SOP of Transferring PecStar Database October 2013.

Slides:



Advertisements
Similar presentations
Using CD-R and CD-RW media to backup SIGNZ data. Step One … a bit of preparation.
Advertisements

Microsoft Office 2010 Access Chapter 1 Creating and Using a Database.
Site Production Installation. Navigate to location of the install package Important – Launch the e-ISuite Installer using your agency’s install protocol.
Microsoft Office 2007 Access Chapter 2 Querying a Database.
1 After completing this lesson, you will be able to: Start Outlook. Navigate within Outlook. Use the Outlook Bar. Use the Folder List. Use the Office Assistant.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Lesson 19 – ADMINISTERING WINDOWS 2000 SERVER : THE BASICS.
Site Training Installation. Navigate to location of the install package Important – Launch the e-ISuite Installer using your agency’s install protocol.
Performing Software Installation with Group Policy
File sharing. Connect the two win 7 systems with LAN card Open the network.
Ch 9 Managing Active Directory User Accounts. Objectives Create Organizational Unit Creating User Accounts in Active Directory Disabling, Enabling, and.
Configuring Active Directory Certificate Services Lesson 13.
Ch 8-3 Working with domains and Active Directory.
Leading at Every Turn. 1)Make sure you have your Trusted Sites configured properly in Internet Explorer 2)Store your credentials on your PC so you.
1 After completing this lesson, you will be able to: View and open folders. Open, edit, and save files. Print files. Sort files. (continued)
Chapter 3 Maintaining a Database
Microsoft Office 2007 Access 2007 Chapter 9 Administering a Database System.
Verify your data entry You could use data types and field properties for adding any validation on your date: EX: Data type: number : allow the user to.
1/28/2010 Network Plus Windows Networking Network Identification Identifies name and type of network. Installed adapters –Performed during Windows installation.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
Site Training Installation. Navigate to location of the install package Important – Launch the e-ISuite Installer using your agency’s install protocol.
Presented by Vishy Grandhi.  Lesson 1: Role based security  Lesson 2: Setup new user  Recipes.
USER SETUP. 2 This guide will show you how to add a new user or edit an existing one with Mifos X System How to add new user or edit an existing one?
Upgrade Process. GL Adjustments Create Backup Restore from a Backup Download & Install.
BY PRIYA M ROBOHELP HTML. INTRODUCTION RoboHELP is a program designed to assist the user in writing help files, including Windows help files (Win HELP)
Macromedia Dreamweaver 8-- Illustrated Introductory 1 Macromedia Dreamweaver 8 Unit B Creating a Web Site.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
How to Take Full Control of the ArrayTools and R Folder You need to have Full Control of the ArrayTools and R installation folders to run BRB-ArrayTools.
Microsoft Outlook 2010 Chapter 3 Managing Contacts and Personal Contact Information with Outlook.
1 Part-1 Chap 5 Configuring Accounts Definitions.
Dr. Gina Green Class Setup.
® Microsoft Access 2010 Tutorial 12 Managing and Securing a Database.
Tour Overview Introduction Collage Basics Collage Basics (Templates and Tools) Computer Configuration Bookmark Collage Getting Started Tour Collage Terminology.
What is Web Site Administration Tool ? WAT Allow you to Configure Web Site With Simple Interface –Manage Users –Manage Roles –Manage Access Rules.
1 Configuring Hardware on a Computer Running Windows XP Professional.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
FrontPage Tutorial Part 2 Creating a Course Web Site.
Site Training Installation. Navigate to location of the install package Important – Launch the e-ISuite Installer using your agency’s install protocol.
Security Planning and Administrative Delegation Lesson 6.
Working with Disks Lesson 4. Skills Matrix Technology SkillObjective DomainObjective # Configuring Data Protection Configure data protection6.4 Using.
Ch. 101 Database Management An Introduction to Databases.
Installing MySQL BCIS 3680 Enterprise Programming.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 7 1 Microsoft Office FrontPage 2003 Tutorial 8 – Integrating a Database with a FrontPage.
Module 8: Managing Software Distribution. Collections Packages Programs Advertisements Collections Packages Programs Advertisements How Software.
Pasewark & Pasewark Microsoft Office 2003: Introductory 1 INTRODUCTORY MICROSOFT EXCEL Lesson 7 – Working with Multiple Worksheets.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Managing File Resource Using File Server Resource Manager Chapter 9 Advance Computer Network Lecture Sorn Pisey
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
…the basics…. Wildland Fire Information and Technology Server Requirements ● Windows 7 Professional or Windows 2003/2008 Server ● Windows 8/10 (discussion)
Usage of Windows MMC To Change Root SSL Certificate Properties in e-Payment User Clients(PC)
IOAP Setup and Maintenance of Assessment Laptop. Introduction In order to have smooth functioning of laptops during ion assessments, a few setup activities.
Page 1 Cash Application By MIS Department. Page 2 Enter your User ID and Password here Note: User ID and Password are initially assigned by MIS. You will.
Associate ® Administration An Associate administrator has the ability to change the parameters for both the author and for the typist. There can be enterprise.
3 Copyright © 2006, Oracle. All rights reserved. Building an Analytic Workspace.
Acess Test Questions. Chapter 1 (Lynda.com) Question 1 An access database uses five main components (database objects). Which is not one of them? Tables.
Installation.  System Requirement : Win2k Server / Win2k Professional / WinXP Win2k Server / Win2k Professional / WinXP Database (Microsoft Access) Database.
Labcheck Next Generation Quick Start Guide Admin Basics.
CombScan Quick Help Guide This guide will show you the basics essentials to get you started with CombScan Detailed information on setup and operation.
Create Database Tables Lesson 2. Software Orientation.
SOP for Configuring Auto-mail Alarm October 2013.
SOP of the Third-party Devices Configuration
Presented by [Harshit Agrawal] 03/02/2017
Proxies Granting proxy authorization enables another provider to access your Inbox Documents and handle them for you. Your proxy can review, sign, refuse,
PecConfig March 17th, 2015 Cathy Ding
How to Change Y-axis of Trending Curve
SOP of Configuring Auto-mail Alarm
SOP of System Security Settings
SOP of Reset Maximum Demand
How To Password Protect A PDF Free With or Without Acrobat.
Presentation transcript:

