Manual User Authentication Tool
Manual User Authentication Tool
Manual User Authentication Tool
SHIMADZU CORPORATION
ANALYTICAL & MEASURING INSTRUMENTS DIVISION
KYOTO, JAPAN
Before Using the Shimadzu User Authentication Tool
Thank you for purchasing CLASS-Agent Software. Before using this software, please read this manual
carefully to get the most out of your software.
This instruction manual describes how to use and operate CLASS-Agent Manager. It assumes that you
should be familiar with some features in Windows you should have some hands-on experience with
the mouse and keyboard.
In this instruction manual, basic terminology used in Windows are used to explain about how to do
anything in CLASS-Agent Software. For definitions of unfamiliar words, please refer to the Windows
manual.
If you are a first-time user of Windows, please read the Windows manual before reading this instruc-
tion manual.
Handling Precautions
1. This Software is and remains the proprietary property of Shimadzu Corporation.
2. No part of this Software may be copied or reproduced in any form or by any means, except for in-
stallation and routine backup. No part of this Software may be leased, assigned, transferred, re-
compiled or altered in any form or by any means.
3. Shimadzu Corporation shall not be liable to the purchaser or any other person for any loss or dam-
age arising out of the use or operation of this Software.
Contents
Preface
About The Shimadzu User Authentication Tool
About the Instruction Manual
Warning Signs
The names of data processing software and equipment are expressed in the form of generic
names. Model names and type names are indicated as may be deemed necessary to identify any
software or equipment.
As used in this instruction manual, this software package is referred to as “CLASS-Agent Soft-
ware” where appropriate.
Warning Signs
The following warning signs are used throughout this instruction manual.
[CAUTION] indicates a potentially hazardous situation where, if not avoided, any damage to
property may be caused.
1.1 Outline
The Shimadzu User Authentication Tool can easily control and attest users in analytical appli-
cations.
1. The tool realizes the User Authentication security by the login/logout processing using the
login ID and the password. In addition, the tool can set in details the password length, the
validity, etc. for each personal computer and each user.
2. The tool controls the user information (such as the name, the section and the address)
based on the database. Because the tool can be connected to the rigid database such as the
SQL Server/MSDE, it can realize easily the security at high level.
3. Because the tool is equipped with the advanced audit trail function, the system administra-
tor can trace the information on each user.
4. Network function
Because the tool corresponds to the LAN consisting of client and server, the information
related to the user login can be unitarily controlled in the server.
1-1
1 Installation Procedures
Procedure
1) Gather a CD-ROM disk for CLASS-Agent Software. Then insert the CD-ROM disk into
your CD-ROM drive.
2) With the CD-ROM disk inserted, the installation wizard appears as shown below. A screen
may change with versions.
[NOTE] If the installation wizard does not automatically start, or to restart the installation
wizard, use the "Run" command in Windows 2000/XP/Vista/7 as follows.
Choose [Start] [Run] to open the "Run" dialog box. Click the [Browse] button
and choose a SETUP.EXE program from the root folder on the CD-ROM. Then
click the OK button to run the setup program.
( If it is the case of Windows Vista or Windows 7, you can select “Start of search”,
too )
[NOTE] When using the user authentication database of the MS-Access form and using a
limitation Windows user, it makes the user authentication database move to another
folder and it must be used under windows XP SP3.
(‘Change Server’ by the ‘user authentication tool’)
1-2
1 Installation Procedures
2) After you have specified which component to install, the installation program for the se-
lected component starts up. In the installation wizard, click on the [Next] button to proceed
as instructed on-screen.
1-3
1 Installation Procedures
4) If you click on the [Next] button, the next wizard screen appears to start the installation
process.
1-4
1 Installation Procedures
5) And then, the next wizard screen appears. Click [OK] button at the first installation.
When re-installation or ActiveX Data Objects (ADO) has been already installed
by installation of the Microsoft Office, click [No] button.
- About re-installation -
6) You will see a message indicating that the installation was completed successfully. Then
click on the [Finish] button.
Install the application software “Class-Agent” consecutively. For the installation method,
refer to the “CLASS-Agent Software Installation Manual (223-10286)”.
1-5
1 Installation Procedures
2) Password
You can use decimal numerals, alphanumeric characters and Non-alphanumeric charac-
ters (such as !, $, #, %).
And Upper case letters (A to Z) and Lower case letters (a to z) are distinguished between
in all databases.
1-6
2. Shimadzu User Authentication Tool
2.1 Shimadzu User Authentication Tool··············································· 2-1
2.1.1 Running the Program ··································································· 2-1
2.1.2 Main Screen ··············································································· 2-2
2.1.3 Configuration ·············································································· 2-3
2.1.4 Changing the Server ···································································2-11
2.1.5 Releasing PC Lockout ·································································2-13
2.1.6 Creating a New User Authentication Database··································2-15
2.1.7 Viewing the Event Log ·································································2-22
2.1.8 Viewing the User List···································································2-27
2.1.9 Releasing User Lockout ·······························································2-29
2.1.10 Exiting······················································································2-30
2. Shimadzu User Authentication Tool
1) On the desktop [start] menu, point to [Settings] and select [Control Panel].
Double-click here.
[NOTE] No administrator password is set immediately after the installation. The system
administrator must set this password.
2-1
2. Shimadzu User Authentication Tool
The figure below shows the main screen of the Shimadzu User Authentication Tool. Run the
various functions from this screen.
Main Screen
2-2
2. Shimadzu User Authentication Tool
2.1.3 Configuration
Enter the "Login ID" and "Password" and click the [OK] button to display the <Configuration
for user attestation server> screen. Click the [Cancel] button to cancel the login.
This screen sets the Shimadzu User Authentication Tool configuration. The
screen offers five tab screens: "Password," "Lockout," "E-mail 通知", "Alert
Message," and "Description." Clicking the [Default] button in the "Password" or
"Lockout" tab screen sets the recommended security values.
If the User Authentication Tool is shared by two or more Shimadzu applications,
the setting changes are applied to all the applications.
1) [Help] button
Click the [Help] button to display the <Help> screen.
2) [Print] button
Click the [Print] button to print the Shimadzu User Authentication Tool
settings.
3) [OK] button
Click the [OK] button to apply the changed set values.
4) [Cancel] button
Click the [Cancel] button to exit the <Configuration for user attestation
server> screen.
2-3
2. Shimadzu User Authentication Tool
[NOTE] When the minimum password length setting is changed, the setting becomes effective
the next time the password is changed.
2-4
2. Shimadzu User Authentication Tool
2-5
2. Shimadzu User Authentication Tool
[NOTE] Unlimited lockout is not applied to the system administrator (for Agent, the user with
administrator rights). The lockout is applied according to the set lockout duration and
number of login failures.
2-6
2. Shimadzu User Authentication Tool
[NOTE] Only ASCII-code characters are permitted in the mail addresses, user lockout message,
PC lockout message, and the Subject and From fields.
1) メールアドレス
Set the email addresses to receive the messages. The same message will
be sent to all of the mail addresses set here.
The grid to enter the mail address is a combo box that allows any mail
address registered in the Shimadzu User Authentication Tool to be
selected. Of course, mail addresses to receive the messages can be
entered directly.
2) ユーザーロックアウトメッセージ
Enter the message to be sent when a user lockout occurs. If the characters
"&U" are entered in the message, they are replaced by the name of the
user who failed to log in.
2-7
2. Shimadzu User Authentication Tool
3) PC ロックアウトメッセージ
Enter the message to be sent when a PC lockout occurs.
4) 詳細設定
Make SMTP server settings and other settings.
5) SMTP
Set the SMTP server name or IP address that manages the mail
transmissions.
6) ポート
Set the port number enabled for the SMTP server. Normally, an SMTP
server uses port 25. However, if a different port number is specified for
your SMTP server, consult your system administrator and set the
appropriate number.
