Beruflich Dokumente
Kultur Dokumente
D49195GC10
Edition 1.0
July 2007
D51750
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle, JD Edwards, PeopleSoft, and Siebel are registered trademarks of Oracle Corporation and/or its affiliates. Other names may
be trademarks of their respective owners.
Author
Mildred Wang, Robert Farrington, Clara Jaeckel, Melody Yang
Technical Contributors and Reviewers
Donna Johnson, Leta Davis, Barbara Waddoups, Gary Lemmons, Roman Kratochvil, Roger
Wigenstam, Venkata Vengala, Biju Mohan, Gursat Olgun, Maxine Zasowski, Sunil Ghosh
This book was published using:
oracletutor
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Table of Contents
Introduction .....................................................................................................................................................1-1
Introduction ...................................................................................................................................................1-3
Course Objectives..........................................................................................................................................1-4
Overview .......................................................................................................................................................1-5
Oracle Applications System Administration .................................................................................................1-6
Oracle Workflow Component........................................................................................................................1-7
Oracle Applications Flexfields Component...................................................................................................1-8
Additional Material........................................................................................................................................1-9
Managing Printers...........................................................................................................................................9-1
Managing Printers..........................................................................................................................................9-3
Objectives ......................................................................................................................................................9-4
Oracle Print Definition Components .............................................................................................................9-5
Relationships of the Printer Components ......................................................................................................9-7
Formatting Information .................................................................................................................................9-8
Defining Printers............................................................................................................................................9-10
Finding Existing Printer Types......................................................................................................................9-11
Registering a New Printer..............................................................................................................................9-12
Defining a New Printer Type.........................................................................................................................9-13
Printing with Pasta.........................................................................................................................................9-14
Setup for Basic Printing with Pasta ...............................................................................................................9-15
The pasta.cfg file ...........................................................................................................................................9-16
Modifying an Existing Printer Type to Use Pasta .........................................................................................9-17
Generating Other Formats using the Preprocessing Option...........................................................................9-19
Using Pasta with XML Publisher ..................................................................................................................9-20
Other Customization Materials for Oracle Applications Printing..................................................................9-22
Summary........................................................................................................................................................9-23
Introduction to Oracle Applications Manager..............................................................................................10-1
Introduction to Oracle Applications Manager (OAM) ..................................................................................10-3
Objectives ......................................................................................................................................................10-4
What is Oracle Applications Manager? .........................................................................................................10-5
Benefits of Oracle Applications Manager......................................................................................................10-6
Oracle Applications Manager Integrates with ..........................................................................................10-7
Application Management Pack for Oracle E-Business Suite.........................................................................10-9
Navigation in OAM .......................................................................................................................................10-10
Applications Dashboard ................................................................................................................................10-11
Site Map.........................................................................................................................................................10-13
Administration...............................................................................................................................................10-14
Monitoring.....................................................................................................................................................10-15
Maintenance ..................................................................................................................................................10-16
Diagnostics and Troubleshooting ..................................................................................................................10-17
Setting Up Oracle Applications Manager......................................................................................................10-18
Summary........................................................................................................................................................10-19
System Monitoring in Oracle Applications Manager...................................................................................11-1
System Monitoring in Oracle Applications Manager ....................................................................................11-3
Objectives ......................................................................................................................................................11-4
System Status Overview................................................................................................................................11-5
System Status Configuration Changes........................................................................................................11-7
System Status Web Components Status .....................................................................................................11-8
System Status System Alerts ......................................................................................................................11-10
System Status User Initiated Alerts ............................................................................................................11-12
Performance...................................................................................................................................................11-13
Critical Activities...........................................................................................................................................11-15
Critical Activities Setup.................................................................................................................................11-16
System Alerts, Metrics, Logs.........................................................................................................................11-17
Database Initialization (init.ora) Parameters..................................................................................................11-19
Copyright Oracle Corporation, 2006. All rights reserved.
Pending Phase................................................................................................................................................13-28
Running Phase ...............................................................................................................................................13-29
Completed Phase ...........................................................................................................................................13-30
Inactive Phase................................................................................................................................................13-31
System Administrator Monitoring Privileges ................................................................................................13-32
Review Log Files...........................................................................................................................................13-33
Managing Log Files and Tables ....................................................................................................................13-34
Purge Request Results ...................................................................................................................................13-35
Grouping Concurrent Programs and Requests...............................................................................................13-36
Creating a Request Group..............................................................................................................................13-38
Using a Request Group with a Code..............................................................................................................13-39
Submitting Requests: Form Compared with Responsibility..........................................................................13-40
Implementing a Coded Request Group..........................................................................................................13-41
Customization Example.................................................................................................................................13-42
Creating the New Form Function ..................................................................................................................13-43
Passable Request Parameters.........................................................................................................................13-44
Adding the Function to the Menu..................................................................................................................13-45
Defining a Request Set ..................................................................................................................................13-46
Request Set Stages.........................................................................................................................................13-47
Stage Status ...................................................................................................................................................13-48
Linking of Stages...........................................................................................................................................13-50
Defining Request Sets Step 1: Enter Request Set Name ...............................................................................13-51
Defining Request Sets Step 2: Define a Stage ...............................................................................................13-53
Defining Request Sets Step 3: Enter Requests for Stage ...............................................................................13-54
Defining Request Sets Step 4: Enter Request Parameter...............................................................................13-55
Defining Request Sets Step 5: Link Stages ...................................................................................................13-56
Submitting a Request Set...............................................................................................................................13-57
User Request Set Privileges...........................................................................................................................13-58
System Administrator Request Set Privileges ...............................................................................................13-59
Summary........................................................................................................................................................13-60
Summary........................................................................................................................................................14-32
Preface
Profile
Before You Begin This Course
Prerequisites
There are no prerequisites for this course.
