DBA Data[Home] [Help]

APPS.PA_SECURITY dependencies on PA_SECURITY

Line 1: PACKAGE BODY pa_security AS

1: PACKAGE BODY pa_security AS
2: /* $Header: PAPLSECB.pls 120.1.12010000.3 2009/06/08 12:00:28 paljain ship $ */
3:
4:
5: /* ----------------------------------------------------------------------

Line 12: || module that is calling pa_security

8: ||
9: || Input Parameters:
10: || X_user_id <-- identifier of the application user
11: || X_calling_module <-- hard-coded string that refers to the
12: || module that is calling pa_security
13: || functions
14: ||
15: || Description:
16: || This function is called to initialize package globals that are

Line 133: pa_security_extn.check_project_access(

129: IF ( G_update_allowed = 'Y') THEN
130: RETURN( G_update_allowed );
131: END IF;
132:
133: pa_security_extn.check_project_access(
134: X_project_id
135: , G_person_id
136: , G_cross_project_user
137: , G_module_name

Line 151: pa_security_extn.check_project_access(

147: IF ( G_query_allowed IS NOT NULL ) THEN
148: RETURN( G_query_allowed );
149: END IF;
150:
151: pa_security_extn.check_project_access(
152: X_project_id
153: , G_person_id
154: , G_cross_project_user
155: , G_module_name

Line 209: pa_security_extn.check_project_access(

205: IF ( G_update_allowed IS NOT NULL ) THEN
206: RETURN( G_update_allowed );
207: END IF;
208:
209: pa_security_extn.check_project_access(
210: X_project_id
211: , G_person_id
212: , G_cross_project_user
213: , G_module_name

Line 266: pa_security_extn.check_project_access(

262: IF ( G_view_labor_costs IS NOT NULL ) THEN
263: RETURN( G_view_labor_costs );
264: END IF;
265:
266: pa_security_extn.check_project_access(
267: X_project_id
268: , G_person_id
269: , G_cross_project_user
270: , G_module_name

Line 574: fg.grantee_key = PA_SECURITY_PVT.get_grantee_key( 'PERSON', X_person_id, 'N') and

570: fnd_grants fg,
571: fnd_objects fo
572: WHERE
573: --fg.grantee_key = 'PER:'||X_person_id and /* commenting this line for 11.5.10 security changes */
574: fg.grantee_key = PA_SECURITY_PVT.get_grantee_key( 'PERSON', X_person_id, 'N') and
575: /* replaced the above line with this call. The last paramater will assert that the function will not write to database. */
576: fg.grantee_type = 'USER' and
577: fg.menu_id = ppr.menu_id and -- Added for bug 3224170
578: ppr.project_role_id = 3 and -- Added for bug 3224170

Line 683: /* fg.grantee_key = PA_SECURITY_PVT.get_grantee_key( 'PERSON', X_person_id, 'N') and*/

679: fnd_objects fo,
680: fnd_menus fm
681: WHERE */
682: --fg.grantee_key = 'PER:'||X_person_id and /* commenting this line for 11.5.10 security changes */
683: /* fg.grantee_key = PA_SECURITY_PVT.get_grantee_key( 'PERSON', X_person_id, 'N') and*/
684: /* replaced the above line with this call. The last paramater will assert that the function will not write to database. */
685: /* fg.grantee_type = 'USER' and
686: ppa.project_id = X_project_id and
687: to_char(ppa.carrying_out_organization_id) = fg.instance_pk1_value and -- bug2777621

Line 719: END pa_security;

715: RETURN( 'N' );
716:
717: END check_forecast_authority;
718: */
719: END pa_security;