7) 表題
Set the subject of the sent emails.
8) From
Set the From address of the sent emails.
2-8
2. Shimadzu User Authentication Tool
2-9
2. Shimadzu User Authentication Tool
1) Description
Enter the comment in this box. Up to 255 characters can be entered.
2-10
2. Shimadzu User Authentication Tool
Click the [Change Server] button to display the <Login check> screen.
Enter the "Login ID" and "Password" and click the [OK] button to display the <Change
server> screen. Click the [Cancel] button to cancel the login.
2-11
2. Shimadzu User Authentication Tool
[NOTE]
For MS-Access format, a WindowsNT/2000/XP restricted login user has no
access rights to the Windows system folder. It is necessary to log in with
administrator rights to change this setting.
5) Network library
Select the network library from the dropdown list.
"Named pipe" Select this library when the User Authentication Tool is
set up under MS Windows NT, and NetBEUI is used as
the network protocol. When selecting this library, the
user account must be set in Windows NT.
"TCP/IP" Select this library when the User Authentication Tool is
set up under MS Windows NT or Windows 98 (MSDE
only), and TCP/IP is used as the network protocol.
"Multi protocol" Select this library when two or more servers are using
different network protocols. When this library is
selected, the first available network protocol is
automatically selected to establish connection.
Click the [OK] button to change the server. Click the [Cancel] button to
cancel changing the server.
(For a detailed explanation of network libraries, refer to the manuals of
Microsoft SQL Server, Acesss2000, etc.)
2-12
2. Shimadzu User Authentication Tool
Click the [Release Lockout PCs] button to release the lockout status of all PCs detected to
have attempted to make an illegal access to the Shimadzu User Authentication Tool.
The <Login check> screen is displayed after the [Release Lockout PCs] button is clicked.
Enter the "Login ID" and "Password" and click the [OK] button to display the <Release
lockout PCs> screen. Click the [Cancel] button to cancel the login.
2-13
2. Shimadzu User Authentication Tool
Select the computers to be unlocked and click the [Release] button to enable
login to the selected computers.
The following message appears and the screen closed when all the locked-out
PCs are released.
The same message appears if the [Release Lockout PCs] button is clicked when
no locked-out computer exists.
2-14
2. Shimadzu User Authentication Tool
Click the [Create New] button to display the <Login check> screen.
A new user information database can be created. Before creating the database, connect the
computer over a LAN to a computer where SQL Server (MSDE) or Oracle is set up.
Enter the "Login ID" and "Password" and click the [OK] button to display the <Create
Database> screen. Click the [Cancel] button to cancel the login.
Select the type of user authentication database to create and click the [OK]
button. Click the [Cancel] button to cancel selection of the user authentication
database.
[NOTE] A new user information database can be created. If SQL Server or MSDE is used as the
user authentication database, before creating the database, connect the computer over
a LAN to a computer where SQL Server or MSDE is set up. If Oracle is used as the user
authentication database, Oracle must be installed in the computer where the new
database is to be created.
2-15
2. Shimadzu User Authentication Tool
If "SQL server (MSDE)" is selected in the <Create Database> screen and the
[OK] button clicked, the <MSDE (SQL Server) login properties> screen is
displayed.
1) Server name
Enter the server name (PC name) where the SQL Server/MSDE exists.
Enter "(local)" to create the database in this computer.
2) Login-ID
Enter the login ID of the system administrator ("sa") of the server where the
SQL Server/MSDE exists or a login ID with equivalent rights.
3) Password
Enter the password of the system administrator.
4) Network library
Select the network library from the dropdown list. For details about the
setting method, see 5) in 2.1.4.1 Changing the Server.
5) [Next] button
Click the [Next] button to proceed to the next screen.
6) [Cancel] button
Click the [Cancel] button to cancel creation of the new Shimadzu User
Authentication Tool.
7) [Help] button
Click the [Help] button to display the <Help> screen.
2-16
2. Shimadzu User Authentication Tool
1) User-ID
Create the system administrator referred to by Shimadzu applications
when the User Authentication Tool was created. The ID is fixed as "Admin."
2) Password
Set the password using letters and numbers. A minimum password length
of 6 characters is required in the ER/ES mode.
3) Password check
Enter the password again. Do not forget this password. It is required to run
Shimadzu applications.
4) [Back] button
Click the [Back] button to return to the <MSDE (SQL Server) login
properties> screen.
5) [Next] button
Click the [Next] button to proceed to the <Ready to create> screen.
6) [Cancel] button
Click the [Cancel] button to cancel creation of the new Shimadzu User
Authentication Tool.
7) [Help] button
Click the [Help] button to display the <Help> screen.
2-17
2. Shimadzu User Authentication Tool
1) [Back] button
Click the [Back] button to return to the <Create application's administrator>
screen.
2) [Create] button
Click the [Create] button to create the User Authentication Tool. An error
occurs if there is a problem with the network connection or if the SQL
Server (MSDE) is not running on the server computer. The status is
displayed on the screen.
3) [Cancel] button
Click the [Cancel] button to cancel creation of the new Shimadzu User
Authentication Tool.
4) [Help] button
Click the [Help] button to display the <Help> screen.
2-18
2. Shimadzu User Authentication Tool
If "Oracle" is selected in the <Create Database> screen and the [OK] button
clicked, the <Oracle DBA login information> screen is displayed.
1) Instance
Specify the instance of Oracle to create the user authentication database.
If two or more instances of Oracle exist in the computer, the user
authentication database is created using the instance specified in this
combo box.
2) System user
Specify the user with Oracle SYSDBA rights. This user is normally
SYSTEM.
3) Password
Set the password for the user specified at 2) above.
4) PC Name
Displays the currently set computer name. This cannot be changed.
5) [Next] button
Click the [Next] button to proceed to the next screen.
6) [Cancel] button
Click the [Cancel] button to cancel creation of the new Shimadzu User
Authentication Tool.
7) [Help] button
Click the [Help] button to display the <Help> screen.
2-19
2. Shimadzu User Authentication Tool
1) Admin user
Create the system administrator referred to by Shimadzu applications
when the User Authentication Tool was created. The ID is fixed as "Admin."
2) Password
Set the password using letters and numbers. A minimum password length
of 6 characters is required in the ER/ES mode.
3) Re-enter password
Enter the password again. Do not forget this password. It is required to run
Shimadzu applications.
4) [Back] button
Click the [Back] button to return to the <Oracle DBA login information>
screen.
5) [Next] button
Click the [Next] button to proceed to the <Completed> screen.
6) [Cancel] button
Click the [Cancel] button to cancel creation of the new Shimadzu User
Authentication Tool.
7) [Help] button
Click the [Help] button to display the <Help> screen.
2-20
2. Shimadzu User Authentication Tool
1) [Back] button
Click the [Back] button to return to the <Create application's administrator>
screen.
2) [Create] button
Click the [Create] button to create the User Authentication Tool. An error
occurs if the Oracle settings are incorrect or the instance is not running.
The status is displayed on the screen.
3) [Cancel] button
Click the [Cancel] button to cancel creation of the new Shimadzu User
Authentication Tool.
4) [Help] button
Click the [Help] button to display the <Help> screen.
2-21
2. Shimadzu User Authentication Tool
Click the [View event log] button to display the <Login check> screen.
Enter the "Login ID" and "Password" and click the [OK] button to display the <Event log>
screen. Click the [Cancel] button to cancel the login.
1) [Condition] button
Click the [Condition] button to set the extraction conditions.
2) [Copy] button
Click the [Copy] button to copy the event log data to the clipboard. As the data is
copied in csv format, it can be pasted in an editor as comma-delimited text.
3) [Print] button
Click the [Print] button to print out the event log list.
2-22
2. Shimadzu User Authentication Tool
4) [Font] button
Click the [Font] button to specify the font for the event log list.