Related Publications
Oracle Publications
Part Number
B31451
B31453
B31454
B31431
Additional Publications
Read-me files
Oracle Magazine
Title
Typographic Conventions
Typographic Conventions in Text
Caps and
lowercase
Courier new,
case sensitive
(default is
lowercase)
Initial cap
Element
Glossary term (if
there is a glossary)
Buttons,
check boxes,
triggers,
windows
Code output,
directory names,
filenames,
passwords,
pathnames,
URLs,
user input,
usernames
Arrow
Brackets
Commas
Graphics labels
(unless the term is a
proper noun)
Emphasized words
and phrases,
titles of books and
courses,
variables
Interface elements
with long names
that have only
initial caps;
lesson and chapter
titles in crossreferences
SQL column
names, commands,
functions, schemas,
table names
Menu paths
Key names
Key sequences
Plus signs
Key combinations
Italic
Quotation
marks
Uppercase
Example
The algorithm inserts the new key.
Click the Executable button.
Select the Cant Delete Card check box.
Assign a When-Validate-Item trigger to the ORD block.
Open the Master Schedule window.
Code output: debug.set (I, 300);
Directory: bin (DOS), $FMHOME (UNIX)
Filename: Locate the init.ora file.
Password: User tiger as your password.
Pathname: Open c:\my_docs\projects
URL: Go to http://www.oracle.com
User input: Enter 300
Username: Log on as scott
Customer address (but Oracle Payables)
Convention
Bold italic
Example
When-Validate-Item
Passwords
SELECT last_name
FROM s_emp;
PL/SQL objects
Lowercase
italic
Uppercase
Syntax variables
1.
(N) From the Navigator window, select Invoice then Entry then Invoice Batches
Summary.
2.
3.
Notations:
(N) = Navigator
(M) = Menu
(T) = Tab
(B) = Button
(I) = Icon
(H) = Hyperlink
(ST) = Sub Tab
Copyright Oracle Corporation, 2006. All rights reserved.
Convention
Caps and
lowercase
Lowercase
1.
In the navigation frame of the help system window, expand the General Ledger entry.
2.
3.
4.
Review the Enter Journals topic that appears in the document frame of the help system
window.
Chapter 15
Introduction to Oracle
Workflow
Objectives
Enabling E-Business
Traditional Workflow
Traditional applications-based workflow processes are launched from a business application
through APIs hard-coded within the application. These processes model the business rules in
the individual local application and are made up of activities executed by the Workflow Engine
only in that applications system. For example, the modeling of an approval hierarchy is a
common use of Oracle Workflow in this scenario.
Traditional Workflow
Event-Based Workflow
With the Business Event System, Oracle Workflow supports both traditional applicationsbased workflows and event-based integration workflows.
For e-business, there is a requirement to integrate with external systems, such as sending a
document to a business-to-business exchange, or other systems external to the local
application. Oracle Workflow supports e-business integration workflows by allowing business
analysts and developers to model business processes spanning different systems using a
graphical drag-and-drop designerthe Workflow Builderand run those processes using the
Workflow Engine and the Business Event System. This support enables Oracle Workflow
customers to deal with business objects in comprehensive e-business integration flows with
minimal intrusion into the core application.
The Business Event System and the Workflow Engine can function independently of each
other. However, you can achieve the most powerful and flexible processing by using the
Business Event System and the Workflow Engine together to execute cross-system processes
for e-business integration.
Event-Based Workflow
Subscription-Based Processing
The Business Event System provides increased flexibility through subscription-based
processing: you raise a business event from an application, but specify the processing to
perform for that event as a subscription in Oracle Workflow. For example, you can launch a
workflow process when an event is raised by specifying that process in a subscription to the
event. You can also define multiple subscriptions to the same event to perform additional
processing for different purposes without intruding any further on the core application.
Subscription-Based Processing
Oracle Workflow empowers process participants by giving them access to review the
progress and current status of their processes.
Users can find the answers to many common questions themselves using these monitoring
capabilities.
Summary
Chapter 16
Oracle Workflow
Components
Objectives
Workflow Engine
Workflow Processes
A workflow process definition must be saved to the same database as the Workflow Engine. A
process definition is composed of activities and the transitions between them.
A completed application transaction or event can initiate a workflow process by raising an
event or by calling a series of Workflow Engine APIs.
The Workflow Engine locates the Start activity in the process definition.
The Workflow Engine drives through the process, performing all automated steps such as
function activities and Raise and Send event activities, until an asynchronous activity such
as a notification, Receive event activity, or blocking activity occurs.
- The Workflow Engine calls the Notification System to deliver a notification message
to an appropriate role. Once a user of that role completes the notification response,
the Workflow Engine continues to drive through the remaining activities in the
process.
- If a blocking activity is encountered, the Workflow Engine waits for an external
program to complete and call the appropriate Workflow Engine API before
proceeding to the next activity.
Workflow Processes
- If a Receive event activity is encountered, the Workflow Engine waits to receive the
event from the Business Event System before proceeding to the next activity.
The process completes when the Workflow Engine encounters an End activity.
Example: Order Processing
This example shows a workflow process that includes business events.
For more information, refer to the Oracle Streams Advanced Queuing Users Guide and
Reference.
Notification System
The Notification System:
Routes notifications to a role, which can be a single user or group of users
Enables users to receive and respond to notifications using an e-mail application or Web
browser of choice
Sends e-mail notifications and processes e-mail responses using the JavaMail API
Allows any users with access to the Internet to be included in a workflow process
Provides access to the Worklist from Oracle E-Business Suite through the Worklist web
pages
Enables users to drill down from a notification in the Worklist web pages to any URL or
Oracle E-Business Suite form to respond to the notification
Notification System
E-Mail Notifications
Directory Services
Users can be associated with more than one role, and a role may contain more than one user.
The Workflow Engine and Notification System use the directory service to determine who
should receive notifications and in what format. Notifications can be delivered to an individual
user or to all members of a particular role.
Note: Oracle Workflow uses a directory service model in which denormalized information is
maintained in the Workflow local tables for performance gain. You should maintain
synchronization between the user and role information stored in application tables by the
source modules and the information stored in the Workflow local tables.
Directory Services
Workflow Monitor
Oracle Workflow includes both administrator and self-service versions of the Status Monitor in
the Oracle Application Framework user interface format.
Workflow Manager
Administrators can use Workflow Manager to perform the following tasks:
Run Workflow service components, such as notification mailers and agent listeners.
Control other Workflow system services, including background engines, purging obsolete
Workflow data, and cleanup of the Workflow control queue.
Monitor work item processing by viewing the distribution of all work items by status and
drilling down to additional information.
Monitor event message processing for local Business Event System agents by viewing the
distribution of event messages by status and drilling down to additional agent information
and individual event messages, as well as by viewing queue propagation details.
With this ability to monitor work items and event messages, a system administrator can
identify possible bottlenecks easily.
Workflow Manager
Service Components
Oracle Workflow uses the Generic Service Component Framework (GSCF) to simplify and
automate the management of background Java services. A service component is an instance of
a Java program that has been defined according to the GSCF standards so that it can be
managed through this framework.
Use Oracle Workflow Manager to configure and run service components.
Note: Oracle Workflow Manager also lets you manage Web services outbound components,
which process outbound Web service messages for Oracle XML Gateway. For more
information, see the Oracle XML Gateway Users Guide.
Service Components
Review Questions
Summary
Chapter 17
Objectives
Select the role to which you want to assign workflow administrator privileges. If you want all
users and roles to have workflow administrator privileges, such as in a development
environment, enter an asterisk (*).
LDAP
If you are integrating with Oracle Internet Directory, specify the Lightweight Directory Access
Protocol (LDAP) server information for the LDAP directory to which you will connect. If you
already configured these parameters while installing Oracle Application Server with Oracle EBusiness Suite, Oracle Workflow displays those values here. For more information, see:
Installing Oracle Application Server 10g with Oracle E-Business Suite Release 12
(OracleMetaLink note 376811.1) and Oracle Single Sign-On Integration, Oracle Applications
System Administrator's Guide - Security.
Host: The host on which the LDAP directory resides.
Port: The port on the host.
Username: The LDAP user account used to connect to the LDAP server. This user name
must have write privileges and is required to bind to the LDAP directory.
Old Password: Enter your current LDAP password. Oracle Workflow validates this
password before letting you change it.
New Password: Enter the new LDAP password you want to use. The password must be at
least five characters long.
Repeat Password: Enter your new LDAP password again in this field to confirm it.
Change Log Base Directory: The LDAP node under which change logs are located.
User Base Directory: The LDAP node under which user records can be found.
Business Event Local System
Specify the system name for the database where this installation of Oracle Workflow is
located, to identify it in the Business Event System. Oracle Workflow automatically creates the
system definition for this database in the Event Manager during installation.
Select the execution status for the local system.
Enabled: Subscriptions are executed on all events. Oracle Workflow sets the system status
to Enabled by default.
Local Only: Subscriptions are executed only on events raised on the local system.
External Only: Subscriptions are executed only on events received by inbound agents on
the local system.
Disabled: No subscriptions are executed on any events.
Notification Style
Specify whether Oracle Workflow should send e-mail notifications to users, and if so, in what
format. A user can override this default setting by specifying a different notification style in his
or her individual Oracle EBusiness Suite preferences.
HTML mail with attachments
Plain text mail with HTML attachments
Plain text mail
Plain text summary mail
Do not send me mail
HTML mail
HTML summary mail
Browser Signing DLL Location
Specify the location of the Capicom.dll file that is used for Web page operations with
encryption in the Microsoft Internet Explorer browser. This preference is required only if you
plan to use certificate-based digital signatures to confirm notification responses, and your users
access Oracle Applications with Microsoft Internet Explorer. By default, this preference is set
to a URL at which the Capicom.dll file can be downloaded from Microsofts Web site. In most
cases, you do not need to change this setting. However, you can update this preference if the
location of the Capicom.dll file changes, or if you choose to store a copy of the file on your
local network and point to that location instead.
JInitiator
Review details about the JInitiator plugin in your Oracle E-Business Suite installation. Oracle
Workflow uses JInitiator to launch Oracle Applications forms linked to notifications.
Class ID: The class identifier for this version of JInitiator.
Download Location: The location where the JInitiator executable is staged for download
to users client machines.
Version: The JInitiator version number.
You can optionally set the logging mode to NOLOGGING to suppress redo log data,
obtaining a performance gain. Without this redo log data, however, no media recovery is
possible for the Workflow directory tables and indexes.
Temporary Tablespace: Select the temporary tablespace the program should use.
Raise Errors: Select Yes or No to indicate whether the program should raise an exception
if it encounters an error. Usually you can leave this parameter set to the default value,
which is Yes.
Note: Products that use role hierarchies do not participate in bulk synchronization. These
products must perform incremental synchronization.
Oracle XML Gateway also provides PL/SQL agent listeners named ECX Inbound Agent
Listener and ECX Transaction Agent Listener, and a Java agent listener named Web Services
IN Agent. See: Oracle XML Gateway User's Guide.
You can optionally create additional agent listener service components. For example, you can
configure agent listeners for other inbound agents that you want to use for event message
propagation, such as the standard WF_IN and WF_JMS_IN agents, or any custom agents. You
can also configure an agent listener service component that only processes messages on a
particular agent that are instances of a specific event.
Scheduling Propagation
If you want to use the standard WF_OUT and WF_JMS_OUT agents or custom agents for
event message propagation, ensure that you schedule propagation for those agents.
Scheduling Propagation
For information about using Oracle Enterprise Manager to schedule Oracle Advanced Queuing
propagation, refer to Oracle Enterprise Manager Support, Oracle Streams Advanced Queuing
User's Guide and Reference and the Oracle Enterprise Manager online help.
Scheduling Propagation
The Schedule_Propagation API parameters are:
queue_name: The queue associated with the local outbound agent for which you want to
schedule propagation. Specify the queue name prefaced by the schema that owns the
queue, in the following format: <schema>.<queue>
The standard Workflow queues are usually owned by the APPLSYS schema.
destination: The database link to the remote system to which you want to propagate
messages. To propagate messages to another queue on the local system, enter the
destination NULL. The default value is NULL.
start_time: The initial start time for the propagation window.
duration: The duration of the propagation window, in seconds
next_time: A date function to compute the start of the next propagation window from the
end of the current window. For example, to start the window at the same time every day,
next_time should be specified as 'SYSDATE + 1 - duration/86400'. If this value is NULL,
then propagation is stopped at the end of the current window and is not run repeatedly.
