Planning security with nested groups

Hi all

We have a CapEx Planning Application and have a problem with the security of the entity. We have users within their own groups of HSS. Some groups are nested in other groups. For example

User1 is in Analyst_Group and Analyst_Group is in another group, Operations_Group.

On a specific entity (11122), we give the Analyst_Group and Operations_Group write access no access.

Planning should take the least restrictive security (for User1 in this case should be writable by 11122), but taking the security defined for Operations_Group. If set to None, then he cannot see this entity. If his game to play, then he gets only read access.

Does anyone know why it does not work the way in which the Admin planning guides say it should (IE its not to take the least restrictive permissions)?

We use the 11.1.2.1.0 planning.

Thank you!

Good read on the nested groups

So in your case Operations_Group is the parent, then Analyst_Group will inherit the parent's access.

Concerning

Celvin

http://www.orahyplabs.com

Tags: Business Intelligence

Similar Questions

  • ACS 5.2 assignment of authorization with nested groups in LDAP

    I have a Cisco Secure ACS 5.2 on a virtual machine. We use it for administrative access to our equipment Cisco GANYMEDE +. I use LDAP to authenticate with acitive directory. I currently run when a user is directly in the group that is assigned.  I change the way in which assign us group permissions and have created nested groups.

    For example:

    -User1 is a member of group1

    g -roup1 is a member of the "Group 2".

    I have card group2 to have access to my devices. However, User1 is not get mapped to the Group of law and access is denied.

    When I go to the monitoring, reporting and authentication GANYMEDE + details, under other attributes where it shows the outside groups the user is a member, I don't see group2, only group1.

    However when User1 is a member of group2 directly, the user is able to log on.

    GBA 5.2 not does support permissions allow this how to use nested groups?

    Mapping of nested groups is not supported by LDAP (because users containing that attribute memberOf groups just above them, are not nested). It is a behavior deafult when we use nested with LDAP groups. You must add subgroups for GBA and both respective authorization rules.

    Kind regards

    Jousset

    The rate of useful messages-

  • RTF model: are with nested groups

    Hi all

    I have a certain pickle of a problem that apparently...

    my data structure looks like this:

    <>COMPANY
    -< STORE >
    -Department < AND >
    -< ITEM > < / ITEM >
    -< / DEPARTMENT >
    -< / STORE >
    < / COMPANY >

    several companies may have several banks, which in turn have several departments, which, in turn, may also have several elements.

    my select statement looks like this:

    Select company_id,
    store,
    Department,
    agenda,
    Sum (Qty) as my_sum
    Of
    table_1, table_2, table_n
    where the...
    Group of...
    company_id order;

    my xml data model gathering looks something like this:

    < name of the group = "G_company"...
    -< element name = "E_company"...
    -name of the group = "G_store"...
    -< element name = "E_store"...
    -name of the group = "G_department"...
    -< element name = "E_department"...
    -name of the group = "G_item"...
    -< element name = "E_item"...
    -< element name = "E_item_total" value = "my_sum"...
    -< / Group >
    -< element name = "E_department_total" value = "G_item. E_item_total"function =" SUM () "/ >"
    -< / Group >
    -< element name = "E_store_total" value = "G_department. E_department_total"function =" SUM () "/ >"
    -< / Group >
    < / Group >

    my report currently looks like this:

    -< /B > < b > store-Dept of < b > < /b > - Dept of < b > < /b > - < b > point < /b > - < b > < /b > - point store < b > < /b > - Dept of < b > < /b > - < b > < /b > - < b > < /b >
    ---Townsville---TDept_1---TDept_2---TDItm1---TDItm2---Newcastle---NDept1---NDItm1---NDItm2 company < /b > < b >
    ---CompanyA------2----------------4------------3---------------2---------------1------------------1-------------------3----------------2-------------------4
    ---CompanyB------1----------------2------------4---------------5---------------2------------------1-------------------6----------------3-------------------1


    If I focus just on the Store-> Department-> order of the day, I realized that in my RTF using the template as follows:

