Use of the Web Console or MOM Adminsitrator console may generate several COM+ warnings (300310)
The information in this article applies to:
- Microsoft Operations Manager 2000
This article was previously published under Q300310 SYMPTOMS
A user who is only a member of the Microsoft Operations Manager (MOM) OnePointOp Users group may generate 23 or more COM+ warnings in the Application Event log on the MOM server. This symptom occurs when the user tries to connect by using the MOM Web Console or MOM Administrator console. CAUSE
MOM makes COM+ calls to identify the security level of the user before proceeding to set up the user interface. This behavior is expected and does not indicate a problem.
The following warning messages may appear in the Application Event logs on the MOM server:
Event Type: Warning
Event Source: COM+
Event Category: Security
Event ID: 4098
Date: 4/27/2001
Time: 11:29:03 AM
User: N/A
Computer: COMP1
Description:
A method call to an object in a COM+ application was rejected because the caller is not properly authorized to make this call. The COM+ application is configured to use Application and Component level access checks, and enforcement of these checks is currently enabled. The remainder of this message provides information about the component method that the caller attempted to invoke and the identity of the caller.
Destination of the rejected call:
Application Id: {6F83CBFA-CD3D-493B-9A22-302C4AA1E035}
CLSID: {7623E890-5680-11D3-A463-00A0C9AFE040}
IID: {0F23F910-598D-11D3-A464-00A0C9AFE040}
Method #: 7
Class: DasServer.DasRoleSecurity.1
Interface: IdasRoleSecurity_KnowledgeAuthor
Method: CheckKnowledgeAuthor
Caller Information:
Svc/Lvl/Imp = 10/6/2, Identity = testdom\momlab
or
Event Type: Warning
Event Source: COM+
Event Category: Security
Event ID: 4098
Date: 4/27/2001
Time: 11:29:03 AM
User: N/A
Computer: TestUser
Description:
A method call to an object in a COM+ application was rejected because the caller is not properly authorized to make this call. The COM+ application is configured to use Application and Component level access checks, and enforcement of these checks is currently enabled. The remainder of this message provides information about the component method that the caller attempted to invoke and the identity of the caller.
Destination of the rejected call:
Application Id: {6F83CBFA-CD3D-493B-9A22-302C4AA1E035}
CLSID: {7623E890-5680-11D3-A463-00A0C9AFE040}
IID: {7623E893-5680-11D3-A463-00A0C9AFE040}
Method #: 7
Class: DasServer.DasRoleSecurity.1
Interface: IdasRoleSecurity_Operator
Method: CheckOperator
Caller Information:
Svc/Lvl/Imp = 10/6/2, Identity = testdom\momlab
WORKAROUNDTo work around this behavior, follow these steps: - On the DCAM, click Start, point to Programs, point to Administrative Tools, and then click Component Services.
- In the Component Services console, expand Components Services, expand Computers, expand My computer, expand COM+ , expand Applications, expand OnePointActiveOpsDas, expand Components, and then expand DasServer.DasRoleSecurity.1.
- Right-click DasServer.DasRoleSecurity.1, click Properties, and then click the Security tab.
- Click to select the EeaUser check box.
STATUS
This behavior is by design.
Modification Type: | Minor | Last Reviewed: | 6/13/2005 |
---|
Keywords: | kbinfo kbnofix kbpolicy kbui KB300310 |
---|
|