How to prevent connections after 30 days of inactivity?

Hello all,.

I need to stop someone from signature in the database, if they had not used the account for more than 30 days.

Any ideas?

Thanks in advance,

Brian

Here is a small example, you can start with:

SQL> create or replace trigger logon_check
after logon on database
begin
  if user = 'TEST_USR' then
     raise_application_error(-20001,'You are not allowed anymore');
  end if;
end logon_check;
/

Trigger created.

SQL> grant create session to test_usr identified by test_us;

Grant succeeded.

SQL> conn test_usr/test_us
ERROR:
ORA-00604: error occurred at recursive SQL level 1
ORA-20001: You are not allowed anymore
ORA-06512: at line 3

Warning: You are no longer connected to ORACLE.
SQL>

Nicolas.

Tags: Database

Similar Questions

  • How to prevent connection to port 80 redirection

    We use our load balancing switch to offload SSL for all communications between the browser and the switch are SSL communication between the APEX (on Tomcat) application and the switch remains in clear text.

    If I have access to the APEX application using https, then the login page appears safe. After clicking the "Sign In" button on the login page, the redirect only retains the https - the URL is replaced to http. We use custom authentication, the "connect" button called "apex_authentication.login".

    In the User Interface, the home page URL is set on "f?" p = & APP_ID.:1: & SESSION. "As this contains only the root of context, I would not expect to change the https to http protocol.  Once I'm connected to the application, I can change the URL https and all the subsequent response remains as https - until I connect.

    Is there a login and logout parameter we need to load APEX we use SSL offloading? Why it changes the Protocol not only the part of the URL after the context root?

    Help!

    See you soon,.

    Brent

    OK, I managed to get this work turned on a simple change in Tomcat's server.xml file was just what he needed. The fields I added were proxyName, proxyPort, plan and secure.  This makes Tomcat believe he received a connection, even when it does not. Similarly, when the application of ADR makes a request of the Tomcat application type, it says that the connection is secure, so the connection and disconnection, it uses the correct URL.

    connectionTimeout = "20000".

    redirectPort = "8443".

    proxyName = "apps.hmdclinical.com"

    proxyPort = "443".

    scheme = "https"

    course = "true" / >

    See you soon,.

    Brent

  • Disable the user account from DIO after 90 days of inactivity - IOM

    Hello

    I have a requirement where I have to disable a user account, if it has not signed the last 90 days in our environment (OID). Users are authenticated via OAM when they connect. Anyone have an idea what attribute in what class of object OID should be checked for the last connection attempt made by the user and what is the data type of the same thing? It's a date that I can compare after completing an initial context of LDAP OID and pointing to each single user?

    Really need a solution for this. Please answer.

    Thank you very much
    -oidm.

    See the description of the schema to the:

    http://download.Oracle.com/docs/CD/B28196_01/idmanage.1014/b25348/schema.htm#CFHCGFCC

    Create you a code that is running on a daily basis, check for the last date of connection and, if it is more than 90 days, you disable the user OID.

  • Windows auto-serrures after 10 minutes of inactivity.

    Can someone help me solve this problem? Windows Vista sends me back the connection after 10 minutes of inactivity screen, which becomes inconvenient when there is 5 to 10 times a day. First of all, it is NOT related to the screen saver, I have the "on RESUME, display login" unchecked, as well as my screen saver is disabled. It is also not related to the option to sleep in the advanced power settings, I have my computer never sleep. Vista is not sleep, hibernation, Logging Off ot, it is blocking. Basically it's just to send me back the login screen after 10 minutes of inactivity, and when I log in all my stuff is still there. Web pages or applications I had open are all still there, but it's always a pain the the _ because if I have any program configured to run automatically (as virus scans etc.) in the middle of the night programs start if the system is locked.

    I searched online for a while and could not find any help. It seems that everyone who has this problem just gets told to check their settings to screen saver and power, but this problem is not related to those.

    Hey Nick,

    This is sometimes possible when you computer from the fan or the computer gets hot. Go to BIOS and enable two fans cause by default only one fan is turned on.

    Let me know it works...

    DOM.

  • How to activate Windows after the 3-day grace period?

    HOW TO ACTIVATE WINDOWS AFTER PRESCRIBED PERIOD AGAIN?

    I forgot to activate my windows again after only three days in advance?

    I use a dial connection using a USB plug. It's SmartBro, location Philippines. My number is * removed *.

    I could not activate using the internet because I couldn't connect my dial-up access. I got a prompt to automatically connect bur that he had failed.

    I don't have a landline.

    I tried the phone activation. I got yhis installation ID:

    Can I have the confirmation through your answer ID? Give your could give me, this activates my windows again, even without an internet connection yet.

    Without this activation, I couldn't connect to internet...

    My activation key is: * delete *.

    Currently, I'm in a café of inet, I would be grateful if you could give me a solution to my problem.

    My email is: * address email is removed from the privacy * or * address email is removed from the privacy *

    Hoping for your quick response.

    Thnak you.

    Chris Maypa

    Hello

    Check out the link and follow the steps.

    How to activate Windows XP

    http://support.Microsoft.com/kb/307890

  • How to prevent the creation of 15000 files for 300 MB each day Firefox

    Firefox creates files of 'file' in C:\Users\LeRicain\AppData\Local\Mozilla\Firefox\Profiles\dnm04rk5.default\cache2
    There are about 10,000 and 20,000 files I have to remove to get about 300 MB of space each day

    How to prevent the creation of these files in Firefox

    Here are the files from cache. Basically, it takes Web sites that access you a lot and records bits of them so they'll load faster the next time you visit them. FOR EXAMPLE if you visit Google.com much, Firefox will save some elements of this page in the cache so that the next time visit you Google.com, it will not have to re - download.

  • Given that I have updated to IOS 9.2 my Ipad 2 Air is discharge the battery in 12 to 14 hours, even without any use. Before the update, after a day of average use of the battery was still 70-75%. How can I reinstall the IO 9.1?

    Given that I have updated to IOS 9.2 my Ipad 2 Air is discharge the battery in 12 to 14 hours, even without any use. Before the update, after a day of average use of the battery was still 70-75%. How can I reinstall the IO 9.1?

    Hello

    The best way to save battery life is to go into the settings and turn off Apps Refresh

    I now get 3 / 4 hours of battery life more.

    You cannot return to a previous ios 9.1

    See you soon

    Brian

    PS

    If you still have a problem iCloud backup now

    Then restore settings to get rid of any bugs.

  • How to get wifi connection after reinstalling factory default DVD for Iconia W3-810?

    My W3-810 Iconia has been reset using Acer Recovery DVD. After that 8 window has been restarted, he not been able to find the wireless device.

    Does anyone know how to get a wifi connection after reinstalling factory default DVD?

    Best is to download the drivers for a different machine, then transfer to the W3 with a USB or SD card. Once they are installed included you be back running.

  • I lost the internet connection after acceptance of your latest updates. How can I cancel the updates?

    I lost the internet connection after acceptance of your latest updates. How can I cancel the updates?

    Debbie

    How do you know that the loss of your internet connection has nothing to do with the Windows updates? You must find the reason for the loss of the connection.

    How do you connect? Is a wired or wireless with a modem or a router? If a router is the router shared with another computer and this computer can connect to the internet? You need to determine if the problem is a fault on your computer or a failure to connect to your internet access provider?

    What error messages are reported?

    Event Viewer reports

    1. normally, when an error occurs on your computer looking in Event Viewer should be your starting point to find a solution. More related system errors are recorded and get an exact copy of the relevant report is important. Unfortunately, is not easy to understand reports and most of the users computer need help with their interpretation. I have to say later interpretation.

    2 Event Viewer includes three main newspapers of Windows. Here's the Application, security, and system. For purposes of troubleshooting system is by far the most important.

    3. to access the system log, select Start, Control Panel, administrative tools, Event Viewer, in the list on the left of the window select Windows and the system logs. Place the cursor on the system, right click and select filter current log. Check the front of the error and click OK and see you only reports errors. Click the Date and time column header to sort. You may need to click a second time to see the last report above.

    4. a tip for posting copies of error reports! Run Event Viewer and double-click the error you want to copy. Select the Details tab and check the box in front of the XML view. Click the copy button to place a copy in the Clipboard and close Event Viewer. Now start your message and paste it into the body of the message. Make sure that it is the first dough right out of the event viewer.

    5. He cautioned against three types of reports, information, and reports errors. In most situations, it is the error reports that offer the best information but sometimes WARNING reports provide useful clues.

    6. all reports have stamps date and hour and when troubleshooting, it is important to focus on the latest reports. Reports of studies from the point when the computer is started, and then check if a similar report appeared in the previous session. If errors do not repeat investigation as to why they happen is wasted effort.

    7. in the individual reports the most important information is the event ID and Source such as these help when looking for help on the internet. The description is just as important and copy the exact text to use as search criteria greatly helps achieve better results when using Google. Not paraphrase descriptions when other people asking for help.

  • How can I delete my profile after 30 days

    Hi This is stone

    How can I remove my 30 days trail

    The trial period will expire automatically after 30 days.

    Let me know if you need help to uninstall the application.

