Tuesday, January 22, 2013

EPM Installation and the role of User Account Control (UAC)


Oracle Essentials: Oracle Database 11g (4th Edition) by Greenwald, Ric (Google Affiliate Ad)
During Hyperion EPM installation, Oracle's EPM installation document instructs disabling the Window's User Account Control. If we do not disable the UAC, we will get an error message. This is what I have learned during the EPM installation. Through research on Microsoft page, I have found out the ways of disabling the UAC, and I have then here so that someone with the same issue can have a quick look for reference. These are available in Microsoft's page as well. 


To turn off UAC

  1. Click Start, and then click Control Panel.
  2. In Control Panel, click User Accounts.
  3. In the User Accounts window, click User Accounts.
  4. In the User Accounts tasks window, click Turn User Account Control on or off.
  5. If UAC is currently configured in Admin Approval Mode, the User Account Control message appears. Click Continue.
  6. Clear the Use User Account Control (UAC) to help protect your computer check box, and then click OK.
  7. Click Restart Now to apply the change right away, or click Restart Later, and then close the User Accounts tasks window.

 To disable UAC from prompting for credentials to install applications

  1. Click Start, click All Programs, click Accessories, click Run, type secpol.msc in the Open text box, and then click OK.
  2. From the Local Security Settings console tree, click Local Policies, and then click Security Options.
  3. Scroll down and double-click User Account Control: Detect application installations and prompt for elevation.
  4. Select the Disabled option, and then click OK.
  5. Close the Local Security Settings window.
 To disable Admin Approval Mode
  1. Click Start, click All Programs, click Accessories, click Run, type secpol.msc in the Open box, and then click OK.
  2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue..
  3. From the Local Security Settings console tree, double-click Local Policies, and then double-click Security Options.
  4. Scroll down and double-click User Account Control: Run all administrators in Admin Approval Mode.
  5. Select the Disabled option, and then click OK.
  6. Close the Local Security Settings window.
 To change the elevation prompt behavior for administrators
  1. Click Start, click Accessories, click Run, type secpol.msc in the Open box, and then click OK.
  2. From the Local Security Settings console tree, click Local Policies, and then click Security Options.
  3. Scroll down to and double-click User Account Control: Behavior of the elevation prompt for administrators.
  4. From the drop-down menu, select one of the following settings:
    • Elevate without prompting (tasks that request elevation will automatically run as elevated without prompting the administrator)
    • Prompt for credentials (this setting requires user name and password input before an application or task will run as elevated)
    • Prompt for consent (default setting for administrators)
  5. Click OK.
  6. Close the Local Security Settings window.
To change the elevation prompt behavior for standard users
  1. Click Start, click Accessories, click Run, type secpol.msc in the Open box, and then click OK.
  2. From the Local Security Settings console tree, click Local Policies, and then Security Options.
  3. Scroll down to and double-click User Account Control: Behavior of the elevation prompt for standard users.
  4. From the drop-down menu, select one of the following settings:
    • Automatically deny elevation requests (standard users will not be able to run programs that require elevation, and they will not be prompted)
    • Prompt for credentials (this setting requires user name and password input before an application or task will run as elevated, and it is the default for standard users)
  5. Click OK.
  6. Close the Local Security Settings window.

No comments: