DBA Data[Home] [Help]

APPS.PA_TASK_ASSIGNMENTS_PUB dependencies on PA_SECURITY

Line 1728: -- need to call the pa_security package

1724: pa_debug.write(G_PKG_NAME ,pa_debug.g_err_stage,3);
1725: END IF;
1726: -- As part of enforcing project security, which would determine
1727: -- whether the user has the necessary privileges to update the project
1728: -- need to call the pa_security package
1729:
1730: pa_security.initialize (X_user_id => l_user_id,
1731: X_calling_module => l_module_name);
1732: IF P_DEBUG_MODE = 'Y' AND (li_curr_level <= 3) THEN

Line 1730: pa_security.initialize (X_user_id => l_user_id,

1726: -- As part of enforcing project security, which would determine
1727: -- whether the user has the necessary privileges to update the project
1728: -- need to call the pa_security package
1729:
1730: pa_security.initialize (X_user_id => l_user_id,
1731: X_calling_module => l_module_name);
1732: IF P_DEBUG_MODE = 'Y' AND (li_curr_level <= 3) THEN
1733: pa_debug.g_err_stage:=' After initializing security..' || L_FuncProc;
1734: pa_debug.write(G_PKG_NAME ,pa_debug.g_err_stage,3);

Line 1800: IF pa_security.allow_query(x_project_id => l_project_id ) = 'N' OR

1796: -- Hence, cannot update the project.Raise error
1797: -- If the user has query privileges, then check whether
1798: -- update privileges are also available
1799:
1800: IF pa_security.allow_query(x_project_id => l_project_id ) = 'N' OR
1801: pa_security.allow_update(x_project_id => l_project_id ) = 'N' THEN
1802:
1803: -- The user does not have update privileges on this project
1804: -- Hence , raise error

Line 1801: pa_security.allow_update(x_project_id => l_project_id ) = 'N' THEN

1797: -- If the user has query privileges, then check whether
1798: -- update privileges are also available
1799:
1800: IF pa_security.allow_query(x_project_id => l_project_id ) = 'N' OR
1801: pa_security.allow_update(x_project_id => l_project_id ) = 'N' THEN
1802:
1803: -- The user does not have update privileges on this project
1804: -- Hence , raise error
1805: --dbms_output.put_line('pa_security.allow_query or update not allowed..');

Line 1805: --dbms_output.put_line('pa_security.allow_query or update not allowed..');

1801: pa_security.allow_update(x_project_id => l_project_id ) = 'N' THEN
1802:
1803: -- The user does not have update privileges on this project
1804: -- Hence , raise error
1805: --dbms_output.put_line('pa_security.allow_query or update not allowed..');
1806: pa_interface_utils_pub.map_new_amg_msg
1807: ( p_old_message_code => 'PA_PROJECT_SECURITY_ENFORCED'
1808: ,p_msg_attribute => 'CHANGE'
1809: ,p_resize_flag => 'Y'

Line 1819: --dbms_output.put_line('pa_security.allow_query or update successful..');

1815: ,p_attribute5 => '');
1816: RAISE FND_API.G_EXC_ERROR;
1817: END IF;
1818:
1819: --dbms_output.put_line('pa_security.allow_query or update successful..');
1820: IF P_DEBUG_MODE = 'Y' AND (li_curr_level <= 3) THEN
1821: pa_debug.g_err_stage:='PA_PROJECT_SECURITY_ENFORCED function check successful.' || L_FuncProc;
1822: pa_debug.write(G_PKG_NAME ,pa_debug.g_err_stage,3);
1823: END IF;

Line 4426: -- need to call the pa_security package

4422: END IF;
4423:
4424: -- As part of enforcing project security, which would determine
4425: -- whether the user has the necessary privileges to update the project
4426: -- need to call the pa_security package
4427:
4428: pa_security.initialize (X_user_id => l_user_id,
4429: X_calling_module => l_module_name);
4430:

Line 4428: pa_security.initialize (X_user_id => l_user_id,

4424: -- As part of enforcing project security, which would determine
4425: -- whether the user has the necessary privileges to update the project
4426: -- need to call the pa_security package
4427:
4428: pa_security.initialize (X_user_id => l_user_id,
4429: X_calling_module => l_module_name);
4430:
4431: -- Actions performed using the APIs would be subject to
4432: -- function security. If the responsibility does not allow

Line 4498: IF pa_security.allow_query(x_project_id => l_project_id ) = 'N' OR

4494: -- Hence, cannot update the project.Raise error
4495: -- If the user has query privileges, then check whether
4496: -- update privileges are also available
4497:
4498: IF pa_security.allow_query(x_project_id => l_project_id ) = 'N' OR
4499: pa_security.allow_update(x_project_id => l_project_id ) = 'N' THEN
4500:
4501: -- The user does not have update privileges on this project
4502: -- Hence , raise error

Line 4499: pa_security.allow_update(x_project_id => l_project_id ) = 'N' THEN

4495: -- If the user has query privileges, then check whether
4496: -- update privileges are also available
4497:
4498: IF pa_security.allow_query(x_project_id => l_project_id ) = 'N' OR
4499: pa_security.allow_update(x_project_id => l_project_id ) = 'N' THEN
4500:
4501: -- The user does not have update privileges on this project
4502: -- Hence , raise error
4503: