Beruflich Dokumente
Kultur Dokumente
D49195GC10
Edition 1.0
July 2007
D51749
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle, JD Edwards, PeopleSoft, and Siebel are registered trademarks of Oracle Corporation and/or its affiliates. Other names may
be trademarks of their respective owners.
Author
Mildred Wang, Robert Farrington, Clara Jaeckel, Melody Yang
Technical Contributors and Reviewers
Donna Johnson, Leta Davis, Barbara Waddoups, Gary Lemmons, Roman Kratochvil, Roger
Wigenstam, Venkata Vengala, Biju Mohan, Gursat Olgun, Maxine Zasowski, Sunil Ghosh
This book was published using:
oracletutor
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Table of Contents
Introduction .....................................................................................................................................................1-1
Introduction ...................................................................................................................................................1-3
Course Objectives..........................................................................................................................................1-4
Overview .......................................................................................................................................................1-5
Oracle Applications System Administration .................................................................................................1-6
Oracle Workflow Component........................................................................................................................1-7
Oracle Applications Flexfields Component...................................................................................................1-8
Additional Material........................................................................................................................................1-9
Managing Printers...........................................................................................................................................9-1
Managing Printers..........................................................................................................................................9-3
Objectives ......................................................................................................................................................9-4
Oracle Print Definition Components .............................................................................................................9-5
Relationships of the Printer Components ......................................................................................................9-7
Formatting Information .................................................................................................................................9-8
Defining Printers............................................................................................................................................9-10
Finding Existing Printer Types......................................................................................................................9-11
Registering a New Printer..............................................................................................................................9-12
Defining a New Printer Type.........................................................................................................................9-13
Printing with Pasta.........................................................................................................................................9-14
Setup for Basic Printing with Pasta ...............................................................................................................9-15
The pasta.cfg file ...........................................................................................................................................9-16
Modifying an Existing Printer Type to Use Pasta .........................................................................................9-17
Generating Other Formats using the Preprocessing Option...........................................................................9-19
Using Pasta with XML Publisher ..................................................................................................................9-20
Other Customization Materials for Oracle Applications Printing..................................................................9-22
Summary........................................................................................................................................................9-23
Introduction to Oracle Applications Manager..............................................................................................10-1
Introduction to Oracle Applications Manager (OAM) ..................................................................................10-3
Objectives ......................................................................................................................................................10-4
What is Oracle Applications Manager? .........................................................................................................10-5
Benefits of Oracle Applications Manager......................................................................................................10-6
Oracle Applications Manager Integrates with ..........................................................................................10-7
Application Management Pack for Oracle E-Business Suite.........................................................................10-9
Navigation in OAM .......................................................................................................................................10-10
Applications Dashboard ................................................................................................................................10-11
Site Map.........................................................................................................................................................10-13
Administration...............................................................................................................................................10-14
Monitoring.....................................................................................................................................................10-15
Maintenance ..................................................................................................................................................10-16
Diagnostics and Troubleshooting ..................................................................................................................10-17
Setting Up Oracle Applications Manager......................................................................................................10-18
Summary........................................................................................................................................................10-19
System Monitoring in Oracle Applications Manager...................................................................................11-1
System Monitoring in Oracle Applications Manager ....................................................................................11-3
Objectives ......................................................................................................................................................11-4
System Status Overview................................................................................................................................11-5
System Status Configuration Changes........................................................................................................11-7
System Status Web Components Status .....................................................................................................11-8
System Status System Alerts ......................................................................................................................11-10
System Status User Initiated Alerts ............................................................................................................11-12
Performance...................................................................................................................................................11-13
Critical Activities...........................................................................................................................................11-15
Critical Activities Setup.................................................................................................................................11-16
System Alerts, Metrics, Logs.........................................................................................................................11-17
Database Initialization (init.ora) Parameters..................................................................................................11-19
Copyright Oracle Corporation, 2006. All rights reserved.
Pending Phase................................................................................................................................................13-28
Running Phase ...............................................................................................................................................13-29
Completed Phase ...........................................................................................................................................13-30
Inactive Phase................................................................................................................................................13-31
System Administrator Monitoring Privileges ................................................................................................13-32
Review Log Files...........................................................................................................................................13-33
Managing Log Files and Tables ....................................................................................................................13-34
Purge Request Results ...................................................................................................................................13-35
Grouping Concurrent Programs and Requests...............................................................................................13-36
Creating a Request Group..............................................................................................................................13-38
Using a Request Group with a Code..............................................................................................................13-39
Submitting Requests: Form Compared with Responsibility..........................................................................13-40
Implementing a Coded Request Group..........................................................................................................13-41
Customization Example.................................................................................................................................13-42
Creating the New Form Function ..................................................................................................................13-43
Passable Request Parameters.........................................................................................................................13-44
Adding the Function to the Menu..................................................................................................................13-45
Defining a Request Set ..................................................................................................................................13-46
Request Set Stages.........................................................................................................................................13-47
Stage Status ...................................................................................................................................................13-48
Linking of Stages...........................................................................................................................................13-50
Defining Request Sets Step 1: Enter Request Set Name ...............................................................................13-51
Defining Request Sets Step 2: Define a Stage ...............................................................................................13-53
Defining Request Sets Step 3: Enter Requests for Stage ...............................................................................13-54
Defining Request Sets Step 4: Enter Request Parameter...............................................................................13-55
Defining Request Sets Step 5: Link Stages ...................................................................................................13-56
Submitting a Request Set...............................................................................................................................13-57
User Request Set Privileges...........................................................................................................................13-58
System Administrator Request Set Privileges ...............................................................................................13-59
Summary........................................................................................................................................................13-60
Summary........................................................................................................................................................14-32
Preface
Profile
Before You Begin This Course
Prerequisites
There are no prerequisites for this course.
Related Publications
Oracle Publications
Part Number
B31451
B31453
B31454
B31431
Additional Publications
Read-me files
Oracle Magazine
Title
Typographic Conventions
Typographic Conventions in Text
Caps and
lowercase
Courier new,
case sensitive
(default is
lowercase)
Initial cap
Element
Glossary term (if
there is a glossary)
Buttons,
check boxes,
triggers,
windows
Code output,
directory names,
filenames,
passwords,
pathnames,
URLs,
user input,
usernames
Arrow
Brackets
Commas
Graphics labels
(unless the term is a
proper noun)
Emphasized words
and phrases,
titles of books and
courses,
variables
Interface elements
with long names
that have only
initial caps;
lesson and chapter
titles in crossreferences
SQL column
names, commands,
functions, schemas,
table names
Menu paths
Key names
Key sequences
Plus signs
Key combinations
Italic
Quotation
marks
Uppercase
Example
The algorithm inserts the new key.
Click the Executable button.
Select the Cant Delete Card check box.
Assign a When-Validate-Item trigger to the ORD block.
Open the Master Schedule window.
Code output: debug.set (I, 300);
Directory: bin (DOS), $FMHOME (UNIX)
Filename: Locate the init.ora file.
Password: User tiger as your password.
Pathname: Open c:\my_docs\projects
URL: Go to http://www.oracle.com
User input: Enter 300
Username: Log on as scott
Customer address (but Oracle Payables)
Convention
Bold italic
Example
When-Validate-Item
Passwords
SELECT last_name
FROM s_emp;
PL/SQL objects
Lowercase
italic
Uppercase
Syntax variables
1.
(N) From the Navigator window, select Invoice then Entry then Invoice Batches
Summary.
2.
3.
Notations:
(N) = Navigator
(M) = Menu
(T) = Tab
(B) = Button
(I) = Icon
(H) = Hyperlink
(ST) = Sub Tab
Copyright Oracle Corporation, 2006. All rights reserved.
Convention
Caps and
lowercase
Lowercase
1.
In the navigation frame of the help system window, expand the General Ledger entry.
2.
3.
4.
Review the Enter Journals topic that appears in the document frame of the help system
window.
Chapter 1
Introduction
Chapter
1 - Page 1 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Introduction
Introduction
Chapter
1 - Page 2 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Introduction
Introduction
Chapter
1 - Page 3 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Course Objectives
Introduction
Chapter
1 - Page 4 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Overview
Introduction
Chapter
1 - Page 5 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Introduction
Chapter
1 - Page 6 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Introduction
Chapter
1 - Page 7 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Introduction
Chapter
1 - Page 8 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Additional Material
Introduction
Chapter
1 - Page 9 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Introduction
Chapter
1 - Page 10 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Chapter 2
Introduction to Oracle
Applications Security
Objectives
When Role Based Access Control and Delegated Administration are added to the Data Security
and Function Security layers system administration tasks can be distributed to local
administrators who manage a subset of the organizations users.
End Users
Registration Processes and Self Service and Approvals further distribute system administration
by automating some registration tasks.
Function Security
The base layer of access control within Oracle Applications is Function Security. Function
Security restricts user access to the individual menus and menu options within the system. It
can also be used to control access to some specific widget (often, graphical in nature) within a
page. Each of these various elements is represented in the system as a function, which is also
known as a permission. Using the Order Entry page as an example, Function Security could
control whether you have the ability to create a new order, or even access the page.
Function Security
Data Security
The second layer represents Data Security. Working in conjunction with Function Security,
Data Security provides additional access control on the data a user can see and what actions a
user can perform on that data, within Oracle Applications. Note that Data Security is not used
in all Oracle Applications products. Products that do use data security include Oracle Projects,
Quality, and Cash Management.
Data Security Policies restrict the actions or operations that can be performed on a specific
business object (for example, inventory items). Data Security Policies can reflect access to:
All Instances All instances of an object represents all rows in the database object. For
example, assume that we have an object inventory item in the database. Creating a data
security policy for all instances of our object would result in providing access to every
single inventory item we have catalogued in the database.
An Instance Set An instance set is a related set of instances of an object. This
corresponds to a set of rows for the database object. Using our object example, an
instance set could be constructed to include all inventory items with a shelf life of 7 days.
A Specific Instance A specific instance generally corresponds to a single row in the
database. A specific instance is generally identified by a primary key value for the object.
Copyright Oracle Corporation, 2007. All rights reserved.
Data Security
Using our example, we could enter a unique serial number for the inventory item. This
would return one and only one inventory item from the database.
Example
Organizations can define roles that closely mirror their business situation. For example, an
organization can create an "Employee" role and assign that role to all of its employees. It can
also create an "External" role and assign that role to customers and suppliers. Further examples
may include specific roles such as "Support Agent", "Sales Rep", "Sales Managers". In these
examples, each role contains a specific level of access privileges that restricts its assignees to
the scope of their job functions. Some members of the organization will probably be assigned
more than one role. A sales representative would be assigned the Employee and Sales
Representative roles and a Sales Manager would be assigned the Employee, Sales
Representative, and Sales Manager roles. Roles and role assignments are stored in the
workflow directory, which is interpreted by the security system at runtime.
Delegated Administration
With delegated administration, instead of exclusively relying on a centralized administrator to
manage all of its users, an organization can create local administrators with sufficient
privileges to manage a specific subset of the organization's users and roles. This provides
organizations with a tighter, more granular level of security and the ability to easily scale their
administrative capabilities.
Administration Privileges
Administration Privileges determine the users, roles and organization information delegated
administrators (local administrators) can manage. Each privilege is granted separately, yet the
three work in conjunction to provide the complete set of abilities for the delegated
administrator.
User Administration Privileges
A local administrator must be granted User Administration Privileges to determine the users
and people the local administrator can manage. Local administrators can be granted different
privileges for different subsets of users. For example, a local administrator can be granted
privileges only to query one set of users, and granted full privileges (including update and reset
Delegated Administration
password) for another set. Local administrators cannot query users for which they do not have
administration privileges.
Role Administration Privileges
Role Administration Privileges define the roles local administrators can directly assign to and
revoke from the set of users they manage.
Organization Administration Privileges
Organization Administration Privileges define the organizations a local administrator can view
in the system. This privilege enables an administrator to search for people based on their
organization, if the local administrator has additionally been granted access to view the people
in that organization (User Administration Privileges). Depending on the user administration
privileges, an administrator may have the ability to register new people for that organization.
Example
Organizations can internally designate administrators at division or even department levels,
and then delegate administration of external users to people within those (external)
organizations. These delegation policies are defined as data security policies. The set of data
policies defined as part of delegated administration are known as Administration Privileges.
Registration Processes
Oracle User Management contains the following registration processes.
Self-Service Account Requests
Commonly referred to as Self Service Registration, self-service account requests provide a
method for persons to request a new user account. Consider the case where customers may
need to register before they can purchase an item from an online store. Once the customer has
completed the registration process, the customer obtains both a user account and the necessary
role(s) for accessing some portion of the website in which they registered.
Requests for Additional Access
Users can request additional access through the Oracle User Management Access Request Tool
(ART) available in the global preferences menu. Requests for Additional Access uses the same
Oracle User Management infrastructure and processing logic as Self Service Account
Requests.
Account Creation By Administrators
Administrators can benefit from existing registration processes designed to streamline the
process of creating and maintaining user access. Registration Processes of this type are geared
toward administrators, especially delegated administrators, to ensure consistent application of
Copyright Oracle Corporation, 2007. All rights reserved.
Registration Processes
the client's user security policies. Each account creation registration process can be made
available to select local administrators. Local administrators can perform these tasks for users
within their own organizations.
Summary
Chapter 3
Function Security
Chapter
3 - Page 1 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Function Security
Function Security
Chapter
3 - Page 2 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Function Security
Function Security
Chapter
3 - Page 3 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Lesson Aim
Function Security restricts user access to individual menus of functions, such as forms, HTML
pages, or widgets (such as buttons in a form) within an application. Function Security allows
you to define a user and assign the user one or more responsibilities, where each responsibility
has a menu associated with it. Function Security by itself restricts access to various functions,
but it does not restrict access to the data a user can see or what actions a user can perform on
that data. This lesson discusses defining users, responsibilities, and menus.
Function Security
Chapter
3 - Page 4 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Objectives
Function Security
Chapter
3 - Page 5 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Function Security
Chapter
3 - Page 6 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Function Security
Chapter
3 - Page 7 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Custom Applications
An application is composed of components such as forms, menus, and concurrent programs.
An application serves as a unique context for these components. The next three slides discuss
necessary steps in implementing security for a custom application.
Function Security
Chapter
3 - Page 8 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Custom Applications
Defining an Application
(N) Application > Register
You can protect custom functions, forms, reports, and programs from being lost during
upgrades by registering them under a custom application.
In the Applications window you will supply the following information:
Application Enter a user-friendly name that will appear in lists seen by the user.
Short Name Oracle Applications uses this short name to identify forms, menus,
concurrent programs, and other components of your application.
Basepath Enter the base path where the forms, reports, and program files are located.
Make sure your base path is unique to prevent other applications from writing to the same
directory.
For a complete explanation of the fields in this form see:
(Help) Applied Technology > Oracle Applications System Administration > Configuration >
Applications DBA > Applications Window
Function Security
Chapter
3 - Page 9 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Defining an Application
Registering an Oracle ID
(N) Security > ORACLE > Register
You need to register an Oracle ID if you create a custom application using Oracle Application
Object Library.
Note that:
Only database administrators can create Oracle accounts.
Only create a new Oracle ID for a custom extension to Oracle Applications.
The install group designates which data group the application is associated with. For
applications that span all data groups, the install group is 0. Install groups numbered 1 or
greater are associated with one specific data group. Your database administrator can
supply the correct install group number.
Function Security
Chapter
3 - Page 10 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Registering an Oracle ID
Function Security
Chapter
3 - Page 11 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Data Groups
Function Security
Chapter
3 - Page 12 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Securing Functions
You can manage security by controlling access to individual functions through menu
definitions.
About Functions
A function is a set of code in Oracle Applications that is executed only if the name of the
function is present in a list maintained within a responsibility.
There are two types of functions: a form function and a nonform function or subfunction.
A subfunction represents a securable subset of a forms functionality.
Adding Functions to or Removing Functions from a Responsibility
Maintain menu structures while eliminating specific functionality.
Exclude individual functions from a responsibility.
Adding or Removing Menus of Functions
Use menus to group functions together.
Exclude groups of functions by excluding a menu from a responsibility.
Function Security
Chapter
3 - Page 13 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Securing Functions
Function Security
Chapter
3 - Page 14 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Defining a Menu
Assign the menu structure to the new responsibility by using the responsibilities form.
Document your menu structure by printing the Function Security Menu Report.
Function Security
Chapter
3 - Page 15 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Function Security
Chapter
3 - Page 16 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Menu Guidelines
Function Security
Chapter
3 - Page 17 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Creating a Menu
Use the Menus window to create a menu:
(N) Application > Menu
After you save your changes in this form, the Compile Security concurrent program is
automatically submitted to compile the menu data. Compiling your menu data allows for the
system to determine more quickly, during a users session, whether a function is available to a
particular responsibility or menu.
New Menus form fields:
Menu Type used to specify the purpose of the menu. The possible values are:
- Standard for menus that would be used in the Navigator form
- Tab for menus used in Self-Service applications
- Security for menus used to aggregate functions for data security or specific function
security purposes, but would not be used in the Navigator form.
Grant check box checking this box indicates that this function is automatically enabled
for the user.
For a complete explanation of the fields on this form see:
Copyright Oracle Corporation, 2007. All rights reserved.
Function Security
Chapter
3 - Page 18 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Creating a Menu
(Help) Applied Technology > Oracle Applications System Administration > Security >
Function Security > Menus Window
Note: If a menu entry has both a submenu and a function defined, then the behavior depends
on whether or not the function is executable. If it is executable, then the submenu is treated as
content to be rendered by the function. The submenu will not appear on the navigation tree, but
will be available in function security tests (FND_FUNCTION.TEST calls). If the function is
not executable, then it is treated as a tag for enforcing exclusion rules, and the submenu is
displayed on the navigation tree.
A function is considered executable if it can be executed directly from the current running user
interface.
Function Security
Chapter
3 - Page 19 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Modifying a Menu
You can modify existing custom menus to suit specific job functions.
Overwrite a User Menu Name
When you change a menus user menu name, the menu entries are not affected. The menus
definition still exists, but under a new name. Other menus that call the menu by its old user
menu name now call the same menu by its new (revised) user menu name.
The old user menu name is no longer valid. When you are defining menus, or if you are
selecting main menus when defining a responsibility, the previously named menu is no longer
displayed in any list of values.
Modify a Menu Entry
When you are modifying a previously defined menu, all other menus that call that menu
display the menus modifications. For example, if you modify XXX_GL_USER by adding
another prompt that calls a form, all menus that call GL_SUPERUSER4.0 display the
additional prompt when XXX_GL_USER is displayed.
Note: Modifying shipped menu definitions is not supported. The customized definitions may
be overwritten during an upgrade process.
Function Security
Chapter
3 - Page 20 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Function Security
Chapter
3 - Page 21 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Navigator Menus
Function Security
Chapter
3 - Page 22 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Function Security
Chapter
3 - Page 23 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Function Security
Chapter
3 - Page 24 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Function Security
Chapter
3 - Page 25 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Using Responsibilities
After you have defined a new responsibility, you can associate it with an application user.
Function Security
Chapter
3 - Page 26 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Components of a Responsibility
A responsibility has two required components and two optional components.
Required Components
Data group: specifies the Oracle Application database accounts to which a responsibilitys
forms and concurrent programs connect.
Menu: specifies the forms that a responsibility can display and the functions it can access.
Optional Components
Request security group: lists the concurrent programs that a responsibility can run. When a
request group is assigned to a responsibility, it is referred to as a request security group.
Exclusions: modify a responsibilitys access to the forms and functions specified by a
menu.
Function Security
Chapter
3 - Page 27 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Responsibility Components
Function Security
Chapter
3 - Page 28 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Function Security
Chapter
3 - Page 29 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Defining a Responsibility
(N) Security > Responsibility > Define
A responsibility determines the type of applications a user accesses, which application
functions a user can use, which reports and concurrent programs the user can run, and which
data those reports and concurrent programs can access. Most responsibilities are available
from Oracle Applications (the Forms navigator or the HTML-based E-Business Suite Home
page), others may be accessible from Oracle Self-Service Web Applications or Oracle Mobile
Applications.
Function Security
Chapter
3 - Page 30 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Function Security
Chapter
3 - Page 31 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Lesson Summary
Function Security provides you with the ability to control Oracle Applications Security. The
system administrator specifies which users have access to which functions. User accounts
provide the user access to an application. Responsibilities control that users access to various
functions of the application. Online access is controlled through the use of menus and menu
exclusions. Report and concurrent program access is controlled through the use of request
groups.
Function Security
Chapter
3 - Page 32 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Summary
Chapter 4
Data Security
In this section, references to specific applications are used as examples only. Data Security is
not implemented in all Oracle Applications products. Some applications may require
organizations to create multiple responsibilities to operate with their existing security models.
For more information, please consult the application-specific documentation.
This section is meant to introduce data security and its concepts only. Custom implementation
of data security or modification of shipped data security policies is not covered and is beyond
the scope of this course. Extreme care should be taken if any customization or modification is
done with data security implementations.
Objectives
Introduction
Working in conjunction with Function Security, Data Security provides additional access
control on the data a user can see and what actions a user can perform on that data. Using Data
Security, for example, you could control access to the set of orders that an order administrator
can update within the Order Management application.
Data Security Policies restrict the actions or operations that can be performed on a specific
business object (for example, inventory items). Data Security Policies can reflect access to:
All Instances All instances of an object represents all rows in the database table or view.
For example, assume that we have an object inventory item in the database. Creating a
data security policy for all instances of our object would result in providing access to
every single inventory item we have catalogued in the database.
An Instance Set An instance set is a related set of instances of an object. This
corresponds to a set of rows in the database. Using our object example, an instance set
could be constructed to include all inventory items with a shelf life of 7 days.
A Specific Instance A specific instance generally corresponds to a single row in the
database. A specific instance is generally identified by a primary key value for the object.
Using our example, we could enter a unique serial number for the inventory item. This
would return one and only one inventory item from the database.
Objects
(N) Functional Developer responsibility > Objects
An object is a system entity on which an operation can be performed. In Oracle Applications,
an object typically maps to records in relational tables/views, Forms/HTML pages, and UI
widgets. Examples in Oracle Applications include: a person, an machine, and a file.
Examples of operations include: Create, Update, Escalate, Approve, and Reject. In Oracle
Applications, operations are implied by a permission definition. Permission has been defined
as an operation on a object; for example, Invoke Service Request Form, Update Order,
Approve Expense Report, and Query Customers.
An object instance is a specific example of an object, such as Project Number 123 or User
JDOE. An object instance generally corresponds to a row in the database, and is identified by
a set of one or more primary key values as defined by the object.
Related object instances can be grouped together into an object instance set.
Grants
(N) Functional Administrator Responsibility > Grants
Grants are used to provide specified users access to specific objects or functions.
Grants that deal with business objects are called Data Security Policies.
Grants can also be used to control access to an application's functionality. For example, you
could use a grant to secure an aspect of a menu, page, or other widget within the application.
For example, you want to provide access to a set of administrative menus to a select group of
users.
The grantee defines who is being granted access. The grantee can be one of three types:
A group of users
A specific user for example, Joe Smith
All users (global) all users of the system, except the Guest account
Grants
Permissions
The Role Based Access Control (RBAC) Model defines permission as "an approval to perform
an operation on one or more RBAC-protected objects." This definition maps to what has been
referred to as functions earlier. Permissions can be grouped into permission sets.
Permission sets can be granted to users or roles independently of menus or responsibilities.
Permission assignments, or Grants, reflect the access granted to users through roles.
Permissions are discussed more in the User Management lessons.
Summary
Chapter 5
Objectives
Example
An organization can use Function Security to provide its sales representatives with the required
pages, menus, and menu options for querying customers. It can also control access to specific
components of those pages, such as a "Generate Sales Forecast" button on a sales forecasting
page.
Function Security
Responsibilities
Responsibilities have a menu tree in which available menus are defined with a grant flag. On
being assigned a responsibility, a user gains access to all menus on the menu tree except those
for which an exclusion has been defined. In the above example, Menu 2 has been excluded
from the menu tree. When the user is assigned the corresponding responsibility, the user can
access Menu 1, Menu 3, and Menu 4.
Responsibilities
Example
Data Security restricts the set of users that a local administrator can manage and administer
within Oracle User Management. Data Security policies can only be defined for applications
that have been written to utilize the Data Security Framework.
Data Security
Delegated Administration
Delegated Administration is a privilege model that builds on the RBAC system. With
delegated administration, instead of exclusively relying on a centralized administrator to
manage all of its users, an organization can create local administrators and grant them
sufficient privileges to manage a specific subset of the organization's users and roles. This
provides organizations with a tighter, more granular level of security and the ability to easily
scale their administration.
Administration Privileges
Administration Privileges determine the users, roles and organization information that
delegated administrators (local administrators) can manage. Each privilege is granted
separately, yet the three work in conjunction to provide the complete set of abilities for the
delegated administrator.
User Administration Privileges: A local administrator must be granted User
Administration Privileges to determine the users and people he can manage. Local
administrators can be granted different privileges for different subsets of users.
Role Administration Privileges: Role Administration Privileges define the roles that
local administrators can directly assign to and revoke from the set of users they manage.
Copyright Oracle Corporation, 2007. All rights reserved.
Delegated Administration
Provisioning Services
Oracle User Management includes the following provisioning services, implemented as
registration processes:
Self-Service Account Requests
Commonly referred to as Self Service Registration, self-service account requests provide a
method for persons to request a new user account. For example, customers may need to register
before they can purchase an item from an online store. After completing the registration
process, the customer obtains both a user account and the necessary roles for access to the
store.
Requests for Additional Access
Users can request additional access through the Oracle User Management Access Request Tool
(ART) available in the global preferences menu. Requests for Additional Access uses the same
Oracle User Management infrastructure and processing logic as Self Service Account
Requests.
Account Creation By Administrators
Administrators can benefit from existing registration processes designed to streamline the
process of creating and maintaining user access. Registration Processes of this type are geared
Copyright Oracle Corporation, 2007. All rights reserved.
Provisioning Services
Login Assistance
System administrators often have to reset a user's forgotten password, or even advise a user of
the account's user (login) name. This is unproductive for both the user and the administrator. In
addition, a user may request the password to be reset, when it is actually the user name that has
been forgotten, or vice versa.
A new feature in Release 12 helps reduce the time spent on such administrative activities, by
implementing a login help mechanism on the E-Business Suite Login Page. A user simply
clicks on the "Login Assistance" link located below the Login and Cancel buttons. On the
screen that appears, the user can choose between the Forgot Password and Forgot Username
sections.
Login Assistance
Summary
Chapter 6
Objectives
Introduction to Roles
In previous releases of Oracle Applications, access to individual functions within an
application could only be defined through responsibilities, menu hierarchies, and menu
exclusions. New responsibilities had to be defined for each set of users (with different job
functions) that needed access to a set of pages within an application. These responsibilities
required either:
Completely new menu hierarchies for each responsibility
A common menu covering the superset of all functions within the application, and menu
exclusion rules defined for each responsibility
An example is the Human Resources product, which typically has at least two responsibilities
defined, one for employees and one for managers.
In essence, responsibilities have been used not only to define the application navigation menus,
but also the privileges and permissions within an application. Cost of ownership and
management has increased with the number of responsibilities, as multiple complex menu
hierarchies and/or exclusion rules must be maintained.
Oracle User Management provides new alternatives for defining access to an application,
allowing organizations to separate navigation menus from access control.
Copyright Oracle Corporation, 2007. All rights reserved.
Introduction to Roles
Examples of Roles
In this example, the manager is granted both the employee role and the manager role, since the
manager effectively functions as both.
Examples of Roles
Role Categories
(responsibility) and its menu hierarchy are controlled by different roles, each representing a
specific job function or set of people.
Steps for Creating Roles: Create a Role within the Role Category
Create a role and include it within the role category. In this scenario, the role is Customer
Administrator. This role is created for an external organization, and is assigned to individuals
who manage the external organizations users.
Oracle User Management ships with three seeded roles, Partner Administrator, Customer
Administrator, and Security Administrator. The business scenarios and practices in this course
assume that the Customer Administrator role must be created and configured to function with
the other two.
Note: Many of the practices in this course involve creating, configuring, and testing the
Customer Administrator role. Since Oracle User Management already ships with this role, the
practices require students to create a Course Administrator role that is essentially an exact copy
of the seeded Customer Administrator role. Students can compare their Course Administrator
role to the seeded Customer Administrator role; the two should be identical.
Steps for Creating Roles: Create a Role within the Role Category
Delegated Administration
Registration Processes
Oracle User Management contains the following registration processes:
Self-Service Account Requests
Commonly referred to as Self-Service Registration, self-service account requests provide a
means for people to request a new user account. For example, customers may need to register
before they can purchase an item from an online store. After completing the registration
process, the customer obtains both a user account and the necessary role(s) to access the store.
Requests for Additional Access
Users can request additional access through the Oracle User Management Access Request Tool
(ART), available on the global preferences menu. Requests for Additional Access uses the
same Oracle User Management infrastructure and processing logic as Self-Service Account
Requests.
Account Creation By Administrators
Administrators can benefit from existing registration processes designed to streamline the
process of creating and maintaining user access. Registration Processes of this type are geared
toward administrators, especially delegated administrators, to ensure consistent application of
Registration Processes
the client's user security policies. Each account creation registration process can be made
available to select administrators.
Active To: Date you can (optionally) specify to terminate the registration process.
Using Proxy Mode turns on Page Access Tracking, to enable auditing of pages visited by the
user when acting as a proxy. Go to Preferences > Manage Proxies > Run Proxy Report
Self-Service Features
Self-Service Features
Login Assistance
System administrators often have to reset a user's forgotten password, or even advise a user of
the account's user (login) name. This is unproductive for both the user and the administrator. In
addition, a user may request the password to be reset, when it is actually the user name that has
been forgotten, or vice versa.
A new feature in Release 12 helps reduce the time spent on such administrative activities, by
implementing a login help mechanism on the E-Business Suite Login Page. A user simply
clicks on the "Login Assistance" link located below the Login and Cancel buttons.
On the login assistance screen that appears, the user can either go to the Forgot Password
section and enter the correct user name, or to the Forgot Username section and enter the email
address associated with the account. The user will then either be emailed either password reset
details or the user name, as applicable.
For security, the relevant data is stored securely in workflow tables, and the secure URLs
employed by the mechanism have both an expiration time and a single-use limitation.
Login Assistance
Summary
Chapter 7
Profile Options
Chapter
7 - Page 1 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Options
Profile Options
Chapter
7 - Page 2 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Options
Chapter
7 - Page 3 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Lesson Aim
As a system administrator, you control various options in Oracle Applications that determine
how your applications look and feel. These options can also control how each application
operates. This lesson shows you how to specify these values.
Profile Options
Chapter
7 - Page 4 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Objectives
Profile Options
Chapter
7 - Page 5 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Options
Chapter
7 - Page 6 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Options
Chapter
7 - Page 7 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Options
Chapter
7 - Page 8 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Options
Chapter
7 - Page 9 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Options
Chapter
7 - Page 10 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Options
Chapter
7 - Page 11 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Categories
(N) Functional Administrator responsibility > Core Services > Profile Categories
Profile options can be grouped into logical categories based on their functional area. A profile
option can belong to more than one profile category.
You can create new or update existing profile categories.
The following slides describe some of the more commonly-used profile options. They do not
represent all the profile options included in each listed profile category.
Profile Options
Chapter
7 - Page 12 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Categories
Profile Options
Chapter
7 - Page 13 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Form performs the Responsibility-level audit and also tracks the forms the users choose
and how long each form is used.
Profile Options
Chapter
7 - Page 14 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Options
Chapter
7 - Page 15 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Currency-Related Options
Profile Options
Chapter
7 - Page 16 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Flexfield-Related Options
BiDi Direction
This option controls the appearance of the flexfields window in Applications running in
Semitic languages.
LOV Warning Limit
Sometimes an LOV can take a very long time to run if there is a very significant amount of
data in it. Set this option to the number of rows to be returned before you are asked to continue
retrieving the entire list.
Open Descr Window
This option allows you to control whether a descriptive flexfield window automatically opens
when you navigate to a customized descriptive flexfield.
Profile Options
Chapter
7 - Page 17 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Options
Chapter
7 - Page 18 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Options
Chapter
7 - Page 19 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Options
Chapter
7 - Page 20 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Options
Chapter
7 - Page 21 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Profile Options
Chapter
7 - Page 22 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Signon Password Length sets the minimum length of an Applications signon password. If no
value is entered, the minimum length defaults to 5.
Signon Password No Reuse
This profile option specifies the number of days that a user must wait before being allowed to
reuse a password.
Profile Options
Chapter
7 - Page 23 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Lesson Summary
An important function of the system administrator is to control the default behavior and
appearance of Oracle Applications. This is done by specifying profile values. In this lesson you
saw how to display and update profile values. You also learned how to reference previously
defined profile values elsewhere in Oracle Applications.
Profile Options
Chapter
7 - Page 24 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Summary
Chapter 8
Lesson Aim
As system administrator you may audit application users and the changes they make to
application data. You will learn how both of these options are set and why you use them.
Objectives
Reports
The Signon Audit feature can generate several reports detailing information gathered by
Signon Audit. These reports are shown in the figure.
Signon Audit Forms
Signon Audit Users
Signon Audit Responsibilities
Signon Audit Concurrent Requests Report
Signon Audit Unsuccessful Logins Report
Audit Groups
(N) Security > AuditTrail > Groups
Once you have your tables and columns identified, you should group those tables into an audit
group. In the figure, the three tables mentioned have been placed together in a Receivables
Internal Control audit group.
Summary
Chapter 9
Managing Printers
Chapter
9 - Page 1 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Managing Printers
Chapter
9 - Page 2 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Managing Printers
Chapter
9 - Page 3 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Lesson Aim
Installing a new printer is a typical responsibility of the system administrator. A less common
need is to customize the software that supports printers. This lesson covers the basics of
printer setup and the Pasta printing utility. References for additional information on
customizing your printer setup are also provided.
To set up your printers, you can either use the Pasta utility, in which you enter configuration
data in a file called pasta.cfg, and use predefined components. Alternatively, you can use the
printing setup windows to define your components and enter configuration information.
Managing Printers
Chapter
9 - Page 4 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Objectives
Managing Printers
Chapter
9 - Page 5 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Chapter
9 - Page 6 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Chapter
9 - Page 7 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Formatting Information
For a printer to produce a report, it requires three basic types of formatting instructions: text,
document, and printer.
Text Formatting
Oracle Reports generates reports for the various Oracle Applications.
When Oracle Reports formats text as bold or underlined, and sets page breaks, formatting
codes are used.
A SQL*ReportWriter (SRW) driver defines text formatting codes used by Oracle Reports.
Document Formatting
The dimensions for a report output file are predefined as the number of rows and columns
(height and width).
A print style defines the dimensions for a report output file.
Printer Formatting
A printer prints in a certain orientation, portrait or landscape.
A printer can also start printing with a specific font and type size. These instructions are
contained in an initialization string.
Copyright Oracle Corporation, 2007. All rights reserved.
Managing Printers
Chapter
9 - Page 8 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Formatting Information
Managing Printers
Chapter
9 - Page 9 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Chapter
9 - Page 10 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Defining Printers
Managing Printers
Chapter
9 - Page 11 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Chapter
9 - Page 12 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Chapter
9 - Page 13 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Chapter
9 - Page 14 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Chapter
9 - Page 15 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Chapter
9 - Page 16 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Chapter
9 - Page 17 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Chapter
9 - Page 18 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
2. In the Style field, select the style to which you want to assign a Pasta driver. Or, if you are
assigning Pasta to a style already defined for the printer type, delete the driver in the
Driver Name field currently associated with the style.
3. In the Driver Name field, select the appropriate Pasta driver.
Adding a New Printer Type to Use Pasta
If you want to add a new printer type, you can also add Pasta to your new printer type.
1. Navigate to the Printer Types window.
2. Enter the Type of printer.
3. In the Style field use the list of values to select the style to which you want to assign a
Pasta driver.
4. In the Driver Name field, select the appropriate Pasta driver from the list of values:
- PASTA_LANDSCAPE
- PASTA_PORTRAIT
- PASTA_LANDWIDE
- PASTA_DYNAMIC
Managing Printers
Chapter
9 - Page 19 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Chapter
9 - Page 20 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
To use a converter, change the Pasta configuration file to call a third party package to convert
the PDF to PS or PCL. Pasta can use a preprocessing command to invoke any executable that
supports an input file and an output file (a filter program). The third party package can be an
open source solutions such as Ghostscript and XPdf.
Pasta invokes the filter program to preprocess the XML Publisher output before passing it to
the printing command. By using the preprocess option, you can generate output formats other
than the formats currently supported by Pasta.
For more information, see the Pasta 3.0.4.0 User's Guide for Release 12 in OracleMetaLink
Note 239196.1.
Managing Printers
Chapter
9 - Page 21 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Customization Considerations
You can customize Oracle Applications printer support components to use custom print styles
and custom print programs. For information on how to do customize these components, use
the references below.
Materials Needed
Manual for your specific printer to look up control codes required by a printer type
Installing Oracle Applications for your platform to look up control codes required by an
operating system platform
Oracle Applications System Administrators Guide Configuration
Pasta 3.0.4.0 User's Guide for Release 12 in OracleMetaLink Note 239196.1
Managing Printers
Chapter
9 - Page 22 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Summary
Managing Printers
Chapter
9 - Page 23 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Chapter
9 - Page 24 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Chapter 10
Introduction to Oracle
Applications Manager
Objectives
Introduction
Oracle Applications Manager is a system management console. It provides a wide variety of
features related to system management for use by DBAs, System Administrators, and
Technical Support personnel.
Oracle Applications Manager allows you to monitor and control E-Business Suite system
components. It can help you to understand how the performance and availability of those
components affects your business. When problems arise, Oracle Applications Manager
provides a variety of features to help you diagnose and resolve those problems quickly to
reduce any necessary downtime. Oracle Applications Manager helps you manage your system
configuration by enabling you to make and track configuration changes as well as identify
potential configuration problems. Additionally, Oracle Applications Manager helps you track
periodic maintenance activities and facilitates the patching process.
The pre-defined Oracle Applications Manager Administrator Menu is available from the
System Administration responsibility.
Benefits
Oracle Applications Manager provides features to manage all aspects of the Oracle E-Business
Suite.
During system implementation, Oracle Applications Manager automates configuration tasks
and enables you to tighten security on the system. OAM can also help in keeping the system
up-to-date with the latest E-Business Suite patches.
Oracle Applications Manager automates system monitoring, facilitates daily administration,
and helps speed problem resolution.
For maintenance or upgrades, OAM helps identify necessary updates, provides an analysis of
the potential impact of those updates, and delivers tools to facilitate and minimize any required
downtime.
Navigation
You can access OAM from the System Administration responsibility or the System
Administrator responsibility. A seeded menu, Oracle Applications Manager Administrator
Menu (OAM_ADMIN_MENU) is available from these responsibilities. In addition, individual
OAM functions can be added to custom menus. Direct links to specific Oracle Applications
Manager features are possible from the E-Business Suite Home Page.
The OAM console includes:
The Applications Dashboard, which includes tabs and a dropdown list for quick access to
commonly-used features
The Site Map, which contains links to all features within OAM
Global buttons/links for setup, the Support Cart, your home page, and online help
Navigation in OAM
Applications Dashboard
The Applications Dashboard provides a comprehensive summary of the Oracle E-Business
Suite components including:
An overview of configuration changes and the status of infrastructure components
Performance information
Required critical maintenance activities
Diagnostic test results
The status of key business flows
Potential security issues
Software updates
In addition, a dropdown list provides quick access to commonly-used pages and features,
including:
Configuration Overview
Forms Sessions
Database Status
Copyright Oracle Corporation, 2007. All rights reserved.
Applications Dashboard
Applied Patches
Patch Wizard
Workflow Manager
Site Map
The Site Map provides links to most pages in OAM, in these categories:
Administration
Monitoring
Maintenance
Diagnostics and Repair
Site Map
Administration
Monitoring
Maintenance Features
Patching utilities are available from the Site Map > Monitoring tab. These are described in the
12 Install, Patch, and Maintain Oracle Applications course.
Critical activities are activities that must be run periodically. They are monitored to ensure they
are being run. Examples include refreshing an Employee Directory or purging obsolete data.
Maintenance
Summary
Chapter 11
Objectives
System Overview
(N) Applications Dashboard > Overview (T)
The Overview tab of the Applications Dashboard provides an overview of the general status of
your system.
Applications System Status
The status of each host is shown.
Platform - the host's operating system.
Host Status indicates whether the host is up or down.
Admin - indicates whether the Admin server has been installed on the host machine.
Database - indicates the status of the database instance installed on the host machine.
Concurrent Processing- indicates the status of the Internal Concurrent Manager and the
services managed by the ICM.
Forms - indicates the status of the Forms Server components: Forms Listener, Metrics
Server, Metrics Client, and OAM Generic Collection Service.
Web - indicates the status of the Apache Web Listener.
For the Database column, you can click on the icon(s) in the column to drill down to more
information on the database status.
For Concurrent Processing, you can click on the icon(s) in column to drill down to more details
on the status of concurrent managers and their concurrent processes.
Other regions are discussed on the following slides.
Configuration Changes
This region shows system-level changes that were made in the last 24 hours. Use this data to
help diagnose sudden changes in the functioning of your applications system.
To see the list of Patches Applied, click on the number to drill down to the Patch Summary
page.
To see the list of Site Level Profile Options, click on the number to drill down to the Site Level
Profile Settings page.
To see the list of Applications Context Files Edited, click on the number to drill down to the
Applications Configuration Parameters page. Changes made to context files can impact your
overall processing configuration and the functioning of business processes.
System Alerts
Use the System Alerts region to find out about critical events to your system. Examples of such
events are a halted process or a program that returned an error.
This region lists the number of system alerts in the categories listed below.
If your system is functioning well, there should be no new alerts reported. When an alert of a
particular type first occurs, it is counted as a new alert. It remains new until the status is
manually changed by the administrator. If an alert of the same type occurs again while the
original alert is still in open or new status, it is counted as a new occurrence.
New Alerts - alerts that have not yet been acknowledged by the administrator. An alert is
acknowledged when it is manually moved from a status of "New" to a status of "Open" or
"Closed."
New Occurrences - additional occurrences of alerts that are in new status.
Open Alerts - all alerts that are in an open status. An alert must be manually moved from
the new to open status.
Open Occurrences - all occurrences of alerts that are currently open.
Click on the number for any of these to drill down to the System Alerts and Metrics page.
Copyright Oracle Corporation, 2007. All rights reserved.
