUEST (Req_v);
DBMS_OUTPUT. Put_line (' Conn continued: ' |) TO_CHAR (UTL_HTTP. GET_PERSISTENT_CONN_COUNT));
DBMS_OUTPUT. Put_line (ReadResp);
DBMS_LOB. FREETEMPORARY (ReadResp);
EXCEPTION
WHEN UTL_HTTP.NETWORK_ACCESS_DENIED THEN
DBMS_OUTPUT. PUT_LINE (' DETAILED SQL ERROR CODE ACL_ERROR: ' |) TO_CHAR (UTL_HTTP. GET_DETAILED_SQLCODE));
DBMS_OUTPUT. PUT_LINE ('ACL_ERROR DETAILED SQL ERROR MSG: ' |) UTL_HTTP. GET_DETAILED_SQLERRM);
DBMS_OUTPUT. Put_line ("call stack:" | ") DBMS_UTILITY. FORMAT_CALL_STACK | 10;
DBMS_OUTPUT. Put_line (' the battery error: ' |) DBMS_UTILITY. FORMAT_ERROR_STACK | 10;
DBMS_OUTPUT. Put_line (' error Backtrace: ' |) DBMS_UTILITY. FORMAT_ERROR_BACKTRACE | 10;
IF Req_v.url IS NOT NULL THEN
UTL_HTTP. END_REQUEST (Req_v);
END IF;
WHILE OTHERS THEN
DBMS_OUTPUT. PUT_LINE (' SQL ERROR CODE: ' |) TO_CHAR (UTL_HTTP. GET_DETAILED_SQLCODE));
DBMS_OUTPUT. PUT_LINE (' SQL ERROR MSG: ' |) UTL_HTTP. GET_DETAILED_SQLERRM);
DBMS_OUTPUT. Put_line ("call stack:" | ") DBMS_UTILITY. FORMAT_CALL_STACK | 10;
DBMS_OUTPUT. Put_line (' the battery error: ' |) DBMS_UTILITY. FORMAT_ERROR_STACK | 10;
DBMS_OUTPUT. Put_line (' error Backtrace: ' |) DBMS_UTILITY. FORMAT_ERROR_BACKTRACE | 10;
UTL_HTTP. END_REQUEST (Req_v);
END;
/
display errors
TOGETHER TO DEFINE SUITE;
trigger the echo;

Thank you for your help in advance

Paul

Paul,

You must grant appropriate network access to the schema (or role) to try using utl_http.

See the documentation for the DBMS_NETWORK_ACL_ADMIN package.

You can find the version of Oracle 11 g here: DBMS_NETWORK_ACL_ADMIN

You can find on what ACL are currently defined in your db by displaying views DBA_NETWORK_ACL_PRIVILEGES and DBA_NETWORK_ACLS.

Most likely, you will need create a new ACL, granting the privilege to connect to your schema or role affecting access to the required network resource:

CREATE ROLE WEB_SERVICES_CONSUMER;
GRANT WEB_SERVICES_CONSUMER TO YOUR_SCHEMA;
BEGIN
  DBMS_NETWORK_ACL_ADMIN.CREATE_ACL(acl         => 'web-services.xml',
                                    description => 'Web Wervices ACL',
                                    principal   => 'WEB_SERVICES_CONSUMER',
                                    is_grant    => true,
                                    privilege   => 'connect');
--  Optional
--  DBMS_NETWORK_ACL_ADMIN.ADD_PRIVILEGE(acl       => 'web-services.xml',
--                                       principal => 'WEB_SERVICES_CONSUMER',
--                                       is_grant  => true,
--                                       privilege => 'resolve');

  DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL(acl  => 'web-services.xml',
                                    host => 'foo.url.com'
--                                    lower_port => 80
--                                    upper_port => 80
                                    );
END;
/

Make you the host of procedures ASSIGN_ACL corresponds to the web service host you are trying to access to, or use a wildcard to allow access to the area of the (sub)-, for example *. foo.URL.com or to access the area of void foo or *. URL.com to access the any-URL.com domain.

Tags: Database

Similar Questions

  • Kerberos authentication and use the KTPASS tool

    I work in support to a network analysis software company.  We have the ability to use Kerberos authentication for our product.  Recently, we found that when you generate the keytab file using ktpass on a Windows Server 2003 or 2008, it is a step backwards in the process.  Eventually do you run the ktpass twice to get the keytab file good.

    Our external authentication module is software that uses Kerberos authentication and then he puts it on a remote client computer to access our software. We configure our Kerberos application and then read from the file keytab generated on a Windows Server 2003 or 2008 domain controller by using Kerberos V5 found in the AD domain controllers.

    When you run the ktpass tool, you must submit the username and password to generate the keytab file.  When it is generated, there is a generated KVNO number / incremented in the keytab file.  But it writes the file first and then updates the KVNO + 1 number in the actual key stored in AD.  If your keytab file is always number 1 behind what is actually stored in AD!

    We can fix it by running ktpass once,

    Examine the properties for the KVNO number in the last keytab file

    Re-run the ktpass, but number KVNO + 1

    The keytab file is generated, AD wrote the new KVNO + 1 number in AD

    But now our keytab file matches KVNO number generated by AD

    We lose a step in the ktpass tool?

    is there a way to see what the current number of KVNO is set in AD

    We have tested extensively with Windows 2003 and Windows 2008 R2 domain controllers

    The guests were the two Windows 7 Prof 64 bit

    Was just curious if anyone has had this experience?

    Thanks in advance,

    Terry Ball

    Hello Terry,

    According to the description of the problem, it seems that you are working on Windows server 2003 and 2008. I would recommend posting your query on the Server Forums TechNet for Windows.

    TechNet is watched by other computing professionals who would be more likely to help you. Please check the below link which will redirect you to the appropriate forum.

    http://social.technet.Microsoft.com/forums/WindowsServer/en-us/home?Forum=winserver8gen

    Hope that the information provided is useful. Let us know if you have questions related to Windows, we will be happy to help you.

    Kind regards

  • Hello.  I just uninstalled LR 4.1 and reinstalled using the disc.  There is a 4.4 update I tried to install, but he failed both times I tried.  Message says 'Fail' but without code, etc.  It's 2016 and I use windows 7 64-bit.  Is there an access

    Hello.  I just uninstalled LR 4.1 and reinstalled using the disc.  There is a 4.4 update I tried to install, but he failed both times I tried.  Message says 'Fail' but without code, etc.  It's 2016 and I use windows 7 64-bit.  Is there access to the 4.1 just uninstall and fresh install 4.4 from the site?  Is the problem 4.1 and 4.4 no longer supported?

    You can download LR 4.4.1 including the latest update here:

    https://www.Adobe.com/support/downloads/product.jsp?product=113&platform=Windows

    Uninstall the current version of LR, you have it installed, download LR 4.4.1 installer and install it. I don't know what causes your problem with the update, but that a full installer for 4.4.1 can operate without any problems.

  • If I create a form using the free trial software, will I be able to use and access the form, after the trial period is over?

    If I create a form using the free trial software, will I be able to use and access the form, after the trial period is over?

    Yes, you can access the project that you created after the trial is over, but you need to back it up.

    Concerning

    Stéphane

  • I get the message: access using your Adobe ID has expired. Check your network connection and try again. The network works fine. I need to post this update. What is the problem?

    I have an update to a site that has been for some time. When I click on the "publish" button, I get the error message: access using your Adobe ID has expired. Check your network and try again. The network is fine (email, browsers work). How can I solve this problem?

    Snapshot.jpg

    Hello

    Please see the link below that has the same discussion.

    https://forums.Adobe.com/thread/1934384

    Kind regards

    Vivek

  • I am trying to download revisions and I get this notice: access using your AdobeID has expired. Check your network connection and try again.