    < table >
    -< tr >
    -< td > <? for-each-group@column:G_store; E_store? > shop < table > < td > <? for-each-group@column:G_department; E_department? > Department < table > < td > <? for-each-group@column:G_item; E_item? > element <? end for each group -? > <? end for each group -? > <? end for each group -? > < table >
    -< /tr >
    -< tr >
    -< td > <? for-each-group@column:G_store; E_store? > <? E_store_total? > < table > < td > <? for-each-group@column:G_department; E_department? > <? E_department_total? > < table > < td > <? for-each-group@column:G_item; E_item? > <? E_item_total? > <? end for each group -? > <? end for each group -? > <? end for each group -? > < table >
    -< /tr >
    < /table >


    as you can see, the store-> Department-> point go through the report horizontally.
    My problem is I want to have the totals for each column, such as:

    -< /B > < b > store-Dept of < b > < /b > - Dept of < b > < /b > - < b > point < /b > - < b > < /b > - point store < b > < /b > - Dept of < b > < /b > - < b > < /b > - < b > < /b >
    ---Townsville---TDept_1---TDept_2---TDItm1---TDItm2---Newcastle---NDept1---NDItm1---NDItm2 company < /b > < b >
    ---CompanyA------2----------------4------------3---------------2---------------1------------------1-------------------3----------------2-------------------4
    ---CompanyB------1----------------2------------4---------------5---------------2------------------1-------------------6----------------3-------------------1
    ---<b>Total</b>------------3----------------6------------6---------------7---------------3------------------2-------------------9----------------5-------------------5

    so I did a SUM on each of the Department/E_store/item_totals as:

    <? sum (current - group () / E_store_total)? >

    who now works for E_store_total... but not for E_department_total and E_item_total!
    It seems that BI Publisher does not like used money with inner loops.
    because if I extract only the column for E_department, the total value down is correct!
    but once I put the outside loop store, it breaks.

    what I get now with is:

    -< /B > < b > store-Dept of < b > < /b > - Dept of < b > < /b > - < b > point < /b > - < b > < /b > - point store < b > < /b > - Dept of < b > < /b > - < b > < /b > - < b > < /b >
    ---Townsville---TDept_1---TDept_2---TDItm1---TDItm2---Newcastle---NDept1---NDItm1---NDItm2 company < /b > < b >
    ---CompanyA------2----------------4------------3---------------2---------------1------------------1-------------------3----------------2-------------------4
    ---CompanyB------1----------------2------------4---------------5---------------2------------------1-------------------6----------------3-------------------1
    ---<b>Total</b>------------3----------------4------------3---------------2---------------1------------------1-------------------3----------------2-------------------4

    It makes the total general store correctly, but it gives me just the first line for the other totals.

    I tried:

    1 using the CUBE function in my SQL query, which gives me the results I want with all the totals I want, but I can't translate it into XML.
    2. try to use the pivot table option, but I can't always make it work as I want.
    3. using a separate sql query to retrieve the grandtotals but cela does not either because the required multiple looping.

    I am at a complete impasse, any help would be really appreciated!
    PS. I'm a very cool beginner

    Sent the hotfix.

    You must use the current group.

  • Transform a shape layer with several groups/paths in another?

    Hello

    I'm trying to turn the form A B-shaped into aftereffects.

    shapes copy.jpg

    Both are drawn in illustrator, and I imported into aftereffects and diverted path to forms.

    At the moment I do a key framing color and the path in the sticky on the form A and form B. From there I will meet with two questions.

    (1) for now I have to manually open each group, every path, every feature of color until I'm able to keyframe them. After that I have to paste the keyframe of the track and keyframe colors individually to the corresponding group. It's doable, but I have to turn the form in 10 more other variants. Just want to check is there a shorter way to the key all the way to access and color properties frame. And then copy all of the keyframes from one form to the other.

    Screen Shot 2016-04-21 at 2.33.34 PM.png

    (2) I noticed that not all the points on the path are created equal. I think that the "starting point" is noted with an extra box compared to other points.

    Screen Shot 2016-04-21 at 2.47.02 PM.pngScreen Shot 2016-04-21 at 2.47.14 PM.png

    As the "starting point" of a path is different from the rest, the transition has become weirdshape.gif.
    Can I check if someone knows how to change the "starting point" to another point on the same path? Or y at - it another way of fixing?

    Finally, if there is more easy morphing shapes to another, I'll be happy to listen. Thanks a lot ~

    I would do this kind of thing differently and 90% of the work in Illustrator.

    I would like to begin by drawing a path in Illustrator, to duplicate the path and to change the size and position and change the color of the outline of the color I wanted for the inside of the first form at the beginning of the animation.

