Call a Manager change in Java

We have a requirement to capture the event occurs (removal, modification, addition) in the CI_FA Table. Events occur in the CI_FA table by a java program or XAI or online can be captured by a Manager change in Java. But how do to capture the event occurs by a program COBOL (because it uses direct SQL) or request modifications SQL? Is there something like COBOL change manager as Manager of change to Java which will capture the events occur by a COBOL program or SQL Direct changes? Suggestions please

Each Maintenance Page has a routine/ZA000-CALL-USER-EXIT procedure (to execute COBOL or JAVA User Exits) with XX000-CHECK-UEX-AT (check the User Exits).

To field activity, you must:

CIPOFACP - field activity Page maintenance
1-BA000-CHECK-UEX-AT - call CIPZUXLN, verifies the existence of COBOL or Java User Exits and adds it to the collection.
2 ZA000-CALL-USER-EXIT - call CIPZUXGN for Java User Exits

CIPOFACR - maintenance of the CI_FA line
1-DA000-CHECK-UEX-AT - call CIPZUXLN, verifies the existence of COBOL or Java User Exits and adds it to the collection.
2 ZA000-CALL-USER-EXIT - call CIPZUXGN for Java User Exits

CIPZUXGN will call dynamically respectively com.splwg.base.support.cobol.JavaRowUserExitHandler yourClassName and com.splwg.base.support.cobol.JavaPageUserExitHandler yourClassName for line maintenance programs and Maintenance Page.

CIPOFACP and CIPOFACR will pass the FLG ACTION PAGE and the LINE-ACTION-FLAG to the Java User Exit respectively.

Change manager would be determined based on the entity specified in the annotations of the code.

Haven't tried, but it should work.

Oracle discourages use of triggers in the Production System of any CC & B, because of the upgrade and performance issues, although there is nothing to do.

Tags: Oracle

Similar Questions

  • NUANCE has a software called "SOFTWARE MANAGER". Please change windows XP Professional to list this software in the Remove Programs list. I can't remove it and it is full of ups popp. So boring.

    NUANCE has a software called "SOFTWARE MANAGER".   Please change windows XP Professional and VISTA to list this software in the Remove Programs list.  I can't remove it cause it used to list and it is full of ups popp.  So boring.

    Otherwise, keep up the good work microsoft.

    Concerning
    Gary

    Hi Gary,.

    We will try to uninstall this software by using Microsoft fix - it Manager.
    Refer to this link:
    Solve problems with programs that cannot be installed or uninstalled

    http://support.Microsoft.com/mats/program_install_and_uninstall

    Also perform a virus scan full assistance Security Microsoft scanner.

    See this link for download:

    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    Note: The data files that are infected must be cleaned only by removing the file completely, which means that there is a risk of data loss.

    After completing the methods suggested above, answer us with the State of the question.

  • I have a problem with so-called Access Manager and I can't make it out of my computer could it please help me

    I'm unable to remove the so-called Access Manager

    Here's a FAQ on Access Manager: http://windows.microsoft.com/en-US/windows-vista/Internet-Explorer-Content-Advisor-frequently-asked-questions.

    As said t-4-2, we can not help you to override restrictions or remove or disable the program.  This is between you and the administrator of the system that was put in place.

    I hope this helps.

    Good luck!

    Lorien - MCSA/MCSE/network + / has + - if this post solves your problem, please click the 'Mark as answer' or 'Useful' button at the top of this message. Marking a post as answer, or relatively useful, you help others find the answer more quickly.

  • Call service Salesforce adapter error - java.lang.IllegalStateException: encryption algorithm not initialized

    Hi gurus of the Oracle,.

    I use the "Query" Salesforce adapter operation. It worked fine last week when I had a service to call SFDC API. But after I added a second invoke for the same query operation, I get this error.

    Call service Salesforce adapter error - java.lang.IllegalStateException: encryption algorithm not initialized

    Pls check below the doc for source Composite.xml and BPEL.

    https://drive.Google.com/file/d/0B8E4JtTUuzitQ1lpUkVxNnV5UGM/edit?USP=sharing

    It looks like an access problem, but I am able to call the SFDC API using SOAP UI. Help, please.

    The soa stack error - diagnostic.log

    --======================

    [2014 07-09 T 17: 47:04.272 - 07:00] [soa_server22] [NOTIFICATION] [] [oracle.soa.adapter.cloud] [tid: orabpel.invoke.pool - 4.thread - 9] [username: GOPAL_TARITLA] [ecid: c17d2d5e5766b07e:-65660a9c:14711d970c3:-8000-00000000000d3eba, 1:33309] [APP: soa-infra] [composite_instance_id: 50029] [composite_name: Dell_Zuora_to_Oracle_Invoice_Iface! 1.4] [Component_name: SFDC] resource found by Solver of location

    [2014 07-09 T 17: 47:05.266 - 07:00] [soa_server22] [WARNING] [] [javax.xml.ws.Service] [tid: orabpel.invoke.pool - 4.thread - 9] [username: GOPAL_TARITLA] [ecid: c17d2d5e5766b07e:-65660a9c:14711d970c3:-8000-00000000000d3eba, 1:33309] [APP: soa-infra] [composite_instance_id: 50029] [composite_name: Dell_Zuora_to_Oracle_Invoice_Iface! 1.4] [Component_name: SFDC] could not read the URL wsdlDocumentLocation WSDL definition: null

    [2014 07-09 T 17: 47:05.718 - 07:00] [soa_server22] [ERROR] [] [oracle.soa.adapter] [tid: orabpel.invoke.pool - 4.thread - 9] [userId: GOPAL_TARITLA] [ecid: c17d2d5e5766b07e:-65660a9c:14711d970c3:-8000-00000000000d3eba, 1:33309] [APP: soa-infra] [composite_instance_id: 50029] [composite_name: Dell_Zuora_to_Oracle_Invoice_Iface! 1.4] [component name: SFDC] Salesforce Dell_Zuora_to_Oracle_Invoice_Iface:SFDC [SFDCPortType::query (parameters, parameters)] error sending bytes to socket: java.lang.IllegalStateException: Cipher uninitialized

    [2014 07-09 T 17: 47:05.720 - 07:00] [soa_server22] [ERROR] [] [oracle.soa.adapter] [tid: orabpel.invoke.pool - 4.thread - 9] [username: GOPAL_TARITLA] [ecid: c17d2d5e5766b07e:-65660a9c:14711d970c3:-8000-00000000000d3eba, 1:33309] [APP: soa-infra] [composite_instance_id: 50029] [composite_name: Dell_Zuora_to_Oracle_Invoice_Iface! 1.4] [Component_name: SFDC] JCABinding = > Dell_Zuora_to_Oracle_Invoice_Iface:SFDC [SFDCPortType::query (parameters, parameters)] could not invoke operation "application" against the "sales force" due to: []

    Error sending bytes: java.lang.IllegalStateException: encryption algorithm not initialized

    ]]

    [2014 07-09 T 17: 47:05.722 - 07:00] [soa_server22] [NOTIFICATION] [] [oracle.soa.adapter] [tid: orabpel.invoke.pool - 4.thread - 9] [username: GOPAL_TARITLA] [ecid: c17d2d5e5766b07e:-65660a9c:14711d970c3:-8000-00000000000d3eba, 1:33309] [APP: soa-infra] [composite_instance_id: 50029] [composite_name: Dell_Zuora_to_Oracle_Invoice_Iface! 1.4] [component name: SFDC] JCABinding = > Dell_Zuora_to_Oracle_Invoice_Iface:SFDC [SFDCPortType::query (parameters, parameters)] modify the logging at TRACE level: n to see the full error stack

    [2014 07-09 T 17: 47:05.745 - 07:00] [soa_server22] [ERROR] [] [oracle.soa.adapter] [tid: orabpel.invoke.pool - 4.thread - 9] [username: GOPAL_TARITLA] [ecid: c17d2d5e5766b07e:-65660a9c:14711d970c3:-8000-00000000000d3eba, 1:33309] [APP: soa-infra] [composite_instance_id: 50029] [composite_name: Dell_Zuora_to_Oracle_Invoice_Iface! 1.4] [Component_name: SFDC] JCABinding = > [by default/Dell_Zuora_to_Oracle_Invoice_Iface! 1.4 * soa_bee5ce9f-a39a-4023-b5a6-8c13cbcbf2ad.] SFDC]: query operation failed two-way query()

    [2014 07-09 T 17: 47:05.748 - 07:00] [soa_server22] [ERROR] [] [oracle.soa.bpel.engine.ws] [tid: orabpel.invoke.pool - 4.thread - 9] [username: GOPAL_TARITLA] [ecid: c17d2d5e5766b07e:-65660a9c:14711d970c3:-8000-00000000000d3eba, 1:33309] [APP: soa-infra] [composite_instance_id: 50029] [component_instance_id: 50029] [composite_name: Dell_Zuora_to_Oracle_Invoice_Iface! 1.4] [Component_name: Dell_Zuora_to_Oracle_Invoice_Iface] had FabricInvocationException []

    java.lang.IllegalStateException: encryption algorithm not initialized

    Concerning

    TV Gopal

    OK guys, we found the solution. We had to update the files of PVE strategy on our SOA server Linux machine.

    Thanks to Varun Guruvugari (Support Salesforce) who responded with below the answer on another forum:

    --===========================
    There are countless reasons for uninitialized encryption error, but I'm sure that this reason is because of SSL certificates and you saw the error above for good reasons that salesforce.com ensures the safety and security.

    You will be able to integrate successfully in this instance, by deploying the latest version of the files of Extension JCE (Java Cryptography) unlimited strength jurisdiction policy-6 for JDK1.6 on the server SOA in FMW. Here is a good article to allow strong encryption algorithms FMW:http://docs.oracle.com/cd/E19644-01/817-5447/sgencryp.html#wp15647

    --===========================

    Concerning

    TV Gopal

  • Call the Manager greeting too long? Unity 4.0 (4)

    Hi all

    Is there than a limit to how long call handler Greetings can be? I have 5 or 6 call managers who have long messages, about 2 to 3 minutes of each. This is part of an auto attendant where people call to listen to pre-recorded information.

    The problem is, I am looking to add another Manager to call, but it will not accept a long record of more than 90 seconds. I record a phone via the Unit Admin page. I have appears to accept the call, but when I hit save it displays a message from 01:30 length, and the message is cut off after 1 minute, 30 seconds.

    How can I change this? Is there a limit to the total length of the record of wishes?

    Thank you, Randy

    This is limited by the user service class, with you record greetings. If you look at the COS for this user and go to the greetings page amaximum greeting duration of 90 seconds, you will see - you can bump to 999 seconds (about 17 minutes).

  • Java/jre ColdFusion 11 mutual auth ssl api calls.  Help with coldfusion/java logs.

