Sunday, May 15, 2022

EBS R12 How to Autolaunch JNLP files (Java web start) on Modern Browsers ?

Unlike IE, when we open EBS forms (with JWS enabled) on Edge (or) chrome,  form (jnlp) files will be downloaded and we have to manually click and launch. Business users may not like this behaviour. Please find the steps to auto launch JWS forms on Edge, Firefox & Chrome 

Firefox:

a. Please open firefox .  Click on Menu -->Settinga











b.  In the search box, enter applications & Click on Jnlp content type and Choose the action as    C:\Program Files (x86) (or Program Files) \Java\<version>\bin\javaws.exe 




c. Open anew tab, type about:config in the address bar and press Enter/Return. Click the button accepting the risk -- this change involves some risk.







d. In the search box ,Enter browser.download.skipConfirmLaunchExecutable  & choose  Boolean and Click Add




e. Results should look like below.



f. Now Restart the browser and try to launch forms now. It should auto launch


Microsoft Edge:

IE mode in Edge allows organizations to continue to use legacy elements of Internet Explorer but within Microsoft Edge. Please follow below steps as a workaround.

To enable IE mode on Edge, Please follow these steps:

1. Open Microsoft Edge on Windows 10 & Click the Settings under menu button on the top-right corner.
2. Select the Settings option.
3. Click on Default browser.
4. Under the “Internet Explorer compatibility” section , Please select allow under  “Allow sites to be reloaded in Internet Explorer mode” 
5. Click the Restart button.





6. After restart , Please enter EBS URL on Edge and enter
7. Click menu button on the top-right corner & click on reload in internet explorer mode.
8. Now try to login and launch form (It should not download, instead it should launch directly)

Google Chrome:

Autolaunch of JNLP files on google chrome can't be controlled with browser options . Instead Chrome policies needs to be defined through GPO. Chrome policies are centrally managed by system administrators as Group Policy Object (GPO) using Microsoft Active Directory or Microsoft Intune. Deployment instructions supported by administrative templates (.admx).




Wednesday, May 4, 2022

EBS 12.2 ADOP useful Queries

 

EBS 12.2 adop queries:  

adop session status:

set pagesize 200;
set linesize 160;
col PREPARE_STATUS format a15
col node_name format a30
col APPLY_STATUS format a15
col CUTOVER_STATUS format a15
col ABORT_STATUS format a15
col STATUS format a15
select NODE_NAME,ADOP_SESSION_ID, PREPARE_STATUS , APPLY_STATUS  ,CUTOVER_STATUS , CLEANUP_STATUS , ABORT_STATUS , STATUS from AD_ADOP_SESSIONS where ADOP_SESSION_ID=66;

Note: Y denotes that the phase is done

N denotes that the phase has not been completed

X denotes that the phase is not applicable

R denotes that the phase is running (in progress)

F denotes that the phase has failed

P (is applicable only to APPLY phase) denotes at least one patch is already applied for the session id

C denotes that the status of this ADOP session has completed



cutover statuses:

cutover_status='Y' 'COMPLETED'

cutover_status not in ('N','Y','X') and status='F' 'FAILED'

cutover_status='0' 'CUTOVER STARTED'

cutover_status='1' 'SERVICES SHUTDOWN COMPLETED'

cutover_status='3' 'DB CUTOVER COMPLETED'

cutover_status='D' 'FLIP SNAPSHOTS COMPLETED'

cutover_status='4' 'FS CUTOVER COMPLETED'

cutover_status='5' 'ADMIN STARTUP COMPLETED'

cutover_status='6' 'SERVICES STARTUP COMPLETED'

cutover_status='N' 'NOT STARTED'

cutover_status='X' 'NOT APPLICABLE'


fs_clone status:

set linesize 300
col node_name format a15
col clone_status format a20
col driver_file_name format a20
col clone_status format a20
select node_name,clone_status,driver_file_name,status,to_char(start_date,'DD-MON-YYYY HH:MI:SS PM'),to_char(end_date,'DD-MON-YYYY HH:MI:SS PM') from ad_adop_session_patches where adop_session_id=89;

To find the patches applied in the particular adop session:

select distinct BUG_NUMBER from AD_ADOP_SESSION_PATCHES  where adop_session_id='&session_id';

set linesize 300;
select distinct bug_number,node_name,to_char(start_date ,'DD-MON-YYYY HH24:MI:SS') START_DATE,to_char(end_date,'DD-MON-YYYY HH24:MI:SS')END_DATE from ad_adop_session_patches where adop_session_id=67 group by bug_number,node_name,start_date,end_date order by bug_number;

select distinct bug_number,node_name,to_char(start_date ,'DD-MON-YYYY HH24:MI:SS') START_DATE,to_char(end_date,'DD-MON-YYYY HH24:MI:SS')END_DATE from ad_adop_session_patches where adop_session_id=&session_id  and bug_number='&bug_number' group by bug_number,node_name,start_date,end_date order by bug_number;

AD,TXK VERSIONS:

SELECT abbreviation, codelevel FROM AD_TRACKABLE_ENTITIES WHERE abbreviation in ('txk','ad');

ETCC QUERIES:

set linesize 300;
col node_name format a10;
col database_name format a10;
col check_message format a50;
select database_name,node_name ,check_date ,component_name,component_version,check_message from apps.TXK_TCC_RESULTS where database_name='&DB_NAME';

Tuesday, May 3, 2022

How to open discoverer plus in Microsoft Edge Browser

We all know oracle discoverer is already out of support from June 2014 onwards and It worked in the Internet explorer ,older versions of  Mozilla & Edge .  Internet Explorer is only a few months away from retirement & will be officially retired on June 15, 2022 .IE will fall out of support for multiple versions of Windows 10 & using the old version of browsers would not be secure. We can use the below workaround to access discoverer on Edge.

Solution:

IE mode in Edge allows organizations to continue to use legacy elements of Internet Explorer but within Microsoft Edge. Please follow below steps as a workaround.

Enable IE mode on Microsoft Edge (One Time Setup)

To enable IE mode on Edge, Please follow these steps:

  1. Open Microsoft Edge on Windows 10 & Click the Settings under menu button on the top-right corner.
  2. Select the Settings option.
  3. Click on Default browser.
  4. Under the “Internet Explorer compatibility” section , Please select allow under  “Allow sites to be reloaded in Internet Explorer mode” 
  5. Click the Restart button.
Access Discoverer using Edge

  1. After restart, Please enter the discoverer URL.
  2. Click menu button on the top-right corner & click on "Reload in internet explorer mode"
  3. Login using normal procedure & it should open forms now.


Note: Instead of selecting “Reload in Internet explorer mode" every time, we can add the site to  automatically launch  for 30 days. But after 30 days, we have to re-add it which would be difficult to educate to all the users. so instead of auto launch for 30 days, it is better to "Reload in internet explorer mode" every time.

Sunday, June 20, 2021

How to setup AD bridge on IDCS

What is AD bridge

The Microsoft Active Directory (AD) Bridge provides a link between your AD enterprise directory structure and Oracle Identity Cloud Service. Oracle Identity Cloud Service can synchronize with this directory structure so that any new, updated, or deleted user or group records are transferred into Oracle Identity Cloud Service.

Synchronization Flow & Allowed Operations:

AD to IDCS synchronization (Mandatory) - Create/Update/Delete users from AD to IDCS

IDCS to AD synchronization (optional) - Update/Deactivate ( No create/Delete operations allowed)


Prerequisites :

Set Permissions for Your Microsoft Active Directory (AD) Account

1. Create the service account in AD

2. In order to setup AD to IDCS synchronization, Please grant Generic Read permissions for the users, groups, and organizational units (OU) in the AD domain that you want to import into Oracle Identity Cloud Service:

dsacls "DC=jay,DC=local" /I:T /g "jay.local\sanjeev:GR"

3. If you want to setup IDCS to AD sync (optional) , then please grant Generic Write permission for the users, groups, and organizational units (OU) in the AD domain,

dsacls "DC=jay,DC=local" /I:T /g "jay.local\sanjeev:GW"

Certified Components

  • With the Microsoft Active Directory (AD) Bridge, Oracle Identity Cloud Service can connect to your AD enterprise directory structure.  The  following table lists the certified versions for Oracle Identity Cloud Service,AD, your operating system, and the Microsoft .NET software framework (which is required for the AD Bridge to run).

  • Please create the machine (for deploying AD bridge) that’s attached to the Microsoft Active Directory domain for auto discovery & Make sure firewall is opened to reach IDCS.

Create a Microsoft Active Directory (AD) Bridge

To create a Microsoft Active Directory (AD) Bridge that provides a link between your AD enterprise directory structure and Oracle Identity Cloud Service, you must be assigned to either the identity domain administrator role or the security administrator role
  • In the Identity Cloud Service console, expand the Navigation Drawer, click Settings, and then click Directory Integrations and click Add a Microsoft Active Directory Bridge.


  • Make a note of the Identity Cloud Service URL, Client ID, and Client Secret.
  • Click Download. Oracle Identity Cloud Service downloads the client for the AD Bridge.
  • FTP the ad-id-bridge.exe file to window server which was created in earlier step.

Install AD bridge

  • To install the client for the AD Bridge, double-click the ad-id-bridge.exe file.The Welcome to AD Bridge Installer window appears.In the Language Selection area,
  • select the language that you want to use to install the client for the AD Bridge, and then click OK. The Identity Cloud Service Microsoft Active Directory Bridge Installer appears.


  • In the Welcome dialog box, click Next.

  • In the Destination Folder dialog box, choose one of the following install choices:





  • In the Specify Proxy Server dialog box:
    1. If your organization has a firewall in place and requires communication to be handled using an HTTP Proxy Server, then select Use Proxy Server. If you select this check box, then provide the full path (or address) of the proxy server and the administrator credentials for connecting to the proxy server.

    2. If your organization doesn’t require communication to be handled using an HTTP Proxy Server, then don't select Use Proxy Server.

    3. Click Next.


  • In the Specify Identity Cloud Service Credentials dialog box:

    1. Provide the Cloud Service URL, Client ID, and Client Secret.

    2. Click Test.

      The AD Bridge attempts to connect to the Oracle Identity Cloud Service server.

      If a connection can be established, then a Connection Successful! confirmation message appears.

      Otherwise, you’ll receive an error message, indicating that you entered an incorrect Cloud Service URL, Client ID, or Client Secret. Modify the incorrect values, and click Test again.

    3. Click Next.





  • In the Specify Microsoft Active Directory Credentials dialog box, provide the following connection details to the AD server:

    1. Username: The AD account that the AD Bridge uses to access the AD server.

    2. Password: The password for the AD account.

    3. Use SSL: If you're connecting to the server via an SSL connection, then leave this check box selected. Otherwise, deselect it.




  • Click Next -->Click Close


  • In the Identity Cloud Service console, access the Directory Integrations page. The AD Bridge that you created for the AD domain appears with a status of Partially Configured. The bridge is created, but not configured. See Configure a Microsoft Active Directory (AD) Bridge for more information about configuring this bridge.

    Note:

    If you don't see the AD Bridge in the Directory Integrations page, then refresh your web browser. Also, you can create only one bridge per AD domain.




Configure a Microsoft Active Directory (AD) Bridge


You can access the Managing Security Settings infographic to see how to configure an AD Bridge.

  1. In the Identity Cloud Service console, expand the Navigation Drawer, click Settings, and then click Directory Integrations -->Click the AD Bridge that you want to configure.

    Note : The bridge has a status of Partially Configured.

  2. In the Configure the Microsoft Active Directory Domain page, configure the AD domain to poll for changes to users or groups in AD and import those changes into Oracle Identity Cloud Service. In the Select organizational units (OUs) for users and Select organizational units (OUs) for groups panes:


3. In the Supported Operations area, choose which operations for Oracle Identity Cloud Service users or groups will be propagated to AD: (didn't choose anything as we don't to propogate changes from IDCS to AD)


4. In the Set import frequency area, schedule how often, in hours and minutes, you want Oracle Identity Cloud Service to use the AD Bridge to import users and groups from AD.

5. In the Configure Attribute Mappings area, click Edit Attribute Mappings to define custom attribute mappings between AD and Oracle Identity Cloud Service. (We didn't change anything)



6. In the Authentication Settings area, select Enable local authentication if you want users to use their Oracle Identity Cloud Service or their AD passwords (requires delegated auth setup which has not been setup as of now) to authenticate into Oracle Identity Cloud Service to access Oracle Identity Cloud Service-protected resources.




7.Click Save

8. In the Confirmation window, click OK.The status of the AD Bridge changes from Partially Configured to Configured. The bridge is created and configured.

9. Click on Bridge we have created in IDCS and go to import tab



10 . We can do the full import during first time & subsequently scheduled job will sync the changes from AD to IDCS.









How to Compile Forms , Reports & Custom.pll in R12.2

How to Compile Custom.pll   cd $AU_TOP/resource  cp CUSTOM.plx CUSTOM.plx_bkup  cp CUSTOM.pll CUSTOM.pll_bkup  frmcmp_batch module=CUSTOM.pl...