DBA Data[Home] [Help]

APPS.FND_USER_PKG dependencies on FND_WEB_SEC

Line 30: * UpdateUserInternal -> fnd_web_sec.change_password ->

26: -- bug 8227171
27: g_event_controller varchar2(10);
28:
29: /* bug 13472484 - FND_USER_PKG.UpdateUserInternal sets this var to be used from the following flow
30: * UpdateUserInternal -> fnd_web_sec.change_password ->
31: * fnd_user_pkg.ldap_wrapper_update_user. This var is to indicate whether to pass expiry flag to ldap wrapper
32: * when called from fnd_web_sec.change_password APIs since this calculation is
33: * done in UpdateUserInternal already.
34: */

Line 32: * when called from fnd_web_sec.change_password APIs since this calculation is

28:
29: /* bug 13472484 - FND_USER_PKG.UpdateUserInternal sets this var to be used from the following flow
30: * UpdateUserInternal -> fnd_web_sec.change_password ->
31: * fnd_user_pkg.ldap_wrapper_update_user. This var is to indicate whether to pass expiry flag to ldap wrapper
32: * when called from fnd_web_sec.change_password APIs since this calculation is
33: * done in UpdateUserInternal already.
34: */
35: G_EXPIRE_USER_PWD pls_integer := NULL;
36:

Line 368: * Setting a global so that it can be checked in fnd_web_sec APIs

364: if (x_unencrypted_password is not null) then
365:
366: /* Bug 13472484 - calculate and set global to indicate pwd should
367: * be expired when updating OID pwd. Not necessary if EXTERNAL.
368: * Setting a global so that it can be checked in fnd_web_sec APIs
369: * rather than updating all the signatures for pwd mgmt*/
370:
371: if (fnd_log.LEVEL_STATEMENT >= fnd_log.g_current_runtime_level) then
372: fnd_log.string(FND_LOG.LEVEL_STATEMENT,

Line 378: if (x_unencrypted_password <> FND_WEB_SEC.EXTERNAL_PWD) then

374: 'Password is not null so set global if not external');
375: end if;
376:
377:
378: if (x_unencrypted_password <> FND_WEB_SEC.EXTERNAL_PWD) then
379:
380: -- Bug 13707735 - removed the condition that was added for bug13595376
381: -- this condition is incorrect - removed from both create and update flows.
382: -- NOTE: This condition should be the same as used in FND_SIGNON.IS_PWD_EXPIRED

Line 423: ret := fnd_web_sec.change_password(x_user_name,

419: -- change is being added for bug 2658982 and 1722166.
420: if (x_old_password is not null) then
421: -- Add fifth argument to not use autonomous transaction when chaning
422: -- passowrd. This is for bug 5087728
423: ret := fnd_web_sec.change_password(x_user_name,
424: x_old_password,
425: x_unencrypted_password,
426: x_unencrypted_password,
427: FALSE);

Line 433: ret := fnd_web_sec.change_password(x_user_name,

429: -- verifying the existing password
430: else
431: -- Add third argument to not use autonomous transaction when chaning
432: -- passowrd. This is for bug 5087728
433: ret := fnd_web_sec.change_password(x_user_name,
434: x_unencrypted_password, FALSE);
435: -- Bug 5355566/5840007 reset unsuccessful logins start date since
436: -- password is new and login with this password has not yet occurred.
437: if (x_last_logon_date is null) then

Line 543: -- will be changed higher up in the call to fnd_web_sec.change_password.

539: x_change_source <> fnd_user_pkg.change_source_oid ) then
540: begin
541:
542: -- Bug 13472484 - removed the passing of the password since the password
543: -- will be changed higher up in the call to fnd_web_sec.change_password.
544: -- This second attempt to change the password will result in an error if
545: -- password history is enabled.
546: -- G_EXPIRE_USER_PWD is NULL - this call will use the default of 0.
547: if (fnd_log.LEVEL_STATEMENT >= fnd_log.g_current_runtime_level) then

Line 1012: -- bug 4047740 - as a byproduct of FND_WEB_SEC.set_reencrypted_password

1008: if (pcrypt_pass is null) then
1009: return;
1010: end if;
1011:
1012: -- bug 4047740 - as a byproduct of FND_WEB_SEC.set_reencrypted_password
1013: -- NOT calling change_password we need this check to complete the checks
1014: -- below as in FND_WEB_SEC - also added update to both encrypted rows for
1015: -- the fnd_user update below for completeness.
1016: if(false = fnd_sso_manager.isPasswordChangeable(puser_name)) then

Line 1014: -- below as in FND_WEB_SEC - also added update to both encrypted rows for

1010: end if;
1011:
1012: -- bug 4047740 - as a byproduct of FND_WEB_SEC.set_reencrypted_password
1013: -- NOT calling change_password we need this check to complete the checks
1014: -- below as in FND_WEB_SEC - also added update to both encrypted rows for
1015: -- the fnd_user update below for completeness.
1016: if(false = fnd_sso_manager.isPasswordChangeable(puser_name)) then
1017: encPwd := 'EXTERNAL';
1018: else

Line 1137: -- bug 4047740 changed dummy password from 'welcome' to new FND_WEB_SEC

1133: DoPassword_update(X_USER_NAME, X_ENCRYPTED_USER_PASSWORD);
1134: end if;
1135: exception
1136: when no_data_found then
1137: -- bug 4047740 changed dummy password from 'welcome' to new FND_WEB_SEC
1138: -- constant, requires AFSCJAVS.pls 115.27 and AFSCJAVB.pls 115.63
1139: fnd_user_pkg.createuser(
1140: X_USER_NAME,
1141: X_OWNER, -- bug 7687370

Line 1142: FND_WEB_SEC.INVALID_PWD,

1138: -- constant, requires AFSCJAVS.pls 115.27 and AFSCJAVB.pls 115.63
1139: fnd_user_pkg.createuser(
1140: X_USER_NAME,
1141: X_OWNER, -- bug 7687370
1142: FND_WEB_SEC.INVALID_PWD,
1143: to_number(X_SESSION_NUMBER),
1144: to_date(X_START_DATE, 'YYYY/MM/DD'),
1145: L_END_DATE,
1146: L_LAST_LOGON_DATE,

Line 1229: pwd := nvl( x_unencrypted_password, FND_WEB_SEC.EXTERNAL_PWD );

1225: validate_user_name(x_user_name);
1226:
1227: /* bug 4351689 - allow the create functions to pass in null for
1228: External password control*/
1229: pwd := nvl( x_unencrypted_password, FND_WEB_SEC.EXTERNAL_PWD );
1230:
1231: SAVEPOINT create_user;
1232:
1233: ret := fnd_web_sec.create_user(x_user_name,pwd,user_id);

Line 1233: ret := fnd_web_sec.create_user(x_user_name,pwd,user_id);

1229: pwd := nvl( x_unencrypted_password, FND_WEB_SEC.EXTERNAL_PWD );
1230:
1231: SAVEPOINT create_user;
1232:
1233: ret := fnd_web_sec.create_user(x_user_name,pwd,user_id);
1234:
1235: if (ret = 'Y') then
1236: -- Enhancement 5027812
1237: if ((x_change_source is null or

Line 1239: pwd <> fnd_web_sec.external_pwd) then

1235: if (ret = 'Y') then
1236: -- Enhancement 5027812
1237: if ((x_change_source is null or
1238: x_change_source <> fnd_user_pkg.CHANGE_SOURCE_OID) and
1239: pwd <> fnd_web_sec.external_pwd) then
1240: -- We need to translate the external constant to null. Otherwise
1241: -- fnd_ldap_wrapper.create_user will use that constant as real password.
1242: if (pwd = fnd_web_sec.external_pwd) then
1243: pwd := '';

Line 1242: if (pwd = fnd_web_sec.external_pwd) then

1238: x_change_source <> fnd_user_pkg.CHANGE_SOURCE_OID) and
1239: pwd <> fnd_web_sec.external_pwd) then
1240: -- We need to translate the external constant to null. Otherwise
1241: -- fnd_ldap_wrapper.create_user will use that constant as real password.
1242: if (pwd = fnd_web_sec.external_pwd) then
1243: pwd := '';
1244: end if;
1245:
1246: -- Bug#4118749 - Create user in OID

Line 1323: if (l_oid_pwd <> fnd_web_sec.external_pwd) then

1319: x_fax, l_expire_pwd, l_user_guid, l_oid_pwd);
1320: -- If wrapper gives back EXTERNAL password, we need to update
1321: -- the user with external password. l_oid_pwd will be used later
1322: -- in the UpdateUser call. setting to null means no change.
1323: if (l_oid_pwd <> fnd_web_sec.external_pwd) then
1324: l_oid_pwd := '';
1325: end if;
1326: -- End Bug 4318754, 4424225
1327: exception

Line 1444: else -- fnd_web_sec.create_user must have failed.

1440: end if;
1441: app_exception.raise_exception;
1442: end;
1443:
1444: else -- fnd_web_sec.create_user must have failed.
1445: -- The java layer puts message onto the message stack.
1446: reason := fnd_message.get();
1447: fnd_message.set_name('FND', 'FND_CREATE_USER_FAILED');
1448: fnd_message.set_token('USER_NAME', X_USER_NAME);

Line 2048: return boolRet(fnd_web_sec.validate_login(username, password));

2044: --
2045: function ValidateLogin(username varchar2,
2046: password varchar2) return boolean is
2047: begin
2048: return boolRet(fnd_web_sec.validate_login(username, password));
2049: end ValidateLogin;
2050: ----------------------------------------------------------------------------
2051: --
2052: -- ValidateSSOLogin (RESTRICTED)

Line 2090: return boolRet(fnd_web_sec.Change_Password(username, newpassword, FALSE));

2086: --
2087: function ChangePassword(username varchar2,
2088: newpassword varchar2) return boolean is
2089: begin
2090: return boolRet(fnd_web_sec.Change_Password(username, newpassword, FALSE));
2091: end;
2092: ----------------------------------------------------------------------------
2093: --
2094: -- ChangePassword (PUBLIC)

Line 2111: return boolRet(fnd_web_sec.Change_Password(username, oldpassword,

2107: oldpassword varchar2,
2108: newpassword varchar2) return boolean is
2109:
2110: begin
2111: return boolRet(fnd_web_sec.Change_Password(username, oldpassword,
2112: newpassword, newpassword, FALSE));
2113: end;
2114: ----------------------------------------------------------------------------
2115: --

Line 2134: return (fnd_web_sec.get_reencrypted_password(username, newkey));

2130: --
2131: function GetReEncryptedPassword(username varchar2,
2132: newkey varchar2) return varchar2 is
2133: begin
2134: return (fnd_web_sec.get_reencrypted_password(username, newkey));
2135: end;
2136:
2137: ----------------------------------------------------------------------------
2138: -- SetReEncryptedPassword (PUBLIC)

Line 2159: return boolRet(fnd_web_sec.set_reencrypted_password(username,reencpwd,newkey));

2155: function SetReEncryptedPassword(username varchar2,
2156: reencpwd varchar2,
2157: newkey varchar2) return boolean is
2158: begin
2159: return boolRet(fnd_web_sec.set_reencrypted_password(username,reencpwd,newkey));
2160: end;
2161: ----------------------------------------------------------------------------
2162: -- MergeCustomer (PUBLIC)
2163: -- This is the procedure being called during the Party Merge.

Line 3836: -- FND_WEB_SEC.change_password having an autonomous transaction pragma.

