The issue of security at the object level.

Hello

I am facing a problem in the application of security at the level of the object in OLIVIER.
I did the LDAP authentication successfully.
At the level of the object, I want to give permission to the user currently connected to a general ledger dashboard page.

In this regard, I added the corresponding group the user connected through 'Manage privilège' and given access to dashboards.

After doing this I get following error in my report, but when I'll loggin to the same user.

"Odbc driver returned an error (SQLExecDirectW).
Error details
Error codes: OPR4ONWY:U9IM8TAC:OI2DL65P:OI2DL65P
State: HY000. Code: 10058. [NQODBC] [SQL_STATE: HY000] [nQSError: 10058] A general error occurred. [nQSError: 27004] Unresolved table: 'financial services - GL balance sheet '. (HY000)
Publ. SQL: {call NQSGetQueryColumnInfo ("SELECT" Profit Center"." Business unit name 'book.' Ledger name"time. "" Fiscal quarter ", time. (» Exercice"DE"Financials-GL-bilan"')}

SQL issued: SELECT "Profit Center". "Unit name"book. "" Book name "time. "" Fiscal quarter ", time. «' Exercise ' OF ' Financials - GL-balance»


"

Please suggest me where else I need to do any setting.

Hello

It seems that the user doesn't have access to the presentation/column of table, check and see if the Group has access.

See: http://obiee-tips.blogspot.com/2009/09/obiee-security.html

Kind regards

Matt

Tags: Business Intelligence

Similar Questions

  • Physically unavailable space after shrinking at the object level

    Hello

    When the shrink command on table, its run successfully and is to show the free space on dba_free_space, but I checked on asm diskgroup, space is not recover physically. \

    (1) why need feature "alter table table_name retractable cascade" used, if the space is not recover physically.

    Database version: 11.2.0.3

    Version of the operating system: Solaris sparc

    Kind regards

    Arya

    For free space in database file level

    You can resize the data file until the space used to aid under sql

    SELECT ' ALTER DATABASE DATAFILE "' | FILE_NAME | "' RESIZE '. CEIL ((NVL(HWM,1) * 8192) / 1024/1024). AM; "RELATIVE_ DBADF SHRINK_DATAFILES,.

    (SELECT FILE_ID, MAX(BLOCK_ID+BLOCKS-1) HIGH WATER MARK OF THE DBA_EXTENTS BY FILE_ID GROUP) DBAFS

    WHERE DBADF. FILE_ID = DBAFS. CEIL ((NVL(HWM,1) FILE_ID (+) AND CEIL(BLOCKS* 8192 /1024/1024) - * 8192) / 1024/1024) > 0;

  • Security at the level of the object by creating groups of catalog in OBIEE - 10 G

    Hi all

    I have a requirement to display the dashboard based on the user login. Ex. Mike belongs to HR, Smith to accounts
    When Mike connects, he should see only these three dashboards. View of CF, commune data1, data2 common. When Smith connects, he should see only these three dashboards. Display accounts, common data1, commondata2.
    Commondata1 and commondata2 dashboards has joint reports for all departments. Other dashboards is particular department with all the different reports. How can I implement this?

    One of my previous posts, I was told to do by using the object-level security by creating groups of catalog. Can you please provide me with instructions to end-to-end on creating object groups of catalog-based security level.

    Thanks for your time and your help.

    Hello

    Mike to HR
    Smit - account

    Yes, groups reach you by security at the object level by creating catalog

    (1) create a catalog group and users partially RPD (Ex: Account_grp, HR_grp)
    (2) assign user to this particular group (say Ex: Account_grp = Smith and HR_grp = Mike)

    (3) login (username Admin) dashboard and---> gale dashboard page layout--> add users to this particular
    Dashboard users and save it then
    try to connect to the user mike and smith, it will work

    you see link below

    http://www.rittmanmead.com/2010/01/OBIEE-10G-Web-catalog-best-practices/

    http://www.rittmanmead.com/2007/05/OBIEE-and-row-level-security/

    Thank you

    Deva

  • Security at the level of the object in Oracle 10 g

    Hi gurus

    Question about the object-level privileges

    ------------------------------------------------------------------------------------------------------------
    1. creates a 'TEST' scheme and assigned as a result of privileges

    GRANT CREATE SESSION TEST;
    GRANT CREATE ANY TABLE TEST;

    2. has created a table 'Emp '.

    Can alter the table without assign privileges ALTER ANY TABLE test «»

    Why?

    3. CREATE ANY TABLE privilege revocation
    REVOKE CREATE TABLE TEST;

    I am still able to edit table 'Emp', even if it is not able to create a new table

    Any thoughts on this please.
    --------------------------------------------------------------------------------------------------------------------

    How can I restrict a user to change any of the existing tables?

    Help, please.

    Thank you
    Newbie

    Hello!

    This is because the TEST is the owner of testtab. A tableowner can allways and without any privilege to modify its own tables.

  • cfloginuser - roles of the permissions of the object.  Table?

    Hello, wonderfully helpful people!

    Imagine a project that has a corporate structure. Some users may see only, some users may see a (or several) departments and perhaps an additional user or two. Some users can see everything. Etc.

    Now expand this option to include a lot of companies, each with their unique business structures, and only one person has access from arbitrary objects (apparently) in several companies.

    Basically, the user authorization is at the level of the object; It is not a * role *. And, to add a little extra fun, I know not all the objects involved - it is dynamic - and these objects do not have a unique id between them.

    What I would put roles is a list of lists. a list of each type of object that contains the ID for this object to which the user has access. Perhaps the first value is the object type, and the rest are the identifiers. Example:
    {1,12,13}, {2,12,52}, {3,12,42}

    I'm doing a work around to make the list, in order to use the IsUserInRole and other whatnot (although it's a bit tedious):
    1_12 1_13 2_12, 2_52, 3_12, 3_42

    So:
    1. anyone who processes the permissions at the object level using cflogin? How did you do?
    2. What suggestions could do to improve it?

    Thank you in advance! Surely there is a better way to do it.

    Best wishes
    CAT

    Sorry no good tutorials I especially figured it out by trial and error.
    I find that security systems tend to be very personally and vary
    wildly enforcement and organization to another.

    The basic concept is a CFC that stores the relevant information and the
    functions appropriate to retrieve this information in the desired direction
    format. A big question is do you want the EFA to be aware of the user
    information point of sale or to be factored out in another layer.
    For easy readability, I'll provide the skeleton of a CFC based which is
    unaware of the data store but the roles are passed. I also have
    built this such as, by the way just to a user, the ID of the item
    generates all the data of the user.



    variables. Name = "";
    variables. Roles = structNew();




    variables. Name = arguments.name;
    variables. Roles = arguments.roles;








    It is extremely bare bones and need considerable flesh but off
    It should give you an idea.

    Then you just replace the
    or function tag to call this function to initialize CFC by the way
    the required arguments. And thisObj.isUserInRole call wherever you are
    isUserInRole() appeal.

  • I forgot the answer to my security question, I tried to update these answers, but to update them also, I must first answers old issue of security which I forgot how can I update and change my security question and the answers?

    I forgot the answer to my security question, I tried to update these answers, but to update them also, I must first answers old issue of security which I forgot how can I update and change my security question and the answers

    ?

    You must ask security team account Apple to reset your security questions. To contact them, click here and choose a method; If this page does not list one for your country or if you are unable to call, complete and submit this form.

    (143315)

  • What level of security is the best in the OSI model, which is the application level?

    Hello

    I'm curious to know what level of the model OSI protects best against pirates, which is the application level?

    Thank you

    Johan

    Hello Johan,.

    The OSI networking reference model (ISO 7498 - 1) is designed around seven layers arranged in a stack.

    The OSI security reference model architecture (ISO 7498-2) is also designed around seven layers, reflecting a high level of different requirements in the security of the network.