(Help) Applied Technology > Oracle Applications System Administration > Maintenance >
Overview of Monitoring Oracle Applications > System Alerts, Metrics, and Logs
Performance
(N) Applications Dashboard > Performance (T)
Application Tier Hosts
Database Sessions - the number of active database sessions. Clicking the value link returns
a page showing all active database sessions.
Running Requests - drills down to the Search for Requests Results page showing
information on all currently running requests.
Forms Sessions - the number of running Forms sessions. Drills down to the Forms
Sessions page.
- The Forms Sessions page shows information including the following: username,
auditing session ID or AUDSID (from which you can drill down for database session
information), CPU usage, and duration.
- The Active Database Sessions includes the following information - AUDSID,
machine, program, and module.
Service Processes - drills down to the System Activity page. Service processes include all
concurrent manager processes and all processes managed by the ICM. If you have set up
Copyright Oracle Corporation, 2007. All rights reserved.
Performance
your system to have other services managed by Generic Service Management (GSM),
those services are included as well.
- GSM is an extension of concurrent processing and provides a framework for
managing processes on multiple host machines. With GSM, the Internal Concurrent
Manager manages various service processes across multiple hosts.
Database Instances
Database Sessions - the number of active database sessions. Clicking the value link returns
a page showing all active database sessions.
Running Requests - drills down to the Search for Requests Results page showing
information on all currently running requests.
Forms Sessions - the number of running Forms sessions. Drills down to the Forms
Sessions page.
- The Forms Sessions page shows information including the following: username,
auditing session ID or AUDSID (from which you can drill down for database session
information), CPU usage, and duration.
- The Active Database Sessions includes the following information - AUDSID,
machine, program, and module.
Activity
Services Up - the number of service instances whose target services match the actual
services.
Services Down - the number of service instances whose target services do not match the
actual services.
Unsent Workflow E-mail
Critical Activities
(along with the associated occurrences) in OAM.. You can also add notes to alerts; for
example, to indicate how the problem was resolved.
Metrics
Not all exception conditions can be immediately detected directly within an Oracle
Applications component, but are best detected through external analysis. Some are detected by
measuring certain criteria, such as decreasing transaction throughput for a component or
excessive completion times for a business process. External analysis allows for easier
comparison of current and historical metric values, consideration of metrics from multiple
products and components., and end-user defined exception triggers. These exceptions are
analogous to "events" in Oracle Enterprise Manager where the use specifies the specific
conditions that will trigger an alert.
Logs
System Logs are general log messages that are logged by the various components in an
Applications System. These log messages can be logged by the developer of the components at
the following levels:
Unexpected
Error
Exception
Event
Procedure
Statement
Business Flows
You can define your own custom business flows. Once you have identified the flows that you
would like to monitor, Oracle Applications Manager allows you to control monitoring at the
flow, sub-flow, and system component levels.
Business Flow Details
When you drill down to the monitoring details for a flow, you see the hierarchical
representation of that flow and the associated system components. For each system component
you can see the number of system alerts, concurrent request errors, and Oracle Workflow work
item errors where applicable. You can drill down on the links for more information on the
individual alerts or errors. Also, you can see that the alert and error statistics are rolled up
through sub-flows and flows to show the ripple effects of each on your business flows.
You can also edit a custom flow. You are able to update the name or description of a flow or
sub-flow, and add or delete a new sub-flow or system component to the hierarchy. This page
allows you to define and edit your custom flows. Your custom flows show as type User
Defined and will have an link in the edit column to take you to the editing page. To create a
new flow, click on the Create button.
See the Oracle Applications System Administrators Guide Maintenance for more
information on business flows.
Security tab of the Applications Dashboard. For more information, see the Oracle
Applications Supportability Guide.
Application Services
(N) Site Map > Administration Tab > Application Services > Generic Services
You can configure, monitor, and control application services from the System Activity page for
services. These services are managed under Generic Service Management (GSM). GSM
allows you to manage a variety of services using a fault-tolerant framework. The Application
Services lets you drill down to details for instances of each service and view the instances'
statuses and processes.
Application Services
Monitoring Forms
When a potential runaway process is detected, a System Alert will be posted. As with any
system alerts, you can subscribe to receive notifications via Workflow, so that you dont have
to keep checking back in Oracle Applications Manager for new alerts.
Oracle Applications Manager provides you with a list of the possible runaway processes, and
gives you the option of terminating individual processes once you have confirmed that they are
indeed runaways.
Forms Runaway Processes Page
The Forms Runaway Processes page allows you to configure the thresholds for the feature, and
view the current list of potential runaway processes. Here you can set the values for the
maximum amount of memory that a process should allocate, the maximum percentage of
server CPU that a process should consume, and the maximum amount of time that a process
should every stay alive.
When a runaway process is discovered, a system alert will be posted, and the process will
appear in the table. The table will list middle tier details, including host, PID, memory size,
CPU percentage, and total runtime. You can also see the E-Business Suite user who owns the
process, and the IP address of the client connected to the process.
Once you have confirmed that a process is truly a runaway, you can use the Terminate button
to kill the process.
Forms Sessions
(N) Site Map > Monitoring (T) > Forms Sessions (under Performance or Current Activity)
This page shows information on the current forms sessions. Every open form has its own
database session, or "Forms session." The profile option "Sign-On:Audit Level" should be set
to 'Form' to use this feature. If this profile option is not set to 'Form', the Forms Sessions table
will show an empty table even when there are active forms sessions.
The following data is shown for each session:
Form Name
AUDSID - The auditing session ID. Click on the value to drill down to the Database
Session information page.
RTI_PID - The runtime instance process ID. Click on the value to drill down to the Forms
Sessions for Process ID page.
Username
Responsibility
Application
Forms Sessions
LRs (Session Logical Reads) - Input/output (I/O) is one of the most expensive operations
in a database system. SQL statements that are I/O-intensive can monopolize memory and
disk use and cause other database operations to compete for these resources. To prevent
single sources of excessive I/O, Oracle lets you limit the logical data block reads per call
and per session. Logical data block reads include data block reads from both memory and
disk. The limits are set and measured in number of block reads performed by a call or
during a session.
PRs (Physical Reads) - The total number of data blocks read from the disk for the session.
CPU
PGA (Session Program Global Area memory) - The PGA is a memory buffer that contains
data and control information for a server process. A PGA is created by Oracle when
a server process is started. The information in a PGA depends on the configuration
of Oracle.
UGA - User Global Area memory used by the session.
Duration - in HH:MM:SS
Click on the Session Details button or the AUDSID to view database information for the
selected forms session.
Use the Diagnostics ON/OFF button to turn on or off the Forms Runtime Diagnostics (FRD)
for the runtime process.
Forms Sessions for Process ID
If you click on the RTI_PID from the Forms Sessions page, or if you click on the PID from the
Forms Runtime Processes page, you will see the fields described above as well as the
following data for the Process ID:
Client IP Address
Server Host Name
CPU Time
Memory Usage (KB)
Diagnostics (On/Off)
Log File Name
Client IP Address - The IP address of the client machine used to connect to the Forms
Services.
Username - The database username used by the Forms application for the user session.
Diagnostics - On/Off
Last Update Time
Click on the Sessions button or click on the PID to view the Forms Sessions for Process ID
page.
This page also shows the runtime processes from the Forms Servlet Listener, if any. The Port
column for such processes indicates the Apache Listener port.
Forms Listener versus Forms Listener Servlet
The Forms Listener is a process running on a specific port on the server machine. When the
connection between the client and the Forms runtime process is established, the client and the
runtime process requires that the connection be persistent.
The Forms Listener Servlet is a Java servlet running in a servlet engine. The Web server routes
the client requests for the Forms Listener Servlet directly to the servlet instance. Because the
web server acts like the end point for the client, the other server machines and ports are no
longer exposed to the firewall.
In the Forms Runtime Processes page, the node name and the port are shown for each runtime
process. You can distinguish between the Forms Listener process and Forms Listener Servlet
process by examining the port numbers. For the Forms Listener process, the port is the Forms
server machine port. For the Forms Listener Servlet process, the port is the web server port.
Host Management
(N) Site Map > Administration (T) > Hosts (under System Configuration)
Oracle Applications Manager provides a list of host machines that are employed by the
Applications and Database Tiers of the E-Business Suite system. For each host, you can view
the host status, and you can drill down to see the status of the individual E-Business Suite
processes on that host. You can also view the E-Business Suite configuration details for that
specific host, including the installed server types, and port allocations.
Oracle Applications Manager allows you to change the state of a given host to make that host
available or unavailable to Generic Service Management (GSM). Under GSM, the Internal
Concurrent Manager manages the various service processes across multiple hosts. If you need
to take a host down for maintenance, you can first mark that host as offline in OAM, which
will ensure that concurrent mangers and other service processes are migrated to a secondary
node as appropriate. Later, when you set the node back to online, the processes will be
migrated back.
The new host-oriented interfaces allow you to track more easily which service processes are
running on which hosts, and you can more easily identify the services that would be affected
by a planned or unplanned outage for the host. For planned outages, OAM enables you to
Copyright Oracle Corporation, 2007. All rights reserved.
Host Management
prevent Generic Service Management processes such as concurrent managers from running on
an offline host without reconfiguring the service definitions.
The Hosts page lists all the hosts that are running components of your Applications and
Database tiers. For each host, the current state and status is given. The status indicates
whether or not the host and the E-Business Suite system processes for that host are up and
running.
The Applications Processes tab of the Host Status page lists the individual Generic Service
Management processes that are running on that host. In most cases, you are also able to see the
database session AUDSID associated with the process. You can drill down on the Application
tier process ID to view more information about the process and obtain the log file for the
process. You can drill down on the database session AUDISD to find session statistics,
current SQL, and control SQL tracing for the database session.
You can update the the state to one of three values. A state of Online means that Generic
Service Management processes such as concurrent managers are able to run on the host. If
you want to make the host unavailable to Generic Service Management temporarily, then you
can change the state to Offline. You can later change the state back from Offline to
Online. The third state, called Disabled is used to remove a host from use by the system.
The primary difference between Disabled and Offline is that a disabled host will be
removed from many system management views and status checks. A disabled host is no
longer considered to be part of the system, whereas an offline host is considered to be a
temporarily unavailable part of the system.
From the Hosts page, you can drill down to a more detailed view of the status of a given host,
or to a configuration summary for a host.
The Applications Services tab on the host status page shows a summary of the E-Business
Suite services on the host. This summary is rolled up by server type. For each service type
shown you can drill down to a more detailed view of individual services, and also the the pages
where you can control services running under Generic Service Management.
The Applications Processes tab on the host status page lists the individual Generic Service
Management processes that are running on that host. In most cases, you will also be able to
see the database session AUDSID associated with the process. You can drill down on the
Application tier process ID to view more information about the process and obtain the log file
for the process. You can drill down on the database session AUDISD to find session statistics,
current SQL, and control SQL tracing for the database session.
Dashboard Setup
(N) Setup > Dashboard Setup > Update (B)
The landing page from the Setup is the Dashboard Setup page. View the current collection and
alerting settings here. To update these, click on the Update button.
OAM Dashboard Collection Interval
Specify how frequently the collection program should be run.
Metrics Setup
Enable or disable the collection of individual metrics by checking or un-checking the box in
the Enable Collections column.
- If you would like to enable alerts for a given metric, check the appropriate box in the
Enable Alerts column.
- To set the alert condition, you can choose either less than, equal to, or greater
than from the Threshold Operator column, and then enter the desired value in the
Threshold Value column. Click on the Next button to move to the configuration of
monitoring services.
Service Monitoring
Copyright Oracle Corporation, 2007. All rights reserved.
To enable monitoring for any specific service, check the appropriate box in the Enable
Collection column.
You can set up alerts for a given service by checking the Enable Alerts box, and then
choosing the status that you want in the Threshold Value column.
Alert Notification
Alerts flag events that may need your attention.
The OAM Dashboard Overview tab has a System Alerts region, from which you can drill
down to see any new or open alerts (types of alerts) or occurrences of alerts.
Notifications of alerts can be sent out to users via the Notifications Setup button on the
System Alerts page.
For metrics that are displayed in the OAM Dashboard, when metric exceeds a threshold that
you have set, a warning icon will appear next to that metrics value.
Summary
Chapter 12
Diagnostics and
Troubleshooting with Oracle
Applications Manager
Objectives
Introduction
Oracle Applications Manager provides features to help you diagnose and resolve system issues.
Oracle Applications Manager integrates with Oracle Diagnostics to provide access to a large
library of diagnostic tests for system technologies, E-Business Suite products, and business
flows.
Oracle Applications Manager also controls Oracle Applications Logging. When issues arise
on your system, you can configure logging to write varying levels of diagnostic information for
specific components into a central repository. Oracle Applications Manager allows you to
view and manage the information logged into this repository.
If you encounter a problem in the system, you can first try to diagnose the problem using
Oracle Diagnostics. Then you can try to correct the problem using the Troubleshooting
Wizards.
Also, if you are unable to diagnose and resolve problems yourself, then Oracle Applications
Manager makes it easier for you to communicate with Support. The Support Cart has been
improved to provide automated collections of the data that Oracle Support requires for
resolving issues.
For more information on Oracle Diagnostics and Oracle Applications Logging, see the Oracle
Applications Supportability Guide.
Oracle Diagnostics. For more information on Oracle Diagnostics, see the Oracle Applications
Supportability Guide.
Troubleshooting Wizards
(N) Applications Dashboard > Diagnostics (T) > [links under Troubleshooting Wizards region]
Troubleshooting Wizards are available for the following:
Concurrent Manager Recovery - Use this wizard when the Internal Concurrent Manager
fails to start.
Service Infrastructure - Using the Service Infrastructure diagnostic wizard, you can
examine existing Generic Service Management data to determine potential problems, and
update the data to eliminate the issues. An example of a potential problem is an active
node without a service manager.
GCS and Forms Monitoring - The GCS and Forms Monitoring wizard helps you
troubleshoot the OAM Generic Collection Service. The GCS, or Generic Collection
Service, is a service managed by Generic Service Management. It performs file
uploading, signaling, purging, and other management tasks for other service runtime
processes such as the Forms Listener runtime process.
CP Signature - This wizard collects information regarding the current status of concurrent
processing on the system.
Troubleshooting Wizards
Requests that are Orphaned - This page lists the requests that do not have a manager. If
any requests have Active Sessions listed, drill down on the session ID and terminate the
session from the Database Session Details screen. Return to the Concurrent Manager
Recovery screen and click the Refresh icon to verify that the session is no longer active.
After you have completed the steps for the above conditions, a summary page is shown listing
the information collected from them. After reaching this page, you should be able to restart
your Internal Concurrent Manager.
Service Infrastructure
This wizard will list the potential issues with your Generic Service Management setup,
including:
Active nodes without a service manager
Active Concurrent Processing nodes without an Internal Monitor
Service managers without active nodes
Active nodes with inactive service managers
Enabled service instances without workshifts
Nodes that do not have names in uppercase (for service instances)
Nodes that do not have names in uppercase (for processes)
CP Signature Wizard
The CP Signature wizard collects technical information on Concurrent Processing. This
information is what is most commonly requested by Oracle support analysts, and includes
items such as important configuration settings, code levels, and log files.
This wizard collects information on the following:
Configuration status for Parallel Concurrent Processing, Real Application Clusters, and
Generic Service Management
Registered nodes
Concurrent processing package versions
Concurrent processing package errors
Concurrent processing profile options
Service instances that could be managed by concurrent processing
Concurrent processing processes
Request processing manager specialization rules
Request Conflict Resolution
Concurrent request processing statistics
Copyright Oracle Corporation, 2007. All rights reserved.
CP Signature
Recent requests to run the Purge Concurrent Request and/or Manager Data program
Each step of the Wizard collects a specific set of information listed above. At each step, you
have the option of adding the information to the Support Cart. However, you may want to
wait until the end of the wizard to do so, because at the end you will be presented with a
summary page that shows all of the collected information from all steps, which you can add to
Support Cart all at once. Also note, that you can skip to the summary early by pressing the
Finish button. However, the Summary will only contain the information collected by the steps
that you have executed so far. So, unless told otherwise by Support, you should progress
through every step using the Next button.
Support Cart
The Support Cart feature allows you to save Oracle Applications Manager pages with their
data and then zip them up in a file to send to Oracle Support. Oracle Support can then view
your pages in the Oracle Applications Manager display format.
When you click the Add to Support Cart global button, the page is added to the Support Cart.
If you have filtered or sorted the data, your manipulated view is submitted. To view the
contents of the Support Cart, click the Support Cart global button.
Description
You can enter in a TAR number and description of the issue here.
Applications Signature
The Support Cart can collect a standard set of information regarding your E-Business Suite
system. Oracle Support requires this information when logging a technical assistance request
(TAR).
To collect this information, click Collect.
The set of information collected includes:
Support Cart
Product Information For each product, the version, current patch level, and status (for
example, Installed) is shown.
Database parameters The init.ora parameter settings.
Patches For each individual patch applied, the patch number, type (for example, Patch
Set or Maintenance Pack), and application timestamp is shown.
Topology - This page includes data about all the nodes of the applications infrastructure.
For each node, the system collects information about the operating system and the
different services running on that node.
Database version
You can specify to include or exclude output and log files for specific nodes as well.
Other Information Collected
Pages that you save using the Add to Support Cart button are listed under this tab.
Summary
Chapter 13
Managing Concurrent
Programs and Reports
Lesson Aim
An important area of security involves controlling access to reports and other concurrent
programs. This level of security is provided by request group definitions. This lesson shows
how the system administrator creates and uses these request groups.
Request sets are similar to request groups in that they are both collections of programs along
with their parameters and options. Request sets can be created by users, but they are still
managed by the system administrator.
Objectives
Objectives
Definitions
Definitions
Submitting Requests
(N) Concurrent > Requests > Submit a New Request > (B) Schedule...
The Schedule Window
The scheduling window provides you with several scheduling options. You can choose to reuse
a schedule you previously defined and saved, or define a new schedule. You can define your
schedule to run a request as soon as possible, at a specific time, or repeatedly at specific
intervals, or on specific days of the week or month.
When saving your schedule you must provide a unique name. You can also provide additional
information in the Description field.
Submitting Requests
(N) Concurrent > Requests > Submit a New Request > (B) OK > (B) Options...
Request ID
Reprinting a Report
The Find Requests Window appears when you navigate to (N) Requests > View.
Note: The Profile Option Concurrent:Save Output must be set to Yes.
Reprinting a Report
Canceling a Request
Holding a Request
Pending Phase
A program in the Pending phase can be in one of four statuses:
Normal: The program is waiting for an available manager.
Waiting: A child program is waiting for a parent to mark it ready to run.
Standby: A program is waiting for another incompatible program in the same logical
database to complete.
Scheduled: A programs scheduled start time has not yet elapsed.
Pending Phase
Running Phase
A program in the Running phase can be in one of four statuses:
Normal: Program is in progress.
Paused: A parent program is waiting for one or more child programs to complete.
Resuming: A parent program is continuing after the completion of one or more child
programs.
Terminating: The program is being terminated.
Running Phase
Completed Phase
A program in the Completed phase can be in one of five statuses:
Normal: Program completed successfully.
Warning: Program completed successfully but with warning messages.
Error: Program failed to complete successfully.
Terminated: A running program was terminated.
Canceled: A pending or inactive program was canceled before it started.
Completed Phase
Inactive Phase
A program in the Inactive phase can be in one of three statuses:
Disabled: The requested program has not been enabled for execution.
On Hold: The requested program has been placed on hold.
No Manager: There is no manager defined to run this type of request.
Inactive Phase
member of the set. Programs in a request set can share parameters; therefore a parameter value
needs to be entered only once for multiple programs. Any user can create a request set.
The code must not contain any spaces. The combination of the application and the code
identify the request group.
Customization Example
The slide shows the values that are used in the following example.
Customization Example
Stage Status
Manager - View Completed Requests page is enabled. When you click on the Restart button
the request set can restart from the point of the error.
Once the stage has been identified, the request set program submits the stage program in
resubmit mode. In this mode, the program looks at the same stage from the previous run and
determines which programs need to be rerun, (only those that ended in error), and runs those
programs. If this stage completes successfully or has a Warning status, the system proceeds to
the next stage using the normal mechanism of restarting the request set program.
Linking of Stages
There are no restrictions on linking stages within a request set. Any stage can be linked to any
other stage, including itself. Two or more links can point to the same stage. For example, one
stage can link to another if the completion status of the first is Success or Warning, and link to
a third stage if the status is Error.
You determine the end of a request by not specifying a follow-up stage for each completion
status. You can end a request set after any stage in the set. When any stage completes with a
status that does not link to another stage, the request set ends.
You can use the linking of stages to control your request set. By using the Request Set Wizard
button in the Request Set window you can create the request set as follows:
Run in Parallel creates one stage containing all of the requests you wish to run in
parallel.
Run Sequentially creates a separate stage containing the request or requests for each step
in the sequence and link in the appropriate order.
Run Sequentially but abort on Error sets up your sequence the same as it did for Run
Sequentially, but when it links the stages, it does not enter a follow-up stage as a link in
the Error completion status field.
Copyright Oracle Corporation, 2007. All rights reserved.
Linking of Stages
Request Parameters
((N) Requests > Set > (B) Define Stages > (B) Requests > (B) Parameters
Request Parameters Window
Use the Request Parameters window to customize the parameter values of a specific request in
a request set. The fields at the top of the Request Parameters window list general information
about the current request set for which you can customize the parameter values. The multi-row
portion of the window lists the parameters for that request.
The Sequence and Prompt fields are display only.
Selecting the Display check box specifies visibility of a request parameter at submission
time.
Selecting the Modify check box to specifies you can insert or change the value for a
request parameter at submission time.
Using the Shared Parameter field sets a default value for a parameter that occurs in more
than one report or program of a request set. Use the shared parameter label to set an initial
default value for all occurrences of the same parameter so you can avoid typing the same
value all over again for every occurrence of the parameter.
Lesson Summary
In this lesson you learned how to use request groups to control access to reports and concurrent
programs. Additionally you learned how individual users can define request sets to streamline
processing by setting default values for parameters and sharing parameter values among
multiple reports.
Summary
Chapter 14
Administering Concurrent
Managers
Lesson Aim
The Oracle Applications system administrator is the end users first point of contact for system
questions. The system administrator should be able to monitor the processing of requests and
deal with any problems. He or she should also be able to balance workloads to provide the
optimum processing environment for users. This lesson teaches you how to monitor and
control system processing and also how to plan and schedule your workload.
Objectives
Overlapping Workshifts
When work shifts overlap, the work shift with the more specific time period takes effect for the
overlapping time period. For example, a work shift for January 1 overrides a work shift from
9:00 am to 5:00 PM every Monday through Friday.
When work shifts with the same hierarchy level overlap, the work shift with the largest number
of target processes takes effect.
Concurrent Managers
(N) Concurrent > Manager > Define
Immediate Programs and Spawned Programs
Immediate concurrent programs are C or PRO*C subroutines linked with concurrent managers.
Most concurrent programs are spawned as independent processes at run time instead of running
as subroutines. If you are defining a new concurrent program, you should run the program as a
spawned program rather than as an immediate program.
Examples of these are:
FNDLIBR: Contains immediate concurrent programs used by Oracle Applications Object
Library.
INVLIBR: Contains immediate concurrent programs used by Oracle Inventory.
MFCLIBR: Contains immediate concurrent programs used by Oracle Manufacturing.
PALIBR: Contains immediate concurrent programs used by Oracle Projects.
Combined Rules
(N) Concurrent > Manager > Rule
Specialization Rules
Action Types
Use action types to specify the actions of a manager. An action type specifies the type of
request to which an action refers.
Programs that connect to a specific Oracle Applications account (Oracle ID). For
example, you could include for processing all programs that connect to the Oracle
Payables account AP1.
Specific programs by name. For example, you could include for processing the Oracle
General Ledger program Trial Balance-Budget. When using an action type of program,
you specify the application and the program name.
Certain request types. For example, you could include for processing all programs
defined as a request type of Month-End Reports.
Programs requested by certain users. For example, you could include for processing all
programs requested by the user Operations.
Combined rule. A combined rule combines more than one action to generate a single
rule.
Action Types
Conflicts Domains
Deactivate Concurrent Manager: Deactivates the Internal Concurrent Manager and all other
managers.
Terminate Requests and Deactivate Manager: All running requests running concurrent
programs) are terminated, and all managers are deactivated.
Any Other Manager Control Functions
Activate Concurrent Manager: If the manager is defined to work in the current work shift, it
starts immediately. Restart Concurrent Manager: Internal manager rereads the managers
definition and the rules for concurrent program incompatibilities.
Deactivate Concurrent Manager: Deactivates the manager. All requests (concurrent
programs) currently running are allowed to be completed before the manager shuts down. A
manager will not restart until you select the manager and choose Activate Concurrent Manager.
Terminate Request and Deactivate Manager: All running requests (running concurrent
programs) handled by the manager are terminated. Once deactivated a manager will not restart
until you select the manager and choose Activate Concurrent Manager.
With parallel concurrent processing, one or more managers can run on one or more nodes. You
decide where concurrent managers run when configuring the system. You can define any set of
specialization rules and apply them across nodes in any way desired.
Lesson Summary
In addition to controlling access to Oracle Applications, monitoring the day-to-day processing
of Oracle Applications is a very important job of the system administrator.
The system administrator is the first point of contact when users have, or suspect they have, a
problem with either the results or the processing of a request. The system administrator has
access to several application log files containing diagnostic information that can be of use in
correcting problems.
The system administrator is also responsible for balancing workload to maintain optimum
performance for users. He or she does this by creating concurrent managers to process user
requests. Managers can be specialized to operate only during certain times and to process only
certain types of requests. System administrators also monitor and control the activity of
managers in a parallel environment.
Summary