Create/Access a ClearCase view (Snapshot or Dynamic) without local admin privileges - version-control

In our current environment all the users who would like to access ClearCase will require local administrative rights and i'm looking into the options to remove the local admin privs constraint so that all the users should be able to access if they are part of clearcase domain groups like CCUsers.

Local admin privilege should only be required for installing ClearCase, especially when it comes to the MVFS (MultiView FileSystem) part.
But it is also used for launching ClearCase services. Without a privilege elevation, you would see:
C:\>net start albd
System error 5 has occurred.
Access is denied.
From Windows Services
Unable to open service Albd for writing on Local Computer
Error 5: Access is denied.
First, check if you can set those services as "Automatic": they should be started during Windows Startup, even if the user is not an administrator.
This thread recommends:
Click on Atria Location Broker service and select Properties.
On the General tab, "Startup type" should be "Automatic".
On the Log On tab, select the radio button to Log on as "This account" and enter the ALBD user account and password that you should have already setup (e.g. your-domain\clearcase_albd). If you do this properly, the Atria Location Broker service should start automatically for any user.
See also "Troubleshooting ALBD startup failures on Microsoft Windows".

Related

Drools Invalid credentials to load data from remote server. Contact your system administrator

Whenever I try to open process definition in drools , Getting the Below Error
Invalid credentials to load data from remote server. Contact your system administrator.
I have given all permissions to role permission to user but still this error shows up.
While many details from your problem are not clear, here is the bottom line of this issue.
You are logging into the business-central with user 'nithish'. This user, will be used in the remote REST requests to your kie server instance. This means that user 'nithish' needs to exists on the kie-server side as well - otherwise kie-server will not recognise that user, thus authentication will fail. He needs to be created there with the same password and same roles as are present on the business-central side. I would advise at least
kie-server, rest-all,admin
roles.
The server you've installed your business central on has no access rights.

"Upgrade must be run with administrator rights" message is displayed while running upgrade command for JTS

I am upgrading Collaborative lifecycle management version to 6.0.5 current version is 5.0.2. As specified in IBM Interactive upgrade guide one of the step is to run upgrade script on your databases and below are the command
cd D:\IBM\JazzTeamServer6.0.5\server
upgrade\jts\jts_upgrade.bat -oldJTSHome "D:\IBM\JazzTeamServer5.x\server\conf" -updateTomcatFiles no -updateAppServerFiles no
After running this command I am getting message as "Upgrade must be run with administrator rights"
I am logged in as administrative user on the system, assigned all the full access control permission of folder where CLM server is installed to user still everytime same problem persist.
I was going through links to troubleshoot the problem but nothing seems to be working out for me. Some of the links I have referred are
https://www.techsupportall.com/how-to-enable-administrator-account-on-welcome-screen/
http://www.thewindowsclub.com/elevated-privileges-windows
Can anyone please suggest I am missing anything here?
This could be caused by User Account Control, a feature which makes so that, even if you have administrative rights, you don't actually have them unless you explicitly request them. There are two distinct policies governing UAC behaviour (both found in Computer settings\Windows settings\Security settings\Local policies\Security options), one for the built-in Administrator account, and another one for all other administrative users:
User Account Control: Admin Approval Mode for the built-in Administrator account (disabled by default)
User Account Control: Run all administrators in Admin Approval Mode (enabled by default)
What this means is: by default, the built-in Administrator account is not affected by UAC, while all other administrative users are; thus, it's possible for an administrative user (different from the built-it Administrator) to not actually have administrative rights, even if it's a member of the Administrators group.
More info -> https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd835564(v=ws.10)

mirth administrator won't load on certain user accounts

I have a mirth system on a windows server. The system was running properly. Then, suddenly, I was only able to launch Mirth Administrator when logged in as Admin on Windows Server. For all other accounts, if I right click the mirth icon in the system tray, click Run Administrator and give my credentials, Mirth will hang on "Loading Preferences." If I am not logged in as administrator then all of the buttons are greyed out in the Mirth Server Manager menu and if I click OK, I get an error message saying "could not save file conf\mirth.properties"
It seems like Mirth is suddenly having trouble communicating with the mirthdb--maybe because of a permissions issue. But I can't figure out why.
The only change I've made to the system is installing .NET 4.
Any suggestions on how to debug this?
I'm not sure why your users would have had access in the first place, but in my experience, for all applicable non-administrative accounts, AD security groups, etc, you need to grant read/write permissions to C:\Program Files\Mirth. Also, if you have configured the Mirth Service to run under a particular non-administrative account, then that account will also need permissions to the Mirth folder.
However, there is an alternative means of accessing the Mirth Administrator. Instead of logging directly into the server, open a web browser on your local machine, and navigate to:
http://myservername:8080
You should be greeted with a webpage, and on it, a single buttom labelled "Launch Mirth Connect Administrator." So long as you have the JVM installed on your local machine, you should be able to load and launch the Mirth Administrator directly from there.

error when trying to install MSMQ

Have VS-2003, VS-2005, VS-2008
Tried enabling MSMQ in Add/Remove Windows Components and get this
'A local user is authenticated as an anonymous user and cannot access active directory. You need to log on as a domain user to access Active directory.'
I am trying to do development on my machine and want to set up a private Q so that I can develop a MSMQ application.
This is similar to this situation: I am on my machine as an admin. Am logged into VPN and trying the above.
link text
Uncheck the "active directory integration" option in the "add windows component" gui. It is not needed for private queues.

Programmatically raise user privileges

I have been maintaining an installation for a while but I am not really an expert. now I've been asked to come up with a solution for this:
Our software is always sold together with a computer as it has to be run in a very controlled environment. The installer needs administrative privileges to be executed. So far we had two different users, one with administrative rights and other one without. Our custumer service login as Administrator, install the software and restart the machine so that the user can access as a normal user.
Now we want the user to be able to install the software themselves but we don't want them to have access as an administrator because they can modify things it shouldn't be modified.
So, is there any way to programmatically raise the user privileges during the installation and afterwards lower them back? The installer is made using InstallShield but we use vbscript to check some pre-requisites.
Check out CPAU. It allows you to create an encrypted command that will run the installation as administrator.
EDIT: This is a more comprehensive list of like tools.
If you are looking for a toolkit to do this kind of thing, well, Microsofts MSI technology has this built in: Administrator access is required to install the initial MSI file, additional patches (MSPs I think) are digitally signed by the original MSI and are thus deemed safe - users can install them without requiring administrator elevation.
You can do the same thing: As part of your administrative install, install a service. The service can create a named pipe - that you explicitly give user ACLs to - or even just a socket or monitor a drop off folder that allows the user level code to communicate with the service code (running with SYSTEM or configured access). The service can then use its SERVICE or configured account level permissions to either impersonate an administrator, or do other tasks on the behalf of the user without EVER giving the user any kind of elevated permission - even temporarily.