Security ADF of application using DB tables for users and roles

Hello
I followed the below documents to use SQL authentication instead of jazn.

http://Biemond.blogspot.com/2008/12/using-database-tables-as-authentication.html


http://Biemond.blogspot.com/2008/12/using-WebLogic-provider-as.html

The second paper after completing the ADF Security Assistant, there are steps to create roles and application below at point

* "We need to use myrealm as Kingdom and not jazn.com. Create the role of valid users. "

Could someone suggest where to put these roles?

Thanks in advance!
Vinod

Hi Vinod,

If you set up SQLAuthenticator in the JDeveloper's integrated Weblogic Server, so what happened to your case is expected, because you deleted the Weblogic instance where SQLAuthenticator has been configured. Yes, you have deleted the domaine_par_defaut instance that is located in the directory specified above. JDeveloper will recreate a new instance (not configured) the next time you run.

To avoid reconfiguring SQLAuthenticator, you must set it up on a stand-alone instance of Weblogic (which is not located on the JDeveloper/systems user... folder.

Kind regards

Pino

Tags: Java

Similar Questions

  • creating users and roles of WL server for an application that is secured by security ADF

    Greetings

    I have an application that uses the security of adf, pre-deployment I created the users and roles to grant access or permissions to certain pages in mid CA. the thing is that I need to know if its possible to create users and roles through my the weblogic Server console and that roles and users can have permissions in my app I try but the only thing that works is authentication... I can not pass authorization

    Thanks for your help

    It should work very easily.

    What you have to do is give the domain name as domain (default myrealm) weblogic, this step you already have you're abe to authenticate.

    Now in jazn-"Data.xml", there are 2 types of roles. Application role & business role. Select business roles when assigning permissions. These should also be the same roles myrealm.

    You can also use the application role and have a relationship between the application role & business role.

    Only the care you need to take are to deploy the application in the EAR file, deployed a flag there migrate suite security users and security groups object. Deselect it.
    When you use the user groups and migrate the Application roles.

    Vincent

  • ERROR: ' we found your application uses iOS identifier for advertising but does not include the functional ad.

    I just create my new Single Edition App, but Apple rejected my application because:

    "We found your application uses iOS identifier for advertising but does not include.

    feature ad. This is not consistent with the terms of iOS Developer

    "License program, as required by the App Store Review Guidelines."

    https://iTunesConnect.Apple.com/WebObjects/iTunesConnect.woa/Wo/10.0.0.7.3.0.9.3.3.1.0.13. 3.1.1.11.3.1.0.6.1.1

    What does that mean? What should I do? I already created another unique edition correctly...

    Rebuild your simple editing application and then try again to Apple. We have released a fix for this Friday.

    Neil

  • The use of tables for example the names of

    How to use the tables for example names?

    If I, for example 'button [0]' as Instance name Flash tells me that I don't use character valid.

    :

  • error code after you download security ca roadrunner (application error reads cannot read memory) and some numbers...

    error code after you download security ca roadrunner (application error reads cannot read memory) and some numbers...

    Try a system restore to a Date before the problem began:

    Restore point:

    http://www.howtogeek.com/HOWTO/Windows-Vista/using-Windows-Vista-system-restore/

    Do Safe Mode system restore, if it is impossible to do in Normal Mode.

    Try typing F8 at startup and in the list of Boot selections, select Mode safe using ARROW top to go there > and then press ENTER.

    Try a restore of the system once, to choose a Restore Point prior to your problem...

    Click Start > programs > Accessories > system tools > system restore > choose another time > next > etc.

    http://www.windowsvistauserguide.com/system_restore.htm

    Read the above for a very good graph shows how backward more than 5 days in the System Restore Points by checking the correct box.

    See you soon.

    Mick Murphy - Microsoft partner

  • Lightroom question: my mac crashed, had backups, installed new OS 10.11 EL Capitan, use creative cloud for PS and LR, where go my Presets to develop, can not find them anywhere, any suggestions, thanks.

    Lightroom question: my mac crashed, had backups, installed new OS 10.11 EL Capitan, use creative cloud for PS and LR, where go my Presets to develop, can not find them anywhere, any suggestions, thanks.



    Thanks for the info, will try that.

    Sent from my iPad

  • When to use the cursor for loop and the cursor (open, fetch, close)

    Hello world
    I have a small doubt about when to use the cursor for loop and when to use the cursor for loop and the cursor (open, fetch, close).
    Well, I'm not the difference between implicit and explicit cursor. So please tell me how I got to know, what to use and when?