    Hello

    I'm here because I have exhausted my Coldfusion/Java ssl keystore certs troubleshooting capabilities.  Here's the question. I'm developing a Coldfusion 11 application which must make calls to api for services SOAP Chase payconnexion. I use the tags of cfhttp in coldfusion to do this, that is using java jre 1.7.x to achieve this. The problem I'm getting generic 500 internal server errors of Chase.   They claim that I'm not sending a cert in the exchange of ssl.    What I did is:

    -put our generic cert/key pair in the keystore of coldfusion

    -put our root and the string in the keystore

    -put the chase Server certs in the keystore

    -converted files of key/crt in .pfx and make calls

    for hunting with those, something like:

    < cfset objSecurity = createObject ("java", "impossible") / >

    < cfset storeProvider = objSecurity.getProvider ("JsafeJCE") / >

    < cfset Application.sslfix = true / >

    < cfhttp url = "" #chase_api_server #/ ' "

    result = "http_response.

    method = "post".

    port = "1401" charset = "utf-8".

    clientCert = "#cert_path #/ #cert_file1 #

    clientCertPassword = "#cert_password #" >

    < cfhttpparam type = "header" name = "SOAPAction" value = "updateUserProfileRequest" / >

    < cfhttpparam type = "header" name = "Host" value = "ws.payconnexion.com" / > "

    < cfhttpparam type = "xml" value = "#trim (my_xml) #" / >

    < / cfhttp >

    Here is what I see in the newspapers of the CF, can someone help me interpret what

    is happening?

    Thank you

    Bob

    =============================================================

    ***

    found the key for: 1

    String [0] =]

    [

    Version: V3

    Object: CN = *. payments.austintexas.gov, O = city of Austin, L = Austin, ST = Texas, C = US

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip >

    Validity: [from: Mon Aug 11 12:39:37 CDT 2014]

    [To: Fri Oct 01 18:34:24 CDT 2016]

    Issuer: CN = Entrust Certification Authority - L1C, OR = "(c) 2009 Entrust, Inc.", OR = www.entrust.net/rpa is incorporated by reference, O = 'Entrust, Inc.', C = US "

    Serial number: [< snip > 7]

    Certificate extensions: 9

    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://OCSP.entrust.NET

    ,

    accessMethod: caIssuers

    accessLocation: U: http://AIA.entrust.NET/2048-L1C.CER

    ]

    ]

    [2]: ObjectId: 2.5.29.35 criticality = false

    [AuthorityKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    [3]: ObjectId: 2.5.29.19 criticality = false

    BasicConstraints:]

    CA:false

    PathLen: undefined

    ]

    [4]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://crl.entrust.net/level1c.crl]

    ]]

    [5]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [1.2.840.113533.7.75.2]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ]]  ]

    [CertificatePolicyId: [2.23.140.1.2.2]]

    []  ]

    ]

    [6]: ObjectId: 2.5.29.37 criticality = false

    [ExtendedKeyUsages

    serverAuth

    AutClient

    ]

    [7]: ObjectId: 2.5.29.15 criticality = false

    [KeyUsage

    DigitalSignature

    Key_Encipherment

    ]

    [8]: ObjectId: 2.5.29.17 criticality = false

    [SubjectAlternativeName

    DNSName: *. payments.austintexas.gov

    DNSName: payments.austintexas.gov

    ]

    [9]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    [1] string =]

    [

    Version: V3

    Object: CN = Entrust Certification Authority - L1C, OR = "(c) 2009 Entrust, Inc.", OR = www.entrust.net/rpa is incorporated by reference, O = 'Entrust, Inc.', C = US "

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip >

    public exponent: 65537

    Validity: [from: Fri 11 Nov 09:40:40 CST 2011,]

    [To: Thu Nov 11 20:51:17 CST 2021]

    Issuer: Authority of Certification CN = Entrust .net (2048), OR = (c) 1999 Entrust.net Limited, www.entrust.net/CPS_2048 incorp =. by Ref. (limits liab.), O = Entrust .net

    Serial number: [< snip >]

    Certificate extensions: 7

    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://OCSP.entrust.NET

    ]

    ]

    [2]: ObjectId: 2.5.29.35 criticality = false

    [AuthorityKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    [3]: ObjectId: 2.5.29.19 criticality = true

    BasicConstraints:]

    CA:true

    PathLen:0

    ]

    [4]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://crl.entrust.net/2048ca.crl]

    ]]

    [5]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [2.5.29.32.0]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ]]  ]

    ]

    [6]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    Key_CertSign

    Crl_Sign

    ]

    [7]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    [2] string =]

    [

    Version: V3

    Subject: Authority of Certification CN = Entrust .net (2048), OR = (c) 1999 Entrust.net Limited, www.entrust.net/CPS_2048 incorp =. by Ref. (limits liab.), O = Entrust .net

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip > public exponent: 65537

    Validity: [from: Fri dec 24 11:50:51 CST 1999]

    [To: kill Jul 24 09:15:12 CDT 2029]

    Issuer: Authority of Certification CN = Entrust .net (2048), OR = (c) 1999 Entrust.net Limited, www.entrust.net/CPS_2048 incorp =. by Ref. (limits liab.), O = Entrust .net

    Serial number: [< snip >]

    Certificate extensions: 3

    [1]: ObjectId: 2.5.29.19 criticality = true

    BasicConstraints:]

    CA:true

    PathLen:2147483647

    ]

    [2]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    Key_CertSign

    Crl_Sign

    ]

    [3]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    ***

    trustStore is: / opt/coldfusion11/jre/lib/security/cacerts

    trustStore type is: jks

    trustStore provider is:

    init truststore

    adding that cert trust:

    < certs snip 85 >

    trigger the seeding of SecureRandom

    done seeding SecureRandom

    January 23, 2015 13:15:37 information [ajp-bio-8014-exec-7] - HTTP request to leave {URL ='https://ws.payconnexion.com:1401/pconWS/9_5 /", method = 'post'"}

    Ignoring the unsupported encryption suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