    I am trying to download revisions and I get this notice: access using your AdobeID has expired. Check your network connection and try again.

    Hello

    Please try the suggestions in the link below one by one and I'm sure that you will be able to solve the problem.

    I can't Adobe Business Catalyst. When I publish my site to my testing with Adobe Business Catalyst site, I get a message that I was out. What is going on?

    Kind regards

    Vivek

  • An authentication error occurred using your identification code Adobe deconnectez_ you and restart Muse and connect you... nothing changes.

    An authentication error occurred using your identification code Adobe deconnectez_ you and restart Muse and connect you... nothing has changed.  Under preferences to Muse I see the username and password correct, but under "switch account", I see my old username. Attempt to rewrite with the new username and pswrd is not allowed.Screen Shot 2015-11-10 at 12.57.48 PM.pngScreen Shot 2015-11-10 at 12.58.17 PM.png

    Can anyonehelp me?Screen Shot 2015-11-09 at 3.25.06 PM.png

    On click to change the account it should allow you to delete the existing account and add new.

    Thank you

    Sanjit

  • How to remove the trial version of Acrobat DC 30 days that I have somehow on my MacBook Pro?  I don't want the dang thing, and it prevents me from using my Acrobat Pro 11 software.  Trying to access using the tree without end of support for Adobe is reall

    How to remove the trial version of Acrobat DC 30 days that I have somehow on my MacBook Pro?  I don't want the dang thing, and it prevents me from using my Acrobat Pro 11 software.  Trying to access using the tree without end of support for Adobe of really making me cranky.

    Hi thomh65004143,

    You simply drag the Acrobat DC application from the applications folder to the trash to uninstall.

    Then restart your system & install Acrobat XI Download Adobe Acrobat products. Standard, Pro | DC, XI, X.

    Let me know if you are still having a problem.

    Kind regards

    Nicos

  • How can I configure Outlook Express to receive messages to different mailboxes (via POP3) but to send messages and responses using a single SMTP account?

    How can I configure Outlook Express to receive messages to different mailboxes (via POP3) but to send messages and responses using only a single SMTP account?

    In other words, I need to download via POP3 messages sent to the * address email is removed from the privacy *, * address email is removed from the privacy *, * address email is removed from the privacy * but I want to send messages using Mar SMTP service associated to * address email is removed from the privacy *

    If I get a message like * address email is removed from the privacy * I want to answer as * address email is removed from the privacy *.

    Is this possible?

    How can I configure Outlook Express?

    Concerning

    Marius

    You can do this if the Server SMTP allows you to send from a location that you are not connected via their internet service.  So if you have this permission, go to tools | Accounts | Add mail.  Then under the account of property | You want to set the server for incoming mail to the POP3 account, and then the SMTP protocol for the other account that you use to send servers.  And then indicate whether or not the server requires authentication, and if yes, then you will need to put in the user name and password for the SMTP server it.  Under properties. Advanced to define appropriate ports that may be different from the default value according to e-mail accounts.  You can also check the "leave a copy of messages on the server" for accounts POP3, if you access messages from multiple computers.

    Once you have an account set up, then you can set others upward in the same way, but change the POP3 properties for each while leaving the SMTP ones the same.

    Once you have all that in place, you might want to backup things in case something goes wrong: www.oehelp.com/OETips.aspx#6

    Steve

  • Cisco ACS 5.2 authentication and authorization processes

    I am designing a network and I asked me a few questions that I don't know how respond to those so I thought putting it in the forum to see if I can get help.

    First, thank you very much for reading this post and thank you if you can add comments to help out me.

    installation program:

    Two ACS on each center data in Server and application to the switches by dc + hybrid mode the Ganymede and fold to the other on the failure scenario.

    ACS - version 5.2 planning upgrade to 5.8, if she is stable.

    Result of the will

    If users fails authentication AD then it should be rejected.