The default value is NULL.
Copyright Oracle Corporation, 2007. All rights reserved.
latency: A latency time in seconds to specify how long you want to wait, after all
messages have been propagated, before rechecking the queue for new messages to the
destination. The latency represents the maximum wait time during the propagation
window for a message to be propagated after it is enqueued. To propagate messages as
soon as possible after they are enqueued, enter a latency of zero. The default latency is 60
seconds.
Tuning Performance
Changing the Maximum Cache Size for the Business Event System
The Business Event System caches event, subscription, and agent definitions to enhance
performance during subscription processing. The default maximum size of the cache is 50
records. You can optionally increase the maximum cache size to reduce the database queries
performed by the Business Event System, or decrease the maximum cache size to reduce the
amount of memory used by the cache.
The maximum cache size is determined by the value for the WFBES_MAX_CACHE_SIZE
resource token. To change this value, you must first create a .msg source file specifying the
new size as the value for the WFBES_MAX_CACHE_SIZE resource token. Then use the
Workflow Resource Generator program to upload the new seed data from the source file to the
database table WF_RESOURCES. See: To Run the Workflow Resource Generator, Oracle
Workflow API Reference.
Enabling Static Function Calls for Custom PL/SQL Functions
If you use custom PL/SQL functions within the Business Event System, including event data
generate functions, event subscription rule functions, and queue handler enqueue and dequeue
APIs, Oracle Workflow calls those functions using dynamic SQL by default. However, you
can enable Oracle Workflow to call your custom functions statically to enhance performance.
Oracle Workflow provides two PL/SQL packages with procedures that contain lists of static
function calls. The Business Event System internally calls these procedures during subscription
processing to check whether static function calls are available for the procedures being
executed.
WF_BES_DYN_FUNCS package - Contains static function calls for generate functions
and rule functions.
WF_AGT_DYN_FUNCS package - Contains static function calls for queue handler
enqueue and dequeue APIs.
The initial seeded versions of these packages include static function calls only for seeded Oracle
Workflow functions, such as the rule function WF_RULE.Default_Rule and the queue handler
APIs WF_EVENT_QH.Enqueue and WF_EVENT_QH.Dequeue. You can use the
wfbesfngen.sql script to add functions from other Oracle Applications products or your own
custom functions to these packages.
10. Include additional icons in your Oracle Workflow icons subdirectory to customize the
diagrammatic representation of your workflow processes.
For more information, refer to the Setting Up Oracle Workflow chapter in the Oracle
Workflow Administrators Guide.
WF_ITEMS_N2
WF_ITEMS_N3
- Drill down to My Computer > HKEY_LOCAL_MACHINE > Software > Oracle, and
then to the Oracle home where the Workflow Builder is installed.
- Select the NLS_LANG variable and select Modify from the Edit menu.
- Enter the value you want and click OK.
- Exit the Registry Editor.
Start Oracle Workflow Builder. Create a translated version of your workflow definition
and save it as a flat file (.wft), or open and view a workflow definition that is already
translated.
Loading Workflow Definitions in Other Languages to a Database
Ensure that the language you want is set up in the database. You select and install
additional languages as part of the Oracle E-Business Suite installation.
Before running the Workflow Definitions Loader program to load a translated workflow
definition to your database, you must set the NLS_LANG environment variable to the
appropriate territory and character set for the workflow definition you want to load. The
character set must match the character set encoding used to create the workflow definition
file, which is determined by the NLS_LANG value that was set on the client PC before the
.wft file was created in the Workflow Builder. To set NLS_LANG before running the
Workflow Definitions Loader, use the following format: _TERRITORY.CHARSET
Note that it is important to include the underscore (_) before the territory name and the
period (.) between the territory name and the character set name in the NLS_LANG value.
You do not need to include the language in this NLS_LANG value because the Workflow
Definitions Loader uses the language specified within the .wft file to determine the
language to load.
Before using the Workflow Builder to save a translated workflow definition to your
database, you must set the NLS_LANG environment variable to the appropriate language,
territory, and character set. If you are saving several workflow definitions in different
languages, you must reset NLS_LANG for each language.
Sending E-mail Notifications in Other Languages
Determine whether Oracle has translated the e-mail notification templates to the language
you want to set by checking for the file containing the templates in the appropriate
language subdirectory, $FND_TOP/import/<lang>. The standard templates are delivered
in a file called wfmail.wft.
If the e-mail templates are available for the desired language, Oracle Workflow uses the
language preference for the notification recipient to determine the language for an e-mail
notification.
Worklist function. Your specialized worklist view will appear in the list of views only when
users access the Personal Worklist from that responsibility.
The Notifications administrator search page is seeded on the menu for the Workflow
Administrator Web Applications responsibility by default. You can also add its function to
other responsibilities from which you want users to be able to search for notifications. For
example, if you want users with the Workflow User Web Applications responsibility to have
access to the Notifications administrator search page, you can add this function to the
FND_WFUSER (Workflow User) menu with a prompt such as Notification Search.
A user must have workflow administrator privileges to access other users' notifications on the
Notifications administrator search page. If a user does not have administrator privileges, that
user can only search for and access his or her own notifications.
Use the WF: Vacation Rules - Allow All profile option to determine whether the list of item
types for vacation rules includes the All option. The All option lets users create a generic
rule that applies to notifications associated with any item type.
Enabled: The All option appears in the list of item types for vacation rules. This is the
default value.
Disabled: Users must always specify the item type to which a vacation rule applies.
After changing the value of this profile option, you must stop and restart Oracle HTTP Server
for the change to take effect.
assigned. Oracle Workflow uses this information to validate that the user attempting to sign
with a certain certificate is the same user to whom that certificate is assigned.
A user can have more than one certificate assigned to him or her. However, each certificate can
only be assigned to one user. Additionally, after you have loaded a certificate for a user, you
cannot delete it from the database or assign it to a different user. If a certificate is incorrectly
assigned, the user to whom it belongs must revoke it and obtain a new certificate instead.