    In the OSI model, each layer has its own functionality and according to which it has features of different security as shown below.

    Application - authentication

    Presentation - access control

    Session - non-repudiation

    Transport - the integrity of the data

    Network - Privacy

    Data binding - insurance / availability

    Physics - certification / Signature

  • Easy VPN setup with interface to multiples with the same level of security

    Hello

    I want to configure an ASA 5505 with 7.2 (4) software and dual license ISP and when I configure two interfaces with the level 0 on two security interfaces and enable vpnclient the trace message appear:

    ERROR: Cannot determine the internal and external interfaces Easy VPN remote: multiple interfaces with the same levels of security.

    vpnlclient of configuration above:

    vpnclient Server x.x.x.x where x.x.x.x
    vpnclient mode network-extension-mode
    vpnclient nem-st-autoconnect
    vpnclient TUNNEL_EZVPN_TUNNELSPEC vpngroup password *.
    vpnclient username usr_ezvpn_tunnelspec password *.
    vpnclient enable

    interfaces:

    interface Vlan200
    nameif outside1
    security-level 0
    IP x.x.x.x 255.255.255.252
    !
    interface Vlan300
    nameif outside2
    security-level 1
    IP x.x.x.x 255.255.255.128
    !

    monitor the SLA to the routing:

    monitor SLA 100
    type echo protocol ipIcmpEcho 200.221.2.45 interface outside1
    NUM-package of 5
    frequency 30
    monitor als 100 calendar life never start-time now
    ALS 200 monitor
    type echo protocol ipIcmpEcho 200.154.56.80 interface outside2
    NUM-package of 5
    frequency 30
    Annex monitor SLA 200 life never start-time now
    ALS 300 monitor
    type echo protocol ipIcmpEcho 4.2.2.1 interface outside1
    NUM-package of 5
    frequency 30
    Annex monitor SLA 300 life never start-time now
    ALS 400 monitor
    type echo protocol ipIcmpEcho 200.244.168.149 interface outside1
    NUM-package of 5
    Timeout 3000
    threshold of 3000
    frequency 30
    Annex monitor SLA 400 life never start-time now

    Follow-up:

    !
    track 1 rtr 400 accessibility
    !
    Track 2 rtr 200 accessibility
    !

    routes:

    Route 0.0.0.0 outside1 0.0.0.0 x.x.x.x 100 track 1
    Route 0.0.0.0 outside2 0.0.0.0 x.x.x.x 200 track 2

    The track works normal.

    Kind regards!

    Try using the command "backup interface" on the secondary ISP interface.

    http://www.Cisco.com/en/us/docs/security/ASA/asa72/command/reference/b_72.html#wp1338585

    You need to increase the level of security to 1 for this interface.

    By default, EasyVPN uses the highest level of safety inside and the lowest outside.  Anything between the two must be set manually.  I assume you have an interior vlan defined but not added to the posted config.

  • What is the need for accessors from view at the level of the entities, as well as the view object level?

    Hi all

    What is the need for accessors of the entity and object level view-level view

    I use 11.1.1.7 jdev

    Thank you

    Delphine

    Timo, I think you might have taken the tack wrong here.  As you know EOs can use VO * accessors * (not associations) like your for things like validation entity or object view research

    CM.

  • Hello, in indesign 2015 at the pallet level, when I select an object I can't find colorful peas and pencil!

    Hello, in indesign 2015 at the pallet level, when I select an object I can't find colorful peas and pencil! Please can you help me solve this problem?

    Thank you

    It is indesign CC 2015

    Schermata 2015-07-28 alle 10.17.56.png

    It is indesign CC 2014

    Schermata 2015-07-28 alle 10.42.51.png

    Hello! Sorry for my English!

    I manually deleted the preferences of the library after the suggestion of Peter, but it does not work

    Then I tried to start Indesign by pressing the Ctrl + Cmd + Opt + shift and now it works properly!

    I hope that I have explained myself!

