DBA Data[Home] [Help]

APPS.FND_USER_PKG dependencies on FND_WEB_SEC

Line 297: ret := fnd_web_sec.change_password(x_user_name,

293: -- change is being added for bug 2658982 and 1722166.
294: if (x_old_password is not null) then
295: -- Add fifth argument to not use autonomous transaction when chaning
296: -- passowrd. This is for bug 5087728
297: ret := fnd_web_sec.change_password(x_user_name,
298: x_old_password,
299: x_unencrypted_password,
300: x_unencrypted_password,
301: FALSE);

Line 307: ret := fnd_web_sec.change_password(x_user_name,

303: -- verifying the existing password
304: else
305: -- Add third argument to not use autonomous transaction when chaning
306: -- passowrd. This is for bug 5087728
307: ret := fnd_web_sec.change_password(x_user_name,
308: x_unencrypted_password, FALSE);
309: -- Bug 5355566/5840007 reset unsuccessful logins start date since
310: -- password is new and login with this password has not yet occurred.
311: if (x_last_logon_date is null) then

Line 383: x_unencrypted_password <> FND_WEB_SEC.EXTERNAL_PWD) then

379: begin
380: -- 5235329, 5375111 Let ldap/oid know whether to expire password
381: -- But only if there is a new password.
382: if (x_unencrypted_password is not null and
383: x_unencrypted_password <> FND_WEB_SEC.EXTERNAL_PWD) then
384: begin
385: select fnd_ldap_wrapper.G_TRUE
386: into l_expire_pwd
387: from fnd_user

Line 521: -- bug 4047740 - as a byproduct of FND_WEB_SEC.set_reencrypted_password

517: if (pcrypt_pass is null) then
518: return;
519: end if;
520:
521: -- bug 4047740 - as a byproduct of FND_WEB_SEC.set_reencrypted_password
522: -- NOT calling change_password we need this check to complete the checks
523: -- below as in FND_WEB_SEC - also added update to both encrypted rows for
524: -- the fnd_user update below for completeness.
525: if(false = fnd_sso_manager.isPasswordChangeable(puser_name)) then

Line 523: -- below as in FND_WEB_SEC - also added update to both encrypted rows for

519: end if;
520:
521: -- bug 4047740 - as a byproduct of FND_WEB_SEC.set_reencrypted_password
522: -- NOT calling change_password we need this check to complete the checks
523: -- below as in FND_WEB_SEC - also added update to both encrypted rows for
524: -- the fnd_user update below for completeness.
525: if(false = fnd_sso_manager.isPasswordChangeable(puser_name)) then
526: encPwd := 'EXTERNAL';
527: else

Line 642: -- bug 4047740 changed dummy password from 'welcome' to new FND_WEB_SEC

638: DoPassword_update(X_USER_NAME, X_ENCRYPTED_USER_PASSWORD);
639: end if;
640: exception
641: when no_data_found then
642: -- bug 4047740 changed dummy password from 'welcome' to new FND_WEB_SEC
643: -- constant, requires AFSCJAVS.pls 115.27 and AFSCJAVB.pls 115.63
644: fnd_user_pkg.createuser(
645: X_USER_NAME,
646: X_OWNER, -- bug 7687370

Line 647: FND_WEB_SEC.INVALID_PWD,

643: -- constant, requires AFSCJAVS.pls 115.27 and AFSCJAVB.pls 115.63
644: fnd_user_pkg.createuser(
645: X_USER_NAME,
646: X_OWNER, -- bug 7687370
647: FND_WEB_SEC.INVALID_PWD,
648: to_number(X_SESSION_NUMBER),
649: to_date(X_START_DATE, 'YYYY/MM/DD'),
650: L_END_DATE,
651: L_LAST_LOGON_DATE,

Line 724: pwd := nvl( x_unencrypted_password, FND_WEB_SEC.EXTERNAL_PWD );

720: validate_user_name(x_user_name);
721:
722: /* bug 4351689 - allow the create functions to pass in null for
723: External password control*/
724: pwd := nvl( x_unencrypted_password, FND_WEB_SEC.EXTERNAL_PWD );
725:
726: SAVEPOINT create_user;
727:
728: ret := fnd_web_sec.create_user(x_user_name,pwd,user_id);

