During Hyperion EPM installation, Oracle's EPM installation document instructs disabling the Window's User Account Control. If we do not disable the UAC, we will get an error message. This is what I have learned during the EPM installation. Through research on Microsoft page, I have found out the ways of disabling the UAC, and I have then here so that someone with the same issue can have a quick look for reference. These are available in Microsoft's page as well.
To turn off UAC
- Click Start, and then click Control
Panel.
- In Control Panel, click User
Accounts.
- In the User Accounts window, click User
Accounts.
- In the User Accounts tasks window,
click Turn User Account Control on or off.
- If UAC is currently configured in Admin Approval Mode,
the User Account Control message appears. Click Continue.
- Clear the Use User Account Control (UAC) to
help protect your computer check box, and then click OK.
- Click Restart Now to apply the change
right away, or click Restart Later, and then close the User
Accounts tasks window.
To disable
UAC from prompting for credentials to install applications
- Click Start, click All Programs,
click Accessories, click Run, type secpol.msc in
the Open text box, and then click OK.
- From the Local Security Settings console tree, click Local
Policies, and then click Security Options.
- Scroll down and double-click User Account
Control: Detect application installations and prompt for elevation.
- Select the Disabled option, and then
click OK.
- Close the Local Security Settings window.
To disable Admin
Approval Mode
- Click Start, click All Programs,
click Accessories, click Run, type secpol.msc in
the Open box, and then click OK.
- If the User Account Control dialog box
appears, confirm that the action it displays is what you want, and then
click Continue..
- From the Local Security Settings console tree,
double-click Local Policies, and then double-click Security
Options.
- Scroll down and double-click User Account
Control: Run all administrators in Admin Approval Mode.
- Select the Disabled option, and then
click OK.
- Close the Local Security Settings window.
To change the
elevation prompt behavior for administrators
- Click Start, click Accessories,
click Run, type secpol.msc in the Open box,
and then click OK.
- From the Local Security Settings console tree, click Local
Policies, and then click Security Options.
- Scroll down to and double-click User Account
Control: Behavior of the elevation prompt for administrators.
- From the drop-down menu, select one of the following
settings:
- Elevate without prompting (tasks that request elevation will automatically
run as elevated without prompting the administrator)
- Prompt for credentials (this setting requires user name and password
input before an application or task will run as elevated)
- Prompt for consent (default setting for administrators)
- Click OK.
- Close the Local Security Settings window.
To change the
elevation prompt behavior for standard users
- Click Start, click Accessories,
click Run, type secpol.msc in the Open box,
and then click OK.
- From the Local Security Settings console tree, click Local
Policies, and then Security Options.
- Scroll down to and double-click User Account Control:
Behavior of the elevation prompt for standard users.
- From the drop-down menu, select one of the following
settings:
- Automatically deny elevation requests (standard users will not be able to run programs
that require elevation, and they will not be prompted)
- Prompt for credentials (this setting requires user name and password
input before an application or task will run as elevated, and it is the
default for standard users)
- Click OK.
- Close the Local Security Settings window.
No comments:
Post a Comment