    Kind regards
    BS2012

    Published by: BS2012 on January 29, 2013 12:15

    All SQLs are analyzed, stored and executed as cursors. Thus, you will always use a cursor.

    The problem is that languages, such as PL/SQL, provide different interfaces to interact with the SQL cursor. As the ref, the slider interface, the interface DBMS_SQL slider interface and so on.

    Each of these interfaces offers different features. For example, using the interface DBMS_SQL allows binding dynamics and dynamic recovery. The Ref Cursor interface allows your code PL/SQL pass a handle to a reference pointing to the SQL cursor, to an external client. Etc.

    The fundamental reason for the use of an explicit cursor interface is mainly that you own and manage bulk made extraction output provided by PL/SQL cursor.

    With a cursor FOR , the motor loop of PL/SQL optimize the loop by extracting block a 100 lines both. However, you cannot access this collection in bulk directly inside the loop.

    With an explicit cursor interface, you specify the size of the extraction in bulk via the clause LIMIT , and you set the variable of collection to use. This allows you to use the collection directly variable inside the loop.

    However, the need to do - code manually in bulk collection - rarely occur in the daily programs in PL/SQL. A line of treatment is both slow and not well fits. And even if your bulk code collects lines, these lines must still be processed one at a time in your code. It is much more efficient and scalable rather write SQL code, and make the engine SQL the line of treatment for you.

  • I want to connect to a computer laptop win 7 with a xp pc, but she keep asking for user and pass?

    I want to connect to a computer laptop win 7 with a xp pc, but she keep asking for user and pass?

    Hi Maysambagheri,

    The description of the problem seems a little unclear and I wish I had a better understanding before you start working on it. I would really appreciate if you could answer the following questions:

    1. how you try to connect with two computers?

    2. What is the error message that is accurate or complete?

    3. do not connect you to your Windows 7 laptop as administrator?

    4. have you made any recent hardware or exchange of software on your computer before the show?

    Please provide us with more information on the specific question to help you to fix as soon as possible.

    For reference:

    Networking of computers running different versions of Windows:

    http://Windows.Microsoft.com/en-us/Windows7/networking-home-computers-running-different-versions-of-Windows

    Your response is very important for us to ensure a proper resolution. Please get back to us with the information above to help you accordingly.

  • Adding security to an application of ADFBC by using a table of users

    I am trying to add security to my request, and most of the examples and information that I find uses JAAS with OC4J and an .xml file to get the roles of passwords, etc. I'm pretty new to all this, so I don't really know where to start, but I have a request of ADFBC using Jdeveloper 10.1.3.3, Tomcat, and I would like to have all my user information stored in a table of users.

    Any help is appreciated. Thank you!

    Published by: user10942416 on June 9, 2009 12:52

    If your servlet filter is properly configured, it will run when you try to open your page, but just before the response is sent from the server. So in the url that you try to hit your page directly, the servlet filter is interrupted by the request, do what he needs (i.e. check if the user is authenticated), and then either continue in the filter chain (which should eventually process the request and return a response), or stop here and redirect the user to the login page.

  • Can I build an application using a table that is owned by another user?

    Greetings,

    I am very beginner in Oracle, and I really need help with this point.
    I created 2 user accounts: user1 and user2.

    In User1, I wrote:

    GRANT CONNECT, RESOURCE
    for User2.

    Grant select, insert, update
    on table1
    for User2.


    Now, user2 can see the content of this table, but only in the part SQL (select * from user1.table1)
    How can I create an application that uses the table1 to user2?
    When I go to application builder, I have to choose one of the tables belonging to the user2. But I can't use table1 User1 although that User2 has permission to access.

    Any help?

    Thank you in advance!

    Beginner's daughter

    Hello

    There is a powerful solution, that you can use.

    You can create a view. Some views may be editable (this means that it is possible to update
    the Table for the view) and you can add some constraints (Primay Key) on a view.

    For example:

    CREATE or REPLACE ADVICE {color: Red} User2.view_name {color}
    (col1 {color: red} {color}, col2 {color: red} {color})
    UNIQUE RELY DISABLE NOVALIDATE,
    The CONSTRAINT {color: red} pk_view {color}
    Col1 PRIMARY KEY {color: red} {color}) MATTER DISABLE NOVALIDATE
    ) AS
    SELECT col1 {color: red} {color}, col2 {color: red} {color} OF {color: Red} User1.Table1 {color};

    This example is from the link below:

    [http://www.psoug.org/reference/views.html]

    Hope this can help.
    Best regards
    Jean Valentine

  • ERROR. We found that your application uses iOS identifier for advertising but does not include the ad feature.

