To find the list of users who have access to the specific cube in essbase

Hi team,

I have EMP 11.1.2.2. Can you please let me know how to find the list of users who have access to the individual of the cube in shared services or by using script maxl essbase. I don't get the answer you need using the commissioning report.

Thanks for your time and your help.

Try the display Privilege, you must then filter for that particular cube. Why is commissioning report does not?

Concerning

Celvin

Tags: Business Intelligence

Similar Questions

  • How to obtain the list of users who have logged vCenter

    Y at - it a script that lists the users who have signed in a specific vcenter?  I couldn't seem to find a.

    Take a look on Get vCenter full session info

  • List of users who have been granted to a particular function in oracle apps R12 db?

    Hello
    I need to list all the users who have been granted special function (suppliers) of Oracle apps R12 server. The user-> RESP-> Menu-> submenu/function. I have two queries as follows:

    -Sql query below gives all users those
    access of the application of purchase and Payables.
    SELECT u.user_id, SUBSTR (u.user_name, 1, 30) UNIQUE user_name,.
    SUBSTR (r.responsibility_name, 1, 60), responsibility
    SUBSTR (a.application_name, 1, 50) application
    U fnd_user,
    fnd_user_resp_groups g,
    fnd_application_tl has,
    fnd_responsibility_tl r
    WHERE g.user_id (+) = u.user_id
    AND g.responsibility_application_id = a.application_id
    AND a.application_id = r.application_id
    AND g.responsibility_id = r.responsibility_id
    AND a.application_name in ('Purchasing', 'Accounts payable')
    ORDER OF SUBSTR (user_name, 1, 30),
    SUBSTR (a.application_name, 1, 50),
    SUBSTR (r.responsibility_name, 1, 60);

    -Under a sql query gives the function name.
    SELECT function_id, user_function_name, creation_date description
    OF applsys.fnd_form_functions_tl where function_id = 1348;

    What the other tables join to get all users with this feature (suppliers) given?

    Concerning

    The grant is ok. When I connect on the toad using & issued the following command, the message error gives sufficient privileges.

    ALTER PACKAGE COMPILATION PACKAGE; > ALTER PACKAGE BODY build;

    Can you reproduce the problem of SQL * more?

    If the grant on the package is OK, please go through the code of the package and make sure that the READ-ONLY user has right to select on all tables referenced in the package specification/body.

    Thank you
    Hussein

  • Request to retrieve the list of users who do not have an updated resource service

    I try to get the list of users who are not a particular resource put into service. I can't seem to find a table that links the object resource information and user information. I need to generate a CSV file. No matter who's done this before, or have any ideas. If so, any information would be very useful.

    Thank you

    Select * usr where usr.usr_key not in)
    Select usr.usr_key from usr, obi, obj, Ouedraogo, ost
    where oiu.usr_key = usr.usr_key
    and oiu.obi_key = obi.obi_key
    and obi.obj_key = obj.obj_key
    and obj.obj_name =: obj_name
    and oiu.ost_key = ost.ost_key
    and ost.ost_status not in ('revoked'))

    -Kevin

  • How to list all the users who have the privilege of s/n?

    How to list all the users who have the privilege of s/n?

    Peter

    Select * from dba_role_privs where GRANTED_ROLE = 'DBA ';

  • Can you create a button in Dreamweaver with a "promo code" function, so users who have the promo code can go to a discount on a product page?

    Can you create a button in Dreamweaver with a "promo code" function, so users who have the promo code can go to a discount on a product page?

    Unless you are a qualified PHP coder, you will need a full shopping cart 3rd party.

    Asecurecart is reasonably priced, and it can be integrated with your PayPal account for the processing of payments + many others like WorldPay, Authorize.net, etc...

    ASecureCart shopping cart. A shopping cart compliant secure PCI.

    Nancy O.

  • Tips for Windows users who have chosen Macintosh

    Hello!