    Ignoring the unsupported encryption suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384

    Ignoring the unsupported encryption suite: TLS_RSA_WITH_AES_256_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384

    Ignoring the unsupported encryption suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384

    Ignoring the unsupported encryption suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256

    Ignoring the unsupported encryption suite: TLS_RSA_WITH_AES_128_CBC_SHA256

    Allow the dangerous renegotiation: true

    Allow legacy Hello messages: true

    Is the first handshake: true

    Is secure renegotiation: false

    % No session caching client

    ClientHello, TLSv1

    RandomCookie: GMT: 1405197529 bytes = {191, 115, 95, 85, 79, 234, 145, 176, 62, 70, 36, 102, 168, 15, 127, 174, 88, 118, 4, 177, 226, 5, 254, 55, 108, 203, 80, 80}

    Session ID: {}

    Cipher suites: [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA SSL_RSA_WITH_RC4_128_SHA, TLS_ECDH_ECDSA_WITH_RC4_128_SHA, TLS_ECDH_RSA_WITH_RC4_128_SHA, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA TLS_EMPTY_RENEGOTIATION_INFO_SCSV, SSL_RSA_WITH_RC4_128_MD5]

    Compression methods: {0}

    Extension elliptic_curves, the names of curve: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1, sect233k1, sect233r1, sect283k1, sect283r1, secp384r1, sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, sect193r1, sect193r2, secp224k1, sect239k1, secp256k1}

    Extension ec_point_formats, formats: [uncompressed]

    Servername extension, server_name: [hostname: ws.payconnexion.com]

    ***

    AJP-bio-8014-exec-7, WRITING: TLSv1 Handshake, length = 191

    AJP-bio-8014-exec-7, READ: TLSv1 Handshake, length = 81

    ServerHello, TLSv1

    RandomCookie: < snip >

    Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA

    Compression method: 0

    Extension renegotiation_info, renegotiated_connection: < empty >

    ***

    %% Initialized: [Session-5, TLS_RSA_WITH_AES_256_CBC_SHA]

    * TLS_RSA_WITH_AES_256_CBC_SHA

    AJP-bio-8014-exec-7, READ: TLSv1 Handshake, length = 4183

    Certificate chain

    String [0] =]

    [

    Version: V3

    Subject: CN = ws.payconnexion.com, OR is PayConnexion, O is JPMorgan Chase, L = New York, ST = New York, C = US

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip >

    public exponent: 65537

    Validity: [from: Sun Apr 20 19:00:00 CDT 2014]

    [To: kill Jun 02 18:59:59 CDT 2015]

    Issuer: CN = VeriSign Class 3 International Server CA - G3, OU = terms of use at https://www.VeriSign.com/RPA (c) 10, OU = VeriSign Trust Network, O = "VeriSign, Inc.", C = US

    Serial number: [< snip >]

    Certificate extensions: 8

    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://se.symcd.com

    ,

    accessMethod: caIssuers

    accessLocation: U: http://se.symcb.com/se.CRT

    ]

    ]

    [2]: ObjectId: 2.5.29.35 criticality = false

    [AuthorityKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    [3]: ObjectId: 2.5.29.19 criticality = false

    BasicConstraints:]

    CA:false

    PathLen: undefined

    ]

    [4]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://se.symcb.com/se.crl]

    ]]

    [5]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [2.16.840.1.113733.1.7.54]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ], PolicyQualifierInfo:]

    qualifierID: 1.3.6.1.5.5.7.2.2

    qualifier: < snip >

    ]]  ]

    ]

    [6]: ObjectId: 2.5.29.37 criticality = false

    [ExtendedKeyUsages

    serverAuth

    AutClient

    2.16.840.1.113730.4.1

    ]

    [7]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    DigitalSignature

    Key_Encipherment

    ]

    [8]: ObjectId: 2.5.29.17 criticality = false

    [SubjectAlternativeName

    DNSName: ws.payconnexion.com

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    [1] string =]

    [

    Version: V3

    Object: CN = VeriSign Class 3 International Server CA - G3, OU = terms of use at https://www.VeriSign.com/RPA (c) 10, OU = VeriSign Trust Network, O = "VeriSign, Inc.", C = US

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip >

    public exponent: 65537

    Validity: [from: Sun 07 Feb 18:00:00 CST 2010]

    [To: Fri Feb 07 17:59:59 CST 2020]

    Issuer: CN = VeriSign Class 3 Public Primary Certification Authority - G5, OR = "(c) 2006 VeriSign, Inc. - use only permitted", OU = VeriSign Trust Network, O = "VeriSign, Inc.", C = US

    Serial number: [< snip >]

    Certificate extensions: 10

    [1]: ObjectId: 1.3.6.1.5.5.7.1.12 criticality = false

    Unknown extension: coded DER BYTE string =

    < snip >

    [2]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://OCSP.VeriSign.com

    ]

    ]

    [3]: ObjectId: 2.5.29.35 criticality = false

    [AuthorityKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    [4]: ObjectId: 2.5.29.19 criticality = true

    BasicConstraints:]

    CA:true

    PathLen:0

    ]

    [5]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://crl.verisign.com/pca3-g5.crl]

    ]]

    [6]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [2.16.840.1.113733.1.7.23.3]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ], PolicyQualifierInfo:]

    qualifierID: 1.3.6.1.5.5.7.2.2

    qualifier: < snip >

    ]]  ]

    ]

    [7]: ObjectId: 2.5.29.37 criticality = false

    [ExtendedKeyUsages

    serverAuth

    AutClient

    2.16.840.1.113730.4.1

    2.16.840.1.113733.1.8.1

    ]