    Hello

    We have introduced an application using DPS Enterprise and had this error. I saw on the forum that it came early this year and a fix has been released, so no reason for this again? We use the latest versions.

    Graham

    Apple sometimes incorrectly reports apps with this error on review. There is no identifier advertising in use at the DPS. The dismissal of the appeal and tell them the app includes iOS identifier for advertising and ask them to check again.

    Neil

  • How to restrict access to the service web application deployed on weblogic for user group only

    I built the web service application in jdevelopler 11.1.1.7. Their security policy applied in the web service of the default Oracle policy which is (policy: Wssp1.2 - 2007-Https-UsernameToken - Plain.xml)

    Now all want to access the web service application must provide the name of user and password in the header section of the SOAP request to meet the requirement of the policy.

    the following steps I'm trying to restrict access to the application of web service with a specific group of users among users of weblogic:

    Connect to the weblogic administration console

    Create user or group of users

    Click on the links of deployments

    Select your web service

    Click the Security tab

    Click the sub-tab political

    Choose your authorization provider in the menu drop-down (looks like by default)

    Choose Add Conditions-> Group-> Type in the name of the Group

    Finishing

    But access is always available for all weblogic users (IE users not in the group specified in the above security configuration). How can I restrict access to only authorized group? Any thing lacking in my approach?

    There is nothing wrong with the steps mentioned in the question. In addition, you must do the following

    At the time of the application deployment with regard to the security part, there is a list in the title of the question (which security template you want to use with this application?)

    You must select (Advanced: use a custom template that you have configured on the page of configuration of the Kingdom) a configuration mentioned in the question will be work

  • Create table for users

    Hi all

    11.2.0.3.10

    AIX6

    I created a user SCOTT in our database.

    I have grant connect, resource to scott; because it is easier to do it this way.

    DBA, I wish that I'm the only one to create all the tables of scott, and he cannot create for himself.

    What is the effective way to do this? Is this order enough? > REVOKE CREATE a TABLE FROM SCOTT;

    Thank you

    MK

    RP gave you the right answer if you want to restrict users to create table, do not give them privilege resource.  See this demo:

    Connected to:

    Oracle Database 11g Enterprise Edition Release 11.2.0.1.0 - Production

    With partitioning, OLAP, Data Mining and Real Application Testing options

    SQL > create user test identified by the test.

    Created by the user.

    SQL > grant connect to test;

    Grant succeeded.

    SQL > connect test/test;

    Connected.

    SQL > create table tab1 (a number);

    create table tab1 (a number)

    *

    ERROR on line 1:

    ORA-01031: insufficient privileges

    SQL > connect sys/pw as sysdba

    Connected.

    SQL > grant create table to test;

    Grant succeeded.

    SQL > connect test/test;

    Connected.

    SQL > create table tab1 (a number);

    Table created.

    SQL > connect sys/pw as sysdba

    Connected.

    SQL > revoke create table test;

    Revoke succeeded.

    SQL > connect test/test;

    Connected.

    SQL > create table tab2 (a number);

    create the table tab2 (a number)

    *

    ERROR on line 1:

    ORA-01031: insufficient privileges

    SQL >

    Concerning

    Girish Sharma

  • Use the TC for backup and as external hard drive

    Hello

    Can I use TC for backup and as external hard drive?

    If yes then when it is full, TC erase my personal data I have stored in TC as a hard drive or erase the oldest backups?

    1. Yes, but you shouldn't. Your working data and backups must be on separate drives in case one of them goes down.

    2. Time Machine will not erase the data it did not originally there.

    (142739)

  • Using the script for import and export

    Hello

    Can any such a me what is the use of the script for import and export.

    After you move the pages from / to server what is the need to import / export command.

    export/oracle/apps/ap/setup/webui/customizations/site/0/SetupPG - rootdir < destination path > - user < database username > - password < database password > - dbconnection "(description = (address_list = (address = (community = tcp.world) (protocol = tcp) (host = < host name > (port < port id > =))) (connect_data = (sid = < sid >)))".) "

    Thanks in advance,
    Roselyne

    Hi Flo,

    Page and the region are stores in database import/export we really want pages/areas to store in the database.

    Thank you
    -Anil

Maybe you are looking for