DBA Data[Home] [Help]

APPS.CS_SR_SECURITY_UTIL dependencies on CS_JTF_RS_RESOURCE_EXTNS_SEC

Line 117: p_function => 'CS_JTF_RS_RESOURCE_EXTNS_SEC',

113: -- as a Grant
114: -- Refer to script AFSCDSCS.pls for instructions on how to use the API.
115: fnd_data_security.get_security_predicate (
116: p_api_version => 1.0,
117: p_function => 'CS_JTF_RS_RESOURCE_EXTNS_SEC',
118: p_object_name => 'JTF_TASK_RESOURCE',
119: p_grant_instance_type => 'SET',
120: p_user_name => 'GLOBAL',
121: x_predicate => lx_predicate,

Line 215: object_name => 'CS_JTF_RS_RESOURCE_EXTNS_SEC',

211: enable => TRUE );
212:
213: dbms_rls.enable_policy(
214: object_schema => 'APPS',
215: object_name => 'CS_JTF_RS_RESOURCE_EXTNS_SEC',
216: policy_name => 'CS_SR_JTF_RESOURCE_ACCESS',
217: enable => TRUE );
218:
219: dbms_rls.enable_policy(

Line 257: object_name => 'CS_JTF_RS_RESOURCE_EXTNS_SEC',

253: enable => FALSE );
254:
255: dbms_rls.enable_policy(
256: object_schema => 'APPS',
257: object_name => 'CS_JTF_RS_RESOURCE_EXTNS_SEC',
258: policy_name => 'CS_SR_JTF_RESOURCE_ACCESS',
259: enable => FALSE );
260:
261: dbms_rls.enable_policy(

Line 320: -- WHERE (cs_jtf_rs_resource_extns_sec.user_id IS NULL )

316: -- OR EXISTS
317: -- ( SELECT '1'
318: -- from fnd_user_resp_groups ur,
319: -- cs_sr_type_mapping csmap
320: -- WHERE (cs_jtf_rs_resource_extns_sec.user_id IS NULL )
321: -- OR cs_jtf_rs_resource_extns_sec.user_id = ur.user_id
322: -- AND ur.responsibility_id = csmap.Responsibility_id
323: -- AND ur. responsibility application_id = csmap.application_id
324: -- AND csmap.business_usage = 'AGENT'

Line 321: -- OR cs_jtf_rs_resource_extns_sec.user_id = ur.user_id

317: -- ( SELECT '1'
318: -- from fnd_user_resp_groups ur,
319: -- cs_sr_type_mapping csmap
320: -- WHERE (cs_jtf_rs_resource_extns_sec.user_id IS NULL )
321: -- OR cs_jtf_rs_resource_extns_sec.user_id = ur.user_id
322: -- AND ur.responsibility_id = csmap.Responsibility_id
323: -- AND ur. responsibility application_id = csmap.application_id
324: -- AND csmap.business_usage = 'AGENT'
325: -- AND csmap.incident_type_id = sys_context(CS_SR_SECURITY, SRTYPE_ID)

Line 331: from cs_jtf_rs_resource_extns_sec

327: -- and trunc(nvl(csmap.end_date,sysdate)) ))
328:
329: cursor check_sr_access ( c_resource_id IN NUMBER )is
330: select 1
331: from cs_jtf_rs_resource_extns_sec
332: where resource_id = c_resource_id;
333:
334: l_count NUMBER;
335:

Line 482: -- WHERE (cs_jtf_rs_resource_extns_sec.user_id IS NULL )

478: -- OR EXISTS
479: -- ( SELECT '1'
480: -- from fnd_user_resp_groups ur,
481: -- cs_sr_type_mapping csmap
482: -- WHERE (cs_jtf_rs_resource_extns_sec.user_id IS NULL )
483: -- OR cs_jtf_rs_resource_extns_sec.user_id = ur.user_id
484: -- AND ur.responsibility_id = csmap.Responsibility_id
485: -- AND ur. responsibility application_id = csmap.application_id
486: -- AND csmap.business_usage = 'AGENT'

Line 483: -- OR cs_jtf_rs_resource_extns_sec.user_id = ur.user_id

479: -- ( SELECT '1'
480: -- from fnd_user_resp_groups ur,
481: -- cs_sr_type_mapping csmap
482: -- WHERE (cs_jtf_rs_resource_extns_sec.user_id IS NULL )
483: -- OR cs_jtf_rs_resource_extns_sec.user_id = ur.user_id
484: -- AND ur.responsibility_id = csmap.Responsibility_id
485: -- AND ur. responsibility application_id = csmap.application_id
486: -- AND csmap.business_usage = 'AGENT'
487: -- AND csmap.incident_type_id = sys_context(CS_SR_SECURITY, SRTYPE_ID)

Line 493: from cs_jtf_rs_resource_extns_sec

489: -- and trunc(nvl(csmap.end_date,sysdate)) ))
490:
491: cursor check_sr_access ( c_resource_id IN NUMBER )is
492: select 1
493: from cs_jtf_rs_resource_extns_sec
494: where resource_id = c_resource_id;
495:
496: l_count NUMBER;
497:

Line 625: -- Drop the VPD policy associated with CS_JTF_RS_RESOURCE_EXTNS_SEC object

621: (object_schema => 'APPS',
622: object_name => 'CS_SR_TYPES_SELECT_SEC',
623: policy_name => 'CS_SR_SEC_SRTYPE_ACCESS');
624:
625: -- Drop the VPD policy associated with CS_JTF_RS_RESOURCE_EXTNS_SEC object
626: DBMS_RLS.drop_policy
627: (object_schema => 'APPS',
628: object_name => 'CS_JTF_RS_RESOURCE_EXTNS_SEC',
629: policy_name => 'CS_SR_JTF_RESOURCE_ACCESS');

Line 628: object_name => 'CS_JTF_RS_RESOURCE_EXTNS_SEC',

624:
625: -- Drop the VPD policy associated with CS_JTF_RS_RESOURCE_EXTNS_SEC object
626: DBMS_RLS.drop_policy
627: (object_schema => 'APPS',
628: object_name => 'CS_JTF_RS_RESOURCE_EXTNS_SEC',
629: policy_name => 'CS_SR_JTF_RESOURCE_ACCESS');
630:
631: -- Drop the VPD policy associated with CS_SR_ACCESS_RESP_SEC object
632: DBMS_RLS.drop_policy

Line 661: -- Create the VPD policy associated with CS_JTF_RS_RESOURCE_EXTNS_SEC object

657: statement_types => 'SELECT',
658: static_policy => FALSE,
659: long_predicate => TRUE );
660:
661: -- Create the VPD policy associated with CS_JTF_RS_RESOURCE_EXTNS_SEC object
662: DBMS_RLS.add_policy
663: (object_schema => 'APPS',
664: object_name => 'CS_JTF_RS_RESOURCE_EXTNS_SEC',
665: policy_name => 'CS_SR_JTF_RESOURCE_ACCESS',

Line 664: object_name => 'CS_JTF_RS_RESOURCE_EXTNS_SEC',

660:
661: -- Create the VPD policy associated with CS_JTF_RS_RESOURCE_EXTNS_SEC object
662: DBMS_RLS.add_policy
663: (object_schema => 'APPS',
664: object_name => 'CS_JTF_RS_RESOURCE_EXTNS_SEC',
665: policy_name => 'CS_SR_JTF_RESOURCE_ACCESS',
666: function_schema => 'APPS',
667: policy_function => 'FND_GENERIC_POLICY.GET_PREDICATE',
668: statement_types => 'SELECT',