  • My free trial of Illustrator 2015 crashed and burned after 2 days of trial. How can I get my trial free back before buy you. and if I decide to buy it, will I get another version to download. As I'm not crushed version tha

    My free trial of Illustrator 2015 crashed and burned after 2 days of trial. How can I get my trial free back before buy you. and if I decide to buy it, will I get another version to download. As I don't want the broken version that will not reopen.

    Cindy,

    I believe you can reinstall right under the trial, use preferably the full path in three steps (the otherwise strange things may persist):

    (1) uninstall (check the box to delete the preferences),

    (2) run the cleanup tool, see the link below,

    (3) reinstall.

    http://www.Adobe.com/support/contact/cscleanertool.html

    The cleaning tool works for all versions of CS3 on (you can see the top of the page).

    Here are the instructions for use, including individual applications:

    https://helpx.Adobe.com/creative-cloud/KB/CC-cleaner-tool-installation-problems.html

  • If I do the free trial of 30 days for photoshop how to stop use it so I don't is not charged after 30 days? It will just fade away? or if I continue to use it I will be in charge?

    If I use the free 30-day trial for photoshop I get charged if I continue to use the application after 30 days? Or how to stop using it after 30 days

    There is no charge and no financial information that must be given to your 30-day trial.  your software will stop working after 30 days so keep using it beyond this period will require payment.

  • I have currently a 30 days free member ship, will be automatically converted into full membership? How to prevent this?

    I have currently a 30 days free member ship, will be automatically converted into full membership? How to prevent this?

    No, it will not be converted to accession in itself, unless you buy it manually.

    Once 30 days have been completed, you will get pop-up notification as trial expired and offers the option to purchase.

  • I would like to know how to prevent messages sent to be registered on the SMTP server

    Currently, my Thunderbird client saves a copy of all messages sent to the folder "sent", as expected. All sent messages are also stored on the Server SMTP (G-Mail in this case). To avoid having to delete them manually, I want to warn the outgoing message to be stored on the SMTP server in the first place. Currently, my account of Thunderbird for Copies and folders settings has a check mark next to the option 'Other' with a destination of the folder option sent in Thunderbird. I don't see any other parameters that could control how sent SMTP mail server handles. I use the POP service only with the G-Mail Server. What settings should be in place to prevent messages accumulate in the folder "sent" on the SMTP server account?

    I think I can now answer my own question! The question turns out to be a g-mail not delivered not a factor controlled by Thunderbird.

    Apparently g-mail can automatically a copy of all mail sent by SMTP service one account. It's a "feature" that cannot be disabled! A workaround seems to be to set up a filter in g-mail account settings for all mail with an address corresponding to your own email address and send the message to the trash folder. Items in the Recycle Bin are automatically deleted after 30 days. Google prevents the rule 30 days being modified by measure of security, but at least trashed messages for irrevocably removed in a month.

  • How can I connect to someone who is hacking my network?

    How can I connect to someone who is hacking my network?

    Hi Frank,.

    What kind of network - your internet connection?  your intranet from home or the office (and it is wireless or wired or both)?  An ad - hoc network or a network based on the domain server (and if the latter, what type of server)?  The network hosts a web site, an exchange server that is accessible by internet, or also allowed incoming connections?  How many computers is on the network and what are the current use operating systems and who do you think are presented?  If you use a router, is protected by a router security identifier unique and a password (no admin / admin or other default standard settings, everyone knows) and a unique key and what type of security type (WPA, WPA2,...) and what type of encryption code?  This can be verified by the computer and others need to be checked or enabled via the router you can reach most likely through your browser by typing 192.168.1.1 where you would normally enter a URL.  If this isn't the correct code, then see below for IPCONFIG and would probably be the address that you want as the gateway by default and possibly the address of the DHCP server or the DNS server address as well and use what is there instead.  What type of method of internet access (DSL, cable, Satellite,...)?

    How do you know if that someone is hacking your system?  What evidence do you have that it happens or happened?  How do you think that piracy happens - happens through your connections in real-time (as if someone used a remote access or remote desktop) or it occurs because you seem to see the proof of it (if so, what evidence)?  I am trying to determine if a person has a path in your system directly or whether you are infected with malware that allows a periodic access or 'appear' as you are being hacked, when you are just infected.

    Do you notice it when it is real or only later after it occurred?  What exactly is the pirate make - information collection, change of information, install programs, remove programs or information, theft of bandwidth, or you are not sure and don't know exactly?  This happens only when you are connected to the internet or does it also occur when you are not connected and just using the computers and devices that are other interconnected?  If it isn't when it is connected to the internet, which helps limit the possibilities.