    If you read this discussion, so I'm assuming that you are now the proud owner of an iMac. Congratulations for your choice and welcome in the Macintosh community! The purpose of this discussion is to create a reference guide for users who have recently acquired a Mac and learn how to do many basic tasks as we used to do in Windows, but on a Macintosh instead. I will do my best to add content to this guide based on the feedback of the community, but for now, here is a list of topics that I find very useful for the first time that Mac users.

    Q: "that Mac has a right-click?

    A: right-click functionality is present on your Mac. If you use a third party with two buttons separate, then mouse right click is available in the same way that you're used to. If you opted to use the mouse Magic Mouse, you can activate "secondary click" by opening system preferences (the silver gear on your dock icon), by selecting 'Mouse' and check 'secondary click. " Now, the right side of your mouse Magic Mouse will provide right click functionality. Alternatively, you can press the control key on your keyboard while you press the button on your Magic Mouse to have access to the same functions. If you use the Magic Trackpad, you can enable secondary click in the same way you would with the Magic Mouse, but you will be rather type the Magic Trackpad with two fingers in order to access, click on functions.

    Q: "is there a keyboard shortcut that works like Alt + F4 to close the Mac?"

    A: there are indeed shortcut that allows you to stop your Mac from your keyboard. Press command + Eject and you will see a menu that says "restart, sleep, cancel, Shut Down. By default, 'Shut Down' is already highlighted, which means that all you have to do is press the Enter key. Just like that, you closed your Macintosh.

    Q: "what is the keyboard shortcut to close an application?

    A: for closing of an application you are using, press command + Q. Note that by tapping on the red circle (or red x, depending on which version of Mac OS X you are running) in the upper left corner of your application window does not close the application. By pressing the red circle only will leave the current application window, but keep the app running in the background.

    Q: "is there is start menu? How can I find my installed applications? »

    R: OS X, the advanced operating system that powers your Macintosh, manages the launch of applications and the user interface of Windows separately. First of all, installed applications can be read of Launchpad. To access Launchpad, you can click on the rocket icon silver on your dock (the dock is the place where a row of icons for application on the bottom of your screen). Alternatively, you can press the Launchpad shortcut key on the keyboard that came with your iMac. The shortcut key for Launchpad is F4. Second, you can use the Finder to display each application, the document or the file that is currently on your computer. Finder is the blue smiling icon on your dock, also known as the "Happy Mac" icon Open Finder, and listed on the sidebar will be the Applications folder, which will be an alphabetical list of all your applications.

    Q: "How do we install an application?

    R: If you use the Mac App Store to buy your software, everything you have to do is click on 'Install' once you have bought the application. If you use an application that sits on a DVD - ROM, or that you have downloaded from the Internet, then there are two methods that you will encounter. The first method is via an installation wizard, similar to Windows. Just follow the instructions given by the installation wizard, and the installer will do the rest. The second and the most common method is to mount the .dmg file (.dmg is an extension of a disk image file) by double-clicking it, and then dragging the icon of the application in your Applications folder. You can access your Applications folder in the Finder.

    Q: "how to ". uninstall applications? »


    A: the process of uninstalling applications on a Macintosh computer is fairly simple and often does not require the user to face a "Uninstall Wizard. Open the Finder, blue, smiling face icon located on your dock. Select 'Applications' in the sidebar. Locate the icon of the application that you want to install, and then you click-and - drag the icon to the trash icon on your dock. Once the application of the Recycle Bin icon, you can open the trash and choose "Empty" in the upper right. Just like that, your application is removed from your Macintosh.

    Q: "How do I find my Mac for files and applications.

    R: OS X and its antecedent, Mac OS, introduced the innovation, fully integrated desktop search, first with Sherlock and now with the projector. To access Spotlight, you can click on the magnifying glass icon in the upper right of the bar at the top of your screen. Once you click this icon, you will need to type in a search field. Start typing the name of the folder, file, document or application you are looking for, and Spotlight will provide a list by category that matches the query expression, you typed.

    Q: "How do I defragment my hard drive?


