User access commissioning of automation

Hi all

We started working on the user access request commissioning of automation to save our time access.

Can you please provide your entries how we can automate this process.

Background:

Version of Hyperion Essbase: 11.1.2.4

We use authentication MSAD

Once we receive request for access will analyze application and process based on requirement. We are not provisioning individually, we are just adding new users to existing groups.

Thank you

Alain

There is a lot of information about LCM, it just takes a little research.

The main documentation is available - life cycle Management Guide

Run an export of FCL in Shared Services for commissioning to get an idea of the required format, you could do a right click and export for editing if you wish in Shared Services.

See you soon

John

Tags: Business Intelligence

Similar Questions

  • HP workspace: how end-user access to HP workspace of an HP Elite x 3?

    Hey everybody,

    How the end-user access HP workspace of an HP Elite x 3?

    Thank you

    Bill

    To access the HP workspace, dock the unlocked, HP Elite x 3 to be an Elite Lap Docking Station HP or HP Elite Desk. When the device is automatically active the mode Continuum of Windows and connected display, simply tap on the tile of the workspace of HP that is located on the HP Elite x 3 startup screen.

    If you can't find the tile, click or tap Start > all Apps > HP workspace. You will be then prompted to connect to the workspace of HP with the credentials of your companies.

    Note that Internet access is required to use HP workspace. If the application of the workspace of HP is not listed in the list of applications, the user can download HP workspace of the App Store Windows.

  • I can, t our user access in Control Panel; is a message "wrong number of arguments or invalid property assignment.

    I can, t our user access in Control Panel; is a message "wrong number of arguments or invalid property assignment.

    Hello

    I suggest you follow the troubleshooting steps form the article and check if it helps.

    Cannot open the item user accounts in Control Panel on a Windows XP-based computer

    http://support.Microsoft.com/kb/919292

    Hope this helps

  • How can I block the users access to microsoft office?

    How can I block the users access to microsoft office?

    You must set "" permission to run on each of the Microsoft Office programs (word.exe, excel.exe, powerpnt.exe, etc.) such that the group 'Administrators' and the SYSTEM is allowed to run.  To do this, you do a right click on the .exe file, select 'Properties', then click on the 'Security' tab and change security as you wish.

    If you do not have a 'Security' tab, then it is because you have XP Home Edition, or if you have XP Pro with active Simple file sharing.  For XP Home, you must boot mode safe (repeatedly tap F8 at startup key) and login as an administrator to access this tab.  For XP Pro, follow the instructions in the following article:

    "How to disable the file sharing simple and how to set permissions on a shared folder in Windows XP"
      <>http://support.Microsoft.com/kb/307874 >

    HTH,
    JW

  • How can I prevent standard users access records personnel administrator for example. photos and documents

    How can I prevent standard users access records personnel administrator for example. photos and documents

    Hello bh51,

    Did you run your antivirus as well as any spyware removal?  As davidhk requested, then you are able to turn sharing off the coast, but it just doesn't work?   I suggest creating a new folder and move the data, and then see if other users are still able to view these.

    Please let us know status.

  • If the user accesses the server accidentally deleted the folder how recovery

    If the user accesses the server accidentally deleted the folder how recovery

    Hi AmjadPasha,

    If you are referring to a local file, you can check the trash.

    If you are referring to a network share, then there is very little that can be done.

    You can try using recovery software/services of third parties to retrieve the file.

    You can use your favorite search engine to search for third-party software.

    Note: The use of third-party software, including hardware drivers can cause serious problems that may prevent your computer from starting properly. Microsoft cannot guarantee that problems resulting from the use of third-party software can be solved. Software using third party is at your own risk.

    Hope this information is useful.

  • remote users access site ipsec tunnel

    How to configure the ACL and the road to allow remote users access to site ipsec as local users?

    Current scenario is

    1. distance users (192.168.2.0/24) ipsec <->Cisco 870 (192.168.0.0/24)

    (2 cisco 870(192.168.0.0/24) ipsec tunnel <->cisco 1811 (10.0.0.0/24)

    Now remote users can access the 192.168.0.0 network, no problem, but how they can access 10.0.0.0 network?