Line 728: ret := fnd_web_sec.create_user(x_user_name,pwd,user_id);

724: pwd := nvl( x_unencrypted_password, FND_WEB_SEC.EXTERNAL_PWD );
725:
726: SAVEPOINT create_user;
727:
728: ret := fnd_web_sec.create_user(x_user_name,pwd,user_id);
729:
730: if (ret = 'Y') then
731: -- Enhancement 5027812
732: if ((x_change_source is null or

Line 734: pwd <> fnd_web_sec.external_pwd) then

730: if (ret = 'Y') then
731: -- Enhancement 5027812
732: if ((x_change_source is null or
733: x_change_source <> fnd_user_pkg.CHANGE_SOURCE_OID) and
734: pwd <> fnd_web_sec.external_pwd) then
735: -- We need to translate the external constant to null. Otherwise
736: -- fnd_ldap_wrapper.create_user will use that constant as real password.
737: if (pwd = fnd_web_sec.external_pwd) then
738: pwd := '';

Line 737: if (pwd = fnd_web_sec.external_pwd) then

733: x_change_source <> fnd_user_pkg.CHANGE_SOURCE_OID) and
734: pwd <> fnd_web_sec.external_pwd) then
735: -- We need to translate the external constant to null. Otherwise
736: -- fnd_ldap_wrapper.create_user will use that constant as real password.
737: if (pwd = fnd_web_sec.external_pwd) then
738: pwd := '';
739: end if;
740:
741: -- Bug#4118749 - Create user in OID

Line 769: if (l_oid_pwd <> fnd_web_sec.external_pwd) then

765: x_fax, l_expire_pwd, l_user_guid, l_oid_pwd);
766: -- If wrapper gives back EXTERNAL password, we need to update
767: -- the user with external password. l_oid_pwd will be used later
768: -- in the UpdateUser call. setting to null means no change.
769: if (l_oid_pwd <> fnd_web_sec.external_pwd) then
770: l_oid_pwd := '';
771: end if;
772: -- End Bug 4318754, 4424225
773: exception

Line 861: else -- fnd_web_sec.create_user must have failed.

857: x_user_guid => l_user_guid,
858: x_change_source => fnd_user_pkg.change_source_oid);
859: end if;
860:
861: else -- fnd_web_sec.create_user must have failed.
862: -- The java layer puts message onto the message stack.
863: reason := fnd_message.get();
864: fnd_message.set_name('FND', 'FND_CREATE_USER_FAILED');
865: fnd_message.set_token('USER_NAME', X_USER_NAME);

Line 1465: return boolRet(fnd_web_sec.validate_login(username, password));

1461: --
1462: function ValidateLogin(username varchar2,
1463: password varchar2) return boolean is
1464: begin
1465: return boolRet(fnd_web_sec.validate_login(username, password));
1466: end ValidateLogin;
1467: ----------------------------------------------------------------------------
1468: --
1469: -- ChangePassword (PUBLIC)

Line 1483: return boolRet(fnd_web_sec.Change_Password(username, newpassword, FALSE));

1479: --
1480: function ChangePassword(username varchar2,
1481: newpassword varchar2) return boolean is
1482: begin
1483: return boolRet(fnd_web_sec.Change_Password(username, newpassword, FALSE));
1484: end;
1485: ----------------------------------------------------------------------------
1486: --
1487: -- ChangePassword (PUBLIC)

Line 1504: return boolRet(fnd_web_sec.Change_Password(username, oldpassword,

1500: oldpassword varchar2,
1501: newpassword varchar2) return boolean is
1502:
1503: begin
1504: return boolRet(fnd_web_sec.Change_Password(username, oldpassword,
1505: newpassword, newpassword, FALSE));
1506: end;
1507: ----------------------------------------------------------------------------
1508: --

Line 1527: return (fnd_web_sec.get_reencrypted_password(username, newkey));

1523: --
1524: function GetReEncryptedPassword(username varchar2,
1525: newkey varchar2) return varchar2 is
1526: begin
1527: return (fnd_web_sec.get_reencrypted_password(username, newkey));
1528: end;
1529:
1530: ----------------------------------------------------------------------------
1531: -- SetReEncryptedPassword (PUBLIC)

Line 1552: return boolRet(fnd_web_sec.set_reencrypted_password(username,reencpwd,newkey));

1548: function SetReEncryptedPassword(username varchar2,
1549: reencpwd varchar2,
1550: newkey varchar2) return boolean is
1551: begin
1552: return boolRet(fnd_web_sec.set_reencrypted_password(username,reencpwd,newkey));
1553: end;
1554: ----------------------------------------------------------------------------
1555: -- MergeCustomer (PUBLIC)
1556: -- This is the procedure being called during the Party Merge.

