DBA Data[Home] [Help]

APPS.HR_USER_ACCT_API dependencies on HR_USER_ACCT_INTERNAL

Line 224: -- Passing password_date to the modified hr_user_acct_internal.create_fnd_user

220: -- null value to the parameter.
221: --
222:
223: -- Fix 2288014.
224: -- Passing password_date to the modified hr_user_acct_internal.create_fnd_user
225: -- enabling users to have control over password change after first login.
226: --
227: hr_user_acct_internal.create_fnd_user
228: (p_hire_date => l_hire_date

Line 227: hr_user_acct_internal.create_fnd_user

223: -- Fix 2288014.
224: -- Passing password_date to the modified hr_user_acct_internal.create_fnd_user
225: -- enabling users to have control over password change after first login.
226: --
227: hr_user_acct_internal.create_fnd_user
228: (p_hire_date => l_hire_date
229: ,p_user_name =>
230: hr_user_acct_utility.g_fnd_user_rec.user_name
231: ,p_password =>

Line 462: hr_user_acct_internal.create_fnd_responsibility

458: hr_utility.set_location(l_proc, 40);
459: -- **********************************************
460: -- Create the new responsibility
461: -- **********************************************
462: hr_user_acct_internal.create_fnd_responsibility
463: (p_resp_key => l_fnd_resp_rec.new_resp_key
464: ,p_resp_name => l_fnd_resp_rec.new_resp_name
465: ,p_resp_app_id => l_fnd_resp_rec.new_resp_app_id
466: ,p_resp_description => l_fnd_resp_rec.new_resp_description

Line 539: hr_user_acct_internal.create_fnd_user_resp_groups

535: -- NOTE: Only insert a row into fnd_user_resp_groups
536: -- when the profile option 'ENABLE_SECURITY_GROUPS'
537: -- is 'N'.
538: --
539: hr_user_acct_internal.create_fnd_user_resp_groups
540: (p_user_id => l_user_id
541: ,p_responsibility_id => l_responsibility_id
542: ,p_application_id => l_user_resp_app_id
543: ,p_sec_group_id => 0

Line 583: hr_user_acct_internal.create_fnd_user_resp_groups

579:
580: hr_utility.set_location (l_proc ||
581: ' before create_fnd_user_resp_groups', 53);
582: --
583: hr_user_acct_internal.create_fnd_user_resp_groups
584: (p_user_id => l_user_id
585: ,p_responsibility_id => l_responsibility_id
586: ,p_application_id => l_user_resp_app_id
587: ,p_sec_group_id => l_sec_group_id

Line 605: hr_user_acct_internal.create_sec_profile_asg

601: hr_utility.set_location (l_proc ||
602: ' before create_sec_profile_asg', 56);
603:
604: -- Insert this row into per_sec_profile_assignments
605: hr_user_acct_internal.create_sec_profile_asg
606: (p_user_id => l_user_id
607: ,p_sec_group_id => l_fnd_resp_rec.sec_group_id
608: ,p_sec_profile_id => l_fnd_resp_rec.sec_profile_id
609: ,p_resp_key => l_responsibility_key

Line 646: hr_user_acct_internal.build_func_sec_exclusion_rules

642: -- Build the function security exclusion rules table by
643: -- combining the template responsibility's rules with
644: -- any new rules.
645: --
646: hr_user_acct_internal.build_func_sec_exclusion_rules
647: (p_func_sec_excl_tbl => hr_user_acct_utility.g_fnd_resp_functions_tbl
648: ,p_out_func_sec_excl_tbl => l_out_func_sec_excl_tbl);
649: --
650: l_resp_func_count := l_out_func_sec_excl_tbl.count;

Line 659: hr_user_acct_internal.create_fnd_resp_functions

655: END IF;
656: --
657: FOR i in 1..l_resp_func_count
658: LOOP
659: hr_user_acct_internal.create_fnd_resp_functions
660: (p_resp_key => l_out_func_sec_excl_tbl(i).resp_key
661: ,p_rule_type => l_out_func_sec_excl_tbl(i).rule_type
662: ,p_rule_name => l_out_func_sec_excl_tbl(i).rule_name
663: ,p_delete_flag => 'N');

Line 710: hr_user_acct_internal.build_resp_profile_val

706: THEN
707: -- New responsibility using an existing resp as a template, we'll
708: -- make a copy of the profile option values from the template resp
709: -- for the new responsibility.
710: hr_user_acct_internal.build_resp_profile_val
711: (p_template_resp_id =>
712: hr_user_acct_utility.g_fnd_resp_tbl(i).existing_resp_id
713: ,p_template_resp_app_id =>
714: hr_user_acct_utility.g_fnd_resp_tbl(i).existing_resp_app_id

Line 749: hr_user_acct_internal.create_fnd_profile_values

745: FOR j in 1..l_out_profile_opt_val_count
746: LOOP
747: -- Reset the variable before each loop
748: l_profile_value_saved := null;
749: hr_user_acct_internal.create_fnd_profile_values
750: (p_profile_opt_name =>
751: l_out_profile_opt_val_tbl(j).profile_option_name
752: ,p_profile_opt_value =>
753: l_out_profile_opt_val_tbl(j).profile_option_value

Line 786: hr_user_acct_internal.build_resp_profile_val

782: hr_user_acct_utility.g_fnd_resp_tbl(i).new_resp_key IS NOT NULL
783: THEN
784: -- that means existing resp id is null, we'll just attach profile
785: -- option values at the new resp level.
786: hr_user_acct_internal.build_resp_profile_val
787: (p_template_resp_id => null
788: ,p_template_resp_app_id => null
789: ,p_new_resp_key =>
790: hr_user_acct_utility.g_fnd_resp_tbl(i).new_resp_key

Line 822: hr_user_acct_internal.create_fnd_profile_values

818: --
819: FOR j in 1..l_out_profile_opt_val_count
820: LOOP
821: l_profile_value_saved := null;
822: hr_user_acct_internal.create_fnd_profile_values
823: (p_profile_opt_name =>
824: l_out_profile_opt_val_tbl(j).profile_option_name
825: ,p_profile_opt_value =>
826: l_out_profile_opt_val_tbl(j).profile_option_value

Line 868: hr_user_acct_internal.create_fnd_profile_values

864: l_profile_value_saved := null;
865: IF hr_user_acct_utility.g_fnd_profile_opt_val_tbl(i).profile_level_name
866: = 'USER'
867: THEN
868: hr_user_acct_internal.create_fnd_profile_values
869: (p_profile_opt_name =>
870: hr_user_acct_utility.g_fnd_profile_opt_val_tbl(i).profile_option_name
871: ,p_profile_opt_value =>
872: hr_user_acct_utility.g_fnd_profile_opt_val_tbl(i).profile_option_value

Line 1150: hr_user_acct_internal.update_fnd_user

1146: -- the old password (decrypted) and as of now, there is no way to decrypt
1147: -- a password without using the java code. Hence, the only functionality
1148: -- allowed for updating an fnd_user rec is to end date the record.
1149: ----------------------------------------------------------------------------
1150: hr_user_acct_internal.update_fnd_user
1151: (p_user_id => get_user_ids.user_id
1152: ,p_end_date => l_date
1153: );
1154: --

Line 1165: hr_user_acct_internal.update_sec_profile_asg

1161: FOR get_sec_prf_asg in lc_get_sec_profile_asg
1162: (c_user_id => get_user_ids.user_id)
1163: LOOP
1164: hr_utility.trace('Calling update_sec_profile_asg with ' || get_sec_prf_asg.sec_profile_assignment_id);
1165: hr_user_acct_internal.update_sec_profile_asg
1166: (p_sec_profile_asg_id => get_sec_prf_asg.sec_profile_assignment_id
1167:
1168: ,p_object_version_number => get_sec_prf_asg.object_version_number
1169: ,p_start_date => get_sec_prf_asg.start_date

Line 1197: hr_user_acct_internal.update_fnd_user_resp_groups

1193: hr_utility.trace('user_id' || get_user_ids.user_id);
1194: hr_utility.trace('security_group_id' || get_user_resp.security_group_id);
1195: hr_utility.trace('p_end_date' || l_date);
1196:
1197: hr_user_acct_internal.update_fnd_user_resp_groups
1198: (p_user_id => get_user_ids.user_id
1199: ,p_responsibility_id => get_user_resp.responsibility_id
1200: ,p_resp_application_id
1201: => get_user_resp.responsibility_application_id