    A: Unlike Windows, OS X uses the HFS + file system. By default, HFS + automatically defragments the files on your hard drive. In other words, you have nothing to do at all, that OS X is "smart" enough to handle this task on its own. Please note that there are some third-party defragmentation tools that are available online. Avoid these tools, not only because they are unnecessary, but also because they run the risk of harming your Macintosh, rather than help them.

    Q: "How do I clean the registry?

    R: OS X does not make use of a registry to store application settings. Applications running in OS X are, for the most part, autonomous. So there is no registry for your management.

    Q: "what is the equivalent of Mac Control Panel?

    R: on the Macintosh, the 'System Preferences' is the tool that allows users to manage things like wallpaper, devices, user accounts, network settings and much more. "System preferences" can be found by clicking the gear icon money on your dock, or using the dashboard to choose "System Preferences" icon or by opening Finder, select 'Applications' in the sidebar and clicking on the icon "System Preferences."

    Q: "what is the equivalent of Mac of MS Paint?"

    A: Macintosh is a great computer to create media rich content and Apple offers several solutions for the production of such content. However, Apple does not provide equivalent software workaround for MS Paint. There are however a number of fantastic offers from third parties that provide a comparable and in many ways, superior functionality. I recommend an app called GIMP, acronym for "GNU Image Manipulation Program". GIMP has no monetary cost and may be acquired from the GIMP project site. Alternatively, you can use the Mac App Store and download a tool such as supreme paint, which is a tool of low-cost ($4.99 at the time of this writing) which also offers features similar to MS Paint and GIMP. Here are links to each

    GIMP: https://www.gimp.org/downloads/

    Supreme paint: https://itunes.apple.com/us/app/supremepaint-fully-functional/id993977111?mt=12

    Q: "what is the equivalent of Mac of Windows Movie Maker"

    A: every new Mac comes with the suite iLife software, including Garageband and iMovie. iMovie is a robust application that offers edition advanced functions and effects not found in Windows Movie Maker. If you are interested in a more powerful tool, Apple also offers Final Cut Pro, which offers a studio quality editing solution, with an interface that is familiar to users of iMovie.

    Q: "what is equivalent to Mac from Windows Media Player?"

    A: every Mac is QuickTime Player, a media player that supports a number of media formats, including AIFF, MP3, MP4, WAV, JPEG, MPEG files and many others still. If you play a DVD, you will need to use the DVD player, which is a separate application that is preinstalled on your Mac. Alternatively, you can use iTunes to watch and listen to all the same formats of files supported by QuickTime Player. You can also buy movies on the iTunes store and watch them in the iTunes application.

    I highly recommend that you are reading switch Basics: on Windows, I used to... - Apple Support and also https://www.apple.com/support/macbasics/pctomac/

    The use of a Mac is extremely simple, millions of PC users are passed successfully (including myself 10 + years), it takes very little time to become proficient.

    Moreover, drefragging a HD is not necessary on a PC and not a Mac. It is the thought of the early 1990s and was not necessary for many years. If you start playback as the two links provided, you will find all your answers, more I HIGHLY recommend that you look at the site of Apple OS X, located at http://www.apple.com/osx/

    Good luck and welcome to the light side.

  • List of users who will connect activity above a certain threshold

    I'm trying to get a query that returns a list of users who exceed a number of thresholds of activity recorded in any arbitrary hour. I initially coded it upward using analytical functions with fenestration:


    with the log in form
    (select "Fred" as username, to_date ('2009-07-01 08:05 ',' yyyy-mm-dd hh24:mi:ss') as logtime Union double all the)
    Select 'Fred' as username, to_date ('01-07-2009 08:12:14 ',' yyyy-mm-dd hh24:mi:ss') as logtime Union double all the
    Select 'Wilma' as username, to_date ('2009-07-01 08:01 ',' yyyy-mm-dd hh24:mi:ss') as logtime Union double all the
    Select 'Wilma' as username, to_date ('2009-07-01 08:03:15 ',' yyyy-mm-dd hh24:mi:ss') as logtime Union double all the
    Select 'Wilma' as username, to_date ('2009-07-01 08:04:18 ',' yyyy-mm-dd hh24:mi:ss') as logtime Union double all the
    Select 'Wilma' as username, to_date ('2009-07-01 08:06:59 ',' yyyy-mm-dd hh24:mi:ss') as double logtime
    )
    -Select * log
    Select distinct
    username
    Of
    (select
    username
    , count (*) more
    (user name partition
    order of logTime
    lines between 2 previous and the current line
    ) as group_count
    , min (logTime) more
    (user name partition
    order of logTime
    lines between 2 previous and the current line
    ) as min_group_logtime
    , max (logTime) more
    (user name partition
    order of logTime
    lines between 2 previous and the current line
    ) as max_group_logtime
    the journal
    )
    where group_count = 3
    and max_group_logtime - min_group_logtime < = 1/24

    -Try out: -.
    -UserName
    -- --------
    -Wilma
    --
    -- --------------------------------



    Is there a better way to do this?


    Kent Waldrop

    Hi, Kent,

    If you want to know who has 3 rows within a period of 1 hour. right?

    The query you posted can be simplified:

    WITH     got_prev_logtime     AS
    (
         SELECT     username
         ,     logtime
         ,     LAG (logtime, 2) OVER ( PARTITION BY  username
                                             ORDER BY      logtime
                              )           AS prev_logtime
         FROM    log_table
    )
    SELECT DISTINCT       username
    FROM   got_prev_logtime
    WHERE  logtime     <= prev_logtime + (1 / 24);
    

    In your original request, max_group_logtime was just the logtime since the current line.
    You have been calculated for groups of up to 3 lines, and then calculating the min_group_logtime and finally to test to see if the Group contained really 3 rows.
    LAG (logtime, 2) combines these steps. Returns NULL if there is not at least 2 previous lines and otherwise the logtime of the older.

    Thanks for posting the sample data in a useable form. It is a big help.

    Published by: Frank Kulash, July 17, 2009 10:59

  • How can I configure Server 2008 R2 to disconnect users, who have been disconnected more than exodus 12 hours?

    How can I configure Server 2008 R2 to disconnect users, who have been disconnected more than exodus 12 hours?

    These MS Answers forums are intended for the home rather than the it professional user. Please transfer your question in the relevant Microsoft Technet forum here:

    http://social.technet.microsoft.com/Forums/en-us/category/windowsserver .

    Thank you.      :)

    (I'm sorry, but I can't move this thread for you because the two forums are working on separate platforms

  • I want to develop an application Live TV for BlackBerry PlayBook. Please guide where can I find the specifications such as width, height, and icon sizes and design factors etc.

    I want to develop an application Live TV for BlackBerry PlayBook. Please guide where can I find the specifications such as width, height, and icon sizes and design factors etc.

    Guideleines of the user and the specifications on the sizes of icons etc to BlackBerry PlayBook OS Applications

    OK, I downloaed the pdf below for UI guiderlines

    UI_Guidelines_BlackBerry_PlayBook_Tablet_2_1.PDF

    Ok

  • Window 7 unsuccessful backup, error message "the system cannot find the specific file" error code: 0 x 80070002.

    I tried to back up my desktop using Windows 7 upwards, but he is not successful, he stopped, message error "the system cannot find the specific file" error code: 0 x 80070002.  He said no specific file that causes the problem.

    Also, my Seagate FreeAgent, I back upwards of C: from my old PC that runs under Windows XP, which causes conflicts of the OS?  Enjoy diagnose and advise!

    Hello

    I imagine the inconvenience that you are experiencing. I will certainly help the question of fixing.

    I suggest you follow the steps in the link below and check off the question:

    0x8100002F error code and or error code 0 x 80070002 when you back up files in Windows 7:

    http://support.Microsoft.com/kb/979281

    I hope that the information above helps you.

  • Search for users who have the SYSADMIN responsibility

    I want to find all the users who has SYSADMIN responsibility.


    clues?

    I want to find all the users who has SYSADMIN responsibility.

    clues?

    Application: submit the program simultaneous "users of a responsibility."

    Of the database:

    SQL> SELECT fu.*
    FROM fnd_user_resp_groups_direct furgd, fnd_responsibility_vl frvl, fnd_user fu
    WHERE furgd.responsibility_id = frvl.responsibility_id
    AND fu.user_id = furgd.user_id
    AND(to_char(furgd.end_date) is null
    OR furgd.end_date > sysdate)
    AND frvl.end_date is null
    AND frvl.responsibility_name = 'System Administrator'; 
    

    See also old son queries - http://forums.oracle.com/forums/search.jspa?threadID=&q=Query+AND+Users+AND+Responsibilities&objID=c3&dateRange=all&userID=&numResults=15&rankBy=10001

    Thank you
    Hussein

  • My computer has been hacked and I want to delete unwanted users who have been added

    My computer has been hacked and the settings have been changed to add remote users.  I am trying to remove additional users that have been added, but I don't want to delete something I need by mistake.   I'm the only person who uses this computer and I don't want to share it on my network.  There is a user called "SYSTEM" that should I delete also Aministrators (plural) and trusted Installer. I have to keep one of these?

    Hello Debkp123,

    You don't want to remove the SYSTEM account. (It probably not you would delete this account)
    You don't want to delete your system32 folder by making your computer unbootable.
    Watch the TechNet article following describing the default accounts/users on Windows:
    http://TechNet.Microsoft.com/en-us/library/bb726980.aspx

  • Help to find the specification of the specific motherboard for upgrades.

    I searched for this motherboard specifications for spending a few hours, I recently have it this low-end PC medium-term and short-term use (until I can save up for a decent gaming platform in the future), but also I don't want to update some components to make it faster and more responsive , but I'm hard-pressed to find concrete information on this motherboard supports.

    Office model is Acer Veritron M420, but I can't find the exact specifications of the motherboard, using the information system and CPU - Z that I could find:

    Desktop model: Acer Veritron M420.

    Motherboard: Acer RS780DV

    Processor: Athlon II X 3 425 (Socket AM3 938)

    RAM: Currently has 4 GB but supports up to 8 GB, already set the ram upgrade, pending order.

    GPU: Radeon 3200 IGP. Is POWER supply 300W so my GPU choices are limited, but I'll think about it later, supposed to be that the motherboard supports the PCIE 16 X 2.0, but no information specific to this topic.

    Here are the main elements that I intended to modernize a bit. Maybe even the CPU so I can find what max CPU model, it supports.

    https://Mega.co.nz/#! yRoERbCK! 0JVpdHv-9W_hxdifL15zNJeeTKGhBtjnM4Vt7XjIKpU

    I've attached a text of CPU - Z report.

    Any help would be appreciated. Thank you.

    Motherboards Veriton M421 or M421G:

  • Lockout procedure user, who is not logged during specific days

    Dear Sir

    I need to write a procedure that locks the user who is not connected to the db for the last 45 days. I enabled session audit in my db. Which means, there NTIMESTAMP # column for the connection time and action # 100 for the connection event in the AUD $ table.

    How the procedure can be written so that it can only locked the right user. Please help me...

    Kind regards

    I don't see a version number of Oracle - and that makes a difference.

    12 c 'select username from dba_users last_login;"

    In previous versions - if you want to avoid to work through a large aud$ table (dba_audit), then two other possibilities:

    (a) create a profile (or modify the default profile) for password changes after 45 days, forcing a change of password on all users, then "select expiry_date dba_users where expiry_date.< trunc(sysdate)"="" any="" expiry="" date="" in="" the="" past="" is="" (should="" be="" -="" but="" i="" haven't="" tested="" this)="" a="" user="" that="" has="" not="" logged="" on="" for="" 45="">

    (b) to create a logon trigger that maintains a shadow dba_users and updates (inserts initially) one line with the logon timestamp. Primary key on the user name. See the table for the last hours of connection.

    In any case, be careful with some of the names of internal users

    Concerning

    Jonathan Lewis

Maybe you are looking for