DBA Data[Home] [Help]

APPS.PA_TASK_ASSIGNMENTS_PUB dependencies on PA_SECURITY

Line 1673: -- need to call the pa_security package

1669: pa_debug.write(G_PKG_NAME ,pa_debug.g_err_stage,3);
1670: END IF;
1671: -- As part of enforcing project security, which would determine
1672: -- whether the user has the necessary privileges to update the project
1673: -- need to call the pa_security package
1674:
1675: pa_security.initialize (X_user_id => l_user_id,
1676: X_calling_module => l_module_name);
1677: IF P_DEBUG_MODE = 'Y' AND (li_curr_level <= 3) THEN

Line 1675: pa_security.initialize (X_user_id => l_user_id,

1671: -- As part of enforcing project security, which would determine
1672: -- whether the user has the necessary privileges to update the project
1673: -- need to call the pa_security package
1674:
1675: pa_security.initialize (X_user_id => l_user_id,
1676: X_calling_module => l_module_name);
1677: IF P_DEBUG_MODE = 'Y' AND (li_curr_level <= 3) THEN
1678: pa_debug.g_err_stage:=' After initializing security..' || L_FuncProc;
1679: pa_debug.write(G_PKG_NAME ,pa_debug.g_err_stage,3);

Line 1742: IF pa_security.allow_query(x_project_id => l_project_id ) = 'N' OR

1738: -- Hence, cannot update the project.Raise error
1739: -- If the user has query privileges, then check whether
1740: -- update privileges are also available
1741:
1742: IF pa_security.allow_query(x_project_id => l_project_id ) = 'N' OR
1743: pa_security.allow_update(x_project_id => l_project_id ) = 'N' THEN
1744:
1745: -- The user does not have update privileges on this project
1746: -- Hence , raise error

Line 1743: pa_security.allow_update(x_project_id => l_project_id ) = 'N' THEN

1739: -- If the user has query privileges, then check whether
1740: -- update privileges are also available
1741:
1742: IF pa_security.allow_query(x_project_id => l_project_id ) = 'N' OR
1743: pa_security.allow_update(x_project_id => l_project_id ) = 'N' THEN
1744:
1745: -- The user does not have update privileges on this project
1746: -- Hence , raise error
1747: --dbms_output.put_line('pa_security.allow_query or update not allowed..');

Line 1747: --dbms_output.put_line('pa_security.allow_query or update not allowed..');

1743: pa_security.allow_update(x_project_id => l_project_id ) = 'N' THEN
1744:
1745: -- The user does not have update privileges on this project
1746: -- Hence , raise error
1747: --dbms_output.put_line('pa_security.allow_query or update not allowed..');
1748: pa_interface_utils_pub.map_new_amg_msg
1749: ( p_old_message_code => 'PA_PROJECT_SECURITY_ENFORCED'
1750: ,p_msg_attribute => 'CHANGE'
1751: ,p_resize_flag => 'Y'

Line 1761: --dbms_output.put_line('pa_security.allow_query or update successful..');

1757: ,p_attribute5 => '');
1758: RAISE FND_API.G_EXC_ERROR;
1759: END IF;
1760:
1761: --dbms_output.put_line('pa_security.allow_query or update successful..');
1762: IF P_DEBUG_MODE = 'Y' AND (li_curr_level <= 3) THEN
1763: pa_debug.g_err_stage:='PA_PROJECT_SECURITY_ENFORCED function check successful.' || L_FuncProc;
1764: pa_debug.write(G_PKG_NAME ,pa_debug.g_err_stage,3);
1765: END IF;

Line 4091: -- need to call the pa_security package

4087: END IF;
4088:
4089: -- As part of enforcing project security, which would determine
4090: -- whether the user has the necessary privileges to update the project
4091: -- need to call the pa_security package
4092:
4093: pa_security.initialize (X_user_id => l_user_id,
4094: X_calling_module => l_module_name);
4095:

Line 4093: pa_security.initialize (X_user_id => l_user_id,

4089: -- As part of enforcing project security, which would determine
4090: -- whether the user has the necessary privileges to update the project
4091: -- need to call the pa_security package
4092:
4093: pa_security.initialize (X_user_id => l_user_id,
4094: X_calling_module => l_module_name);
4095:
4096: -- Actions performed using the APIs would be subject to
4097: -- function security. If the responsibility does not allow

Line 4161: IF pa_security.allow_query(x_project_id => l_project_id ) = 'N' OR

4157: -- Hence, cannot update the project.Raise error
4158: -- If the user has query privileges, then check whether
4159: -- update privileges are also available
4160:
4161: IF pa_security.allow_query(x_project_id => l_project_id ) = 'N' OR
4162: pa_security.allow_update(x_project_id => l_project_id ) = 'N' THEN
4163:
4164: -- The user does not have update privileges on this project
4165: -- Hence , raise error

Line 4162: pa_security.allow_update(x_project_id => l_project_id ) = 'N' THEN

4158: -- If the user has query privileges, then check whether
4159: -- update privileges are also available
4160:
4161: IF pa_security.allow_query(x_project_id => l_project_id ) = 'N' OR
4162: pa_security.allow_update(x_project_id => l_project_id ) = 'N' THEN
4163:
4164: -- The user does not have update privileges on this project
4165: -- Hence , raise error
4166: