DBA Data[Home] [Help]

APPS.PA_PROJECT_ASSETS_PUB dependencies on PA_SECURITY

Line 437: -- need to call the pa_security package

433:
434:
435: -- As part of enforcing project security, which would determine
436: -- whether the user has the necessary privileges to update the project
437: -- need to call the pa_security package
438:
439: pa_security.initialize (X_user_id => l_user_id,
440: X_calling_module => l_module_name);
441:

Line 439: pa_security.initialize (X_user_id => l_user_id,

435: -- As part of enforcing project security, which would determine
436: -- whether the user has the necessary privileges to update the project
437: -- need to call the pa_security package
438:
439: pa_security.initialize (X_user_id => l_user_id,
440: X_calling_module => l_module_name);
441:
442: -- Actions performed using the APIs would be subject to
443: -- function security. If the responsibility does not allow

Line 484: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN

480: END IF;
481:
482:
483: -- Now verify whether project security allows the user to update the project
484: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN
485:
486: -- The user does not have query privileges on this project
487: -- Hence, cannot update the project.Raise error
488: pa_interface_utils_pub.map_new_amg_msg

Line 505: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN

501: RAISE FND_API.G_EXC_ERROR;
502: ELSE
503: -- If the user has query privileges, then check whether
504: -- update privileges are also available
505: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN
506:
507: -- The user does not have update privileges on this project
508: -- Hence , raise error
509:

Line 2172: -- need to call the pa_security package

2168:
2169:
2170: -- As part of enforcing project security, which would determine
2171: -- whether the user has the necessary privileges to update the project
2172: -- need to call the pa_security package
2173:
2174: pa_security.initialize (X_user_id => l_user_id,
2175: X_calling_module => l_module_name);
2176:

Line 2174: pa_security.initialize (X_user_id => l_user_id,

2170: -- As part of enforcing project security, which would determine
2171: -- whether the user has the necessary privileges to update the project
2172: -- need to call the pa_security package
2173:
2174: pa_security.initialize (X_user_id => l_user_id,
2175: X_calling_module => l_module_name);
2176:
2177: -- Actions performed using the APIs would be subject to
2178: -- function security. If the responsibility does not allow

Line 2219: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN

2215: END IF;
2216:
2217:
2218: -- Now verify whether project security allows the user to update the project
2219: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN
2220:
2221: -- The user does not have query privileges on this project
2222: -- Hence, cannot update the project.Raise error
2223: pa_interface_utils_pub.map_new_amg_msg

Line 2240: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN

2236: RAISE FND_API.G_EXC_ERROR;
2237: ELSE
2238: -- If the user has query privileges, then check whether
2239: -- update privileges are also available
2240: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN
2241:
2242: -- The user does not have update privileges on this project
2243: -- Hence , raise error
2244:

Line 3282: -- need to call the pa_security package

3278:
3279:
3280: -- As part of enforcing project security, which would determine
3281: -- whether the user has the necessary privileges to update the project
3282: -- need to call the pa_security package
3283:
3284: pa_security.initialize (X_user_id => l_user_id,
3285: X_calling_module => l_module_name);
3286:

Line 3284: pa_security.initialize (X_user_id => l_user_id,

3280: -- As part of enforcing project security, which would determine
3281: -- whether the user has the necessary privileges to update the project
3282: -- need to call the pa_security package
3283:
3284: pa_security.initialize (X_user_id => l_user_id,
3285: X_calling_module => l_module_name);
3286:
3287: -- Actions performed using the APIs would be subject to
3288: -- function security. If the responsibility does not allow

Line 3330: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN

3326:
3327:
3328:
3329: -- Now verify whether project security allows the user to update the project
3330: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN
3331:
3332: -- The user does not have query privileges on this project
3333: -- Hence, cannot update the project.Raise error
3334: pa_interface_utils_pub.map_new_amg_msg

Line 3351: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN

3347: RAISE FND_API.G_EXC_ERROR;
3348: ELSE
3349: -- If the user has query privileges, then check whether
3350: -- update privileges are also available
3351: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN
3352:
3353: -- The user does not have update privileges on this project
3354: -- Hence , raise error
3355:

Line 6858: -- need to call the pa_security package

6854:
6855:
6856: -- As part of enforcing project security, which would determine
6857: -- whether the user has the necessary privileges to update the project
6858: -- need to call the pa_security package
6859:
6860: pa_security.initialize (X_user_id => l_user_id,
6861: X_calling_module => l_module_name);
6862:

Line 6860: pa_security.initialize (X_user_id => l_user_id,

6856: -- As part of enforcing project security, which would determine
6857: -- whether the user has the necessary privileges to update the project
6858: -- need to call the pa_security package
6859:
6860: pa_security.initialize (X_user_id => l_user_id,
6861: X_calling_module => l_module_name);
6862:
6863: -- Actions performed using the APIs would be subject to
6864: -- function security. If the responsibility does not allow

Line 6905: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN

6901: END IF;
6902:
6903:
6904: -- Now verify whether project security allows the user to update the project
6905: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN
6906:
6907: -- The user does not have query privileges on this project
6908: -- Hence, cannot update the project.Raise error
6909: pa_interface_utils_pub.map_new_amg_msg

Line 6926: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN

6922: RAISE FND_API.G_EXC_ERROR;
6923: ELSE
6924: -- If the user has query privileges, then check whether
6925: -- update privileges are also available
6926: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN
6927:
6928: -- The user does not have update privileges on this project
6929: -- Hence , raise error
6930:

Line 7266: -- need to call the pa_security package

7262:
7263:
7264: -- As part of enforcing project security, which would determine
7265: -- whether the user has the necessary privileges to update the project
7266: -- need to call the pa_security package
7267:
7268: pa_security.initialize (X_user_id => l_user_id,
7269: X_calling_module => l_module_name);
7270:

Line 7268: pa_security.initialize (X_user_id => l_user_id,

7264: -- As part of enforcing project security, which would determine
7265: -- whether the user has the necessary privileges to update the project
7266: -- need to call the pa_security package
7267:
7268: pa_security.initialize (X_user_id => l_user_id,
7269: X_calling_module => l_module_name);
7270:
7271: -- Actions performed using the APIs would be subject to
7272: -- function security. If the responsibility does not allow

Line 7313: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN

7309: END IF;
7310:
7311:
7312: -- Now verify whether project security allows the user to update the project
7313: IF pa_security.allow_query (x_project_id => l_project_id ) = 'N' THEN
7314:
7315: -- The user does not have query privileges on this project
7316: -- Hence, cannot update the project.Raise error
7317: pa_interface_utils_pub.map_new_amg_msg

Line 7334: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN

7330: RAISE FND_API.G_EXC_ERROR;
7331: ELSE
7332: -- If the user has query privileges, then check whether
7333: -- update privileges are also available
7334: IF pa_security.allow_update (x_project_id => l_project_id ) = 'N' THEN
7335:
7336: -- The user does not have update privileges on this project
7337: -- Hence , raise error
7338: