Posts

Showing posts from October, 2017

What is the Difference between Percentage Complete and Percentage Physically Complete

Image
In Microsoft Project there are two ways to  define Task completion. One is in terms of Percentage complete and second is by Percentage Physically complete. See below screenshot showing " Physical % Complete " and " % Complete ".  What is the difference between these two? Which Percentage completion should one report? Figure: Above screenshot is from Microsoft Project 2016  (Click on above screenshot to see clearly) The Percentage complete is reported in terms of time.  However, this reporting may not be true representation of the actual work completed. For example, if the work performed is similar and has same steps and takes the same amount of time, then this reporting may work. However, in practical projects, as work is performed there are some tasks that take more time and resources and there are some tasks that take less time and few resources. Hence reporting in terms of time may not be an accurate representation of the work completed. The Mi

Oracle E-Business Suite Integration with Oracle Access Manager (OAM) for Single Sign-on

Image
( for EBS integration with Oracle IAM refer here ). Below are various deployments scenarios of EBS with OID Basic Deployment Scenario : E-Business Suite + SSO and Oracle Directory Services Deployment Scenario 1: Multiple Oracle E-Business Suite Instances + Central SSO and Oracle Directory Services Instance Deployment Scenario 2: New Oracle E-Business Suite Installation + Existing Third-Party Identity Management Solution Deployment Scenario 3: Existing Oracle E-Business Suite Instance + Existing Third-Party Identity Management Solutions Deployment Scenario 4: Multiple Oracle E-Business Suite Instances with Unique User Populations References Oracle E-business Security Guide     https://docs.oracle.com/cd/E26401_01/doc.122/e22952/T156458T580814.htm

How to find files and then move to a different directory

How to find files older than 1 day and move to different location for backup #!/bin/bash for file in `find /home/test_copy/from_dir -mtime +2` do cp $file /home/test_copy/to_dir done #./copy_script1.sh    {all files from from_dir copied to to_dir directory, criteria being older than 2 days. The directory from_dir was not copied as shown below in the output of the script} cp: omitting directory  `/home/test_copy/from_dir/'

OAM cookies

Image
Understanding various Cookies used in OAM (Oracle Access Manager) Oracle Access Manager (OAM) uses several cookies to track and maintain session information for user sessions. e.g OAM_ID, OAM_REQ, ObSSOCookie. Each cookie and its purpose is given below. How does the OAM server know which session belong to which user? In other words how does OAM uniquely identify each user session and apply the authentication policy for the particular user and application. This post will cover these in terms of the various cookies that are set and by OAM server/Webgates. Each cookie is used to provide a function that helps OAM server to create and subsequently track the session of a user, whether the user is authenticated, whether the session is active, or it is Expired. A session can also be in an Inactive state as well. OAM protects its resources via Application policy set by the administrator for each of the protected resource/application. Each of the Application/resource has a Webgate install

A Sample WSDL for ACME Webservice - Webservice Connector for OIM

A Sample WSDL for ACME Webservice Example of sample wsdl provided by Oracle for the Webservice connector for OIM. LINK   http://docs.oracle.com/cd/E22999_01/doc.111/e38352/app_acme_wsdl.htm#CHDFJJJC Download link for Webservice connector

Oracle Identity Manager OIM User Provisioning

OIM User Provisioning ( For OIM Reconciliation refer here ) There are 3 types of provisioning in Oracle Identity Manager - Request-based, Policy-based and Direct. What is Provisioning : Provisioning is creating user account in an external to OIM resource (directory or an application), called a Target resource. An example of Provisioning would be when a user who is already created or exists in OIM, this user account is created in say, OID or AD. The reverse of Provisioning is De-provisioning. Here the identity data flow is from OIM to the external resource. (1) Request-based provisioning : In request-based provisioning, an individual creates a request for a target system account. The provisioning process is completed when an OIM User with the required privileges approves the request and provisions the target system account to the requester. (2) Policy-based provisioning : This type of provisioning refers to resources being granted to users automatically through access policies. Ac