Oracle and DB2 Case Sensitivity Access Control Lists and Content Tracker Reports Secure Mode
8.5.1 Oracle and DB2 Case Sensitivity
If Oracle or DB2 is used as the Content Server database, metadata values are case sensitive and care must be used when entering the content metadata values in the applicable query report criteria. As a result, depending on how a value is entered in the corresponding field, Content Tracker Reports may not return all possible matching files. With either an Oracle or DB2 Content Server database, values must be entered exactly as they are entered in the Content Server. Therefore, depending on the lettering structure of the values in the Content Server, the values entered in the query metadata fields will need to be entered in all lowercase letters, all uppercase letters or mixed-case letters. Otherwise, Content Tracker Reports will not return all of the matching files. For example, if the content type in the Oracle or DB2 Content Server database is AdAcc but the user enters it in the query field as adacc, ADACC, or Adacc, Content Tracker Reports will not return any results. In this case, the content type metadata value must be entered using mixed-case letters. This is true for all of the metadata fields in each of the pre-defined query reports.8.5.2 Access Control Lists and Content Tracker Reports Secure Mode
The security checks preference variable SctrEnableSecurityChecks is set when you install the Content Tracker Reports component. Essentially, this preference variable enables you to select one of two security modes: secure and non-secure. The security checks preference provides the option to employ individual user role and account information to restrict the visibility of content item information in report results. This means that you control what content items and, subsequently, the metadata that users can see in their generated reports. Ideally, users should not be able to see anything through Content Tracker Reports that they couldnt find via a Content Server search. Therefore, if you select the secure mode, the information in any generated report will be filtered based on the users role and account privileges. However, if you have enabled Access Control Lists ACLs on your Content Server instance, the secure mode option in Content Tracker Reports does not work. During installation, you must leave the security checks preference check box blank. This means that on an ACL-based system, the secure mode must be disabled. In this case, it is possible for users other than a system administrator to see information about content items that they would not otherwise be authorized to access and view. Note: For more detailed information about the security checks installation preference and how it will affect the report queries and report results, see Security Checks and Query Results on page 8-63. 8-58 Application Administrators Guide for Content Server8.5.3 Pre-Defined Reports
Parts
» Oracle Fusion Middleware Online Documentation Library
» About Native File Conversion Identifying MIME Types
» About Custom Fields Managing Content Fields
» Changing the Default Sort Order of the Opening Query
» About Managed Links Managing Linked Content with Link Manager
» Configuring Link Manager Managing Linked Content with Link Manager
» Managing Links Managing Linked Content with Link Manager
» Link Manager Database Tables
» Link Manager Filters Managing Linked Content with Link Manager
» Site Studio Integration Managing Linked Content with Link Manager
» Click Go located next to the Abort refresh activity option. The refresh activity
» About DCLs and Metadata Schemas
» About Content Profiles Using Profiles to Customize Content Screens
» Content Profile Rules Using Profiles to Customize Content Screens
» Click OK. Oracle Fusion Middleware Online Documentation Library
» Select the Is global rule with priority check box. You can optionally change the
» On the Conditions tab, click Add. Click OK. Click OK. Click OK. Click OK.
» Workflow Overview Introduction to Workflows
» Workflow Steps Introduction to Workflows
» Workflow Step Evaluation Process
» Pre-design Questions Planning a Workflow
» Designing a Workflow Modifying Workflows
» Criteria Workflow Process Creating a Criteria Workflow
» Basic Workflow Process Creating a Basic Workflow
» Idoc Script Functions and Variables
» About Jumps Customizing Workflows
» Jump Variables and Steps Setting Up Jumps
» Jump Examples Customizing Workflows
» Scenario 1: Criteria Workflow Workflow Scenarios
» Scenario 2: Tokens Scenario 3: Jump Based on Metadata Scenario 4: Time-Dependent Jump
» Acquiring a Digital Signature Setting Up Parallel Workflows
» Adding Ad Hoc Step Users Customizing Criteria Workflow Emails
» Paste the following code into the entry event of your workflow step. Note that
» Other Customizations Workflow Tips and Tricks
» Searching Within a Workflow Step Suppressing Workflow Notifications
» Workflow Item Stuck in EDIT or GENWWW Status
» Workflow Item Entered in Wrong Workflow
» About PDF Watermark How PDF Watermark Works
» Folders Overview Usage Scenarios
» Folders Structure Naming Folders Folders Component Security
» Folder Metadata Inheritance Trash Bin Metadata Propagation
» Folder Content Item Revisions
» Folder Archiving Folder Searching URL-Mapped Folders
» About WebDAV What is WebDAV?
» WebDAV Clients WebDAV Architecture
» Preventing Folder Static Inheritance for Specific Metadata Fields
» Optimizing System Performance Click OK.
» Virtual Folders Configuring WebDAV
» Other Issues Click OK twice to save the settings and close the Internet Options screen.
» Adding Custom Viewers and Renderers
» Content Tracker Summary About Content Tracker Components and Functions
» Content Tracker Reports Summary Data Recording Overview
» Data Reduction Overview Data Reporting Overview Content Tracker Terminology
» General Limitations General Considerations
» Data Collection and Processing
» Data Collection Operational Overview
» Data Reduction Operational Overview
» Data Output Operational Overview
» Tracking Limitations Operational Overview
» Data Reduction Features Data Tracking Functions
» Activity Snapshots Data Tracking Functions
» Service Calls Data Tracking Functions
» Web Beacon Objects Data Tracking Functions
» Click the Snapshot tab. Click OK. Open the Content Tracker Administration page: Click OK.
» Oracle and DB2 Case Sensitivity Access Control Lists and Content Tracker Reports Secure Mode
» Pre-Defined Reports Report Generation
» Custom Reports External Report Generator
» User AuthenticationAuthorization and Auditing Site Studio Web Site Activity Reporting
» Security Checks and Query Results
» Accessing Drill Down Reports Accessing Reports from the Information Page
» Creating Custom Report Queries
» Creating Secure Report Queries Using an External Report Generator
» About the Service Call Configuration File
» About the Content Tracker Logging Service
» Managing Service Call Information
» Configuration Variables Configuration and Customization
» Activity Metrics SQL Queries
» Web Server Filter Debugging Support Java Code Debugging Support DataBinder Dump Facility
» Search Rules About Content Categorizer
» XML Conversion About Content Categorizer
» Configuration Variable Setting Up Content Categorizer
» Understanding Search Rules Search Rules
» Pattern Matching Search Rules
» Abstract Search Rules Search Rules
» Categorization Engine Search Rule Filetype Search Rule
» Translation Transformation Using XSLT Stylesheets
» SearchML Transformation XSLT Transformation
» Flexiondoc Transformation XSLT Transformation
Show more