  • (1) now I use Lightrom 5.7 How to level 6 or CC? (2) what is the difference between the 6 and CC vercion? (3) when I used lightromm 3, inEXIF the distance in metres to the object that I took, in the virsions later that the function has disappeared, I coul

    (1) now I use Lightrom 5.7 How to level 6 or CC?

    (2) what is the difference between the 6 and CC version?

    (3) when I used lightromm 3, I could see in EXIF distance in metres to the object that I took, in the virsions later that the function is missing, it is very sad I am stiil waiting and I hope it would be possibble in new versions. Or this indication may possible by setting?

    (1) now I use Lightrom 5.7 How to level 6 or CC?

    Buy the standalone update from here: products

    Download CC version here: Adobe explore desktop apps | Adobe Creative Cloud

    (2) what is the difference between the 6 and CC version?

    See this comparison chart: Lightroom compare versions. Adobe Photoshop Lightroom CC

    (3) when I used lightromm 3, I could see in EXIF distance in metres to the object that I took, in the virsions later that the function is missing, it is very sad I am stiil waiting and I hope it would be possibble in new versions. Or this indication may possible by setting?

    Plugin ExifMeta of Rob Cole displays the distance between the subject field (and much more).  Unfortunately, his Web site seems to be down again.  He has been very active here, but he has not posted in several months.

  • updated the domain functional level of 2003 to exchange 2010 online but not the functional level of the forest. Is it possible now? What issues we face?

    I have a domain that was underway at a functional level of 2000 with an Exchange 2003 server.  I had a contractor improved functional level of the domain to 2003 to an exchange server 2010 online to replace the Exchange 2003 server, which he did, but I just discovered that there not upgrading the functional level of the forest.  We have discovered this as it moves to finally remove the Server 2003 out of the environment and visited account the functional level of the forest has been still in 2000.  My question is can we put the 2003 forest functional level, even if the domain is already in 2003 with no impact?  I know that this seems to be a classic case of reading is not things through.  A viable support or feedback would be greatly appreciated.
    FYI, first post time!

    Hello

    The business support, you can find forums on TechNet, please create a new post at the following link:

    http://social.technet.Microsoft.com/forums/en/category/WindowsServer/

  • Make an object level to knock out the other objects underneath

    I'm in Illustrator CC. I'm working on a chart for knitters and I'm struggling with how to place symbols on a grid and do not have gridlines appear through the symbols.

    I have a created a visible grid of horizontal and vertical lines which form the basis of the graphic knit. I put on this grid, many symbols of point knitting. Some of the symbols are just size of one square inch, while others cover plenty. I don't want the gridlines to show through wide multiple-square symbols, so initially, I created a white the width of the symbol on which I placed the box symbol, and then I gathered the symbol and the box white and placed in a layer which was above the network layer, so that the gridlines are not displayed. BUT when the chart is reduced in InDesign, it is placed on a colorful box and now the symbols are in white, while the rest of the grid is transparent, color below box display.

    I could go back in Illustrator and make all the white squares correspond to the color of the box of InDesign, but this seems a lot for me to work. What I would do instead is not use the white box at all, but rather to find a way for the symbols to knock out all that is behind them. I don't want to group them with the grid lines, since I want to be able to move the symbols anywhere on the grid and them knock out the lines. I hope that makes sense.

    To simplify, I want what's on top to hit all of the objects below it, but without having to combine or link objects.

    I've done this before, but can't remember how I did it and cannot find any info online.

    Thank you

    What

    Thank you.

    In this way, it will work.

    https://DL.dropboxusercontent.com/u/15485305/TEST_mg.AI.zip

    You had the fill set to none, but it should have a color (any color works)

    Knockout groups were always in places where it shouldn't be.

  • Privileges of the object. Who is the grantor?

    Nice day.
    Please explain the next issue
    SQL> conn /as sysdba
    Connected.
    SQL> create user test identified by test;
    
    User created.
    
    SQL> create user test1 identified by test;
    
    User created.
    