    I guess I can do like this:

    1. in cisco 870, site to site ip 192.168.0.0 tunnel allow 0.0.0.255 10.0.0.0 0.0.0.255

    (add) permit ip 192.168.2.0 0.0.0.255 10.0.0.0 0.0.0.255

    2. in the site-to-site vpn cisco 1811

    (add) permit ip 10.0.0.0 0.0.0.255 192.168.2.0 0.0.0.255

    3. in settings vpn split cisco870 add the 10.0.0.0/24 network

    Is this fair?

    Thank you.

    You must configure the interesting traffic that an ACL contains the source is remote destination as local LAN and LAN.

  • How can we get the details of the traffic for the spaces for example, users access report by place (all users)

    How can we get the details of the traffic for the spaces for example, users access report by space (for all users), DB tables can be used to get information, such as for example: users who have logged in - never

    You can use analytics. WebCenter Analytics comes with a number of events out-of-the-box for which it brings together measures which are very useful.

    You can check in the WebCenter Analytics database schema. WebCenter Analytics Dashboards are present in the scheme of ACTIVITIES and are modeled in the form of a star schema.

    The schema includes 2 types of tables. FACTS analytical tables are used to store instances of specific events. For each event, a specific FACT table is present, for example for page views, the views of space, connections and so on. These tables contain a timestamp for the moment, that the event is occurred and integer ID these descriptive reference data stored in DIMENSION tables.

    DIMENSION tables contain descriptive information about the entities associated with events. Size examples are pages, applications, groupspaces, users and so on.

    See the details of the table all the under http://docs.oracle.com/cd/E23943_01/webcenter.1111/e10148/jpsdg_app_aschema.htm#JPSDG10767

    If you want to custom event.that track, as you can get. see this blog entry

    Quobell technology - portal WebCenter: WebCenter Analytics: define and save custom events

  • How do I give users access to the addition of other users and groups in weblogic * without * giving administrator rights

    Hello

    Before opening a SR Oracle for the same problem, just wanted to put it out there to see if we can provide a non administrator user access to the Weblogic administration Console so that it can log and ONLY add users and groups, but not change any setting in the administration console. We offer a personalized access? All grain specific to be accessible?

    Please don't give me the links where it says "give read-only access", giving "monitor."

    read only user cannot add new users/groups in the administration console. The administrator credentials can be provided to that user. It just has to be able to connect, go to security domains > myrealm and add new users and groups. nothing else.

    Please let me know.

    Thank you

    Dan

    Thanks Christian.

  • What "unmapped user access" for NFS share in Windows Server 2008 R2?

    In the beginning, I followed this Youtube video to set up an NFS share in Windows Server 2008 R2:

    https://www.YouTube.com/watch?v=BQ8Q_vsiksg

    Please note that the default option to allow to access Unix unmapped user is not changed (to about 1 min 57 sec).

    Then I found another article at http://www.vmwarearena.com/2012/07/create-nfs-datastore-for-esx-in-windows.html

    But in this article, I like to select allow anonymous access (instead of allow access Unix unmapped user).

    So who is correct?  Or both are correct (which means that this 'unmapped user access' is not serious)?

    And why should we have to allow root access (in the NFS share permissions dialog box)?  What a security risk?

    Thanks in advance.

    Have you tried to run through the steps taken from the blog of VMware?

    How to enable NFS on Windows 2008 and currently at ESX | Insider - Articles from VMware VMware support

    Also, there are 3 KB articles to know in case of potential problems

    1. http://kb.vmware.com/kb/1004490

    2. http://kb.vmware.com/kb/1003967

    3. http://technet.microsoft.com/en-us/library/cc753302 (WS.10) .aspx

    Noting in particular this section

    Share the folder of Windows for NFS

    To share the folder of Windows for NFS:

    1. Right click on the local folder you want to share via NFS.
    2. Click NFS share.
    3. Type the name for the share. For example, NFS-VMFS01.
    4. Delete to allow anonymous access.
    5. Click on permissions.
    6. Change the type of access in reading + writing and select allow root Access.
  • Best practices for the management of user access in ESXi host without 'root '.

    What is the best way to make the management of the user access to the ESXi host after you disable the default root account. Is it better to create induvidual accounts

    Via vCenter or intergrate Active directory or any other specific way.  Please help me to clarify this point. Thanks in advance for your answers.

    With the release of ESXi 5.1 it is possible to create an account on the ESXi host and assign them Full Admin privileged but there are a lot of admins of loggin in each ESXi host and user account creation.

    I would like suggestions to add the ESXi to AD and add the authorization based on domain accounts.