5) [Exit] button
Click the [Exit] button to exit the <Event log> screen.
6) Displayed contents
Login date Date and time when the operation was performed
Computer name Name of the computer on which the operation was
performed
User ID ID of the user who performed the operation
User name Full name of the user who performed the operation
Operation Details of the operation
Configuration The configuration of the User Authentication Tool was
setting changed. (This operation is recorded only when the
program "Configuration" menu is executed.)
User Add A new Shimadzu application user was registered.
(Subsequently, user-related operations can be executed
and recorded by each Shimadzu application.)
User Edit Registered user information was changed.
User Del Registered user information was deleted.
User Restore Deleted user information was restored.
Result Status indicating whether the setting was made correctly
OK The setting was made correctly.
CAUTION No problem in the setting, but a problem occurred.
NG An error occurred, and the setting was not made.
Information Details of the operation performed on the User
Authentication Tool.
Software Name of the Shimadzu application that performed the
operation on the User Authentication Tool.
Description Comment entered by the user when the change was made.
2-23
2. Shimadzu User Authentication Tool
1) Period
Set the event log period of the data to be extracted.
The combo box operation is enabled when the checkbox is selected. A
calendar appears on the dropdown menu.
2) User
Select this item to display a specific user only. Enter the user ID of the data
to be extracted.
4) Result
Select the result of the data to be extracted as "OK," "CAUTION," or "NG."
2-24
2. Shimadzu User Authentication Tool
5) Operation
Select the result of the data to be extracted as "User Add," "User Edit," or
"User Del."
6) PC name
Enter the name of the computer in which the data to be extracted is
registered.
7) Software
Enter the software name (Shimadzu application name) of the data to be
extracted.
8) Information
Enter the details of the data to be extracted.
9) Description
Enter the comment in the data to be extracted.
2.1.7.2 Fonts
1) Font
Specify the font type.
2-25
2. Shimadzu User Authentication Tool
2) Font style
Specify the font style.
3) Size
Specify the font size.
4) Effects
Apply strikeout or underline.
5) Color
Specify the font color in the dropdown list.
6) Sample
Displays a preview of the font specified on this screen.
7) Script
"Japanese" is automatically displayed when a Japanese font is selected in
"Font." "Western" is automatically displayed when a Western font is
selected in "Font."
2-26
2. Shimadzu User Authentication Tool
Click the [View user list] button to display the <Login check> screen.
Enter the "Login ID" and "Password" and click the [OK] button to display the <User list>
screen. Click the [Cancel] button to cancel the login.
1) [Copy] button
Click the [Copy] button to copy the user list information to the clipboard. As the data is
copied in csv format, it can be pasted as comma-delimited text into an Excel
spreadsheet.
2-27
2. Shimadzu User Authentication Tool
2) [Print] button
Click the [Print] button to print out the user list.
3) [Font] button
Specify the font to display the user information.
Click the [Font] button to display the <Font> screen. For details, see 2.1.7.2 Fonts.
4) [Exit] button
Click the [Exit] button to exit the <User list> screen.
2-28
2. Shimadzu User Authentication Tool
Click the [Release Lockout users] button to release the lockout status of all users detected
to have attempted to make an illegal access to the Shimadzu User Authentication Tool.
The <Login check> screen is displayed after the [Release Lockout users] button is clicked.
Enter the "Login ID" and "Password" and click the [OK] button to display the <Release
lockout users> screen. Click the [Cancel] button to cancel the login.
2-29
2. Shimadzu User Authentication Tool
Select the user to be unlocked and click the [Release] button to enable login by
the selected users.
The following message appears and the screen closed when all the locked-out
users are released.
The same message appears if the [Release Lockout users] button is clicked
when no locked-out user exists.
2.1.10 Exiting
Click the [Exit] button to complete the Shimadzu User Authentication Tool settings.