Line 3175: -- FND_WEB_SEC.change_password having an autonomous transaction pragma.

3171: update fnd_user set user_name = upper(x_new_user_name)
3172: where user_name = upper(x_old_user_name);
3173:
3174: -- This code was moved before updating FND_USER due to a change in
3175: -- FND_WEB_SEC.change_password having an autonomous transaction pragma.
3176: -- Password changes failed due to said change. See bug 2426407.
3177: -- handle password encryption with new username
3178: tmpbuf := 'Recrypting '||x_new_user_name|| ' password';
3179: if (fnd_log.LEVEL_STATEMENT >= fnd_log.g_current_runtime_level) then

Line 3771: if (l_pwd_ret = fnd_web_sec.external_pwd) then

3767: -- Bug 5605892
3768: end if;
3769:
3770: -- Bug 5605892
3771: if (l_pwd_ret = fnd_web_sec.external_pwd) then
3772: return('EXTERNAL');
3773: else
3774: return(null);
3775: end if;

Line 3791: -- This is called by the fnd_user_pkg and fnd_web_sec

3787:
3788: ----------------------------------------------------------------------------
3789: --
3790: -- ldap_wrapper_update_user (PUBLIC)
3791: -- This is called by the fnd_user_pkg and fnd_web_sec
3792: -- It serves as a helper routine to call fnd_ldap_wrapper.update_user
3793: -- when we need to synch the user update to OID.
3794: -- Note
3795: -- Please note that even this is public procedure, it does not mean for

Line 3866: if (l_oid_pwd = fnd_web_sec.external_pwd) then

3862: set user_guid = l_user_guid
3863: where user_name = x_user_name;
3864: end if;
3865:
3866: if (l_oid_pwd = fnd_web_sec.external_pwd) then
3867: -- Add third argument to not use autonomous transaction when chaning
3868: -- passowrd. This is for bug 5087728
3869: ret := fnd_web_sec.change_password(x_user_name, l_oid_pwd, FALSE);
3870: if (ret = 'N') then

Line 3869: ret := fnd_web_sec.change_password(x_user_name, l_oid_pwd, FALSE);

3865:
3866: if (l_oid_pwd = fnd_web_sec.external_pwd) then
3867: -- Add third argument to not use autonomous transaction when chaning
3868: -- passowrd. This is for bug 5087728
3869: ret := fnd_web_sec.change_password(x_user_name, l_oid_pwd, FALSE);
3870: if (ret = 'N') then
3871: reason := fnd_message.get();
3872: fnd_message.set_name('FND', 'FND_CHANGE_PASSWORD_FAILED');
3873: fnd_message.set_token('USER_NAME', X_USER_NAME);

Line 3988: -- This is called by the fnd_user_pkg and fnd_web_sec.

3984: ----------------------------------------------------------------------------
3985: -- This routine is for AOL INTERNAL USE ONLY !!!!!!!
3986: --
3987: -- ldap_wrp_update_user_loader
3988: -- This is called by the fnd_user_pkg and fnd_web_sec.
3989: -- It serves as a helper routine to call fnd_ldap_wrapper.update_user
3990: -- when we need to synch the user update to OID.
3991: procedure ldap_wrp_update_user_loader(x_user_name in varchar2,
3992: x_hashed_password in varchar2,

Line 4032: if (l_pwd_ret = fnd_web_sec.external_pwd) then

4028: fnd_message.set_token('REASON', reason);
4029: app_exception.raise_exception;
4030: end if;
4031:
4032: if (l_pwd_ret = fnd_web_sec.external_pwd) then
4033: update fnd_user
4034: set encrypted_foundation_password = 'EXTERNAL',
4035: encrypted_user_password = 'EXTERNAL'
4036: where user_name = upper(x_user_name);