    [8]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    Key_CertSign

    Crl_Sign

    ]

    [9]: ObjectId: 2.5.29.17 criticality = false

    [SubjectAlternativeName

    CN = VeriSignMPKI-2-7

    ]

    [10]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    [2] string =]

    [

    Version: V3

    Object: CN = VeriSign Class 3 Public Primary Certification Authority - G5, OR = "(c) 2006 VeriSign, Inc. - use only permitted", OU = VeriSign Trust Network, O = "VeriSign, Inc.", C = US

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip >

    public exponent: 65537

    Validity: [from: Tue Nov 07 18:00:00 CST 2006]

    [To: Sun Nov 07 17:59:59 CST 2021]

    Issuer: OU = class public primary Certification Authority 3, O = "VeriSign, Inc.", C = US

    Serial number: [< snip >]

    Certificate extensions: 8

    [1]: ObjectId: 1.3.6.1.5.5.7.1.12 criticality = false

    Unknown extension: coded DER BYTE string =

    < snip >

    [2]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://OCSP.VeriSign.com

    ]

    ]

    [3]: ObjectId: 2.5.29.19 criticality = true

    BasicConstraints:]

    CA:true

    PathLen:2147483647

    ]

    [4]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://crl.verisign.com/pca3.crl]

    ]]

    [5]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [2.5.29.32.0]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ]]  ]

    ]

    [6]: ObjectId: 2.5.29.37 criticality = false

    [ExtendedKeyUsages

    serverAuth

    AutClient

    resynced

    2.16.840.1.113730.4.1

    2.16.840.1.113733.1.8.1

    ]

    [7]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    Key_CertSign

    Crl_Sign

    ]

    [8]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    ***

    Found the certificate of trust:

    [

    [

    Version: V3

    Subject: CN = ws.payconnexion.com, OR is PayConnexion, O is JPMorgan Chase, L = New York, ST = New York, C = US

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: public exponent: 65537

    Validity: [from: Sun Apr 20 19:00:00 CDT 2014]

    [To: kill Jun 02 18:59:59 CDT 2015]

    Issuer: CN = VeriSign Class 3 International Server CA - G3, OU = terms of use at https://www.VeriSign.com/RPA (c) 10, OU = VeriSign Trust Network, O = "VeriSign, Inc.", C = US

    Serial number: [< snip >]

    Certificate extensions: 8

    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://se.symcd.com

    ,

    accessMethod: caIssuers

    accessLocation: U: http://se.symcb.com/se.CRT

    ]

    ]

    [2]: ObjectId: 2.5.29.35 criticality = false

    [AuthorityKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    [3]: ObjectId: 2.5.29.19 criticality = false

    BasicConstraints:]

    CA:false

    PathLen: undefined

    ]

    [4]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://se.symcb.com/se.crl]

    ]]

    [5]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [2.16.840.1.113733.1.7.54]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ], PolicyQualifierInfo:]

    qualifierID: 1.3.6.1.5.5.7.2.2

    qualifier: < snip >

    ]]  ]

    ]

    [6]: ObjectId: 2.5.29.37 criticality = false

    [ExtendedKeyUsages

    serverAuth

    AutClient

    2.16.840.1.113730.4.1

    ]

    [7]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    DigitalSignature

    Key_Encipherment

    ]

    [8]: ObjectId: 2.5.29.17 criticality = false

    [SubjectAlternativeName

    DNSName: ws.payconnexion.com

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    AJP-bio-8014-exec-7, READ: TLSv1 Handshake, length = 13

    CertificateRequest

    CERT types: RSA, DSS

    CERT authorities:

    < empty >

    ServerHelloDone

    corresponding to the alias: 1

    Certificate chain

    String [0] =]

    [

    Version: V3

    Object: CN = *. payments.austintexas.gov, O = city of Austin, L = Austin, ST = Texas, C = US

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    < snip > public exponent: 65537

    Validity: [from: Mon Aug 11 12:39:37 CDT 2014]

    [To: Fri Oct 01 18:34:24 CDT 2016]

    Issuer: CN = Entrust Certification Authority - L1C, OR = "(c) 2009 Entrust, Inc.", OR = www.entrust.net/rpa is incorporated by reference, O = 'Entrust, Inc.', C = US "

    Serial number: [< snip >]

    Certificate extensions: 9

    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://OCSP.entrust.NET

    ,

    accessMethod: caIssuers

    accessLocation: U: http://AIA.entrust.NET/2048-L1C.CER

    ]

    ]

    [2]: ObjectId: 2.5.29.35 criticality = false

    [AuthorityKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    [3]: ObjectId: 2.5.29.19 criticality = false

    BasicConstraints:]

    CA:false

    PathLen: undefined

    ]

    [4]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://crl.entrust.net/level1c.crl]

    ]]

    [5]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [1.2.840.113533.7.75.2]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ]]  ]

    [CertificatePolicyId: [2.23.140.1.2.2]]

    []  ]

    ]

    [6]: ObjectId: 2.5.29.37 criticality = false

    [ExtendedKeyUsages

    serverAuth

    AutClient

    ]

    [7]: ObjectId: 2.5.29.15 criticality = false

    [KeyUsage

    DigitalSignature

    Key_Encipherment

    ]

    [8]: ObjectId: 2.5.29.17 criticality = false

    [SubjectAlternativeName

    DNSName: *. payments.austintexas.gov

    DNSName: payments.austintexas.gov

    ]

    [9]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    [1] string =]

    [

    Version: V3

    Object: CN = Entrust Certification Authority - L1C, OR = "(c) 2009 Entrust, Inc.", OR = www.entrust.net/rpa is incorporated by reference, O = 'Entrust, Inc.', C = US "