    I use then the gradient tool to create a blend between the two forms specifying the number of steps, so my first form duly filled out for one frame looked like this:

    I would then do the same for my second form by using different colors, so I got this:

    With the two mixtures on you will see this:

    The upper mixing layer is where your animation will start and the bottom is where your animation should end.

    The next step is to select Merge layers and spread the mixture, if you find yourself with two groups:

    Here comes the fun part. Select groups, and then specify the number of steps you want as long as the number of images that you want in your animation. In this case, I want a second 1 transition and my comp is 29.97 FPS, so I selected 30.

    Now spread the mixture:

    We should end up with a group at layer 1 with 30 subgroups:

    Ungroup the higher group only then deselect all layers and select a single layer, then choose release to layers (sequence).

    now select all sub layers in the layer panel and drag it above layer 1. Layer 1 is now empty, so you can delete:

    Save the file HAVE and import into AE as a model with the size of the layer keeps selected:

    [Open the model, select all layers, move the a CTI frame to the right by pressing Ctrl/Cmnd + arrow to the right, then press Alt/Option +] to set the out point of all layers and then the wizard from keyframe to the layers in sequence without overlapping:

    I usually go to the point of exit of the background layer and press N to set the work area exit point, then cut the comp to work area.

    This model is then nested in your main comp and you can activate the time-remapping, so you can change the speed and use CC force motion blur to smooth animation.

    You will find it much easier to create the morph to a shape layer in Illustrator those in AE, you don't need to convert anything to forms and most of the work is done for you before you start. Total time to create this project with about 1/4 of the time it took to create this post.

  • Hyperion planning security

    I loaded the Group and members of the SSP using LCM in 11.1.2.0. Now I'm trying to load level dimension for Hyperion Planning Security. I read the Administrator's guide and below given the thread as well
    Hyperion Planning Security
    Re: loading of shared services groups

    I'm still confuse. How to load the dimension, shape data and task level security to Hyperion planning in bulk
    Could you please guide me.

    Thanks for your help...

    Two methods are pretty much the same thing, LCM is fine in the latest versions, and you have more control over the artifacts that you want to export/import.

    See you soon

    John
    http://John-Goodwin.blogspot.com/

  • HP Elite X 2 1011 G1 compressed: secure with BCU TPM activation error

    Hi, I am trying to activate the TPM secure with BCU, but every time I get this error at startup

    "MUD embedded controller data are invalid then that MPM is locked.
    Please MPM to unlock and lock again to capture data of valid MUD. "with accept and 10 - > 0 counting down.

    -I am able to change the other settings of the BIOS with the BCU, but not of TPM.

    -the BIOS password

    -J' I reset the default bios settings

    This is the file I used for config

    BIOSConfig 1.0
    Security level of TPM device
    * Change
    View
    Hide
    TPM Embedded Security security level
    * Change
    View
    Hide
    BONES of TPM security level management
    * Change
    View
    Hide
    Reset the TPM secure of operating system security level
    * Change
    View
    Hide
    TPM reset to the factory settings
    * No.
    Yes
    Reset the TPM security of OS
    Disable
    * Select
    BONES of the TPM Management
    Disable
    * Select
    Activate the TPM on next startup
    Disable
    * Select
    TPM device
    Hidden
    TPM 1.2
    * TPM 2.0
    TPM activation policy
    * F1 at startup
    Allow the user to reject
    No prompt

    And it is the newspaper (after the second execution of the script, all the parameters have been updated in the first inning, but TPM activate next startup update every time I run the script)

    19/07/2016 11:25:22.240764 | 9040 | Definition of | HP:hared:treamLog:treamLog. Severity of log level > = Info
    19/07/2016 11:25:22.240764 | 9040 | Info | HP:hared:treamLog:treamLog. BEGIN.
    19/07/2016 11:25:22.240764 | 9040 | Info | BiosConfigUtility::InitInstance | *****************************************************
    19/07/2016 11:25:22.240764 | 9040 | Info | BiosConfigUtility::InitInstance | * HP c. 4.0.15.1 Bios Configuration utility *.
    19/07/2016 11:25:22.240764 | 9040 | Info | BiosConfigUtility::InitInstance | *****************************************************
    19/07/2016 11:25:22.897080 | 9040 | Info | BiosConfigUtility::InitInstance | Platform: 2009 - HP Elite x 2 1011 G1 compressed
    19/07/2016 11:25:22.897080 | 9040 | Info | BiosConfigUtility::InitInstance | BIOS version: 1.13 16/05/2016
    19/07/2016 11:25:22.897080 | 9040 | Info | BiosConfigUtility::InitInstance | Manufacturer: Hewlett-Packard
    19/07/2016 11:25:22.897080 | 9040 | Info | BiosConfigUtility::InitInstance | Computer name: CL103009999204
    19/07/2016 11:25:22.897080 | 9040 | Info | BiosConfigUtility::InitInstance | Serial number: 5CG55264Z8
    19/07/2016 11:25:22.897080 | 9040 | Info | BiosConfigUtility::InitInstance | Unicode supported password: Yes
    19/07/2016 11:25:22.897080 | 9040 | Info | BiosConfigUtility::InitInstance | OS: Microsoft Windows 10 Enterprise 64-bit
    19/07/2016 11:25:22.897080 | 9040 | Info | BiosConfigUtility::InitInstance | OS version: 10.0.10240
    19/07/2016 11:25:22.897080 | 9040 | Info | BiosConfigUtility::InitInstance | Command line: [BiosConfigUtility64.exe / set: new.repset /cpwdfile:12345678.bin / verbose/l]
    19/07/2016 11:25:22.897080 | 9040 | Info | BiosConfigUtility::InitInstance | *****************************************************
    19/07/2016 11:25:23.022093 | 9040 | Info | biosconfig::utils:howMessage. < SUCCESS msg = "password successfully reading the file" / >
    19/07/2016 11:25:23.318998 | 9040 | Info | biosconfig::FileSettings:GetSettings | Charge of implementation 'TPM Device security level' with 3 values.
    19/07/2016 11:25:23.318998 | 9040 | Info | biosconfig::FileSettings:GetSettings | Responsible for defining 'TPM Embedded Security security level' with the 3 values.
    19/07/2016 11:25:23.318998 | 9040 | Info | biosconfig::FileSettings:GetSettings | Charge of implementation "OS management of TPM security level" with the 3 values.
    19/07/2016 11:25:23.318998 | 9040 | Info | biosconfig::FileSettings:GetSettings | Charge of setting "Reset of TPM of operating system security level" with 3 values.
    19/07/2016 11:25:23.318998 | 9040 | Info | biosconfig::FileSettings:GetSettings | Responsible for defining 'TPM reset to the factory default values' with 2 values.
    19/07/2016 11:25:23.318998 | 9040 | Info | biosconfig::FileSettings:GetSettings | Full setting 'Reset the TPM for OS' 2 values.
    19/07/2016 11:25:23.318998 | 9040 | Info | biosconfig::FileSettings:GetSettings | Charge of "OS management of TPM" layout with 2 values.
    19/07/2016 11:25:23.318998 | 9040 | Info | biosconfig::FileSettings:GetSettings | Charge of setting 'Enable the TPM on next boot' with 2 values.
    19/07/2016 11:25:23.318998 | 9040 | Info | biosconfig::FileSettings:GetSettings | Full adjustment "TPM Device" 3 values.
    19/07/2016 11:25:23.318998 | 9040 | Info | biosconfig::FileSettings:GetSettings | Riddled with political 'TPM Activation' attitude 3 values.
    19/07/2016 11:25:23.318998 | 9040 | Info | biosconfig::FileSettings:GetSettings | Read the 10 file settings.
    19/07/2016 11:25:23.318998 | 9040 | Info | biosconfig::FileSettings:ApplySettings | Apply all the settings of the BIOS
    19/07/2016 11:25:26.350584 | 9040 | Info | biosconfig::FileSettings:ApplySettings | In 'Device TPM security level' changeStatus = 'skip '.
    19/07/2016 11:25:26.366188 | 9040 | Info | biosconfig::FileSettings:ApplySettings | 'TPM Embedded Security security level' setting changeStatus = 'skip '.
    19/07/2016 11:25:26.381834 | 9040 | Info | biosconfig::FileSettings:ApplySettings | 'The OS level security TPM Management' layout changeStatus = 'skip '.
    19/07/2016 11:25:26.417235 | 9040 | Info | biosconfig::FileSettings:ApplySettings | Setting "Reset of TPM of operating system security level" changeStatus = 'skip '.
    19/07/2016 11:25:26.439250 | 9040 | Info | biosconfig::FileSettings:ApplySettings | Setting 'TPM reset to the factory default values' changeStatus = 'skip '.
    19/07/2016 11:25:26.458811 | 9040 | Info | biosconfig::FileSettings:ApplySettings | Setting 'Reset of the TPM for OS' changeStatus = 'skip '.
    19/07/2016 11:25:26.475825 | 9040 | Info | biosconfig::FileSettings:ApplySettings | Implementation changeStatus "OS the TPM Management" = "jump".
    19/07/2016 11:25:26.571695 | 9040 | Info | biosconfig::FileSettings:ApplySettings | Setting 'Enable the TPM on next boot' changeStatus = 'pass' returnCode = 0 oldValue = newValue 'Disable' = 'enable '.
    19/07/2016 11:25:26.591711 | 9040 | Info | biosconfig::FileSettings:ApplySettings | Setting "TPM Device" changeStatus = 'skip '.
    19/07/2016 11:25:26.614732 | 9040 | Info | biosconfig::FileSettings:ApplySettings | 'TPM Activation strategy' setting changeStatus = 'skip '.
    19/07/2016 11:25:26.642752 | 9040 | Info | biosconfig::FileSettings:ApplySettings | Processing parameters: 10, errors: 0 warnings: 0, was ignored: 9, succeeded: 1
    19/07/2016 11:25:26.649256 | 9040 | Info | biosconfig::utils:howMessage. < SUCCESS msg = "no error occurred" / >
    19/07/2016 11:25:26.649256 | 9040 | Info | HP:hared:treamLog: ~ StreamLog | End.

    See you soon

    I noticed that using TPM 1.2 does not give me this problem, so I went to that and everything was good. I expected that TPM 2.0 was less probematic, but it is not true.

  • How can I get the 'secure site' (padlock) icon to display when you access a web page secured with Firefox 4?

    The "secure" (lock) icon no longer appears on the status bar (or anywhere else I can find) when you go to a secure web page. How can I get the 'secure site' (padlock) icon to display when you access a web page secured with Firefox 4?

    You can add a 'lock' the b-I-S with this extension.

    https://addons.Mozilla.org/en-us/Firefox/addon/padlock-icon/

  • I show two updates of security with a date of 1969 is that right

    I show two updates of security with a date of 1969 are those just my Fox fire beginning very slow very very slow

    This has happened

    Each time Firefox opened

    Is a month ago

    Firefox must have had a problem getting the time to update your system clock, and so the timing of this update is zero. Time (beginning of time) for Unix is 01/01/1970 midnight GMT, less your GMT offset - what makes 12/31/1969 and 2 to 6 pm on North America.

  • Avast internet security with windows 7 Professional compatibility

    Avast internet security with windows 7 Professional compatibility

    before you buy this HP I had avast internet security paid license

    can install this program in my HP without problem?

    tank you very much

    Francisco

    Francisco,

    You could simply stop the Microsoft Essentials if it's getting in the way.

    Prevent the Microsoft Antimalware Service starts automatically

    If you cannot find the software under the name mentioned in the article, locate the service called Windows Defender.

    The same rule applies: set the service to manual start or disable the service.

    =========================================================================

    Opinions differ on the question of whether Microsoft Essentials / Defender should indeed be removed or If disabling services is sufficient.

    Pouvez Avast! Pro co-exist with MS Security Essentials?

    My 8.1 or OS systems, Windows Defender has been disabled (together) - no problems with Avast first.

    =========================================================================

    For your peace of mind, you may contact Avast and ask their opinion with reserve.

    Avast, support

    When you see a post that will help you,

    Who inspires you, gives a cool idea,

    Or you learn something new.

    Click the 'Thumbs Up' on this post.

    My answer-click accept as Solution to help others find answers.

  • CHKDSK incorrectly replacing invalid security with the default id id

    the last 2 times I had to restart after installing an update windows CHKDSK destroyed my computer when chkdsk incorrectly replacing invalid security with the default id id.  OUCH!

    Whenever I roboot now CHKDSK can go and I don't want to lose my computer time a third and having to reinstall everything again.

    Is there some kind of fix for this?

    I have Windows Vista Ultimate SP2

    Hello JimHarding,

    Response by Sebastien will disable chkdsk to run at startup.

    My concern here is that even after a format and clean install, chkdsk keeps is triggered to run.

    This could be a sign that the hard drive begins to run out.  It is my recommendation that you begin to take a very up-to-date backup of your data very convenient where the disc goes down.

    Best regards

    Matthew_Ha

  • Cannot select the Panel of configuraiton of 'Security' with Down and Up the keys on the keyboard

    After you install BlackBerry10Simulator-Installer-BB10_0_06-384-Win-201207130120.exe on Windows XP (Vmware player 3.1.3), I can't select the Panel of configuraiton of 'Security' with Down and Up the keys on the keyboard, because "Screen" is the last item on the screen.

    It works with a mouse. Thank you.

    I use a computer thinkpad notebook and always use the navigation button (red button), so I now have to use a mouse.

  • How to associate policies crypto with tunnel-group?

    Hi, when I review the configuration of the VPN from point to point, I have a question. The ASA has three peer-to-peer VPN configuration. So, there are also three groups of tunnel in there. My question is how each VPN to ensure encryption policy tunnel-group? In the anther Word, what encryption policy associated with tunnel-group? Thank you.

    This is the phase 1, they work from top to bottom.  When you try to negotiate the tunnel between two counterparts, in the background, they send all of your policies and according to which is first (from top to bottom) is used.

    For example.

    If your counterpart device uses (3des, md5, pre-shared key and group 2), it will not match the policy 1 and the rest of the policy will not be considered.

    Kind regards

    Sandra

  • I need to know how to configure the security settings for my laptop secured with a wireless router & domestic printer on a network in an apt building

    I live in an apartment bldg & want to know if my phone is secured with a wireless router & domestic implementation of a network. I have a laptop HP under Win 7 pro, a desktop computer using XP, & a wireless Canon printer? I use Microsoft Security Essentials for security. Can you tell me the right settings to ensure the safety of my business? And if I use the 'Public' library in documents others may see them outside my home network?

    Hi Tere,

    You can see this Microsoft article to strengthen the security of your computer and your network.

     

    Make your network more secure

    http://Windows.Microsoft.com/en-in/Windows7/making-your-network-more-secure

     

    Personal information and files on your wireless network can sometimes be seen by people to pick up the signal from your network. This can lead to identity theft and other acts of violence. A network security key or password can help protect your network against this type of unauthorized access wireless. Refer to this article for more information:

    Set up a security key for a wireless network

    http://Windows.Microsoft.com/en-in/Windows7/set-up-a-security-key-for-a-wireless-network

    Public folders are a convenient way to share files on your computer. You can share files in the public folders with other people using the same computer and with people using other computers on your network. Any file or folder you put in a folder Public is automatically shared with the people who have access to your public folders.

    Share files via public folders

    http://Windows.Microsoft.com/en-in/Windows7/share-files-using-the-public-folders

    Hope this information helps. If you need help with Windows, let us know and will be happy to help you.

  • ADF security with identification details &amp; role of database table

    Dear experts,

    I have developed web applications by ADF with JDeveloper 12.1.3.0.0

    I want to apply the ADF security for authentication and authorization process.

    I mentioned several blogs that associated with example ADF security with the database table, but unfortunately I couldn't reach my task of them because all the blogs that make reference to the roles of username, passwords, and user to hardcode.

    In my web application, there are 3 database table (users, roles, User_Role).

    A user can have one or more roles.

    I was able to accomplish this task using spring-mvc + Hibernate + sprig security. Its code of even below.

    <>Authentication Manager

    <>authentication provider

    < jdbc-user-service data-source-ref = "dataSource".

    users by name of user-query =

    "username, password, enabled users to select where username =?"

    authorities-by-name of user-query =

    "" Select username, role of user_roles where username =? ". / >

    < / authentication provider >

    < / authentication manager >

    Pls guide me to solve this problem.

    Thank you

    Mauricette

    User, your question is not clear. You have implemented the safety with the spring? So, what's your question?

    The ADF security can be combined with a sql authentificator that reads users and roles of the DB tables. See Java / Oracle SOA blog: the use of tables of database as in WebLogic authentication provider and anything on the Fusion Middleware: Tables of database user to implement authentication in ADF and http://soadev.blogspot.de/2010/04/sqlauthenticator-simply-best.html.

    All of these solutions do not use users coded hard and rolls.

    Timo

  • SSL: Cannot communicate securely with peers

    Hi all!

    Recently, Google do upgrade the android GMail app.

    Now he has the opportunity to connect to the POP/IMAP account - it's good again.

    Bad news is that you can not connect to MMP.