You must load a users personal certificate, the root certificate of the certificate authority that
issued the personal certificate, and any intermediate certificates required for this type of
personal certificate.
Run the loader by running Java against
oracle.apps.fnd.wf.DigitalSignature.loader.CertificateLoader. You can load several certificates
at once by listing the information for all the certificates in a data file for the loader. You can
also load a single certificate by specifying the certificate information in the command line for
the loader.
Note: Oracle Workflow does not provide a framework for certificate provisioning. Oracle
Workflows digital signature support assumes that certificate provisioning is already part of
your infrastructure.
Version Compatibility
Review Questions
Summary
Chapter 18
Overview of Flexfields
Chapter
18 - Page 1 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Overview of Flexfields
Overview of Flexfields
Chapter
18 - Page 2 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Overview of Flexfields
Overview of Flexfields
Chapter
18 - Page 3 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Lesson Topics
This lesson describes how to use modifiable fields called flexfields to tailor Oracle
Applications to reflect your business needs and practices.
You can use flexfields to define the structure of certain data identifiers required by Oracle
Applications. You can also gather, store and process additional data that may be required by
your business.
After completing this lesson, you should be able to:
Explain flexfields and how they are used by Oracle Applications
Distinguish between key and descriptive flexfields
Identify key and descriptive flexfields used by Oracle Applications
List the benefits provided by flexfields
Overview of Flexfields
Chapter
18 - Page 4 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Objectives
Lesson Overview
This lesson describes how Oracle Applications uses customizable fields called flexfields to
modify and expand processing. Specifically it covers:
How flexfields operate
The two types of flexfields
Flexfield terminology
Flexfield benefits
Overview of Flexfields
Chapter
18 - Page 5 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Overview
Overview of Flexfields
Chapter
18 - Page 6 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Flexfield Components
A flexfield is composed of segments. The segments of a flexfield contain the flexfield values.
Flexfield segments are combined in a grouping called a structure. The segments that make up a
particular structure are logically or functionally related. A single flexfield can have more than
one structure.
When you implement a flexfield, you decide how many segments you need for a particular
structure and whether you need multiple structures. Being able to define different structures for
the same flexfield allows you to tailor the same flexfield to the needs of different end users.
The example on the slide shows three segments:
Category
Item
Color
These three segments together form a structure.
Overview of Flexfields
Chapter
18 - Page 7 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Overview of Flexfields
Chapter
18 - Page 8 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Overview of Flexfields
Chapter
18 - Page 9 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Overview of Flexfields
Chapter
18 - Page 10 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Key Flexfields
In Oracle Applications you use key flexfields as identifiers for entities. Generally, the identifier
you create using a key flexfield is required by the application (for example, the Accounting
Flexfield builds the account number used by Oracle General Ledger).
A key flexfield appears as a normal field on a form. Any existing value for the key appears in
the field as a concatenated value having segment separators.
You can use the Flexfields: Open Key Window profile option to specify whether you want the
key flexfield window to be opened automatically when you navigate to the key flexfield on the
base form. This profile option is visible and updatable at the user level.
A key flexfield structure usually consists of multiple segments, each of which contains
meaningful information. The resulting combinations of values from these segments therefore
function as intelligent keys.
Overview of Flexfields
Chapter
18 - Page 11 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Key Flexfields
Overview of Flexfields
Chapter
18 - Page 12 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Intelligent Keys
Overview of Flexfields
Chapter
18 - Page 13 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Intelligent Keys
Overview of Flexfields
Chapter
18 - Page 14 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Overview of Flexfields
Chapter
18 - Page 15 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Descriptive Flexfields
You use descriptive flexfields to collect information beyond what is collected by Oracle
Applications. Using descriptive flexfields allows you to gather additional specialized
information required by your business. The use of descriptive flexfields is optional.
A descriptive flexfield appears on a form as a double-character field enclosed by brackets. You
can use the Flexfields: Open Descr Window profile option to specify whether you want the
descriptive flexfield window to be opened automatically when you navigate to the bracketed
field, if the flexfield is enabled. This profile option is visible and updatable at the user level.
A descriptive flexfield typically uses multiple structures. You can:
Define a basic structure that gathers additional information for all entities.
Define several different structures that gather specialized information for different types of
the same general entity.
Define a combination of the preceding two. This structure can gather general information
about all entities and then optionally gather certain information about certain types of
entities.
The example shows a descriptive flexfield that gathers different payment information based on
the type of payment: check (CK) or credit card (CC).
Copyright Oracle Corporation, 2007. All rights reserved.
Overview of Flexfields
Chapter
18 - Page 16 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Descriptive Flexfields
Overview of Flexfields
Chapter
18 - Page 17 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Overview of Flexfields
Chapter
18 - Page 18 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Overview of Flexfields
Chapter
18 - Page 19 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Overview of Flexfields
Chapter
18 - Page 20 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Benefits of Flexfields
You should now have a basic understanding of how flexfields are used by Oracle Applications.
The ease of configuring flexfields provides many benefits to users. The main benefits are listed
on the slide.
Overview of Flexfields
Chapter
18 - Page 21 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Benefits of Flexfields
Overview of Flexfields
Chapter
18 - Page 22 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Overview of Flexfields
Chapter
18 - Page 23 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Summary
Flexfields are Oracle Applications fields that you can configure. You can define the content
and layout of the flexfield to reflect your own business needs.
There are two types of flexfields:
Key flexfields are used to create entity identifiers required by Oracle Applications. You
can use key flexfields to structure these identifiers according to your business
environment. The definition of many key flexfields is required by the application.
You use descriptive flexfields to gather additional information for storage or processing.
You can define descriptive flexfields in multiple ways to accommodate the needs of many
different groups of users. The use of descriptive flexfields is optional.