    If defective AD on ACS and ACS needs to check the other ACS and other ACS has connection AD, then it should demand more diver ACS...

    I'm sure it is not possible, but that it was the main application... I disputed so now the new request

    If AD fails ACS should fall back to the local database. If the local database is not authenticte then it should allow to switch to interrogate the same request of ACS secondary rather then to reject the application.

    Litt: local database is reserved for the network admin but maybe some contractor need to access switches and other devices and they will have the entry in listing so if fails AD, they can always authenticates agaist DC2 AD via DC2 ACS.

    I think to set up

    Authentication rule 1 - authenticate again AD,

    If authentication failed - Reject

    If usernot has been found - reject

    If the process failed - continue

    This should take by default which will be the internal database.

    If authentication failed - Reject

    If the user has not found - drop

    If the process failed - drop

    This should give no answer to switch and then switch should try the second radius server in the list...

    Please someone explain this flow chart for me... and it's correct assumptions...

    I would like to know if there are a few good diagram that I can refer to see the whole process and can use in my presentation...

    Thank you very much for reading and you answer it...

    Hello

    I'm not sure I get your question, but I will try to answer in the way that I understood.

    If you send a drop as a result, this means that ACS deposited the request, causing the AAA client to try again another failure on toward another AAA server.

    A tree had fallen on the community a few years ago:

    (https://supportforums.cisco.com/discussion/11811801/aaa-servers#3931298)

    I hope that's what you are pregnant.

  • Secure ACS Authentication and Authorization with SecurID

    I am able to authenticate connection attempts using an external database (RSA SecurID).  The problem is that everyone with a token is authorized to connect on any switch with priv15 or whatever I put (but no way to control who gets what access).  How can I allow users based on a certain type of belonging to a group?  The SecurID server is already integrated with LDAP, it only checks to see if the user exists in the database.

    I need to create two groups, or even only allow a single group and deny everyone, but anyone in the organization with a token is allowed to connect.  I can't find guides who do anything beyond authentication when you use a SecurID token.

    Thank you.

    Hello

    Have routers and switches, you given the command "authorization exec default group aaa GANYMEDE", it seems that you have only defined authentication on devices. When the control is in place, user access privileges may be governed by the ACS. In network administrator access by default policy (if you are using the default strategy for GANYMEDE), to set the authorization rule to verify membership in a user group and provide the appropriate profile of shell. Make the default rule to give DenyAccess shell profile to other users.

  • order of the authentication and authorization air ISE

    Hello

    I am looking to configure ISE to authenticate joined AD PC (Anyconnect NAM help for user authentication and the machine with the EAP chaining) and profile Cisco IP phones. The Pc and phones connect on the same switchport. The switchport configuration was:

    switchport
    switchport access vlan 102
    switchport mode access
    switchport voice vlan 101
    authentication event fail following action method
    multi-domain of host-mode authentication
    authentication order dot1x mab
    authentication priority dot1x mab
    Auto control of the port of authentication
    MAB
    added mac-SNMP trap notification change
    deleted mac-SNMP trap notification change
    dot1x EAP authenticator

    The configuration above worked well with authentication sessions 'show' of the switch showing dot1x as the method to the field of DATA and mab for VOICE. I decided to reverse the order of authentication/priority on the interface of the switch so that the phone would be authenticated first by mab. As a result, the authentication sessions 'show' of the switch showing mab as a method for both VOICE and DATA.

    To avoid this I created a permission policy on ISE to respond with an "Access-Reject" when the "UseCase = Lookup host" and the endpoint identity group was unknown (the group that contains the PC AD). This worked well worked - the switch would attempt to authenticate the PC and phone with mab. When an "Access-Reject" has been received for the PC, the switch would pass to the next method and the PC would be authenticated using dot1x.

    The only problem with this is that newspapers soon filled ISE with denys caused by the authorization policy - is possible to realize the scenario above without affecting the newspapers?

    Thank you
    Andy

    Hi Andy -.

