search
HomeDatabaseMysql Tutorial解决问题RPE-02260:数据库用户owf

问题: 因为owf_mgr不是OWB用户,所以 在部署进程流包时,提示如下错误: RPE-02260: Database User OWF_MGR must be a Control Center User. Please use the OWB Design Client against the Control Center repository to grant the Control Center User ro

问题:

因为owf_mgr不是OWB用户,所以在部署进程流包时,提示如下错误:

RPE-02260: Database User OWF_MGR must be a Control Center User. Please use the OWB Design Client against the Control Center repository to grant the Control Center User role。

RPE-02260:数据库用户owf_mgr必须是控制中心用户。请针对控制中心资料档案库使用OWB Design Client ,授予其控制中心用户角色。

注释:the OWB Design Client against the Control Center repository中,against the Control Center repository是修饰the OWB Design Client的,故而Please use the OWB Design Client against the Control Center repository to grant the Control Center User role应翻译成“使用针对控制中心资料档案库OWB Design Client OWF_MGR用户授予控制中心用户角色”。因为OWB组件结构中,OWB Design Client (Designcenter)是要连接到一个工作区(这里指的是运行时工作区)上的,所以“针对”可以理解为“连接到”,所以翻译成“使用一个当前连接到运行时的控制中心资料档案库OWB Design Client OWF_MGR用户授予控制中心用户角色”。

假设一个名为PFPKG_1的进程流包下含有两个进程流,分别名为进程流_1进程流_2,则在控制中心(界面)上部署该进程流包失败时,查看它的作业详细资料如下:

名称                   操作          状态                           日志

PFPKG_1         创建          错误                            ora-01924:角色‘OWB_USER’未被授权或不存在                               //3

                                                                                  ora-06512:在“sys.dbms_session”,line   345,

                                                                                  ora-06512:在line   1                                                                                     //4

PFPKG_1         创建          错误                             RPE-02215:无法测试同义词PFPKG_1__WB_RTI_WORKFLOW_UTIL           //1

PFPKG_1         创建          错误                             RPE-02260:数据库用户owf_mgr必须是控制中心用户。请针对控制中心资料档案库使用 

                                                                                                         OWB Design Client,授予其控制中心用户角色。                    //2

进程流_1            创建          INFORMATIONAL     RPE-02071:因为以前报告的严重错误,部署已中止。                                       //0

进程流_2            创建          INFORMATIONAL         RPE-02071:因为以前报告的严重错误,部署已中止。                                    //0

对该作业详细资料的说明:

进程流包PFPKG_1 对应的脚本是PL/SQL脚本,在“sys.dbms_session”,line   345和line   1角色‘OWB_USER’未被授权或不存在,故而无法测试同义词PFPKG_1__WB_RTI_WORKFLOW_UTIL。而角色‘OWB_USER’未被授权或不存在的原因是数据库用户owf_mgr必须是控制中心用户。请针对控制中心资料档案库使用OWB Design Client,授予其控制中心用户角色。进程流_1进程流_2由于进程流包PFPKG_1的严重错误,部署已中止。


还有一种理解日志的顺序: //0 //1 //2 //3 //4

解决方法:



注释:Control Center User(控制中心用户)是OWB用户的另一种说法,两者指的是同一个概念。

Register the Oracle Workflow User(即使用OWB安全UI使owf_mgr称为OWB用户

You need to grant specific roles to the Oracle Workflow(OWF) user,owf_mgr, for it to have the privileges to execute a process flow in the Control Center(确切地说,是在控制中心进程注册到的工作区上。因为在部署时,owf_mgr要执行存放在该工作区上进程流对应的脚本).

You do not have to embed the password for the Control Center in database-links owned by the OWF user. The Control Center user is highly privileged(这里说的控制中心用户的权限也是属于数据库用户权限范围的) and its password is tightly controlled.

To register the OWF user, you use the Register Warehouse Builder Users wizard from the Security > Users node in Global Explorer panel. To get access to the security node, ensure you log in to the design center asthe repository owner(确切说是,工作区所有者用户,非owbsys这个用户,这个用户不能登录设计中心的).

1.

If not already logged in, log in to the Design Center with username/password asrep_owner/rep_owner.

In the Global Explorer panel, expand the Security node. Right-click theUsers node and selectNew.

Note: You must save or revert your changes before creating a new user. To save previous changes, selectSave All from the Design menu or click解决问题RPE-02260:数据库用户owf on the toolbar.

解决问题RPE-02260:数据库用户owf

The Create User dialog appears.

 

2.

On the Create User dialog, you can select from the available list of database users or create a new one that will be automatically registered as Warehouse Builder user.

Earlier in this lesson, where you were instructed to install Oracle Workflow Server, you were instructed to use the Oracle Workflow Configuration Assistant and specify owf_mgr as the Workflow Account. This resulted in the creation of owf_mgr as a database user. Select owf_mgr from the Available DB Users list and click> to move it to Selected Users list. ClickOK.

解决问题RPE-02260:数据库用户owf

Notice that owf_mgr user is added to the Security > Users node in the Global Explorer panel.

参考:Designing ETL Data Flow Mappings【OWB 11g Release 1】

解决在创建进程流位置是遇到的问题:连接成功,无法检索工作流版本


Register the Oracle Workflow User

You need to grant specific roles to the Oracle Workflow(OWF) user, owf_mgr, for it to have the privileges to execute a process flow in the Control Center.

The step of registering the Oracle Workflow user, owf_mgr, is because of the new security model. This new security model means that you do not have to embed the password for the Control Center in database-links owned by the OWF user. The Control Center user is highly privileged and its password is tightly controlled.

To register the OWF user, you use the Register Warehouse Builder Users wizard from the Security > Users node in Global Explorer panel. To get access to the security node, ensure you log in to the design center as the repository owner.


中文译文:

RPE-02260: Database User OWF_MGR must be a Control Center User. Please use the OWB Design Client against the Control Center repository to grant the Control Center User role.

您需要授予 Oracle Workflow (OWF) 用户 owf_mgr 特定角色,使其具有在 Control Center 中执行进程流的权限。
您不必将 Control Center 的口令嵌入 OWF 用户所拥有的数据库链接中。Control Center 用户具有高特权,其口令受到严格控制。
要注册 OWF 用户,可以从 Global Explorer 面板中的 Security > Users 节点使用 Register Warehouse Builder Users 向导。要访问 Security 节点,请确保以信息库所有者的身份登录到 Design Center。
1)
如果尚未登录,以用户名/口令 rep_owner/rep_owner 登录 Design Center。
在 Global Explorer 面板中展开 Security 节点。右键单击 Users 节点并选择 New。
注:在创建新用户之前,您必须先保存或恢复您的更改。要保存以前的更改,请从 Design 菜单中选择 Save All,或者单击工具栏中的解决问题RPE-02260:数据库用户owf
此时出现 Create User 对话框。
解决问题RPE-02260:数据库用户owf

2)
在 Create User 对话框中,您可以从可用数据库用户列表中进行选择,也可以创建一个新用户,该用户将自动注册为 Warehouse Builder 用户。

在本教程前面的部分中,我们说明了如何安装 Oracle Workflow Server,如何使用 Oracle Workflow Configuration Assistant,以及如何将 owf_mgr 指定为工作流帐户。其结果是将 owf_mgr 创建为数据库用户。从 Available DB Users 列表中选择 owf_mgr,单击 > 将其移至 Selected Users 列表。单击 OK。
解决问题RPE-02260:数据库用户owf

注意,owf_mgr 用户已添加到 Global Explorer 面板的 Security > Users 节点中。
解决问题RPE-02260:数据库用户owf


参考:http://blog.csdn.net/kingzone_2008/article/details/8921970


来自oracle官方文档:

About the Security Service

Only users with administrative privileges can access the security service under Globals Navigator to manage users and roles of the security policy in Oracle Warehouse Builder API and Scripting Reference.

When you install Oracle Warehouse Builder and then use the Repository Assistant to create a design repository, Oracle Warehouse Builder makes the design repository owner the default administrator. The first time you start the Design Center after installation, you must log in as the design repository owner. You can then define additional administrators or other users as necessary.

When you log in to the Oracle Warehouse Builder Design Center as the design repository owner, it displays the Globals Navigator.

解决问题RPE-02260:数据库用户owf
Description of the illustration globals_navigator.gif

To view default security settings:

  1. In Globals Navigator, expand Security.

  2. Expand Users, and then expand Roles.

    解决问题RPE-02260:数据库用户owf
    Description of the illustration security_01.gif

  3. Notice that there are two predefined roles, ADMINISTRATOR and EVERYONE.

  4. The one predefined user is the design repository owner; it is assigned the ADMINISTRATOR role by default.

    To view or edit the details for a user, in the globals Navigator, under Security and then under Users, select that and double-click the user. The Edit User screen appears.

    解决问题RPE-02260:数据库用户owf
    Description of the illustration security_02.gif

For a complete list of all the tasks administrators can perform, see "Administrator Role".

参考:http://docs.oracle.com/cd/E11882_01/owb.112/e17130/security_mgmt.htm#WBINS15200

About the Security Service

Only users with administrative privileges can access the Security Service and change security policy in Oracle Warehouse Builder.

When you install Oracle Warehouse Builder and then use the Repository Assistant to create a design repository, Oracle Warehouse Builder assigns the design repository owner you define to be the default administrator. The first time you start the Design Center after installation, you must log in as the design repository owner. You can then define additional administrators or other users as necessary.

Log in to the Oracle Warehouse Builder Design Center as the design repository owner and Oracle Warehouse Builder displays the Globals Navigator.

Under the security node, there are two predefined roles,ADMINISTRATOR andEVERYONE. The one predefined user is the design repository owner,REPOS_OWNER in this example, which is assigned the ADMINISTRATOR role by default.