3832: update fnd_user set user_name = upper(x_new_user_name)
3833: where user_name = upper(x_old_user_name);
3834:
3835: -- This code was moved before updating FND_USER due to a change in
3836: -- FND_WEB_SEC.change_password having an autonomous transaction pragma.
3837: -- Password changes failed due to said change. See bug 2426407.
3838: -- handle password encryption with new username
3839: tmpbuf := 'Recrypting '||x_new_user_name|| ' password';
3840: if (fnd_log.LEVEL_STATEMENT >= fnd_log.g_current_runtime_level) then

Line 4473: if (l_pwd_ret = fnd_web_sec.external_pwd) then

4469: -- Bug 5605892
4470: end if;
4471:
4472: -- Bug 5605892
4473: if (l_pwd_ret = fnd_web_sec.external_pwd) then
4474: return('EXTERNAL');
4475: else
4476: return(null);
4477: end if;

Line 4493: -- This is called by the fnd_user_pkg and fnd_web_sec

4489:
4490: ----------------------------------------------------------------------------
4491: --
4492: -- ldap_wrapper_update_user (PUBLIC)
4493: -- This is called by the fnd_user_pkg and fnd_web_sec
4494: -- It serves as a helper routine to call fnd_ldap_wrapper.update_user
4495: -- when we need to synch the user update to OID.
4496: -- Note
4497: -- Please note that even this is public procedure, it does not mean for

Line 4518: -- Bug 13472484 - Using global when called from fnd_web_sec.change_password

4514: fnd_log.string(FND_LOG.LEVEL_STATEMENT, c_log_head||'.'||l_api_name,
4515: 'Begin - set l_expire_pwd before calling fnd_ldap_wrapper');
4516: end if;
4517:
4518: -- Bug 13472484 - Using global when called from fnd_web_sec.change_password
4519: -- APIs since the expiration calculation is done in fnd_user_pkg.UpdateUserInternal.
4520: -- where this global is set.
4521: -- Any other calls to this API should use the arg x_expire_pwd.
4522:

Line 4598: if (l_oid_pwd = fnd_web_sec.external_pwd) then

4594: set user_guid = l_user_guid
4595: where user_name = x_user_name;
4596: end if;
4597:
4598: if (l_oid_pwd = fnd_web_sec.external_pwd) then
4599: -- Add third argument to not use autonomous transaction when chaning
4600: -- passowrd. This is for bug 5087728
4601: ret := fnd_web_sec.change_password(x_user_name, l_oid_pwd, FALSE);
4602: if (ret = 'N') then

Line 4601: ret := fnd_web_sec.change_password(x_user_name, l_oid_pwd, FALSE);

4597:
4598: if (l_oid_pwd = fnd_web_sec.external_pwd) then
4599: -- Add third argument to not use autonomous transaction when chaning
4600: -- passowrd. This is for bug 5087728
4601: ret := fnd_web_sec.change_password(x_user_name, l_oid_pwd, FALSE);
4602: if (ret = 'N') then
4603: reason := fnd_message.get();
4604: fnd_message.set_name('FND', 'FND_CHANGE_PASSWORD_FAILED');
4605: fnd_message.set_token('USER_NAME', X_USER_NAME);

Line 4709: -- This is called by the fnd_user_pkg and fnd_web_sec.

4705: ----------------------------------------------------------------------------
4706: -- This routine is for AOL INTERNAL USE ONLY !!!!!!!
4707: --
4708: -- ldap_wrp_update_user_loader
4709: -- This is called by the fnd_user_pkg and fnd_web_sec.
4710: -- It serves as a helper routine to call fnd_ldap_wrapper.update_user
4711: -- when we need to synch the user update to OID.
4712: procedure ldap_wrp_update_user_loader(x_user_name in varchar2,
4713: x_hashed_password in varchar2,

Line 4753: if (l_pwd_ret = fnd_web_sec.external_pwd) then

4749: fnd_message.set_token('REASON', reason);
4750: app_exception.raise_exception;
4751: end if;
4752:
4753: if (l_pwd_ret = fnd_web_sec.external_pwd) then
4754: update fnd_user
4755: set encrypted_foundation_password = 'EXTERNAL',
4756: encrypted_user_password = 'EXTERNAL'
4757: where user_name = upper(x_user_name);