BI Publisher data level / security at the level of the line
I would like to know how we can give data level or line level of security defined in BI 11g Publisher. If you have any best practice document/link, please provide.
Don't know if you have already activated
Tags: Business Intelligence
Similar Questions
-
All my data have doubled and the lines are slightly compensation and overlapping. Unusable. How to restore the distorted view course content?
Hello Arnold,.
A screenshot of the upper-left corner of your document could help the issue. Include as much as in the example below.
If this section of the table does not display data "doubled and shifted", provide a second screenshot of a section of the same size, showing a sample of the data in question.
Kind regards
Barry
-
Why my activity log is not up-to-date on security for the family?
I changed my email address on my microsoft account and added a new one. It will not remove the old e-mail account. I also can't progress reports updated on my child account. What can I do?
Hi Janice,.
For your account number, please create separate in the accounts Microsoft forum thread because they are the only one who can better address your concern.
On the question of parental control, not be victim of reports as the child user account is still associated with the former Family Safety parent email. To resolve this problem, you must re - set the parental controls by using the new parent account. Please follow these steps:
1. open the client of parental controls on your computer.
2. on the upper right side of the parental control window, click the icon to get the latest settings from the Web site . After a few seconds, it displays a dialog box saying that there is no accounts on your computer. Click set up the Family Safety.
3. If the dialog box has not shown, please uninstall the parental control on your computer in order to remove the link to child accounts with parental control. Then, reinstall the client of parental control again. You can download the latest version here.
4. connect again to the customer to parental control using the parent account.
5. follow the on-screen instructions to set up parental controls.
6. sign in to the to http://familysafety.microsoft.com using the parent account and change the settings (including activity reports) according to your preference.
7. open again the parental control client, and then click the icon to get the latest settings from the Web site on more time.
Thank you!
-
Sorting dynamic data to display on the lines of the specific web table.
I am building a reservation application simple appt. On one page, I have a table, with the first column being hourly appt for every 15 minutes.
08:00
08:15
08:30
and so on. I have every time as a link to book an appt spending time as a url parameter to the booking page (which works fine).
I'm strugging with the sort of appointments that exist in the database with the time slot for it on the table of the web page, making it visually appealing to the end user.
08:00
08:15 some existing appointment
08:30
I'd be fine if a repeat region would work, corresponding to a hidden field with the static time value to the record returned by SELECT, but I don't know how to coorelate the two. Open nominations leaving blank slots, which makes a single view of their day.
Thanks in advance for any help!
> I've created a table appt_tm where each
> column is an increment of time different 15 min
N ° your appt_tm table must have a single column - appt_time. You add a line for each time slot. Then you simply outer join the appt_time column in the appt_tm table to the table of the appts.
> appt_hr | ClientName. type | appt_day | appt_month | appt_year
Why do you appt day, month and year of columns? Why not just use a date field?
-
Purchase contract expiry date and the date of breakdown of the course on the cover
Hello
In the blanket purchase agreement, I see the expiration date and price paused I see the date and to this day, can someone tell me the difference between these two dates?
Question
1. when I try to put an end date (expiry date) to one of the line I get this error message, or when I try to cancel the po line giving a reason, he throws the same error.
The error
"You cannot cancel or finally close this agreement line because it has open purchase order lines with reference to this document."
Concerning
SudharshanHi Sudarshan,
If you are satisfied with the answer, then please mark this thread and close so that other people can return it in the future, otherwise it will create a confusion that this question was never answered/processed... :) Hope you agree with me... Let me reiterate, I'm not a greedy person on points... I just joined this forum to learn many good consultants autour.Kind regards
S.P DASH -
Script to fix the line terminators Chr (13) | CHR (10)
Hi all
I try to analyse incoming data to ensure that the line terminators are the used by Windows: Chr (13) | CHR (10). The information is within a CLOB.
In my tests, I asked the value into a Varchar2 and has done to detect the differences:
FOR loop_counter in 1... l_len
Loop
C_Char: = Substr (S_Value, Loop_Counter, 1);
Dbms_Output.put_line ('Char' | loop_counter |': ' |) C_Char);
END LOOP;
I can see Chr (13) | Chr (10) with this and also make a logic to replace.
My Question is:
How do I effectively detect when there's only Chr (13) and then proceed in Chr (13) | CHR (10).
I intend to put this code on a trigger.
Thanks in advance.
Mijail o. T.
Published by: 914451 on March 20, 2012 06:35914451 wrote:
Given that the filtering is greedy the above model will include the character following the Chr (13) and it will be lost. Already tested that.He is lost, because you did not include \1 in your replacement: Chr (13) | Chr (10) | » \1'
This has nothing to do with greedyness of regular expressions. Gluttony comes in pla when multy tank of wildcards (+ and *) are used. And don't forget: \1 needs () in the model of looking for work!Also the opinion it must be more complicated because it must match to replace:
Chr (13) OR Chr (10) but NOT Chr (13) | CHR (10)If you had red a few resources on regular expressions, you should have found the logical or (|).
The example given with the knowledge that the number in \1 matches the consecutive number of all the braces of opening in the model of all research it should be easy to combine the serch and replace the model you need.Good bye
DPT -
A > the form has a set of field and text dropdown list entries. After the user updates the data in a specific text, change field, I need to add their data to a table on the first time through. There are many different games of entries that would each have their own line.
B > later the user comes back and changes the data in a field. I need to update this specific line with the new values.
C > later the user returns and removes the data of one of the fields completely so I need to remove that specific table line.
D > the user does not directly from the table. The table summarizes the entries that are made in the text and drop-down list fields. I need to be able to maintain the table in harmony with user input.
I agree with the addition of rows in a table, but I do not know what's best for that lines are kept synchronized. I've got a good amount of Java programming experience under my belt, but I have a few projects in LiveCycle.
I'm quite willng to read if you have any reference material online for the management of dynamic arrays. So far, the only information I have found is how to add and remove lines, but not how to keep track of them.
Any help is greatly appreciated.
Ah sorry missed that you do not use two tables.
Do you use Extensible lines or is there a specific line for each set of data?
You can just hardcode where data are intended - a data go into RowA. To the same output of the field, you would be just: table.rowA.rawValue = this.rawValue;
You can use Global binding on the fields: the fields, take data entry have the same name as the fields in the table and then automatically updated data.
For blank lines, you will need to check if there is data in the fields and if no data you can hide the line: RowA.presence = 'hidden ';
-
Security at the level of the @Dashboard DAT files
Hello
I would like to make a few clarifications for below
(1) we can implement security to the level given in the dashboard? If yes how to do this in the dashboard.
(2) I want to divide into 4 equal parts dash? Thanks for giving an idea
(3) in the case of need, we will use 2 LTS as a Dimension table?
If anyone knows pls give an idea.Hi RamOBI,
Just as an info, it makes it easier for others who will help you if you keep a question to each thread. Right now, you have three questions. Here is my answer to that shown in your topic of the thread.
1. you implement security at the level of data in the repository file (SPR). Build you a domain with the level of data security and use this material to build your dashboard with the level of data security. Here is a site that will guide you through the level of data security. http://www.rittmanmead.com/2007/05/13/OBIEE-and-row-level-security/
If you post other issues into their own net, I'll be more than willing to give you feedback.
Let me know if it helps.
Best regards
-Joe
-
How to implement security at the level of data
How to implement security at the level of data in BI Publihser? I use Obiee enterprise edition and publihser bi. My requirement is to show the data based on the user relation ship - region.
He belongs to the eastern region
B - the user belongs to the region of the South
so if the user has opened a session it must see only the region Eastern report. If user B is connected it should see only the southern region. I use direct sql to my database of oralce as data source.
I appriciate your helpHello
You can use *: xdo_user_name * in your query.
concerning
Rainer -
OBIEE 11 g (data-level security) session variable
Hello
Use OBIEE 11.1.1.6
I would like to apply security to the level of data for a particular column as the year.