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip >

    public exponent: 65537

    Validity: [from: Fri 11 Nov 09:40:40 CST 2011,]

    [To: Thu Nov 11 20:51:17 CST 2021]

    Issuer: Authority of Certification CN = Entrust .net (2048), OR = (c) 1999 Entrust.net Limited, www.entrust.net/CPS_2048 incorp =. by Ref. (limits liab.), O = Entrust .net

    Serial number: [< snip >]

    Certificate extensions: 7

    [1]: ObjectId: 1.3.6.1.5.5.7.1.1 criticality = false

    [Field

    [

    accessMethod: ocsp

    accessLocation: U: http://OCSP.entrust.NET

    ]

    ]

    [2]: ObjectId: 2.5.29.35 criticality = false

    [AuthorityKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    [3]: ObjectId: 2.5.29.19 criticality = true

    BasicConstraints:]

    CA:true

    PathLen:0

    ]

    [4]: ObjectId: 2.5.29.31 criticality = false

    [CRLDistributionPoints

    [DistributionPoint:]

    [U: http://crl.entrust.net/2048ca.crl]

    ]]

    [5]: ObjectId: 2.5.29.32 criticality = false

    [CertificatePolicies

    [CertificatePolicyId: [2.5.29.32.0]]

    [PolicyQualifierInfo: []]

    qualifierID: 1.3.6.1.5.5.7.2.1

    qualifier: < snip >

    ]]  ]

    ]

    [6]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    Key_CertSign

    Crl_Sign

    ]

    [7]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    [2] string =]

    [

    Version: V3

    Subject: Authority of Certification CN = Entrust .net (2048), OR = (c) 1999 Entrust.net Limited, www.entrust.net/CPS_2048 incorp =. by Ref. (limits liab.), O = Entrust .net

    Signature algorithm: SHA1withRSA, OID = 1.2.840.113549.1.1.5

    Key: Sun public key RSA 2048 bits

    module: < snip > public exponent: 65537

    Validity: [from: Fri dec 24 11:50:51 CST 1999]

    [To: kill Jul 24 09:15:12 CDT 2029]

    Issuer: Authority of Certification CN = Entrust .net (2048), OR = (c) 1999 Entrust.net Limited, www.entrust.net/CPS_2048 incorp =. by Ref. (limits liab.), O = Entrust .net

    Serial number: [< snip >]

    Certificate extensions: 3

    [1]: ObjectId: 2.5.29.19 criticality = true

    BasicConstraints:]

    CA:true

    PathLen:2147483647

    ]

    [2]: ObjectId: 2.5.29.15 criticality = true

    [KeyUsage

    Key_CertSign

    Crl_Sign

    ]

    [3]: ObjectId: 2.5.29.14 criticality = false

    [SubjectKeyIdentifier

    [KeyIdentifier

    < snip >]

    ]

    ]

    Algorithm: [SHA1withRSA]

    Signature:

    < snip >

    ]

    ***

    ClientKeyExchange, RSA PreMasterSecret, TLSv1

    AJP-bio-8014-exec-7, WRITING: TLSv1 Handshake, length = 3970

    SESSION KEYGEN:

    PreMaster Secret:

    < snip >

    KEYGEN OF CONNECTION:

    Nuncio of the client:

    < snip >

    Nuncio of server:

    < snip >

    Master Secret:

    < snip >

    Give your MAC Secret client:

    < snip >

    MAC server write Secret:

    < snip >

    Write the client key:

    < snip >

    Server write key:

    < snip >

    Client write IV:

    < snip >

    Server write IV:

    < snip >

    CertificateVerify

    AJP-bio-8014-exec-7, WRITING: TLSv1 Handshake, length = 262

    AJP-bio-8014-exec-7, WRITING: TLSv1 Change Cipher Spec length = 1

    Finish

    verify_data: {51, 254, 40, 56, 247, 218, 130, 183, 112, 239, 95, 4}

    ***

    AJP-bio-8014-exec-7, WRITING: TLSv1 Handshake, length = 48

    AJP-bio-8014-exec-7, READ: TLSv1 Change Cipher Spec length = 1

    AJP-bio-8014-exec-7, READ: TLSv1 Handshake, length = 48

    Finish

    verify_data: {89, 182, 137, 178, 177, 31, 27, 115, 151, 90, 169, 49}

    ***

    % Cache the client session: [Session-5, TLS_RSA_WITH_AES_256_CBC_SHA]

    AJP-bio-8014-exec-7, setSoTimeout (60000) called

    AJP-bio-8014-exec-7, WRITING: TLSv1 Application Data, length = 1520

    AJP-bio-8014-exec-7, READ: TLSv1 Application Data, length = 128

    January 23, 2015 13:15:38 information [ajp-bio-8014-exec-7] - complete HTTP request {status Code = 500, time = 1302 ms}

    AJP-bio-8014-exec-7, READ: TLSv1 Application Data, length = 256

    AJP-bio-8014-exec-7, READ: alert TLSv1, length = 32

    AJP-bio-8014-exec-7, RECV TLSv1 ALERT: attention, close_notify

    AJP-bio-8014-exec-7, called closeInternal (false)

    AJP-bio-8014-exec-7, SEND TLSv1 ALERT: attention, description = close_notify

    AJP-bio-8014-exec-7, WRITING: alert TLSv1, length = 32

    AJP-bio-8014-exec-7, call closeSocket (selfInitiated)

    AJP-bio-8014-exec-7, called close()

    AJP-bio-8014-exec-7, called closeInternal (true)

    OK, apparently nobody Chase who said that we don't send the certificates and realization mutual auth

    was wrong.   Https calls were connection and mutual authentication took place.   The 500

    error was on a soap envelope during delivery and NOT of SSL that I directed to.   Everything that

    works fine now.

    Thank you

    Bob

  • Disqualification 9.0.3: Change the JAVA Version

    How to change the version of JAVA that you use in Disqualification 9.0.3? He is currently using the 'default' version that has been installed with Disqualification, but I would like to change it to use Java7.

    Thank you

    Hi Craig,.

    The answer to this generally depends on the platform since it is the configuration of the Java version that uses the application server.

    Since it seems you are using a standard installation of Windows of the Disqualification on Tomcat, the answer is:

    1. stop all services of the Disqualification (Director DB, DB results, Disqualification Application Server)

    2. find the dnConfig.exe program which will be installed where Disqualification is installed (e.g. C:\Program Files\Datanomic\dnDirector\director\ [versionnumber] in versions previous. or C:\Program Files\Oracle\Enterprise data Quality\director\ [versionnumber] in later versions)

    3. click right on dnConfig.exe and run as administrator

    4. click on the Application Server tab

    5. click on the button Launch Manager of Tomcat

    6. on the tab of the Properties dialog box Java is launched, change the path to the Virtual Machine Java to point to the JRE installed to version 7, for example C:\Program Files\Java\jdk1.7.0_51\jre\bin\server\jvm.dll. You need not modify the Java Classpath.

    7 restart the services.

    Kind regards

    Mike

  • Access the content of BPEL Process Manager to a java class

    Hello

    Is it possible to access the API of a class of java process manager stand alone... My requirement is as follows. I need to run a script in the Unix environment, which will in turn call a java class and pass some parameters like username, password and Networkid processName. This java class must call the APIs necessary to authenticate the credentials passed, choose current examples of the ProcessName spent and bulk to abandon their...

    I tried to create a class of my java class Locator Networkid, password and IP address. But I had a communication Exception like this: 'javax.naming.CommunicationException': cannot find SerialContextProvider. I guess that Im not no definition JNDI properties and other places for FinderBeans in DomainAuth...

    Can someone help me on how to go to the definition of the JNDI properties and other locations of resources...



    Thank you
    Corinne

    Baudelaire,

    See the following forum thread:
    Re: Querying Oracle BPEL process Instances using BPEL client api-default

    Diakité
    http://SOA-HOWTO.blogspot.com

  • How can I block a site that keeps changing my Java?

    I want to ban a site that keeps wanting to change my program Java in Java 'Oracle' to something else. Is there a way to block specific sites in Firefox?

    I am running Windows 8.1 on a Toshiba laptop and have Firefox 25.0.1  Mozilla 26-1.0
    

    Reach
    Mozilla Add-ons Web page
    and are looking for a good blocker of pop-up ads. Find also a blocker website.

  • Management change of HPSMH Collision detection

    Hello world

    We want to just implement collision detection mechanism in the management of change HPSMH. That means that if a CR was raised with a service assigned within a specific date range (say from 2nd to 4th month) .then if any new CR is triggered with the same affected service in the same amount of time then it will show a validation that the services concerned has already been used in a few other CR in the same amount of time.

    Hello and welcome to the HP support community!

    You have posted this question in the section the Community Forum of HP Android tablets.

    According to me, that's not the right area for your question.

    Myself, I have absolutely no idea what you're talking about!   :/

    WyreNut

  • Download Manager changed to Chinese version

    Original title: 2nd corrupt computer o Network Installation Download Manager on my computer, so nothing to download or installs when Chinese programs have been downloaded from the internet to the 2nd computer.

    Remember - this is a public forum so never post private information such as numbers of mail or telephone!

    Ideas: my windows XP Download Manager program was converted into Chinese Charactersand does not work because of Chinese programs being downloaded from the internet to a 2nd computer on the network. Also all dateson in my computer programs are in Chinese characters

    You have problems with programs
    Error messages
    Recent changes to your computer
    What you have already tried to solve the problem

    Hi Carpediemdude,

    1. What Download Manager do you talk too much?

    It seems that you have downloaded the wrong version of the Download Manager.

    I suggest that you uninstall the computer download manager and check if you are able to download other programs on the computer. If you are able to download other programs and then download the correct version of the Download Manager and check.

    How to change or remove a program in Windows XP

    http://support.Microsoft.com/kb/307895

    I hope this helps!

    Halima S - Microsoft technical support.

    Visit our Microsoft answers feedback Forum and let us know what you think.

  • Manager change directory search

    How can we do to change the Directory Manager to request that the first 5 letters of a name when you perform a search?

    I have a set of spare guests in voice of Leslie (our voice for US talent invites) for the choice of name list manager that will allow you to change what is asked for - you can search here:

    http://www.ciscounitytools.com/App_AlternativeDirectoryHandlerPrompts.htm

    There are instructions on how to apply them. The set includes 'enter the first 5 letters of the name and first name' or 'enter the first 5 letters of the last and first name' - that should help you to what you want.

    Be aware that these changes are wiped out on updates you need to reapply them after you upgrade if you want to keep them.

  • UCS Manager logon box Java problem

    I'm testing Java 7 update 55 with the UCS Manager to verify that all features working. When I opened UCS manager connection poster box but I noticed that the 'Domain' option does not appear. Without it, I can't choose between LDAP or local authentication.

    Someone at - it solved this problem with versions of Java (more recent than the 45 update)?

    Thank you.

    You can upgrade UCSM whitout put to rest, but the supported configuration is to have UCSM, fabric and IOM (which is included with the 'Infrastructure package') running the same version...

    Now you can just upgrade the infrastructure bundle and check 'Table 2' both of the links below to confirm compatibility with the Server Bundle (bundle Server = MMIC, BIOS, adapter card controller, etc.) to see what you pouvez/may not combine:

    http://www.Cisco.com/c/en/us/TD/docs/unified_computing/UCS/release/notes...

    http://www.Cisco.com/c/en/us/TD/docs/unified_computing/UCS/release/notes...

    -Record ALL responses and marked the question as answered if what you are looking for.

    Kenny

  • How to call bean managed when enter is pressed in the list of input values

    Hi all

    I have a requirement that, when the focus is in the field < af:InputListOfValues > and "enter" key then managed bean method must be called. I don't know how. Can someone suggest me to implement it.

    Thanks in advance.

    Thanks for your answers,

    I did it by using the rest of the way.

    Step 1: I put clientlistener at the level of the components.

    popupTitle = "search and select:" label = "" autoComplete = "on" autoTab = 'true' ""

    autoSubmit = 'true' labelStyle = "color: black;"

    inlineStyle = "margin: 0px 0px 0px 0px;" contentStyle = "width: 62px; height: 18px; »

    clientComponent = "true" >

    Step 2: in the method javascript I check which button is pressed.

    function checkKeyEvent (evt) {}

    If (AdfAgent.AGENT.getKeyCode (evt) == 13) {}

    source var = evt.getSource ();

    var document = AdfPage.PAGE.findComponentByAbsoluteId ('d1');

    var custEvent = new AdfCustomEvent (document, "callServer",

    {

    submittedValue: source.getSubmittedValue (), localValue: source.getValue)

    },

    (true);

    custEvent.queue ();

    }

    }

    Step 3: Add the ServerListener to the document level ( component will not accept serverliseners as a child tag.)

    Method="#{backingBeanScope.registrationmvfmbMB.performcheck}"/ >

  • How to call a method abstract in Java

    Hi all

    I am new to Java, and have been learning. I have a question here. I came across the following Java class and trying to understand but got confused how he is able to call an abstract method. Here's the code I'm referring to:

    package sampleapps.gui;

    Javax.swing import. *;

    import java.awt.*. *;

    public class InnerClassAnimationExample {}

    int x = 70, y = 70;

    Public Shared Sub main (String [] args) {}

    InnerClassAnimationExample innerClassAnimationExample = new InnerClassAnimationExample();

    innerClassAnimationExample.go ();

    }

    public void getCurrentCard {}

    JFrame frame = new JFrame();

    frame.setDefaultCloseOperation (JFrame.EXIT_ON_CLOSE);

    NewMyDrawPanel drawPanel = new NewMyDrawPanel();

    frame.getContentPane () .add (drawPanel);

    frame.setSize (300, 300);

    frame.setVisible (true);

    for (int i = 0; i < 500; i ++) {}

    x ++ ;

    y ++ ;

    drawPanel.repaint ();

    try {}

    Thread.Sleep (50);

    } catch (Exception e) {}

    e.printStackTrace ();

    }

    }

    }

    class NewMyDrawPanel extends JPanel {

    {} public void paintComponent (Graphics g)

    Graphics2D g2d = (Graphics2D) g;

    Red int = (int) (Math. random() * 255);

    int green = (int) (Math.Random () * 255);

    Blue int = (int) (Math. random() * 255);

    Color startColor = new color (red, green, blue);

    Red = (int) (Math. random () * 255);

    Green = (int) (Math.Random () * 255);

    Blue = (int) (Math.Random () * 255);

    Color endColor = new color (red, green, blue);

    GradientPaint gradient = new GradientPaint (7070, startColor, 150 150, endColor); We can also use colors straight as Color.RED, Color.BLUE

    GradientPaint gradient = new GradientPaint (7070, startColor, 150 150, endColor);

    g2d.setColor (Color.White);

    g2d.fillRect (0, 0, this.getWidth (), this.getHeight ());

    g2d.setPaint (gradient);

    g2d.fillOval (x, y, 40, 40);

    }

    }

    }

    For example, in the code above, there are an internal NewMyDrawPanel class that has a method paintComponent (Graphics g). I've highlighted the 2 lines of code above.

    Line 1 : Graphics2D g2d = (Graphics2D) g;

    Line 2 : g2d.fillOval(x,y,40,40);


    I understand that we are casting type reference to Graphics2D g reference g2d and we call the method fillOval() on g2d. I do not see a method of fillOval() in the Graphics2D class but it's there in the Graphics class and Filloval()) method is an abstract method.

    So my question is:

    1. If we are not able to instantiate an abstract class (Graphics2D Graphics classes) and how are we able to access the abstract method fillOval()

    2. Secondly, given that the fillOval() method is an abstract method, it has no implementation for the method. However, when I call the method fillOval() on Graphics2D reference, I was able to draw and fill in an oval of the specified coordinates. Then, where the actual implementation code would be?

    Could you please, somebody explain how this happened? Pls help.

    Thanks in advance.

    Mahesh Reddy Y V wrote:

    1. If we are not able to instantiate an abstract class (Graphics2D Graphics classes) and how are we able to access the abstract method fillOval()

    2. Secondly, given that the fillOval() method is an abstract method, it has no implementation for the method. However, when I call the method fillOval() on Graphics2D reference, I was able to draw and fill in an oval of the specified coordinates. Then, where the actual implementation code would be?

    The point of having the Graphics class declaring fillOval() summary, is that we can have confidence that all the graph goes instantiable subclass is an implementation of this method. You as the user of this unknown implementer of graphics have no need of care including probably several classes in this legacy hirarchie did the implementation. You just trust in the fact that it must be there, because the java compiler takes care of this.

    Good bye

    DPT

Maybe you are looking for