    I see in the newspapers imapproxy

    [07/Nov/2014:10:28:16 +0300] mail-2 ImapProxyAService.cfg[16692]: General Error: (id 601429) SSL negotiation failed for IP 172.20.10.52:
    Cannot communicate securely with peer: no common encryption algorithm(s). (-12286 11)
    

    Is it possible to fix it.

    Version of the server is

    Oracle Communications Messaging Server 7.0.5.30.0 64bit (built Oct 22 2013)
    libimta.so 7.0.5.30.0 64bit (built 14:31:48, Oct 22 2013)
    Using /opt/sun/comms/messaging64/config/imta.cnf (compiled)
    SunOS mail-2 5.10 Generic_148888-03 sun4u sparc SUNW,Sun-Fire-V240
    
    

    Monk.

    Most likely, your NSS version is outdated. From MS7.0.5.31.0 (patch - 31), the patch bundle now the latest NSS version available at the time so the Solaris OS NSS/NSPR patches are no longer a requirement.

    Ms. 7.0.5.34.0 (patch - 34) is the latest that comes bundled with NSS version 3.17.1

    My MS 7.0.5.34.0:

    #. / imsimta version

    Mail server Oracle Communications 7.0.5.34.0 64bits (built October 14, 2014)

    libimta.so 7.0.5.34.0 64-bit (built 12:21:13, 14 October 2014)

    With the help of /opt/sun/comms/messaging64/config/imta.cnf (updated)

    NSS library version: 3.17.1 Basic ECC

    I get the additional algorithms:

    #. / sslconnect - v 10.220.18.149

    Following list of the SSL/TLS enabled cipher suites:

    TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0X009E)

    TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0 X 0033)

    TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0 X 0032)

    TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0 X 0067)

    TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0 X 0039)

    TLS_DHE_DSS_WITH_AES_256_CBC_SHA (0 X 0038)

    TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0X006B)

    TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (0 X 0016)

    TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA (0 X 0013)

    TLS_RSA_WITH_AES_128_GCM_SHA256 (0X009C)

    TLS_RSA_WITH_AES_128_CBC_SHA (0X002F)

    TLS_RSA_WITH_AES_128_CBC_SHA256 (0X003C)

    TLS_RSA_WITH_AES_256_CBC_SHA (0 X 0035)

    TLS_RSA_WITH_AES_256_CBC_SHA256 (0X003D)

    TLS_RSA_WITH_3DES_EDE_CBC_SHA (0X000A)

    TLS_RSA_WITH_RC4_128_SHA (0 X 0005)

    TLS_RSA_WITH_RC4_128_MD5 (0X0004)

    SSL_CK_RC4_128_WITH_MD5 (0XFF01)

    SSL_CK_RC2_128_CBC_WITH_MD5 (0XFF03)

    SSL_CK_DES_192_EDE3_CBC_WITH_MD5 (0XFF07)

    tsock_connectbyname(): getaddrinfo call...

    -Deb

    -------

    If you have any questions or need help more the resolution suggested, please open a request Service through MOS

    Say thanks if you feel you have the right answer by marking any relatively useful for 5-point response unit or correct for 10 points.

Maybe you are looking for

  • Add DNS - network settings, the parameters of the airport or both?

    I didn't know there are 2 places for that - and I'm not sure that works best. Recently added 6.6.6.6 and 8.8.8.8 to try to speed up Web sites that have been loading slowly, as suggested these tips very. I have added in the network settings, but then

  • Why wireless network connection drops repeatedly?

    I'm a new dv7 running Windows 8. It was connected to my wireless netwrok, but after a few minutes, the connection is lost. Then, it becomes very difficult to see and connect to the network again. Other current devices, as well as my last system, do n

  • Can I use an Autorun CD in my mac but the remote desktop?

    Remote Desktop for Mac and Autorun CD Can I use an Autorun CD in my mac but the remote desktop? Here is my configuration: 1 mac running Lion 2. Windows Server 2003 r2 3 remote Desktop Connection for Mac 2.1.0 Problem: I insert a CD in the mac.  DRC h

  • idrac8 keyboard pass through mode

    Have a T630 with iDRAC 8 Enterprise f/w 2.21.21 (Build 12). Would like to get the keystroke Ctrl + ESC for the system, but he is intercepted by Windows. This occurs regardless of whether the option 'Pass all keystrokes to target' is checked, or if I'

  • 8.1 Windows update help

    I am running Windows 8 in my PC.The download link for Windows 8.1 in Windows applications store is visible to me. Is it possible to download the update via my browser. Thank you.