Overview of Flexfields
Chapter
18 - Page 24 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Summary
Chapter 19
Lesson Topics
This lesson describes planning and using value sets to control input with flexfields. At the end
of this lesson, you should be able to:
List options for validating flexfield segment values and report parameters
Choose the appropriate validation option to use with a particular segment
Identify issues for consideration when planning a validation strategy
Define new value sets
Define allowable values for a value set
Objectives
Lesson Overview
Value sets are definitions of allowable values for use with a flexfield segment or report
parameter. This lesson covers the different types of value sets and how each is used. It also
describes how to plan the value set as well as the actual values for those sets that require a list
of values. Finally, it covers the definition process itself.
Overview
Formatting Types
You can require one of several types of data formatting. When you declare a value set a
particular format type, all data entered in the segment that uses this value set must match the
requirements of the format.
For some format types, there are additional options.
The various format types and options are discussed on the following pages.
Format Interaction
from
where
order by
Value Hierarchies
Value Hierarchies
Summary
Chapter 20
Defining Descriptive
Flexfields
Lesson Topics
This lesson describes the process required to plan a descriptive flexfield.
At the end of this lesson, you should be able to:
Identify the descriptive flexfield to be used and the information to be gathered
Organize the information according to usage
Plan the layout of the descriptive flexfield
Plan the behavior of the descriptive flexfield
Define the descriptive flexfield structure
Define global segments
Define context-sensitive segments as appropriate
Objectives
Lesson Overview
Descriptive flexfields allow the user to gather additional information beyond that gathered by
Oracle Applications. The information gathered by a descriptive flexfield and the structure of
that information can vary between different users. This lesson covers analyzing and organizing
the additional data, designing the different flexfields layouts, and specifying how the
descriptive flexfield will behave.
This lesson also covers the mechanics of defining a descriptive flexfield. Flexfields consisting
of only global segments as well as both global and context-sensitive segments are covered.
Overview
5. Design the flexfield behavior. If you have multiple structures, determine how to process
the different contexts.
6. Define the actual flexfield. Use the descriptive flexfield definition windows to enter your
definition. Freeze and compile the definition to make the flexfield available to other users.
Planning Questions
Global Segments
Context-Sensitive Segments
Context sensitive segments occur depending on the context.
The slide shows sample contexts and the segments that are unique to each of them.
Context-Sensitive Segments
Synchronizing the Context Field Value with the Reference Field Value
You can optionally set up your flexfield so that the context field value is synchronized with the
reference field value. You may have instances where, when querying existing records, you
want the context field value to match the original reference field value, but with new records,
you want the context field value to be derived from the current reference field value.
For example, say the context field is Country Code (IN for India, AU for Australia, and so on).
This information should be constant for the lifetime of a given record, such as an Expense
Report; that is, it remains constant from the original data entry (and saving of the record) to
subsequent queries on the record.
In this example, the Country Code value could be captured as a profile option value specific to
the user (the reference field). The desired behavior of which Country Code value is used by the
descriptive flexfield may depend on the action at runtime. For example, say an expense report
is created by an employee in India, with a Country Code of IN. If payment processing is done
in Australia and the Australian (Country Code: AU) Payables Approver queries the Indian
employee's expense report, the expected default Country Code context field value is IN; it is
not derived from the Australian Payables Approver's profile option value of AU. However, if
Copyright Oracle Corporation, 2007. All rights reserved.
the Australian Payables Approver enters in his/her own expense report, then the expected
default Country Code context field value is AU.
The context field value defaulting behavior is configurable for each descriptive flexfield. How
you configure each descriptive flexfield determines whether the old context field value is
retained or whether the new context information is accepted.
Here are the possible configurations:
Context Field Synchronized and Displayed -The context value is always derived from the
reference field value. Users can see but not update the context field value, because they
should not be allowed to break the synchronization.
Context Field Synchronized but Not Displayed - The context value is always derived from
the reference field value. The context field is hidden from the user.
Context Field Not Synchronized and Not Displayed The context field value is derived
from the reference field value the first time the descriptive flexfield value is touched.
Thereafter it is never synchronized with a new reference field value. Because the context
field is not displayed, users will not be able to update its value.
Context Field Not Synchronized but is Displayed The context field value is derived from
the reference field value the first time the descriptive flexfield value is touched. Thereafter
the context field value is not automatically synchronized with a new reference field value,
but users are allowed to update its value.
Synchronize with Reference Field - Check this box if you want the context field value to be
always synchronized with the reference field value for this descriptive flexfield.
APPLICATION_TABLE_NAME
--------------------------GL_PERIOD_SETS
GL_PERIODS
GL_IEA_AUTOGEN_MAP
GL_AUTO_ALLOC_BATCHES
GL_AUTOREVERSE_OPTIONS
GL_AUTOMATIC_POSTING_SETS
GL_BUDGET_TYPES
GL_BUDGET_VERSIONS
GL_BC_OPTIONS
GL_BC_OPTION_DETAILS
GL_SHARES_ACTIVITY
GL_DAILY_CONVERSION_TYPES
reference field, you do not have to display the context field unless you want to allow the
user to select a context different from the reference field value. If you do not display the
context field and are not using a reference field, you should define a default context value
as discussed above.
Specify whether the context field value should be synchronized with the reference field
value, if applicable.
Enter the context values in the Context Field Values region. The names of these structures
must exactly match the values you expect to see in the context field.
Summary
This lesson discussed how to plan a descriptive flexfield. Descriptive flexfields gather
additional information beyond that gathered by Oracle Applications. Not all users of the same
descriptive flexfield need the same information. Descriptive flexfields can be customized so
that each user sees only the information needed.
Once you have planned the structure of your descriptive flexfield, the actual definition process
is straightforward. If this flexfield uses any new value sets, plan those first. Define the flexfield
header attributes. Define all global segments for the Global Data Elements structure.
If you are using multiple contexts, define either a reference field on the base window, or a
context field on the flexfield itself to control which context structure appears. For each context,
define a structure containing the segments appropriate for that context.
When you have finished defining all your structures and segments, freeze your definition and
compile the flexfield. This makes the flexfield available for others to use.
Summary
Chapter 21
Lesson Topics
At the end of this lesson, you should be able to:
Explain intelligent keys and provide examples
Identify key flexfields that are required by Oracle Applications
Explain the purpose of flexfield qualifiers and optional key flexfield features
Design a key flexfield structure
Define the key flexfield structure and segment attributes
Define flexfield qualifiers and segment qualifiers
Objectives
Lesson Topics
At the end of this lesson, you should be able to:
Explain the purpose for cross-validation
Define cross-validation rules and control the interaction between multiple rules
Identify candidates for shorthand entry
Plan and define useful shorthand aliases
Enable shorthand entry
Explain how flexfield security is accomplished
Identify which flexfields are candidates for security
Design a security plan
Control interactions between security rules
Define and assign security rules
Enable security
Objectives
Overview
Key flexfields create unique identifiers for use internally by Oracle Applications. The
combinations of values for the segments of a key flexfield identify entities. These code
combinations are used throughout Oracle Applications.
Depending on which key flexfield you are defining, you might need to specify flexfield
qualifiers and segment qualifiers. There are also several optional features of key flexfields you
may wish to implement.
This lesson covers the mechanics of the definition process.
Overview
Overview, continued
This lesson describes additional flexfield options, including:
Cross-validation - Cross-validation rules let you control the combination of values
entered for a key flexfield.
Shorthand aliases - Shorthand aliases let you label certain groupings of values for a
multi-segment flexfield. Whenever you need one of these groupings of values, you can use
the alias for that grouping to enter the entire group.
Security rules - Security rules let you control flexfield access to data. You create and tie
security rules to a value set to specify which entries in a list of values are available to a
user of a specific responsibility. This allows you to control that users access to data. You
create security rules by defining inclusion or exclusion statements. You combine these
statements to create a security rule. You must carefully consider the interaction of multiple
rules when planning your security.
Overview
Intelligent Keys
Code Combinations
Types of Qualifiers
Flexfield Qualifiers
Segment Qualifiers
Cross-Validating Values
Securing Values
You may want to allow users to only enter or view specific values for flexfields.
You can create a security rule to restrict values available to a given responsibility. Once you
associate that rule to the appropriate responsibility, all users of that responsibility are restricted
to the values allowed by that security rule.
For example, a company has assigned its sales force to different responsibilities according to
the type of items they sell. Two of these responsibilities are Electronic Sales and Household
Sales. A value set called Item Type lists all the types of items the company sells. In this case,
you can define a security rule to restrict the users of a particular responsibility to only access
item types appropriate for their responsibility. For example, the Household Goods Only
security rule allows access only to the FURN and APPL item types.
Security rules are discussed in more detail later in this lesson.
Designing Segments
Planning Decisions
Application Question: Does the application support different segment structures?
Related Question: How many structures are needed?
Application Question: How many segment columns are available?
Related Question: What segments are needed?
Application Question: What flexfield qualifiers does this flexfield use or need?
Related Question: Do segments correspond to each needed qualifier?
Application Question: Are dynamic inserts feasible?
Related Question: Who can create new combinations?
Application Question: Should cross-validation be enabled?
Related Question: Is protection from invalid combinations needed?
Copyright Oracle Corporation, 2007. All rights reserved.
Planning Decisions
Definition Procedure
Cross-Validating Values
Cross-Validation Reports
Defining an Alias
Summary
Key flexfields are used to build identifiers required by Oracle Applications. Key flexfields
allow the user to provide information needed by Oracle Applications while still structuring that
information to reflect a particular business environment.
The procedure for defining a key flexfield is similar to that for defining a descriptive flexfield.
However, there are additional attributes for key flexfields that may also need to be defined.
Additionally, key flexfields have several optional features that should be implemented where
appropriate.
The additional requirements and options for key flexfields include:
By using qualifiers in key flexfields you can require that certain segments and certain
values be identified for processing.
You can allow security checking and integrity checking.
You can define aliases to speed data entry.
You can enter key flexfield value combinations from different windows, if allowed.
Summary, continued
Cross-validation rules are used to restrict invalid combinations of segment values. Rules are
defined by specifying the value combinations that are either allowed (included) or disallowed
(excluded). Cross-validation rules are not tied to a responsibility like security rules. You can
combine cross-validation rules as needed.
Short aliases provide a way to speed entry of frequently used value combinations. Any key
flexfield is a candidate for shorthand alias entry.
You can control the access to data by defining value security rules. These rules list the
allowable values for display or selection through a flexfield segment. The rules are applied to
the value set defined for that flexfield segment. Once you have defined the rules, you assign
them to a responsibility. All users of that responsibility are then restricted to the approved
values when using the flexfields segment.
Chapter 22
Lesson Topics
A previous lesson discussed creating and using value sets to check user input. You performed
practices in which you defined value sets of the validation types None, Independent, and
Dependent.
In this lesson, you learn how to use values stored in applications tables for validation. You also
learn how to restrict the set of values returned from the table.
At the end of this lesson, you should be able to:
Use values retrieved from application tables for validating input
Reference profile option values when validating input
Use a value from another field on the same form for validation
Use the value from a previously used value set for validation
Objectives
Overview
There are several advanced techniques you can use when defining value sets for validating
input. These techniques use values obtained from a location other than a list specifically
defined for the value set. These locations include:
Values retrieved from an application table
The current value for a particular profile option
A value used earlier in a field on the form
A value used earlier in another value set
Overview
Using $PROFILES$
Using :block.field
Using $FLEX$
Summary
Some value sets (for example, Independent and Dependent) have lists of approved values
explicitly defined. Other types of value sets, however, can use values from other locations for
validation. Using values from an application table is one example of these alternate locations.
Also, the current value of a profile option can be used. The value from a previously appearing
field on a form can be referenced as well. Finally, the value from a previously used value set
can be used by all subsequent value sets.
Summary
Chapter 23
Appendix - Administering
Folders
Objectives
Folders: Definition
Form Fields
(N) Application > Administer Folders
Public: This check box governs the availability of the folder to all users.
Anyones Default: Indicates whether this folder definition is used as a default by a user or
a responsibility. If it is a default definition, use Default Assignments to view the users and
responsibilities for which it is the default folder definition.
Default Assignments: The users and responsibilities that use this folder definition as a
default.
