Impossible to assign a security to the YEARS

Hello
I am trying to set security for "Grant access" to my dimension of years. When I edit Dimension, it shows that the option 'Apply security' is already checked and used in output so that I can not change it.

However, there seems to be no way to assign a security to give users READ access to AFA 08 historical and WRITE access in FY10. This seems to be the expected behavior, but what do I do to assign a security?

Hello

Security is not applied to the years, you can set the opening year of start/end of scenario.
Take a look at the sceanrio rating settings, you will see start and end year/periods

See you soon

John
http://John-Goodwin.blogspot.com/

Tags: Business Intelligence

Similar Questions

  • Pavilion P7-1240: Impossible to disable startup secure in the Bios

    I would like to disable Secure Boot, but do not have the ability to do this in my bios.

    My BIOS is the JAS_710 ROM with v 7.10.

    My menus look almost identical to those in this post:

    http://support.HP.com/us-en/document/c03659945/

    with the exception of having an element of Boot Configuration secure (from Figure 1 - Menu of security).

    Anyone has any experience to turn it off without this configuration item?

    BlairD, welcome to the forum.

    I am not sure you have Secure Boot in the BIOS.  I don't find reference to it in one of the guides.  The computer came originally with Win 7.

    Please click on the Thumbs up button '+' if I helped you and click on "Accept as Solution" If your problem is resolved.

  • List security fixes not released by microsoft over the years 2007 to 2009

    Hi all

    Currently, I am looking for the list of security patches not released by microsoft over the years 2007 to 2009.

    I am aware that most of these islands are very old and new version (superseeded) patches have been released by microsoft.

    But I have a very specific requirement of our client companies to make the list of those available patches.

    Please help me to get the list of patches for the mentioned period. (no link or KB containing the corresponding list will do)

    Thanks adavance :)

    DNR

    Please see the message in your thread on Technet.  You can also try Googling the information as we do.

    https://social.technet.Microsoft.com/forums/en-us/0f25d5bd-6e64-4B34-a2d3-a42f55f594fa/list-of-non-security-patches-released-by-Microsoft-during-years-2007-to-2009?Forum=winserverManagement

  • Unable to accept the terms of use, which is needed to manage the security of the family

    Hello

    I have a new laptop with Windows 8, which I created two users - one for me and one for a child (Standard user - and Coachman on behalf of child) (Administrator). I created a real account for the child and filled out all the necessary information - my live account has been used for a few years, but I update personal information.

    When I try to manage parental controls from the Control Panel, I get an error message indicating that I should go to account.live.com to agree to terms of use. I can't find any place to accept the terms of use, or my account og the child account. I looked for a solution and found that many have had similar problems. One of the solutions that seeems to help was to connect to fss.live.com, but this page just redirects to a generic MS information page of security for the family.

    Any suggestions?

    Thanks for the quick response!

    I managed to find a solution, not an elegant solution, but it will keep your real account (parent1) to monitor your kids.

    1. create a new live account (parent2)
    2. create a new account admin on the PC using the new live account (parent2)
    3. connect to the computer with the admin account and create an account for child
    (using either an og existing live new account - don't forget to check the child...)
    4. you should now be able to manage via the parental control panel
    5. Add a new parent in parental control (your old existing live account - parent1)
    Some steps are probably not necessary, but I managed to get the "accept the terms of use" hampers by following these steps.
  • Impossible to delete mcafee security program from my pc someone ' a help please

    Impossible to delete mcafee security program from my laptop help please

    http://service.McAfee.com/FAQDocument.aspx?ID=TS100507

    How to uninstall or reinstall supported McAfee consumer products using the McAfee Consumer Products Removal (MCPR.exe)

    See you soon.

    Mick Murphy - Microsoft partner

  • Windows 7 security for the family

    Hello

    A couple of years back, I've set up family safety on my daughter's laptop Win 7.  She is now 17 and a senior in high school.  Time to lift the restrictions.  They interfere with his school work.  I had a couple of Microsoft accounts over the years.  I think that I probably put in place safety for the family on his machine using an older account.  When I try to log in security for the family on his cell phone, he already has my most recent user name and allow me to the older (and the password).  When I get my most recent credentials, it says the following: "the action cannot be completed because the parent is therefore more a part of the Family Safety family."  How can I enter the security software for the family on his computer, turn it off and uninstall.  Thank you.

    -Matthew

    Hello

    According to the description, I understand that you are facing problems with the parental control and receive an error message.

    To solve the problem related to the safety of the family, please follow these methods:

    Method 1: I suggest you to update the family safety filter. See the article for more details:

    How to update the family safety filter?
    http://Windows.Microsoft.com/en-us/Windows-Live/Family-Safety-filter-FAQ?woldogcb=0

    Method 2: I suggest you refer to the following article in the Wiki for general troubleshooting:
    http://answers.Microsoft.com/en-us/Windows/wiki/windows_other-security/family-safety-frequently-asked-questions/5672f7b2-e3c0-498a-9a6c-c9cab39f68e5

    Hope this information helps. Please let us know if you need any other help with Windows in the future. We will be happy to help you.

  • BlackBerry Smartphones, how secured is the characteristic of the wipe on the BlackBerry? Should I be worried?

    Before starting playback, please understand that I am a stickler for security and other security gurus to help me with my dilemma. I'm new to BlackBerry phones, but not a beginner in the scene full tech. "BOLD" subsection includes issues that I really want to learn more about.

    Right here. I have an iPhone with OS 1.0 and origin, we couldn't guarantee wipes. Actually, to fill the disk with music and videos so that it would replace all the information. Had to do this many times (5-10 x times) also, because just fill out once wasn't enough to write the data. But with the 2.0, Apple where you can have the iPhone do a safe clear by writing zeros to the drive. It took a while (1 hour or more), but it does the job.

    Well, I grew up now and I moved to the BlackBerry platform. I started the year with the "BOLD" last and will move into the Curve 8900. But before I do, the wife wants to sell me the "BOLD" first. But before I sold it, I want to ensure all wipe top. All DIY guides say to go to options > Security > and wipe the device and type the word "blackberry". Great! Now I know how to do it.

    But what I want to know is now the wiping method is it secure? Can someone, if someone restore my contacts, passwords or anything that has been stored? I do what I did for my original iPhone to the "BOLD" and fill it with data and wipe the Unit 5 times or more?

    Wipe is a safe action.

    I am not aware that someone can restore information after the memory has been erased.

    Visit this link: http://www.blackberry.com/btsc/KB05099

  • Security for the TANDBERG Content Server certificate

    Hello everyone,

    I have a question: How do I renew the security certificate for the TCS web interface?

    Our client has Tanbderg COntent Server installed 4.1 and the certificate has expired, so it is inaccessible by Firefox (the only options are IE10 and less, but they also show a large number of errors).

    Thanks in advance.

    The recording is stored and then transcoded. When the process is complete, you will see registration resulting in the record view > Recorded. Click Play to view the recording. See the online help for more information.

    Installation of a security certificate

    The content Server has implemented SSL (Secure Sockets Layer) Protocol to send the authentication information of the user (username and password) to securely to the user, log in. The SSL implementation means that the web UI must establish its letters of nobility with the browser of the user through an electronic document, called a security certificate.

    Each unit is supplied with a self-signed certificate which is valid for one year. Because self-signed certificates are not a certificate authority approved, when users try to log the unit, most of the browsers displays a message that the site identity can not be verified.

    You can add the unit to the list of sites approved in Internet Explorer or add an exception in Firefox to avoid seeing the connection error messages.  However, Cisco recommends the purchase of a security certificate of a certificate to the authority who has a relationship of trust to an authority root, such as VeriSign or Comodo. These credentials are more likely to be approved by the browser, eliminating the need to add the unit to the list of trusted sites. This certificate must be generated against the Windows computer name or the DNS entry associated with the IP address that is using the device.

    To install your security certificate purchased on the web site of the default unit:

    Step 1 Connect to the appliance using remote desktop, then Start > administrative tools > Internet Information Services (IIS) Manager.

    Step 2 Under Internet Information Services, expand '(local computer)"and then"Web Sites. "

    Step 3 , Right-click on default web site, and then select Properties.

    Step 4 In the Directory security tab, click server certificate in the secure communications section.

    Step 5 Follow the instructions in the Web Server Certificate Wizard to replace the current certificate with your purchase. For more information, see using Internet Information Services.

    You can also install it for the website Administration of Windows Media and website administration of Windows Server in order to avoid security warnings when administrators to connect to these sites.

    When you installed your certificate on web sites, this certificate is then used instead of that self-signed.

    If the security certificate expires, (independent), browsers will display another warning and more no previous warning associated with self-signed certificates. A new certificate request can be generated by using the IIS Web Server Certificate Wizard.  Once this request is generated, another self-signed certificate can be created by using a third-party tool or this request can be sent to a certificate issuing authority. Do NOT remove the expired certificate until you have installed a new because this will prevent any attempt to logon.

  • Impossible to access anything whatsoever in the Panel, limited access to internet

    Impossible to access anything whatsoever in the Panel, run antivirus, nothing found, limited access to internet too.  Don't know what to do.

    Hello

    1. don't you make changes to the computer before the show?
    2. what happens when you try to access the Internet?
    3. what web browser you use to access the Internet?
    4. do you get the error message?

    Method 1
    Step 1: I suggest to start the computer in safe mode with network and check if you are able to access control panel and Internet.

    Startup options (including safe mode)
    http://Windows.Microsoft.com/en-us/Windows7/advanced-startup-options-including-safe-mode
    Step 2: If you are able to access the Control Panel on safe mode, then I suggest you perform the clean boot and remove the program that is causing the problem. Make sure that you disable also all firewall and antivirus when you perform the clean boot.

    How to troubleshoot a problem by performing a clean boot in Windows Vista or in Windows 7
    http://support.Microsoft.com/kb/929135
    http://Windows.Microsoft.com/en-us/Windows7/disable-antivirus-software
    Note: Microsoft does not recommend that you disable the antivirus protection in most conditions. Disable the antivirus protection that temporarily to restore a computer.
    Note:
    follow step 7 clean boot KB929135 article to reset the computer in normal mode.

    Method 2
    I suggest you run virus scan online by using the Microsoft safety scanner.

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    Note: when you do an antivirus online, you will lose data that are affected by the virus. Microsoft is not responsible for the loss of this data.

    Method 3
    I suggest you to create the new user account and check if the problem persists.

    Create a user account
    http://Windows.Microsoft.com/en-in/Windows7/create-a-user-account

    If everything works well in the new user account, then I suggest you to transfer data and settings to the fixed aid corrupt profile.

    Difficulty of a corrupted user profile
    http://Windows.Microsoft.com/en-in/Windows7/fix-a-corrupted-user-profile

  • During ANY installation of a program (e.g. Skype), I get the "year error occurred while attempting to create the directory C:\Program\Microsoft\Windows\Start Menu.

    original title: facilities program

    During ANY installation of a program (e.g. Skype), I get the "year error occurred while attempting to create the directory C:\Program\Microsoft\Windows\Start Menu. What happened with cd installs, but also downloads on the internet.  I already "took possession" of the computer, which is still delayed freaking, but am still unable to fight through all the questions of security, I guess that.  Any help would be greatly appreciated as I'm about to DOWNGRADE to something more user-friendly.  Thank you

    BTW, this is WINDOWS 7 Home Premium

    I had this problem for a long time on Windows 7. Finally, by pure chance I came across this solution that solved the problem. -Take the shortcut of the property

    http://www.SevenForums.com/tutorials/1911-take-ownership-shortcut.html

    You will need to run the "fusion" in the context menu of a reg file, published as part of the solution to change some registry settings. On any folder, you'll get a context menu 'Take Ownership' which restores the property correctly. This solves a lot of problems installing.

    Many people have trouble with this and therefore decided to post here.

    Gem of a solution. Thanks to GRIM and Brink on Windows 7 Forum!

    -Jayawanth

  • You can install the server connection and security on the same virtual machine Server?

    I was looking around and found an old post that says that you could do.

    I tried the documentation view 5 but not a lot of luck there.

    If the deployment is small say 20 users view total.

    Could install you the connection and security on the same VM Server?   W2K8R2 64-bit?

    I certainly understand some of the security risks.

    TIA

    Marc Alumbaugh says:

    Any other ideas?

    No other ideas, but we have should stick to previous ideas and continue to work through them. You make progress in this analysis - continue! When it is correctly configured, you have configured the firewall/proxy etc don't not to block PCoIP and that you use at least seen 4.6 on the Client and the server, it does not work.

    It always seems that there's something blocking PCoIP in your environment - where the black screen.

    So when 'PCoIP external URL' on the login server is defined on InternalIP:4172, your View on the internal network Client connects fine. If you run Wiresahrk on your connection to the server to capture the connections, you will see a connection HTTPS turns on TCP 443. Then when you select a pool of offices you will see a PCoIP connection come in. It comes to 4172 TCP from the customer to the login server, then UDP 4172 also from the Client to the server connection as well as UDP 4172 in reverse. For this reverse part, the source UDP port will be 4172 and corresponds to the destination UDP port source on the incoming UDP packets. Check that this is the case. This will prove that the login server is gateway your PCoIP correctly.

    So far so good.

    Then, you switch to your remote Client to view from on the Internet. To do this, you assign the URL of the "external" ExternalIP:4172 PCoIP. Note that you don't need to restart the login server for this to take effect. It takes effect immediately. This IP address will be the public IP address which will probably through a NAT/firewall to access your connection to the server. You can start by checking that the IP address is correct using to connect to the server address when you satrt the customer to view. When you use the same IP address to the Client and through the authentication step, it will prove that it is set up correctly in terms of Routing/NAT etc. Then follow with Wireshark on the login server and observe what happens when you select a pool of virtual offices and get the black screen. You should see the same activity PCoIP on your login server model as in the case of internal test (i.e. starting with the incoming TCP connection on port 4172). View Client will use the ExternalIP address that you specified in the "URL external PCoIP ' to establish the PCoIP connection to connect to the server. So if you don't see this com 4172 TCP on the login server, or you do not see the packets UDP 4172 then something is blocking. This is usually caused by a firewall or a proxy blocking PCoIP.

    If this is the case and you do not see these packets to connect to the server, then run Wireshark on the Windows Client to view and see if you can see 4172 TCP and/or UDP sent to this ExternalIP 4172. If Yes, then you know that something (such as a firewall or proxy) between the Customer View and the view connection server it blocks.

    Let us know what it was.

    Hope it will be useful.

    Select this option.

  • Security in the cloud

    I've always had this question in the back of my mind and always there:

    "Who hold the account root on the cloud? AND where the equipment? "

    For a customer who is owner of its hardware and software on its site are the unique root/admin, and that he wants to add, but the cloud changes this understanding. Unless that cloud providers to offer a block of material to the customer who was in turn to (former data centers). So, how can we overcome them?

    DJ

    Hello

    Hello, I assume that firms are in the cloud, because in my experience a lawyer would ask which access to information and it's always a problem.

    Not really, I know that some of those who use the cloud, the key is to understand how to properly use the cloud. For example, some lawyers use Forefront and Microsoft Exchange in the cloud. When using such a service, digital signature of e-mail makes sense but also ensure that critical data do not leave the scene, so a solution like Zscaler DLP can be justified.

    Re: jurisdiction

    You're right, it's a big problem if you are using a cloud that spans the country, but to the United States, not much cover countries and it is almost impossible for your data to be included in another country, this is why you must correctly interagate your Cloud provider to determine the limits of its jurisdiction. The European Union on the other hand can have problems with this.  A recent example is democratic party Canadian, that they wanted to use Salesforce (based in the United States), they have determined if they encryption data before placing it in Salesforce, it meets all of the conditions and that the United States could not decipher at will.  So in this case data on site encryption and placing it in the cloud are a way to work around this possible issue.

    Re: In memory has the keys

    It's true, no way around it if you do the encryption in the cloud, I suggest encryption before you leave your premises and then place it in the cloud. Very powerful in this way. Just to make sure that its usable.

    Remember it is not really on the virtual machine or the cloud itself, but security in the cloud is on the data, yes the cloud, you choose the secondary controls needs such as IDS/IPS, but ultimately it is your data that counts. Therefore, encrypt and sign necessary to confirm the integrity and confidentiality and use well known, encryption mechanisms, like something blessed by your Government which believe me did exhaustive tests and tackles cryptanalytic against it.

    Finally, do your research and due diligence, keep updated with the cloud and data attacks, so that you are prepared for the worst. This kind of intelligence is essential to the continued safety, do not depend on the tool providers to do it for you as you risk your data as such in the end data security is your responsibility.

    Re: Supplier responsibility

    In every cloud provider document I've read in the United States, you assume all risks, not them. There is no sharing of the risks here. It's your data, your responsibility. In the EU, it is a little different because of different laws.

    Encryption and digital signatures are not the end of privacy and integrity but if properly will protect your data. If you stay ontop of the intelligence about the attacks, then you will know also better ways to protect your data.

    Not all solutions of cloud IaaS and maybe if put you up an IaaS, you should consider how data moves, is operated, and know if you can use something like CipherCloud to encrypt/decrypt the data as it leaves your premises for use within your cloud IaaS...

    Best regards

    Edward L. Haletky

    Host communities, VMware vExpert,

    Author: VMware vSphere and Virtual Infrastructure Security,VMware ESX and ESXi in the 2nd business edition

    Podcast: the Podcast for security virtualization of resources: the virtual virtualization library

  • Parallel periods for the year to Date feature

    Hello


    I am creating a parallel period of 'Shared member' to provide year-round Sales Date, based on the membership of the periods 'movement' existing.

    It would be easy if I wasn't a live period and the fact that I'm putting this parallel (like brother) than other members of high level...

    As the child to share Members 'Base time period', I can't create a new 'Base' time once it has been deployed - she has... What parameters of the top of the page parent can I use now?


    Another period of time don't have children "Core time" (correct me if I'm wrong), I can't have two values of the "period of time of the year", you may not have a high-level summary period - and I can't leave without precision... that's impossible on a live system without starting over?



    Thanks again for any input,


    Robert.

    Hi Robert,.

    YTD is a default feature. Right-click of your period dimension in the dimension library and go to dynamic time series. Deploy CAJ activation on the generation low (3 on a standard dimension of time), and you will have the A-T-J option when you right click on a period of member selection.

    Kind regards
    Alin

    Published by: AlinGhizila on February 14, 2012 07:50

  • Security at the level of the object by creating groups of catalog in OBIEE - 10 G

    Hi all

    I have a requirement to display the dashboard based on the user login. Ex. Mike belongs to HR, Smith to accounts
    When Mike connects, he should see only these three dashboards. View of CF, commune data1, data2 common. When Smith connects, he should see only these three dashboards. Display accounts, common data1, commondata2.
    Commondata1 and commondata2 dashboards has joint reports for all departments. Other dashboards is particular department with all the different reports. How can I implement this?

    One of my previous posts, I was told to do by using the object-level security by creating groups of catalog. Can you please provide me with instructions to end-to-end on creating object groups of catalog-based security level.

    Thanks for your time and your help.

    Hello

    Mike to HR
    Smit - account

    Yes, groups reach you by security at the object level by creating catalog

    (1) create a catalog group and users partially RPD (Ex: Account_grp, HR_grp)
    (2) assign user to this particular group (say Ex: Account_grp = Smith and HR_grp = Mike)

    (3) login (username Admin) dashboard and---> gale dashboard page layout--> add users to this particular
    Dashboard users and save it then
    try to connect to the user mike and smith, it will work

    you see link below

    http://www.rittmanmead.com/2010/01/OBIEE-10G-Web-catalog-best-practices/

    http://www.rittmanmead.com/2007/05/OBIEE-and-row-level-security/

    Thank you

    Deva

  • I El capitan, but stopped opening safari says impossible to find something wrong with the application extension

    I El capitan, but stopped opening safari says impossible to find something wrong with the application extension

    You can open it by accessing it in the Applications folder? If so, you may have a corrupt Dock alias. Click and hold the alias and make it about 1 inch away from the docking station, then release. Then drag the application in the Applications folder in the Dock to create a new alias. When you have a new alias, control - click/Options/keep in Dock.

Maybe you are looking for