Ex:
I have 2 users A and B.
If a user has connection I want to display the values of the year: 2006,2007,2008
If a user B connection I want to display the values of the year: 2009,2010,2011
Can u share docs or referral link pls.
Thank youHello
Go to Manage > identity > double click the required user > click the permission button > click the data filters >, select the column required.
year column here > then set the year filter = 2006,07,08.
to another user that the same follow-up steps, then set the year filter = 2009,10,11.
for example, when the user login that it cannot see the data restricted.
Please check if useful/correct.
Thank you
Laeticia
Published by: 934322 on February 22, 2013 02:52
-
What level of security is the best in the OSI model, which is the application level?
Hello
I'm curious to know what level of the model OSI protects best against pirates, which is the application level?
Thank you
Johan
Hello Johan,.
The OSI networking reference model (ISO 7498 - 1) is designed around seven layers arranged in a stack.
The OSI security reference model architecture (ISO 7498-2) is also designed around seven layers, reflecting a high level of different requirements in the security of the network.
In the OSI model, each layer has its own functionality and according to which it has features of different security as shown below.
Application - authentication
Presentation - access control
Session - non-repudiation
Transport - the integrity of the data
Network - Privacy
Data binding - insurance / availability
Physics - certification / Signature
-
A group of users with more than security at the level of line!
I have a users group and with morethah, how to control the security level line in Inractive report data?
For example.
user1 to access the line 1.5 < br >
user2 to access the line < br > 1,9,6
the util_3 to access the line 7 < br >
UserX See all tier 1 ~ 100000
I try to appy security at the level of the table, its not feasible!
Thank youselect doc_name ,create_by from doc_table where create_by=:APP_USER
RAMThis request a link with another thread and reached the requirement.
-
Level of security for the dashboard pages.
Hi all
I have a question. I want to apply security to the level of the data to the data in dashboard pages.
All the answers.
Thank you sunny.Hello
Can do this by using the section level security.
Place the x, y in a section and z report in the other section. Now apply security at the level of the article accordingly.Awarded points if the answer.
Kind regards
Srikanth -
Security at the level of the ADF Page - need help
Hello
Currently, I am looking to secure my adf application. The taskflow Unbounded (adfc-config. XML) in my application is as follows
Application is shared with several customers. The homepage of a customer's A.jsp and other D.jsp. The reason is that there are several pages are shared by them. for example. B.JSP and C.jsp
The distinication between two clients's context path. Context path is different to one another. Context for client 1 path is ctx_path1 and for client 2 is ctx_path2.
Since all the page mapping is adfc-config.xml file, when client 2 is being access to the application context path ctx_path2 help and the D.jsp homepage, after if there change the url to A.jsp (ctx_path2/A.jsp), it could reach A.jsp and then B.jsp so on. Client 2 is then able to access the application customer1 and vice versa by changing the URL.
Note: There is correspondence of the page between either B.jsp and F.jsp C.jsp to E.jsp or C.jsp to G.jsp E.jsp to B.jsp so on.
Now, I want to add security to the level of the page Let's say A.jsp, when a customer access request 2 using context path (say ctx_path2)... / ctx_path2/D.jsp, although if he change the URL in... / ctx_path2/A.jsp, the safety of the adf must block access to A.jsp (client application 1.)
Please let me know the solution for the problem above mentioned above.Version Note: ADF - 11.1.1.6.0
Thank you
ASIS
If you enable ADF security and have Customer1 and Customer2 associated with different Application roles, you can set a level for each page role permission, provided that each page has a definition of page each. This will automatically solve your problem of "access if URL.
In addition, when you need to show/hide the navigation links based on the permissions of the user, you can use the visible property:
-
People,
Hello. I implement 9.0 Solution on a University Campus. I faced a problem as below:
Navigator:
Campus community
-Personal Information (student)
-Add/update a person > Search EMPLIDI can enter new information of a person in the system and save successfully. All the information of the people returned to the level of the SQL database > successfully. But in the browser, click on "Search", it returns "no corresponding value found.