    SQL> grant resource, connect to test;
    
    Grant succeeded.
    
    SQL> conn test
    Enter password:
    Connected.
    SQL> create table t (x number);
    
    Table created.
    
    SQL> grant select on t to test1;
    
    Grant succeeded.
    
    SQL> conn /as sysdba
    Connected.
    
    SQL> grant select on test.t to scott;
    
    Grant succeeded.
    
    --########################---
    SQL> select * from dba_tab_privs where table_name='T';
    
    GRANTEE    OWNER      TABLE_NAME GRANTOR    PRIVILEGE            GRA HIE
    ---------- ---------- ---------- ---------- -------------------- --- ---
    SCOTT      TEST       T          TEST       SELECT               NO  NO
    TEST1      TEST       T          TEST       SELECT               NO  NO
    
    SQL>
    Suppose that what was previously-#-a black box.
    How can you determine which is issued a grant?

    Apparently, this is the result of change that put oracle implement 9i or 10g (you have not, as most of the users here mention a version, being that it's completely unimportant that Oracle has not changed since its creation).
    Before 9i, only the owner of the table was able to grant privileges. It's a problem with the BEDS and other applications where DBA did not know the password. Either you need to change the password, or to implement a hack.
    Since the 9i SYS can administer grants on behalf of other users.
    The result seems to be that the owner of the object is registered as the grantor.
    So basically: when you assign AUDIT_SYS_OPERATIONS to true, or do not level GRANT, you won't be able to see.

    ------------
    Sybrand Bakker
    Senior Oracle DBA

  • HP50g: HP50g - hot to check if the object of the stack is a number?

    How to check if an object on the stack is a number or another type of data? There seems to be no any function to check on 50g.

    50 g advanced users to see, page 1-13:

    "The order TYPE ([left SHIFT] PRG-> TEST-> NXT-> TYPE) accepts any object as argument and returns the number that identifies the type of this object." For example, 'HELLO' TYPE returns 2, the value of a string object. See table of object types in Chapter 3, in the command TYPE, to find objects of calculator and corresponding type numbers.

    Generally want to DUP the object to the level of the stack 1 first of all, because likely you want to do something with it, after checking his type.  The following RPL program checks the type of the object in level 1 of the pile and adds a string to the stack indicating its type.  Only some of the possible types are checked and a generic "something else" translates to others:

    «
    TYPE OF DUP
    CASE
    DUP 0 == THEN DROP 'real number' END
    DUP 1 == THEN DROP "complex number" END
    DUP 2 == THEN DROP 'chain' END
    DUP 3 == THEN DROP "real array" END
    DUP 5 is THEN DROP 'list' END
    DROP "something else"
    END
    »

Maybe you are looking for

  • IPhone and email address

    I have a new Iphone and when installing with Apple I had to create a new email addreess but I can't find how to download emails on this subject. I'm quite green in this regard, any help would be appreciated

  • White screen after login screen

    I turn my mac pro on it crosses to the login screen, then the screen become white. He done many times before, but he is back to normal in a few hours later. This time, I have not. What should I do and can it be related to office space?

  • Download repeated after deleting email

    If I move email to Inbox of mail trash or any other mailbox, it downloads in Inbox to the server again.  I use El Capitan OS X 10.11.3, 9.2 Mail.  Mini Mac 2012.  Connected to the server POP ISP Talktalk.  Same problem with my iPad and iPhone, but no

  • After the last update of BIOS that Satellite P100 locks with BSOD

    Hello Due to several problems meeting with updated Toshiba Satellite P100-221 (PSPA6E) launch second online BIOS updated. I have download and I solve problems with my video card and the race of missing keyboard. After a short period, they put on the

  • With the new Apple TV, I'm stuck on a black loading screen in the application to access all CBS. How can I solve this problem?

    I have the new Apple TV, and after seeing a show in the application to access all CBS I'm stuck on a black loading screen. This happened almost 10 minutes now and I don't know what to do to be able to find the main screens of the application and to b