  • Users access planning

    Dear gurus,
    In the planning environment that I work there are more than two applications and a few essbase cubes. I wonder to change access from one of the access of users to read, write planning. In this case, do I need to change the access of the user to read, to write on each form data? or y at - it an easier way to change the user access? I mean, is there a way of planning or HSS where I can change the access of the user to read write for all forms of data at once?
    Thank you gurus

    Export using LCM or ExportSecurity utility
    Edit the file, you could eventually do find and replace
    Import using LCM or ImportSecurity utility

    See you soon

    John
    http://John-Goodwin.blogspot.com/

  • How end users access vm created on an ESX Server?

    I'm new to ESX and wonder how a user can access a virtual machine created on an ESX Server. Say I create an ESX Server and install 4 XP virtual machines on this subject through VSphere how an end user can get to anyone of them?

    they need to know everything about ESX.  A simple method would be to give them each a name of the PC and using RDP to connect to XP desktop in this way.

    Another way, such as mentioned would be to use VMware View and establishment of a broker for connections and users access their desktop computers through the Client view.

  • More then a user accessing virtual at the same time

    Hi all

    I have install Server2.0 for test and I must say that the web interface is a pretty cool idea. The main idea is to use the test environment 2.0 ina, which means that users will not be permanently connected to the virtual machine, but must be there they would go on some virtual OS that is not available in physical machines.

    The test I did was to install 2.0 in a DC 2003 server. Even if he told me that it wasn't good option to install on DC I went come just for test purposes. Everything works very well. I created a user and given the permitions restricted in order just to use the VM and not apply the changes to this.

    Then I added 2 virtual machines and I started one and start using it... Can I access the server 2.0 from somewhere else on the network and having the same user (or even with the diferent user) I started the machine VM for Sami. Now I have 2 users, access to the vmimage from different places and now the problem, is that both control the same vm in the same session... which means that I can't have 2 users working in the same image at the same time.

    On the gmx those who can't... I can access the vmconsole (even with the same user) and images (with the same user) access location diferent.

    Is it normal to work? Does perform a work around? Anyone with the same problem?

    Kind regards

    L

    Happy to help...

    Just give users their own virtual machines - you can grant permissions such that a user cannot access another user.

    Guy Leech

    VMware vExpert 2009

    ---

    If you have found this device or any other answer useful please consider the use of buttons useful or Correct to award points.

  • EssbaseCluster-1 to 11.1.2 - giving users access filter

    I'm trying to grant access filter to an Essbase application users in 11.1.2.1

    Shared Services, I am right-mouse-click on the application under the EssbaseCluster-1 node and selecting 'Assign Access Control', but no users don't appear when I click on the button "search". I have already configured some users with access filter HSS, but without success.

    Suggestions people?

    Published by: Xansaman on August 1, 2011 20:41

    Users access on one level essbase server role, if not try to assign this role to one of them and see if it helps.

    See you soon

    John
    http://John-Goodwin.blogspot.com/

Maybe you are looking for

  • Audio file storage size HD Mac

    When I go to 'about this Mac' my iMac HD list 157 GB of audio files, but I can only find 69GB of music files when I search the HD by genre. My Music folder is about 65 GB, which is consistent with the file iTunes etc, and I know that when the other 4

  • Firefox slows down to a crawl while the sync of bookmarks

    Whenever I add, modify, move, or delete a bookmark, Firefox slows down to a crawl for a few seconds, whereas Sync does its thing. I know that Sync is the question because I added the sync icon to the toolbar and see it light up and spin and Firefox i

  • Need information about express port replicatior for Portege M series

    HelloWhat are the ports and how many of them, are included in the express port (PA3508E-1PRP) for the m series portege Replicator? Thank youRussell

  • Qosmio G20: CPU too high with video usage

    Hello I've got G20 (2.13 Ghz processor) and nVidia 128 MB GeForce Go 6600 and I noticed that when you run video that my CPU utilization goes up high enough. View tv goes up to about 80%, video in media player substantially the same, but the video cli

  • SPOOLER APP HAS STOPPED WORKING

    MICROSOFT SPOOLER SUBSYSTEM APP STOPPED WORKING - WHICH MEANS: MY PRINTER DOES NOT PRINT I DID PASS ON THE RECOMMENDED IN THE MSG OF ERROR FIX, AND IT INDICATES THAT THE SPOOLER IS RUNNING.