I followed the tutorial http://peoplesoftconcept.blogspot.com/2014/03/row-level-security-views-as-search.html review of research PEOPLE_SRCH (view) for the SCC_BIO_DEMO component. GBL step by step as below:
Step 1:
Check them that whitelists has been entrusted to the PS of the user on the user profile page below:
Navigator PeopleTools > Security > (PS) user profile > general page
There are 4 predefined whitelists:
Browser home page: HCSPNAVHP
Profile of the process: HCSPPRFL
Elementary school: HCPPALL
Rank of security: HCDPALLStep 2:
Check security game and the Type of security access to the list of security permissions line HCDPALL as below:Navigator SetUp HRMS > Security > security level line Core > secure by the permissions list
Whitelist: HCDPALL
Security set: PPLOI (Description: unemployed people)
Type of security access: 009
Key 1: 00000-00007, 00008, 00009, 00010SQL > Select CLASSID, SCRTY_SET_CD, SCRTY_TYPE_CD, SCRTY_KEY1 from USER.PS_SJT_CLASS_ALL where CLASSID = "HCDPALL";
His output: 42 selected lines. Type of security access 00009 has 5 ranks as below:
HCDPALL PPLPOI 00000-00009
HCDPALL PPLPOI 00009 00007
HCDPALL PPLPOI 00009-00008
HCDPALL PPLPOI 00009 00009
HCDPALL PPLPOI 00009 00010Step 3:
Check if these types of security and the security of key1 access access EMPLID.SQL > select EMPLID in user.PS_SJT_PERSON where SCRTY_TYPE_CD = '009 ' AND SCRTY_KEY1 = ' 00000';
Its output:
0075
0076
SQL > select EMPLID in user.PS_SJT_PERSON where SCRTY_TYPE_CD = '009 ' AND SCRTY_KEY1 = ' 00009';
Its output:
0064
0065
0066
...There is no selected line for SCRTY_KEY1 '00007', '00008', "00010".
The above output means Permission list HCDPALL, set of security PPLPOI security type 00009 and security access key1 00000, 00009 to have access to all of the EMPLIDs. Thus, the outputs above must return in the browser browser:
Campus community
-Personal Information (student)
-Add/update a person > Search "EMPLID.The problem is that the output above does not return in the browser browser:
Campus community
-Personal Information (student)
-Add/update a person > Search "EMPLID.I see no error to find record PEOPLE_SRCH (view) running the process. I can't understand why the output does not return in the browser "Find" EMPLID.
My question is:
Is that what you would you please run the 3 steps above in your machine and to understand why the output does not return in the browser "Find" EMPLID?
Thanks in advance.People,
Hello. The problem is solved by myself.
The thing is that we can get the information of a person into the system and return it as a person. But if we want to return as a student, the person needs to have registration and registration information. If the person is not admitted or not save you no matter what class, may not be back as a student.
Thank you.
Maybe you are looking for
-
After the installation of the new ios10 I can't take print screens?
-
configuration screens in search of different
Hello I am trying install iMessage and Face time upward on a friends machine they are a Mac using an iPhone running iOS 9.3.1 and El Capitan 10.11.4. When looking on the iPhone I see these screens, and they are not the ones I've seen before. We know
-
Acer Aspire V3 772 G BIOS grayed out
HelloI have a laptop Acer Aspire V3 (model G 772-9643), Acer sent me the recovery disks for. The first two steps they registered on the included sheet was to insert the disc labeled "System drive", then reboot and press F12 to get into the boot menu.
-
More than a user sources for simple event structure of the event
I have five different sources, I want to use to generate the user events using the structure of the unique event, acting as a producer loop. Is does not seem to be possible to use five different sets of create/generate user for a single event events
-
Windows Vista (TM) Build 6002 this copy of Windows is not genuine
I have a legitimate copy of windows and Windows Vista (TM) Build 6002 this copy of Windows is not genuine recently popped up in the corner of my screen after that avast did some antivirus stuff from the start of my PC. Like I said that my OS is genui