To perform actions under the Security node, select an object and right-click to view all of the possible operations. Or select an object and selectEdit from the menu bar.

See Also:

These topics in Oracle Warehouse Builder Installation and Administration Guide:
  • "Managing Security"

  • "Managing Configurations"

参考:http://docs.oracle.com/cd/E11882_01/owb.112/e10581/metadatamgt.htm#WBCON4639
Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
How does MySQL index cardinality affect query performance?How does MySQL index cardinality affect query performance?Apr 14, 2025 am 12:18 AM

MySQL index cardinality has a significant impact on query performance: 1. High cardinality index can more effectively narrow the data range and improve query efficiency; 2. Low cardinality index may lead to full table scanning and reduce query performance; 3. In joint index, high cardinality sequences should be placed in front to optimize query.

MySQL: Resources and Tutorials for New UsersMySQL: Resources and Tutorials for New UsersApr 14, 2025 am 12:16 AM

The MySQL learning path includes basic knowledge, core concepts, usage examples, and optimization techniques. 1) Understand basic concepts such as tables, rows, columns, and SQL queries. 2) Learn the definition, working principles and advantages of MySQL. 3) Master basic CRUD operations and advanced usage, such as indexes and stored procedures. 4) Familiar with common error debugging and performance optimization suggestions, such as rational use of indexes and optimization queries. Through these steps, you will have a full grasp of the use and optimization of MySQL.

Real-World MySQL: Examples and Use CasesReal-World MySQL: Examples and Use CasesApr 14, 2025 am 12:15 AM

MySQL's real-world applications include basic database design and complex query optimization. 1) Basic usage: used to store and manage user data, such as inserting, querying, updating and deleting user information. 2) Advanced usage: Handle complex business logic, such as order and inventory management of e-commerce platforms. 3) Performance optimization: Improve performance by rationally using indexes, partition tables and query caches.

SQL Commands in MySQL: Practical ExamplesSQL Commands in MySQL: Practical ExamplesApr 14, 2025 am 12:09 AM

SQL commands in MySQL can be divided into categories such as DDL, DML, DQL, DCL, etc., and are used to create, modify, delete databases and tables, insert, update, delete data, and perform complex query operations. 1. Basic usage includes CREATETABLE creation table, INSERTINTO insert data, and SELECT query data. 2. Advanced usage involves JOIN for table joins, subqueries and GROUPBY for data aggregation. 3. Common errors such as syntax errors, data type mismatch and permission problems can be debugged through syntax checking, data type conversion and permission management. 4. Performance optimization suggestions include using indexes, avoiding full table scanning, optimizing JOIN operations and using transactions to ensure data consistency.

How does InnoDB handle ACID compliance?How does InnoDB handle ACID compliance?Apr 14, 2025 am 12:03 AM

InnoDB achieves atomicity through undolog, consistency and isolation through locking mechanism and MVCC, and persistence through redolog. 1) Atomicity: Use undolog to record the original data to ensure that the transaction can be rolled back. 2) Consistency: Ensure the data consistency through row-level locking and MVCC. 3) Isolation: Supports multiple isolation levels, and REPEATABLEREAD is used by default. 4) Persistence: Use redolog to record modifications to ensure that data is saved for a long time.

MySQL's Place: Databases and ProgrammingMySQL's Place: Databases and ProgrammingApr 13, 2025 am 12:18 AM

MySQL's position in databases and programming is very important. It is an open source relational database management system that is widely used in various application scenarios. 1) MySQL provides efficient data storage, organization and retrieval functions, supporting Web, mobile and enterprise-level systems. 2) It uses a client-server architecture, supports multiple storage engines and index optimization. 3) Basic usages include creating tables and inserting data, and advanced usages involve multi-table JOINs and complex queries. 4) Frequently asked questions such as SQL syntax errors and performance issues can be debugged through the EXPLAIN command and slow query log. 5) Performance optimization methods include rational use of indexes, optimized query and use of caches. Best practices include using transactions and PreparedStatemen

MySQL: From Small Businesses to Large EnterprisesMySQL: From Small Businesses to Large EnterprisesApr 13, 2025 am 12:17 AM

MySQL is suitable for small and large enterprises. 1) Small businesses can use MySQL for basic data management, such as storing customer information. 2) Large enterprises can use MySQL to process massive data and complex business logic to optimize query performance and transaction processing.

What are phantom reads and how does InnoDB prevent them (Next-Key Locking)?What are phantom reads and how does InnoDB prevent them (Next-Key Locking)?Apr 13, 2025 am 12:16 AM

InnoDB effectively prevents phantom reading through Next-KeyLocking mechanism. 1) Next-KeyLocking combines row lock and gap lock to lock records and their gaps to prevent new records from being inserted. 2) In practical applications, by optimizing query and adjusting isolation levels, lock competition can be reduced and concurrency performance can be improved.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
1 months agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment