Use of the Web Console or MOM Adminsitrator console may generate several COM+ warnings (300310)



The information in this article applies to:

  • Microsoft Operations Manager 2000

This article was previously published under Q300310

SYMPTOMS

A user who is only a member of the Microsoft Operations Manager (MOM) OnePointOp Users group may generate 23 or more COM+ warnings in the Application Event log on the MOM server. This symptom occurs when the user tries to connect by using the MOM Web Console or MOM Administrator console.

CAUSE

MOM makes COM+ calls to identify the security level of the user before proceeding to set up the user interface. This behavior is expected and does not indicate a problem.

The following warning messages may appear in the Application Event logs on the MOM server:
Event Type: Warning
Event Source: COM+
Event Category: Security
Event ID: 4098
Date: 4/27/2001
Time: 11:29:03 AM
User: N/A
Computer: COMP1
Description:
A method call to an object in a COM+ application was rejected because the caller is not properly authorized to make this call. The COM+ application is configured to use Application and Component level access checks, and enforcement of these checks is currently enabled. The remainder of this message provides information about the component method that the caller attempted to invoke and the identity of the caller.

Destination of the rejected call:
Application Id: {6F83CBFA-CD3D-493B-9A22-302C4AA1E035}
CLSID: {7623E890-5680-11D3-A463-00A0C9AFE040}
IID: {0F23F910-598D-11D3-A464-00A0C9AFE040}
Method #: 7

Class: DasServer.DasRoleSecurity.1
Interface: IdasRoleSecurity_KnowledgeAuthor
Method: CheckKnowledgeAuthor

Caller Information:
Svc/Lvl/Imp = 10/6/2, Identity = testdom\momlab
or
Event Type: Warning
Event Source: COM+
Event Category: Security
Event ID: 4098
Date: 4/27/2001
Time: 11:29:03 AM
User: N/A
Computer: TestUser

Description:
A method call to an object in a COM+ application was rejected because the caller is not properly authorized to make this call. The COM+ application is configured to use Application and Component level access checks, and enforcement of these checks is currently enabled. The remainder of this message provides information about the component method that the caller attempted to invoke and the identity of the caller.

Destination of the rejected call:
Application Id: {6F83CBFA-CD3D-493B-9A22-302C4AA1E035}
CLSID: {7623E890-5680-11D3-A463-00A0C9AFE040}
IID: {7623E893-5680-11D3-A463-00A0C9AFE040}
Method #: 7

Class: DasServer.DasRoleSecurity.1
Interface: IdasRoleSecurity_Operator
Method: CheckOperator

Caller Information:
Svc/Lvl/Imp = 10/6/2, Identity = testdom\momlab

WORKAROUND

To work around this behavior, follow these steps:
  1. On the DCAM, click Start, point to Programs, point to Administrative Tools, and then click Component Services.
  2. In the Component Services console, expand Components Services, expand Computers, expand My computer, expand COM+ , expand Applications, expand OnePointActiveOpsDas, expand Components, and then expand DasServer.DasRoleSecurity.1.
  3. Right-click DasServer.DasRoleSecurity.1, click Properties, and then click the Security tab.
  4. Click to select the EeaUser check box.

STATUS

This behavior is by design.

Modification Type:MinorLast Reviewed:6/13/2005
Keywords:kbinfo kbnofix kbpolicy kbui KB300310