    If you are present and it's ongoing, click on start / all programs / accessories / right-click on command prompt and click Run as administrator.  Then type IPCONFIG/all and enter.  Which should display all connections to your computer, and if anyone is connected, this connection must appear, as well as login information and include information such as address TCP/IP (which may be useful to know).  Create a capture image or printscreen of the information.

    If you use Vista or Windows 7, go to start / Control Panel / Network and sharing Center / discover computers and devices.  Is there a link that doesn't seem right or that you don't recognize?  Come back and click on manage network connections.  Are there connections that you don't recognize?  If so, click on them and learn what you can about the properties and other information - create a capture of information or save a printscreen image.

    You use the Windows Firewall and is it activated and functioning?  Open and check exceptions and remove the items that you do not use or do not need - by default adds a lot of things that most people do not use. and everyone is a path in your system.  The less open ports, the better.  Do not remove everything you really need, but uncheck everything you don't need (you can always add it back later if the need ever happens).

    It's just a start on what to do to gather information.  I need the results and answers to give additional advice on what to do next - depending on what you have to say.

    Most likely, we will be able to best prevent access or possibly with the help of your ISP and the ISP of the hacker TCP/IP address (if we find the it), be able to identify who it is and stop it or help you gather enough information take legal or security action against the person or persons responsible.  Ago probably pirates out there that can do what you're tempted, but also provides methods of hacking (and that is basically what YOU want to do) is not something we support or help someone to do here.  To help you protect your system is one thing and we'll do what we can to help here - teach you how to hack the somone who is hacking you is quite another and we will not be involved in this.

    ***********************************************************

    In the meantime, in case there is an infection as opposed to a direct hacking, update and run a full scan with any security software you use.

    If you do not have because they can help, try the following programs. I recommend you download, install, update and run full scans with Malwarebytes:http://www.malwarebytes.org/ and SuperAntiSpyware:http://superantispyware.com/ and then run a full scan of Microsoft Security:http://www.microsoft.com/security/default.aspx.

    Check the following compliments from Stephen Boots - MVP:

    S ' ensure that the Windows Firewall is enabled.

    S ' ensure that all critical updates or important, including service packs for the operating system and programs are installed from Microsoft Update (Windows Update).

    -Make sure that Internet Explorer is version 8 or 9 and implemented to date with all patches.

    -In Internet Explorer 8 or 9, use the SmartScreen filter.

    -Make sure that the Internet IE security settings are at least put to fire medium-high (default).

    -Turn on the pop-up blocker in Internet Explorer.

    -On Vista and Windows 7 make sure that User Account Control (UAC) and doesn't work with elevated privileges.

    -Make sure that automatic updates of Windows are set to notify at least, but the preferred setting is to download and install automatically. If you update manually, be sure to update as soon as possible after being informed of updates available.

    -Make sure that installed applications, including Adobe Acrobat, Adobe Flash and Java are at their latest versions. Many vendors are regularly updated and fixes security vulnerabilities.

    -Never click through links from unknown sources and be careful, even if they are from a "reliable".

    -Do not open attachments in unsolicited e-mail.

    -Practice safe web surfing.

    To ensure that you are not infected (or remove the suspicion that you are infected which is often the case in such situations and is done either by hackers or may appear as the pirates are active when it is just a system infected - or if more than one, you have several computers connected), please follow these compliments of recommendations of JimR1 - MVP :

    You are running Microsoft Security Essentials?

    If Yes: start here - https://support.microsoftsecurityessentials.com/ and select the link that says - I think my computer is infected - and support and select the option for phone, chat or email (options vary depending on the region)

    If you are in North America, you can call 866-727-2338 for a free Microsoft Help for infections of virus and spyware.

    Otherwise:

    You can start here: https://consumersecuritysupport.Microsoft.com/ or here: http://support.Microsoft.com/contactus/cu_sc_virsec_master?WS=support#TAB0 for the help and support for malware infections.

    If this does not work, or that they can't help, try one of the compliments of forums-remove malware following PA Bear - MVP:

    I can recommend the assistance of experts available in these forums: http://spywarehammer.com/simplemachinesforum/index.php?Board=10.0 http://www.spywarewarrior.com/viewforum.php?f=5 http://www.dslreports.com/Forum/Cleanup http://www.Bluetack.co.uk/forums/index.php and http://Aumha.net/viewforum.php?f=30

    *************************************

    The first section will collect information about your situation so we can get an idea where to look and what to look for (and perhaps even determine if it occurs).

    The second section will verify that your computer or network is not infected (you should do this for all the computers on the network) or clean if they are and which remove the cause of the problem (of least temporarily).

    I hope this helps and await your response with responses, results and information.

    Thanks and good luck!

Maybe you are looking for