2-30
Chapter 3 Network Shared Settings
3.1 Outline .....................................................................................................3-1
3.2 Installation of MSDE...............................................................................3-2
3.3 Setup (MSDE/SQL Server) .....................................................................3-7
3.4 Setup (Oracle)........................................................................................3-11
3.5 Setting the Oracle Client PC..................................................................3-14
3 Network Shared Settings
3.1 Outline
This chapter explains The Shimadzu User Authentication Tool while picking up a setting ex-
ample in which the tool is shared in the LAN. In order to share the tool in the LAN, one per-
sonal computer which acts as the database server is required. As the server database, the SQL
Server or the MSDE or the Oracle is required.
The MSDE is the database engine of the SQL Server offered by Microsoft free of charge. It is
customized for small-scale database systems.
Because each client personal computer refers to the database of the user authentication existing
in the server, the information can be unitarily controlled.
Ethernet
3-1
3 Network Shared Settings
Procedure
1) At first, insert the CD-ROM of the CLASS Agent software into the CD-ROM drive, and
install the MSDE.
2) In several seconds after the CD-ROM is inserted into the CD-ROM drive, the following
logo is automatically displayed.
[NOTE] If the logo shown in 2) is not displayed in automatic startup or if the Windows is
started up again, select <RUN(R)> from the [Start] button of the MS-Windows
95/98/NT.
When the <RUN> dialog box is displayed, select and enter “setup.exe” from the
route folder in the CD-ROM using the [Browse] button, then click the [OK] button.
3-2
3 Network Shared Settings
2) Confirm the folder in the temporary area used to install the MSDE.
Specify the hard disk having free space of 150 MB or more, then click the [Continue] but-
ton.
3-3
3 Network Shared Settings
3) When the package is selected, preparation for setup starts. After a while, the following
screen is displayed.
Click the [Next] button on the screen in turn.
Next Button
3-4
3 Network Shared Settings
5) Click the [Next] button to display the following screen and start installation.
Installation will be finished in 15 to 60 minutes depending on the hardware configuration.
Wait until the message for restart is displayed.
3-5
3 Network Shared Settings
After restart, when the contents shown below are displayed on the task bar, the installation
is completed.
3-6
3 Network Shared Settings
3-7
3 Network Shared Settings
3) Enter the name (or IP address) of the current computer to “Server name”, and click the
[Next] button.
The server personal computer name is displayed on the “Network and Dial-up Connec-
tions” identification tab of “Control Panel”.
3-8
3 Network Shared Settings
Though a warning is displayed because the system administrator’s password is not set, ig-
nore the warning and continue the setting.
Now, the database for user authentication is created in the server personal computer.
Next, in the client personal computer, perform the setting to connect the server personal
computer.
3-9
3 Network Shared Settings
2) Enter the name (or IP address) of the server personal computer to “Server name”, then
click the [OK] button.
3) When the message shown below is displayed, the setting of the client is completed.
After that, the user information is unitarily controlled by the server personal computer.
3-10
3 Network Shared Settings
3-11
3 Network Shared Settings
3) Enter the Instance (SID name) of the oracle database, enter the System User (“SYSTEM”)
of the oracle DBA User and password.
Click the [Next] button.
Though a warning is displayed because the system administrator’s password is not set,
ignore the warning and continue the setting.
3-12
3 Network Shared Settings
Now, the database for user authentication is created in the server personal computer.
Next, in the client personal computer, perform the setting to connect the server personal
computer.
3-13
3 Network Shared Settings
“Local net service name” is a setting file with a server name or the information on an instance
(global database name), in order to connect with a server's database.
Usually, it sets up by "Net Configuration Assistant" of the client program of Oracle. “Local net
service name” may be abbreviated to a “net service name” or a “service name”.
Preparation
1. Restart MS-Windows, when MS-Windows is not immediately after starting.
2. Login by “administrator”.
3. Terminate a virus check or permanent residence programs.
Procedure
1. Starting up the setup program.
Double-click “(CD-ROM Drive):\Setup.exe” from the Explorer to start up the
setup program. And click “Install/Deinstall Products” button.
3-14
3 Network Shared Settings
3. Set the installation path of the program. At this time, choose the drive on the server
with the greatest amount of free space. Click the [Next] button.
3-15
3 Network Shared Settings
3-16
3 Network Shared Settings
6. The summary screen is displayed. If the display contents are correct, click the [In-
stall] button.
3-17
3 Network Shared Settings
8. After a while, the next screen is displayed. Since this setting is performed later,
click [Cancel] button.
9. Click “Net8 Configuration Assistant” and click “Stop” button. “Error” dialog is
displayed, and click [OK] button.
After that, bellow screen is displayed.
Click [Next] button.
3-18
3 Network Shared Settings
3-19
3 Network Shared Settings
Preparation
1. Restart MS-Windows, when MS-Windows is not immediately after starting.
2. Login by “administrator”.
3. Terminate a virus check or permanent residence programs.
Procedure
1. Starting up the setup program.
Double-click “(CD-ROM Drive):\Setup.exe” from the Explorer to start up the
setup program. And click “Install/Deinstall Products” button.
3-20
3 Network Shared Settings
3. Set the installation path of the program. At this time, choose the drive on the
server with the greatest amount of free space. Click the [Next] button.
3-21
3 Network Shared Settings
3-22
3 Network Shared Settings
After that, click [Yes] button in the confirmation dialog of "Oracle Net Configu-
ration Assistant" cancellation.
3-23
3 Network Shared Settings
10. Click [Exit] button in the “Configuration Tools” dialog. Confirmation dialog of
exit appears, and click [Yes] button.
3-24
3 Network Shared Settings
3-25
3 Network Shared Settings
3. In the case of Oracle8i, choose "Oracle8 release 8.0 or Oracle7 database or Ser-
vice". In the case of Oracle 9i choose " Oracle8i or later database or service". And
click the [Next] button.
4. Set Instance name as service name (Oracle9i) or SID (Oracle8i) set. Click the
[Next] button.
5. Set the network protocol used to connect databases. In this example, “TCP” is
used. Click the [Next] button.
3-26
3 Network Shared Settings
6. Set the host name that will execute the database service. If the settings of the Ora-
cle are not changed, it is not necessary to change the port No. Click the [Next] but-
ton.
7. To confirm whether the settings are successfully executed, test the service.
Choose the " Yes, perform a test", and click the [Next] button.
8. At first, connection fails. Click the [Change Login] button, and set up a user ac-
count.
3-27
3 Network Shared Settings
9. A user name is [scott] at first. Change “username” and “Password” which were
created by DBA user. In this example, set “system”, and Password.
10. Perform the test again, and confirm that connection is established.
After connection is established, click the [Next] button to close the test screen.
If an error occurs, the settings are incorrect. Check and modify the settings.
11. The Net Service Name wizard starts. In this example, the Net Service Name is
[smzatst].
3-28
3 Network Shared Settings
14. Click the [Finish] button to finish the [Net Configuration Assistant].
When client PC has not participated in the domain (Active Directory) of
MS-Windows, an additional setup of local net service is completion above.
When client PC has participated in the domain, please move on to step15.
3-29
3 Network Shared Settings
3-30
3 Network Shared Settings
17. Please click the list box of network service and search the Local Net Service
Name created by step11. In the case of the client which has participated in the
domain of MS-Windows, “.(domain name)” is added behind the Net Service
Name. (In the case of the following figure, ".LOCAL" is a domain name.)
The name containing this domain name corresponds to Local Net Service Name.
A domain name is not added in the list of the client PC that has not participated
in a domain.
An addition of local net service is completion. Please click a [Cancel] button and [Fin-
ish] button to end “Net Configuration Assistant”.
3-31
3 Network Shared Settings
1) Click the [Change Server] button to display the <Change server> screen and login.
2) Enter the Net Service Name (“smzatst”) of oracle, and then click the [OK] button.
3) When the message shown below is displayed, the setting of the client is completed.
After that, the user information is unitarily controlled by the server personal computer.
3-32