SOP of Transferring PecStar Database October 2013

Step 1. Backup the database 1) Start DatabaseManager.exe under the \Common folder, click Backup on the left-pane, check the Configurations and Data database, and then click Backup.

2) Enter the User Name and Password and click OK. The default user name is ROOT, and the password is null. 3) When the process is completed, click Close. Then quit DatabaseManager. Step 1. Backup the database

4) Close the DatabaseManager. Step 2. Add a Role

2) The Role Properties Edit window appears, enter the Role Name. Navigate to the Authority Definition tab, select the authorities required for this role. Step 2. Add a Role For example: Role Name: Admin Enable all authorities

3) Navigate to the Node Range tab, Click Add Node. Step 2. Add a Role 4) The Select Accessible Nodes window appears. Click on the Station Setup node, and select the Station the role is permitted to access on the right pane. Then click OK.

Step 2. Add a Role 6) Click Add Node and the Select Accessible Nodes window appears. Click on the Report Repository node, and select the Report the role is permitted to access on the right pane. Then click OK. 5) Click Add Node and the Select Accessible Nodes window appears. Click on the Graph Repository node, and select the Graph the role is permitted to access on the right pane. Then click OK.

Step 2. Add a Role 7) After the Node Range is defined, click OK.

Step 3. Add a User Group 1) Right-click on User Group Definition, select New… from the pop-up menu.

Step 3. Add a User Group 2) The User Group Properties window appears. Enter the User Group name. Navigate to User Define tab, click Add User. For example: User Group: SMART

Step 3. Add a User Group 3) The Select User window appears. Select the User Group and then click OK. The user is added to the user group, as below.

Step 3. Add a User Group 3) The Select User window appears. Select the User Group and then click OK. The user is added to the user group, as below.

Step 3. Add a User Group 3) The Select User window appears. Select the User Group and then click OK. The user is added to the user group, as below.

Step 3. Add a User Group 3) The Select User window appears. Select the User Group and then click OK. The user is added to the user group, as below.

Step 3. Add a User Group 3) The Select User window appears. Select the User Group and then click OK. The user is added to the user group, as below.

Step 3. Add a User Group 3) The Select User window appears. Select the User Group and then click OK. The user is added to the user group, as below.

Step 3. Add a User Group 3) The Select User window appears. Select the User Group and then click OK. The user is added to the user group, as below.

Step 3. Add a User Group 4) Navigate to Role Definition tab, click Add User.. The user is added to the user group, as below.

2. Add a Role: Double-click System Security to expand it, right-click on User Definition, select New… from the pop-up menu. Enter the User Name and Password and click OK.

2. Add a Role: Double-click System Security to expand it, right-click on User Definition, select New… from the pop-up menu. Enter the User Name and Password and click OK.

2. Add a Role: Double-click System Security to expand it, right-click on User Definition, select New… from the pop-up menu. Enter the User Name and Password and click OK.

2. Add a Role: Double-click System Security to expand it, right-click on User Definition, select New… from the pop-up menu. Enter the User Name and Password and click OK.

2. Add a Role: Double-click System Security to expand it, right-click on User Definition, select New… from the pop-up menu. Enter the User Name and Password and click OK.

Thank you !!!