    Have you tried to have the config in the following way:

     authentication order mab dot1x authentication priority dot1x mab

    This "order" will tell the switchport always start with mab , but the keyword 'priority' will allow the switchport to accept the authentications of dot1x to dot1x devices.

    For more information see this link:

    http://www.Cisco.com/c/en/us/products/collateral/iOS-NX-OS-software/identity-based-networking-service/application_note_c27-573287.html

    Thank you for evaluating useful messages!

  • patterns of authentication and interactive reports

    Hello

    I have 2 groups of users with different levels of security access, so I need to restrict certain data in the interactive report. I want to create 1 report with all data and 1 report that excludes certain documents based on one of the fields. Can I do this using an authentication scheme? Can someone direct me to some good instructions on how to do this? I'm open to other suggestions as well.

    I have another thread on that as well, but I wonder about another method (limitation of access to the records in interactive report), hoping that it will be a little easier.

    Thank you!

    Rachel PRO wrote:

    I have 2 groups of users with different levels of security access, so I need to restrict certain data in the interactive report. I want to create 1 report with all data and 1 report that excludes certain documents based on one of the fields. Can I do this using an authentication scheme? Can someone direct me to some good instructions on how to do this? I'm open to other suggestions as well.

    I have another thread on that as well, but I wonder about another method (limitation of access to the records in interactive report), hoping that it will be a little easier.

    Authentication schemes are used to establish the identity of a user. Common methods to include validating a username and password, call an external mechanism to the SSO or scan of a fingerprint. Authentication schemes are not related to your problem.

    Did you actually means 'permission' rather than 'authentication '? Authorisation schemes determine the actions by controlling access to pages and components of APEX, a user can run. You can use authorization to control if a user sees a report region, but not the lines that are shown in this report (although technically possible, it is generally not the best approach).

    In short: authentication determines the identity of the user. Authorization determines the operations that a user with this identity can perform. Restricted access control these operations can be performed on the data.

    What you need is an access control and DTV and view the methods described in the other thread are solutions to that. Close this message and focus on the other.

  • How to send XML using UTL_HTTP

    I try to drive, how to send XML data to a webserver using UTL_HTTP, but I get no answer

    I need to present the following document to server 'http://api.fastsms.co.uk/api/xmlapi.php' XML instructions are "the XML Document must be posted not coded, with a game like"xml"of UTF-8 character set parameter"

    If I submit the following in their test form XML

    <? XML version = "1.0"? >

    < apirequest version = "1" >

    < user >

    < username > * USER * < / username >

    password <>* password * < / password >

    < / user >

    < application >

    < name > Application example < / name >

    < version > 1.0 < / version >

    < / application >

    < inboundcheck lastid = "10711399" / >

    < / apirequest >

    I get a response XML returns with the messages in my Inbox.

    This is the code I'm trying to use to accomplish the same thing about PL/SQL: I know an answer just as soon as there is simply no content - header information.  What I am doing wrong?

    l_xml VARCHAR2 (5000);

    Utl_http.req req;

    resp utl_http.resp;

    HostHeaderName VARCHAR2 (256); -Name of the response header

    header_value VARCHAR2 (1024); -Value of the response header

    response_text VARCHAR2 (4000); -Response body

    l_url VARCHAR2 (100);

    BEGIN

    l_xml: = ' xml = <? XML version = "1.0"? > ';

    l_xml: = '< apirequest version = "1" >';

    l_xml: = '< user >. "

    l_xml: = ' < username > * USER * < / username > ';

    l_xml: = ' < password > * PASSWORD * < / password > ';

    l_xml: = ' < / user > ';

    l_xml: = '< application >. "

    l_xml: = ' < name > Application example < / name > '.

    l_xml: = ' < version > 1.0 < / version > ';

    l_xml: = < application "/ > ';

    l_xml: = ' < inboundcheck lastid = "10711399" / > ";

    l_xml: = ' < / apirequest > ';

    -Connection HTTP open

      l_url := ' http://api.fastsms.co.uk/api/xmlapi.php';

    Req: = utl_http.begin_request (l_url, 'POST', utl_http. HTTP_VERSION_1_1);

    -Set headers for type and length

    Utl_http.set_header ("req, 'Content-Type', ' application/x-www-formulaires-urlencoded");

    Utl_http.set_header (Req, 'Content-Length', to_char (length (l_xml)));

    -Write the setting

    Utl_http.write_text (Req, l_xml);

    -Reading response file

    resp: = utl_http.get_response (req);

    -Print the response headers

    BECAUSE me in 1... Utl_http.get_header_count (resp) LOOP

    Utl_http.get_header (resp, i, header_name, header_value);

    logging_pkg.info(header_name ||) ': ' || header_value);

    END LOOP;

    -Print the response body

    BEGIN

    LOOP

    Utl_http.READ_TEXT (resp., response_text);

    logging_pkg.info (response_text);

    END LOOP;

    EXCEPTION

    WHEN utl_http.end_of_body THEN

    logging_pkg.info ('end of body');

    END;

    -close the http connection

    Utl_http.end_response (resp);

    EXCEPTION

    WHEN utl_http.end_of_body THEN

    Utl_http.end_response (resp);

    END;

    See you soon,.

    Brent

    The fact that you do not receive a response of HTTP (headers) return, means that a basic communication worked. After reading the response:

    answer: = utl_http.get_response (request);

    Check the HTTP status code:

    If response.status_code...

    You should get a HTTP 200 for a successful call. May be that you run in a 50 x results, which implies a server error has occurred processing your HTTP call.

    Best bet to see the error on the server is the access log and/or Apache error.

    Oh yes - XML submits work very well through UTL_HTTP. Take a look at the sample code in https://forums.oracle.com/message/10450611#10450611

    In what concerns the validation code and using the syntax highlighting - edit, click use the Advanced Editor, highlight the code and click on the > on the toolbar to access the text highlighting the menu. Unfortunately this does not use fixed fonts - again. I hope that this will be corrected as forum features are addressed.

  • Urgent - Custom authentication and authorization for the application of the ADF

    Hi friends,

    Custom implementation for authentication and authorization for the application of the ADF

    My project to use the OID , authentication and authorization, we will need to support both OAM and DB tables ( according to the preferences of the client during the installation ).

    I am new to this and do not have a clue about the same.

    Please guide me how to set up both in JDeveloper 11 g + ADF

    Thanks in advance.

    The answers you got up to present every point in the right direction. ADF security see the authentication of WLS, even for business authorization with respect to user roles defined on the WLS server. During the deployment, ADF security defined application roles are mapped to the user enterprise groups

    Application developed using Jdeveloper ADF +.

    This would use WLS for authentication

    Users of authentication - LDAP (OID) - are stored in LDAP

    Use the OID authentication provider in WLS

    Authorization - OAM or database (authorization details are stored in the DB or OAM tables)

    You can't allow users without authentication. If you need create authentication providers additional if they exist for OAM and RDBMS (there is a supplier of existing RDBMA, that you can use to identify users and to assign membership user groups). Then, you set the optional flag so that when authentication fails for additional providers you can always start the application.

    When running Admin users - create users from roles to create and assign permission privileges to the role (for pages and workflows)
    assign (or remove) the roles to/to leave users.

    ADF security uses JAAS to permissions that you can change using Enterprise Manager when running. Permissions are granted to the application roles and application roles are granted to business roles that which then has users become members of the. If you want to change the status of user account, then you don't do this the ADF or EM, but use a direct access to the provider of the user (for example, access OID, RDBMS access etc.) There is no unified administration API available that would allow you to do this via WLS (which uses OPSS).

    If your question is in the context of the ADF, the documentation, with that you should follow is OPSS and WLS authentication providers.

    Frank

Maybe you are looking for