Question about user SYS and ROLES

Hello

When I create a role, such as:
create role atestrole;
I see that as soon as the role is created, it is automatically granted to the SYS.

I thought that, given the fact that SYS has already all the privileges system and object in existence, that the automatic grant was superfluous and unnecessary. To test this, I have revoked the role of 'atestrole' of SYS and then tried to give "atestrole" as user SYS to SCOTT. As expected, SYS has been able to give "atestrole" SCOTT.

At this point, it seems that the automatic granting of new roles to SYS does not SYS, being able to do something that he would be able to do otherwise.

Question: SYS automatically grant all newly created roles, cause SYSTEM to have a few abilities that he would or not is superfluous (as seems to be)?

Thank you for your help,

John.

PS: the new roles are automatically awarded to SYS by Oracle itself, it is not something to be done "manually".

Published by: 440bx - 11 GR 2 on 20 Sep, 2010 08:23 - added PS.

I don't know if it will clear the cloud or not! but the result is "a user who creates a role is granted also that default role.
So, if you created the ROLE with SYS is authorized for SYS otherwise DO NOT default. See the example below.

SQL> conn sys@xe as sysdba
Enter password: ******
Connected.

SQL> CREATE ROLE TEST_ROLE_GRANT1;

Role created.

SQL> set line 1000
SQL> SELECT * FROM dba_role_privs
  2  WHERE GRANTED_ROLE='TEST_ROLE_GRANT1';

GRANTEE                        GRANTED_ROLE                   ADM DEF
------------------------------ ------------------------------ --- ---
SYS                            TEST_ROLE_GRANT1               YES YES

SQL> conn system@xe
Enter password: ******
Connected.
SQL> CREATE ROLE TEST_ROLE_GRANT2;

Role created.

SQL> SELECT * FROM dba_role_privs
  2  WHERE GRANTED_ROLE='TEST_ROLE_GRANT2';

GRANTEE                        GRANTED_ROLE                   ADM DEF
------------------------------ ------------------------------ --- ---
SYSTEM                         TEST_ROLE_GRANT2               YES YES

SQL> conn hr@xe
Enter password: **
Connected.

SQL> CREATE ROLE TEST_ROLE_GRANT3;

Role created.

SQL> SELECT * FROM dba_role_privs
  2  WHERE GRANTED_ROLE='TEST_ROLE_GRANT3';

GRANTEE                        GRANTED_ROLE                   ADM DEF
------------------------------ ------------------------------ --- ---
HR                             TEST_ROLE_GRANT3               YES YES

SQL> 

Tags: Database

Similar Questions

  • Questions about the terms and conditions

    Dear team of Adobe Stock,

    I am considering a subscription for an e-commerce site that I am developing. I have a few questions about the terms and conditions:

    3.5 social media use. You can view or download an unmodified version of the book on the Social media Site if (A) you include a notice of copyright in the work itself (© author name - stock.adobe.com) and (B) the terms of use governing the Social media Site do not include any provision that would grant exclusive rights or the ownership of those works or alterations to anyone. "Social Media Site" means a website or application that puts the main emphasis on facilitating social interaction between its users and allowing users to share content in such social interaction

    What I have to insert in each post on social media on behalf of the author? Generally, this information is displayed only for free images. What I have to insert this information even if I signed up for a plan?

    Thank you

    Hello

    Please see the link below for help:

    http://wwwimages.Adobe.com/content/dam/ACOM/en/legal/servicetou/Adobe-stock-additional-ter ms_20160119.pdf

  • user sys and locking system

    Hi all

    We have 10.2.0.4 on solaris 10.

    Currently we have I.T. audit on our environment, and the auditor commented to lock the user sys and system and use a single user with any name (not the name generic oracle) and grant him the privilege of sys and system and use this user for admin purposes. is this true?... is it recommended?

    Please notify

    Hello

    I think that this is not a good way to lock SYS.

    In addition, if you connect as administrator (root for Unix/linux) operating system on the server and use
    Authentication of the BONE and then, you can connect to SYS AS SYSDBA anyway.

    So, in fact, it is not possible to lock SYS even if you run the following:

    ALTER USER SYS ACCOUNT LOCK;
    

    If you want to prevent access on SYS, you must set a password long and complex and
    apply the same rule for the admin / root user OS.

    These passwords must be known very little and well - to identify the people and written nowhere
    (in files or scripts).

    Plus more, you should restrict DBA role to SYS and SYSTEM and remove this powerful role
    other Oracle users.

    Then, you can enable the CHECK in order to control the connection to the session database and,.
    create a LOGIN TRIGGER to verify the connection, the workstation, the program end-users
    that connect to the database.

    In 10g, DBConsole EM shows an alert whenever a user is logged on with SYS.

    Please find attached, an interesting paper written by Pete Finigan on this topic:

    http://www.insight.co.UK/files/presentations/hacking%20and%20securing%20Oracle.PDF

    Hope this helps.
    Best regards
    Jean Valentine

  • A question about the methods and parameters.

    Hey guys, this is my first post here. I am very new to Java and done a bit of C++ before Java. I had a question about the methods and parameters. I do not understand the methods; I know they can be repeated when it is called, but it's almost everything. I also know that a program should have a class that contains the main method. What I really, really understand on methods is what the parameters are. I know they are in parentheses and that is it. Could you explain what they are? I really appreciate it. Thanks to all in advance. Best regards, Michael

    Taking an example:
    Suppose you calculate area of the rectangle you need two inputs one is the length and the width. Area = l X b, where l = length, b = width

    If your method, say, calculateAreaOfRectangle (length int, int width) will be two parameters as arguments.

    System.out.println ("field of rectangle:" + calculateAreaOfRectangle (40,30);)

    public int calculateAreaOfRectangle (int length, int width) {}
    int area;
    Area = length * width;
    return of area;
    }

    So if you call this method then the output will be returned in 120.

    Parameters of a method are simply the input variables for the method of treatment for all calculations or something useful.

    And we cannot have methods inside the main method in Java. It is in the java syntax and if you do, it will throw a syntax error.

  • Question about the interruptions and priming

    Hello

    I had a few questions about the startup and interruptions in a virtualized environment

    Assuming that, plenty of virtualization (no material assistance to virtualization of memory ).

    1 initialization: in an ordinary PC, the boot process starts with the BIOS, to expansion ROM, back to the BIOS and MBR secondary boot record, then grub (is it) and finally the operating system. In a virtualized environment with VMM running directly on top of hardware (Native VMM), how is the initialization of the different process, as I understand it takes BIOS-> Expansion ROM - > BIOS-MBR-> other record secondary-> VMM-> OS--> applications >. Am I right on that?

    2 breaks: VMM examines the source interruptions prior to the interruption, so in a multicore environment, assuming a 2 processor core, how the VMM decides on the kernel for which the interruption in intended, prior to shipment of the interruption. Interruptions are tag ID, said core ID?

    Thanks in advance

    -SC

    sidc7 wrote:

    1 initialization: in an ordinary PC, the boot process starts with the BIOS, to expansion ROM, back to the BIOS and MBR secondary boot record, then grub (is it) and finally the operating system. In a virtualized environment with VMM running directly on top of hardware (Native VMM), how is the different boot process, if I understand correctly to -> BIOS-> Expansion ROM BIOS-> MBR-> other documents-->--> OS--> requests VMM. Am I right on that?

    It is simplistic but essentially correct.  A metaphor would be a little better thinking that the hypervisor/vmm is an operating system, except that the process on this operating system are requests or comments OSes.  If the BIOS-> OPROM-> BIOS-> MBR-> hypervisor-> init process of the hypervisor-> reviews of fork () s operating systems.  This can become blurred by the design choices (for example Xen/Hyper-V init start a coded parent hard partition that makes hypercalls privileged to fork() guest OSes; ESXi init runs a very limited subset of applications directly on the hypervisor and ESX Classic is somewhere between these approaches).

    There is a subtle distinction between "hypervisor" and "www."  The "hypervisor" is the operating system of single root (e.g. ESX) who interacts directly with the hardware and has access to everything; a hypervisor is not to be used to run virtual machines.  When we talk about a "hypervisor", the tendency is to describe something which is a BONE (although usually a minimal OS designed only to run virtual machines).  The "www" is the layer that allows a virtual machine run: it provides the interposition, virtualization and emulation services and can be plural (for example a vmm by guest operating system).  Architecture of VMware deal with these two separate components, while most other virtualization platforms merge the two.

    sidc7 wrote:

    2 breaks: VMM examines the source interruptions prior to the interruption, so in a multicore environment, assuming a 2 processor core, how the VMM decides on the kernel for which the interruption in intended, prior to shipment of the interruption. Interruptions are tag ID, said core ID?

    Strictly speaking, the interruption is not transmitted to a guest operating system - receives the hypervisor (or rather the VMM it transmits to the hypervisor), the hypervisor drivers interpret the interruption (for example reading package of NIC, I/O process of HBA, the timer tick completion), then after a new appropriate break in the guest OS.

  • Need your advice - the user name and roles

    We are the OEM deployment within our Organization.  There is a special requirement on business unit to have several names for the same person, with different roles.    Which means 'employee_1' will be 3 id for several roles such as employee_1_Administrator, employee_1_Operator, employee_1_Monitor!    Is - this recommended by Oracle? or it companies set up such a system? (I know it's technically feasible, but I'm confused as it is a best practice).

    Any suggestions or pointers are really appreciated.

    Vijay

    No, it sounds like a recipe for chaos for me I recommend several ROLES by user.  But if you have several users, they will constantly be logged in and out based on what targets that they manage and which kind of defeated the purpose of having a "Enterprise Manager" tool in my opinion.

    The way in which users EM are roles assigned, allows you to provide multiple roles functionality that can easily be revoked should change responsibilities.

    So create 3 roles:

    Administrator

    Operator

    Monitor

    Give the 3 roles employee_1

    I'd be interested to hear the conditions for this... but the only case that I heard in other companies is for a small number of people who have administrator-level privileges.  UserA was UserA account + userA_Admin.  Must not use their account "admin" for normal each daily tasks (management db, work planning, etc.) but only when necessary for higher level privileges.   Again, it is possible, but difficult.   Only 1 of about 40 clients that I worked with it.

  • Locked user SYS and SYSTEM

    DB version: 11.2.0.2
    Operating system: Solaris 10

    In our production of DBs, I noticed that the SYS and SYSTEM users are locked
    $ sqlplus / as sysdba
    
    SQL*Plus: Release 11.2.0.2.0 Production on Thu Jan 19 14:21:34 2012
    
    Copyright (c) 1982, 2010, Oracle.  All rights reserved.
    
    
    Connected to:
    Oracle Database 11g Enterprise Edition Release 11.2.0.2.0 - 64bit Production
    With the Partitioning option
    
    SQL> select username, account_status from dba_users where username like 'SYS%';
    
    USERNAME                       ACCOUNT_STATUS
    ------------------------------ --------------------------------
    SYSTEM                         LOCKED
    SYS                            LOCKED
    1. How can I connect to the SYS account despite the confinement. Is it because I have connected via external authentication?

    2. don't lock the user SYS standard practice? If so, why?

    1. How can I connect to the SYS account despite the confinement. Is it because I have connected via external authentication?

    you are the owner of the HOUSE of the ORACLE, you need to connect. Yes its because of external authentication.
    Of course you can not connect the user to the system. Have you tried?

    2. don't lock the user SYS standard practice? If so, why?

    Depends on the security, some cases, a user will be created with DBA roles.

  • Questions about Failver customer and rapid failover

    have some questions about customer and quick Faiolver of Oracle Database HA failover. Before asking these questions, I want to explain my environment. Here are the details.



    -We have two physical locations called "ABC" and "PQR".
    -ABC is the main site.
    -PQR is the backup site.
    -In ABC, we have the database to Oracle RAC (11.2.0.2) with two nodes.
    -In the PQR, we have only one stand-alone server (11.2.0.2) database with ASM. This isn't a RAC.
    -Data Guard has been configured between ABC and PQR and it works as expected.
    -Please note that we have a license for Active Data Guard.
    -We have products of Oracle Identity Management to ABC and PQR and they will use the RAC database as a primary database that is in the CBA.
    -We have not yet set up a Data Guard Broker.

    We want to achieve under objectives:


    Objective 1:
    -------

    Whenever primary CARS down completely, standby database becomes a primary database AUTOMATICALLY and it should allow the read/write operation.
    I guess it's called 'Fast Failover'. Please let me know if I'm wrong.

    Issues related to the:

    -To do this, I need to set up Data Guard Broker so that this standy database becomes primary when CARS go down completely with a power outage, planned or not.
    -Let's say that CARS falls does completely, how long take Data Guard Broker do standby db as primary.
    -What the client application / which is already connected to the CARS.
    -Let's DB standby became as primary and after some time if RAC comes back, keep data automatically becomes the primary role of RAC?


    Objective 2:
    --------

    As I explained above, all products Oracle IDM and applications to speak to the RAC database, what do know only on the RAC database, which is the main. They are not aware of the pending database.

    -Whenever a client session is underway with the primary database of CARS if CARS completely falls down, we would like to wait until the client session should get transferred datbase standby without losing session information. However before that happens, standby database should become primary because the client session can perform write operations.

    -Whenever a client attempts to connect to the primary CARS and assumes that the cab is completely down, we would like to expect from any client connections should are transferred pending database.
    However before that happens, standby database should become primary because the client session can perform write operations.

    According to my knowledge, above scenarios are called "client failver." Please let me know if I'm wrong.



    Issues related to the:
    ----------

    1. Please throw some light to reach above features.
    2. According to my understanding, before customer failover happens, fast failover expected has already occurred and ensure should get the switch for the main role. I guess that all this happens thanks to timeout settings. What are those.


    Could you please help?

    Thank you

    I didn't say that clients cannot reconnect automatically when primary fails: I meant that client sessions can generally reconnect and also keep any session state.

    Yes, they can reconnect but only to keep the session state for a SELECT statement. It is also possible with Data Guard, not only in the CARS I wrote: here's a demo with 10 g
    http://uhesse.WordPress.com/2009/08/19/connect-time-failover-transparent-application-failover-for-Data-Guard/.
    What is not possible is to maintain a session state: (INSERT/UPDATE/DELETE) pending transactions must be cancelled.

    Edited by: P. Forstmann on Dec 8. 2011 20:30

  • Expiry of the password for user SYS and SYSTEM

    My database 11g 2 on Redhat 5 has sys and system user password expired
    SQL> select username,account_status,EXPIRY_DATE
     from dba_users where username like 'SYS%';
      2
    USERNAME                       ACCOUNT_STATUS                   EXPIRY_DA
    ------------------------------ -------------------------------- ---------
    SYSMAN                         OPEN
    SYSTEM                         OPEN                             15-FEB-11
    SYS                            OPEN                             15-FEB-11
    But I can still connect the databsae with expired password t.

    Should I worry about the expiration of the password of the user these? For a normal user, I can not connect with expired password

    Dear user13148231,

    Here's an illustration;

    SQL> alter user sys account lock;
    
    User altered.
    SQL> select username, account_status, lock_date, expiry_date from dba_users where USERNAME='SYS';
    
    USERNAME                      ACCOUNT_STATUS                   LOCK_DATE EXPIRY_DA
    ------------------------------------------------------
    SYS                                      LOCKED                           20-AUG-10      23-FEB-09
    
    SQL> host sqlplus sys/password@opttest as sysdba
    
    SQL*Plus: Release 10.2.0.4.0 - Production on Fri Aug 20 12:25:43 2010
    
    Copyright (c) 1982, 2007, Oracle.  All Rights Reserved.
    
    Connected to:
    Oracle Database 10g Enterprise Edition Release 10.2.0.4.0 - 64bit Production
    With the Partitioning, OLAP, Data Mining and Real Application Testing options
    
    SQL> exit
    Disconnected from Oracle Database 10g Enterprise Edition Release 10.2.0.4.0 - 64bit Production
    With the Partitioning, OLAP, Data Mining and Real Application Testing options
    
    SQL> alter user sys identified by password password expire;
    
    User altered.
    
    SQL> select username, account_status, lock_date, expiry_date from dba_users where username='SYS';
    
    USERNAME                      ACCOUNT_STATUS                   LOCK_DATE EXPIRY_DA
    ------------------------------------------------------
    SYS                                EXPIRED & LOCKED                 20-AUG-10   20-AUG-10
    
    SQL> host sqlplus sys/password@opttest as sysdba
    
    SQL*Plus: Release 10.2.0.4.0 - Production on Fri Aug 20 12:27:02 2010
    
    Copyright (c) 1982, 2007, Oracle.  All Rights Reserved.
    
    Connected to:
    Oracle Database 10g Enterprise Edition Release 10.2.0.4.0 - 64bit Production
    With the Partitioning, OLAP, Data Mining and Real Application Testing options
    
    SQL> exit
    Disconnected from Oracle Database 10g Enterprise Edition Release 10.2.0.4.0 - 64bit Production
    With the Partitioning, OLAP, Data Mining and Real Application Testing options
    
    SQL> alter user sys identified by password account unlock;
    
    SQL> select username, account_status, lock_date, expiry_date from dba_users where username='SYS';
    
    USERNAME                       ACCOUNT_STATUS                   LOCK_DATE EXPIRY_DA
    ------------------------------ -------------------------------- --------- ---------
    SYS                            OPEN
    

    Even if the State expired and locked it's OK to connect to the database for the user SYS.

    SQL> alter user ogan identified by password account lock password expire;
    
    User altered.
    
    SQL> select username, account_status, lock_date, expiry_date from dba_users where username='OGAN';
    
    USERNAME                       ACCOUNT_STATUS                   LOCK_DATE EXPIRY_DA
    ------------------------------ -------------------------------- --------- ---------
    OGAN                           EXPIRED & LOCKED                 20-AUG-10 20-AUG-10
    
    SQL> conn ogan/password
    ERROR:
    ORA-28000: the account is locked
    
    Warning: You are no longer connected to ORACLE.
    SQL> conn / as sysdba
    Connected.
    SQL> alter user ogan account unlock;
    
    User altered.
    
    SQL> conn ogan/password@opttest
    ERROR:
    ORA-28001: the password has expired
    
    Changing password for ogan
    New password:
    Retype new password:
    Password changed
    Connected.
    SQL>
    

    Ogan

  • questions about 2100 wlc and lwap connection

    Hello

    I have a few questions, I hope you can answer me.

    In fact, I have a controller connected to 3 Lwap 2100, and they are connected to the WCS. they have a static IP address.

    The distance between each point of access to more than 30 meters.

    1. the distance between the access points affect the accuracy or the stream. How can I calculate this

    2. because the APs use a static IP address, each customer should I connect to the network to add a static ip address? can I do the APs detect clients dynamically?

    I have lwapp reset guide, guide WCS configuration and configuration guide for WLC. If you have more documents or more pls share with me.

    BR

    Yamani

    Hello Ahmed,.

    Yes the distance between AP affect the wireless signal.

    to determine the best location of AP and the distance between them, as the site survey is necessary with the expert of the spectrum wireless or airmagnat...

    You can check the following links for design and RF management

    1) http://tools.cisco.com/squish/1Ea09

    2) http://tools.cisco.com/squish/51a58

    for other questions about DHCP, it is not a must that customer use static IP, you can always configure them with DHCP.

    as an extenal DHCP (like windows server), or on the WLC himself (to the title of controller-> > internal DHCP tab).

    Kind regards

    Talal

    =========
    Please note the answers that you find useful and mark as answer - when is it :-) - so that others can easily find

  • General question about the updates and version number

    I have a general question about versions and update.  I'm new on this and am in the deep end of learning I want.

    In vSphere web client, I see the following versions (these are exactly as the seller, he left a few months that I have screenshots in my documentation that match)

    Version - VMware ESXi, 5.1.0 1612806

    Profile - Dell (updated) ESXi - 5.1 - 799733 (A00)

    I am trying to familiarize themselves with the Update Manager and I noticed that there are a lot of patches and updates available.

    Lists of Update Manager 5 patches as "Missing" with Red x but directly above them are a list of patches with green tick indicating that "installed" - it is perhaps obvious, but im guessing 'installed' means really installed when displayed on the screen - there is an update installed, labeled "ESXI 5.1 all the update 2-' would be able to tell that it has been installed by the details of profile/version above?

    I don't think it's a big deal at this stage, but if I install all missing patches and then the details of the version/profile change in summary screen?

    I hope this makes sense.

    Thank you

    This article allows to correlate the updated version: products VMware correlating build numbers to update levels (1014508)

  • Question about subjects, books and tables of contents

    I have a question about the subjects, books and tocs. I have a project that someone else created, and my task is to create a new topic and add it to the table of contents. I created the topic, but when I generate CHM project it does not appear in the table of contents. I tried to update the table of contents. What I think (I guess) could be the problem, is the 'links to the topics', when I see the links to the topics in other areas (old) they seem to have a link to the main book, but the new one is not mine. Could you help me? Thank you!!!

    It seems that you have a manual table of contents page, rather than using the table of contents of CHM.

    The toc.htm topic that you see in your list of topics is probably where you will need to add your new topic.

    If the table of contents was already populated when you inherited the project, I suspect the previous author was using it just to keep track of the topics they had added manually to the topic toc.htm - added the CHM topic in summary you did mark the column of the table of contents in the list of topics like '' Yes. '' then add to the toc.htm manual is not. Hope that makes sense.

    P.S. Just guess that it is installing what I can see in the screenshot. It is quite unusual, so I hope I'm right.

  • Questions about apex_web_service.make_request and collections

    Hello

    I began using with Apex Web services, and I have a few questions about the apex_web_service.make_request procedure. You can pass a name of the collection as a parameter. I'm a little confused on this parameter from the collection...

    This is perhaps a silly question, but the documentation is not very clear, so... This procedure always inserts just a line in the collection (with the XML returned by the web service call), or are there cases where several lines will be inserted?

    If there is still only a single row, what are the practical reasons to use a collection for her? I ask because in most cases interest you about the columns/rows to display in a form or a report in the Apex and I don't see the advantage to store in a collection of single-row, but I may be missing something...

    If the response contains several rows of data, it will be automatically extract the lines and insert them into the different lines of the collection? (posts...)

    What is the best approach then to extract several rows returned in the XML response and insert them into a collection? Currently I use XMLTABLE in a loop and call apex_collection.add_member for each row returned. is there a better way to do it?

    Thank you
    Luis

    Luis,

    the webservice returns only one row in the results collection.

    XMLTABLE using is a good idea, instead of using a loop, you can also use APEX_COLLECTION. CREATE_COLLECTION_FROM_QUERY or CREATE_COLLECTION_FROM_QUERY_B (B for bulk which may mean 'fast').

    brgds,
    Peter

    -----
    Blog: http://www.oracle-and-apex.com
    ApexLib: http://apexlib.oracleapex.info
    BuilderPlugin: http://builderplugin.oracleapex.info
    Work: http://www.click-click.at

  • Question about importing RAW and JPEG

    Greetings,

    Support of Adobe at the following page talks about the "import and preferences file management Definition:

    http://help.Adobe.com/en_US/Lightroom/3.0/using/WSA66356E1-47C3-405f-8E7F-0FD7AAEB0575.htm l

    I have a few questions about this, and I would really appreciate your input gtting. (I also posted this question on this page, but I don't know if it was the right place...)

    1. that means 'otherwise, Lightroom treats the JPEG in doubles as a file? The JPEG format is not available at all in these circumstances? What can I do with this file "jpeg"? Is located in the same folder as the RAW images?

    2. my understanding is that the JPEG image contains the treatment unit (e.g., Vivid, sharpning, etc.); When I import pictures from my Nikon (NEF) raw, LR does not apply to these parameters, and the image I see in LR is * really * gross (i.e., bland and "free upgrades").  If I shoot and bring in JPEG and RAW, LR is it possible to have LR somehow automatically "make RAW image look like the JPEG?

    Thank you in advance!

    Zevi

    (1) No, it simply as an initial overview.  LR replaces this overview as soon as it renderes its own.

    (2) the profiles are already built for Nikon and Canon.  Look in the calibration Panel in the develop module.

  • A question about the security and economies of pdf

    Please, I have another couple of questions, but on security and the economies of pdf:

    My first question, how can I build a prompt this popup when the form is loaded or open that asks the user a certain password used to show/hide or enable/disable some fields or objects in the form?

    My second question, how can I save the form with a name derived from a field value in the form, or a user by name which is entered by a prompt window when the form is opened or initialized?

    Any ideas, please!

    Thank you

    Mustafa

    Hi Mustafa,

    I have an example here where the script in the click event of a button prompts the user a password. If they enter the password, then four locked fields are made available to them.

    http://assure.LY/ge8Ra9

    You can copy this script to the node docReady event root (usually ' form1'). It would then fire whenever the form is opened.

    One thing to keep in mind is that this solution uses a function (called "hex_sha256"), which is within a Script (called "soHASHING_SHA256") object.

    This allws function allows you to use the hash key, so even if the user types the password (in this case "1234"), the script converts this value to a hash of key '03ac674216f3e15c761ee1a5e255f067953623c8b388b4459e13f978d7c846f4 '.

    This means that if someone looks at the form they cannot determine the password.

    Start by copying the script object and the button in your form. Then try to move the script to the button in the docReady event. Take a look by using the LC designer for more information on script objects.

    The second issue is possible, but it is considered a security risk, so you will need to use a function of trust (which is in a separate JavaScript file that should be stored on each computer that uses the form). It is very difficult to maintain. There is a long thread here: http://forums.adobe.com/message/2266799#2266799

    Hope that helps,

    Niall

Maybe you are looking for