Summary
Chapter 24
Appendix - Incorporating a
Custom Program
Lesson Aim
Oracle Applications uses concurrent programs to process and report on data stored in Oracle
Applications tables. These programs are secured, processed, and managed within the Oracle
Applications environment, using the operations that you have seen in other lessons. However,
you can take your custom applications and programs and integrate them into the Oracle
Applications environment as well. In that environment they can be secured and managed the
same way as regular Oracle Applications programs.
This lesson covers how to integrate user-developed programs into Oracle Applications.
Objectives
Subroutine Name The name of your C or Pro*C program subroutine. Only immediate
programs or spawned programs using the Unified C API use this field.
Note: Defining new immediate concurrent programs is not recommended. Use either a
PL/SQL stored procedure or a spawned C program instead.
Execution File Path
Stage Function Parameters button Opens a window that allows you to enter
parameters for the Request set Stage Function. This button is only enabled when you
select Request Set Stage Function as you Execution Method.
For more information see:
(Help) Applied Technology > Oracle Applications System Administration > Configuration >
Overview of Concurrent Programs and Requests > Concurrent Program Executable Window
Executable: Method The execution method used by your concurrent program displays
in this field.
Executable: Options Contains options for SQL*Report programs.
Executable: Priority Priority for this program. If you do not assign a priority, the users
profile option Concurrent:Priority sets the requests priority at submission time.
Request: Type Certain concurrent managers are specialized to run only certain request
types.
Incrementor For use by Oracle Applications internal developers only.
MLS Function The MLS function used by the program (if applicable). The Multilingual
Concurrent Request feature allows a user to submit a request once to be run multiple
tomes, each time in a different language. If this program utilizes this feature the MLS
function determines which installed languages are needed for the request.
Use in SRS Indicates whether this program can be run using Standard Request
Submission. If this box is checked, you must register the parameters of this program.
Allow Disabled Values For a program authorized for SRS submission, check this box to
allow a user to enter disabled or outdated parameter values.
Run Alone Check this box if your program is incompatible with other programs in its
logical database and should therefore be run alone.
Restart on System Failure Check this box if you want this program to be restarted
automatically when the concurrent manager is restored after a system failure.
Enable Trace turns on SQL tracing when program runs.
NLS Compliant Check this box if the program allows a request to reflect a language
and territory that are different from the language and territory that the user is operating in.
This option should be set only by the developer of the program. The program must be
NLS Compliant to utilize this feature. See: Oracle Applications Developers Guide.
Output Fields Specify the handling or output from executions of this program.
Concurrent Programs Window Buttons
Copy to - Choose this button to create another concurrent program using the same
executable, request, and report information.
Session Control Specify options for the database session of the concurrent program
when it is executed. These options are used to optimize system performance.
Incompatibilities Opens the Incompatible Programs window to define which
programs should not be run when this program is running.
Parameters Opens the Program Parameters window.
For more information see:
(Help) Applied Technology > Oracle Applications System Administration > Configuration >
Overview of Concurrent Programs and Requests > Concurrent Programs Window
Note: You can also define concurrent programs in the Oracle Applications Framework
interface; using the System Administration responsibility, navigate to Concurrent (heading) >
Programs.
Validation Information: Default Value - For certain types of default, you can specify a
default value to use. This default value appears automatically when you enter the
parameter fields in the Validation region.
Validation Information: Required - Choose this box if a value for this parameter is
required by your program.
Validation Information: Enable Security - If the value set for this parameter does not
allow security rules, this field is display only. Otherwise, you can choose to apply any
security rules defined for this value set to affect your parameter list also.
Validation Information: Range - Choose either Low or High if you want to validate
your parameter value against the value of another parameter in this structure.
Display - Indicates whether to display this parameter in the Parameters window when a
user submits a request to run this program form the Submit Requests window.
Display: Display Size The field length in characters for this parameter. The user sees
and and fills in the field in the Parameters window launched from the Submit Request
window.
Display: Description Size The display length in characters for the parameter value
description.
Display: Prompt The prompt to appear in the Parameter window of the Submit Request
window.
Display: Concatenated Description Size - The length for the parameter value description
field. This field displays all the parameter values as a concatenated string.
Token Refers to the name of a keyword or parameter for an Oracle Reports program.
Entries in this field are case-sensitive. Any values entered in this field must exactly match
the value expected by the Oracle Reports program.
For a complete description of the fields in this window see:
(Help) Applied Technology > Oracle Applications System Administration > Configuration >
Overview of Concurrent Programs and Requests > Concurrent Programs Window >
Concurrent Program Parameters Window
Summary
Chapter 25
Appendix - Incorporating
Custom Help Files
Lesson Aim
Oracle Applications uses an extensive network of help files to give users immediate online
assistance. You can customize these help files by manipulating the files supplied by Oracle, or
by adding your own to the system. This lesson covers how to integrate customized help files
into Oracle Applications.
Objectives
Customizing Help
Cross-Application Links
Note
If you have created a new application with new help files that you are uploading for the first
time, you must use the Generic File Manager Access Utility (FNDGFU) to upload these files.
See (Help) Applied Technology > Oracle Applications System Administration > Configuration
> Loaders > Generic File Manage Access Utility for additional information.
1. Copy the customized files to the appropriate product folder in the upload directory.
For example, if you customized six help files for Accounts Receivable, copy the six files
to the <server location><Help Utility Upload Path>\US\AR directory. You must
copy the files to the correct product folder for the Oracle Applications Help System
Utility to place the files in the correct location within the Oracle Applications Help
System.
2. Navigate to the Help Upload page of the Help System Utility. From the System
Administration responsibility, select Help Upload under Help Administration. The File
Upload page appears.
3. Specify the Source Directory for the files.
4. Specify the application and the customization level (typically 100 or above, indicating
these are customized files).
5. Select Upload.
The Help Utility uploads the help files for the application you selected. All files located in
the directory for the selected language and application will be uploaded.
Creating Reports
Running Reports
Help Builder
To access the Help Builder, you can use the System Administration responsibility and select
Help Builder under Help Administration.
Summary