Академический Документы
Профессиональный Документы
Культура Документы
D49195GC10
Edition 1.0
October 2008
D56577
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle, JD Edwards, PeopleSoft, and Siebel are registered trademarks of Oracle Corporation and/or its affiliates. Other names may
be trademarks of their respective owners.
Primary Author
Mildred Wang
Contributing Authors
Clara Jaeckel, Robert Farrington, Bill Sawyer, Melody Yang
Technical Contributors and Reviewers
Leta Davis, Sunil Ghosh, Donna Johnson, Roman Kratochvil, Gary Lemmons, Biju Mohan,
Gursat Olgun, Venkata Vengala, Barbara Waddoups, Roger Wigenstam, Maxine Zasowski
This book was published using:
oracletutor
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Table of Contents
i
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Introduction .....................................................................................................................................................1-1
Introduction ...................................................................................................................................................1-3
Course Objectives..........................................................................................................................................1-4
Overview .......................................................................................................................................................1-5
Oracle Applications System Administration .................................................................................................1-6
Oracle Workflow Component........................................................................................................................1-7
Oracle Applications Flexfields Component...................................................................................................1-8
Additional Material........................................................................................................................................1-9
ii
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
iii
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Managing Printers...........................................................................................................................................9-1
Managing Printers..........................................................................................................................................9-3
Objectives ......................................................................................................................................................9-4
Oracle Print Definition Components .............................................................................................................9-5
Relationships of the Printer Components ......................................................................................................9-7
Formatting Information .................................................................................................................................9-8
Defining Printers............................................................................................................................................9-10
Finding Existing Printer Types......................................................................................................................9-11
Registering a New Printer..............................................................................................................................9-12
Defining a New Printer Type.........................................................................................................................9-13
Printing with Pasta.........................................................................................................................................9-14
Setup for Basic Printing with Pasta ...............................................................................................................9-15
The pasta.cfg file ...........................................................................................................................................9-16
Modifying an Existing Printer Type to Use Pasta .........................................................................................9-17
Generating Other Formats using the Preprocessing Option...........................................................................9-19
Using Pasta with XML Publisher ..................................................................................................................9-20
Other Customization Materials for Oracle Applications Printing..................................................................9-22
Summary........................................................................................................................................................9-23
Introduction to Oracle Applications Manager..............................................................................................10-1
Introduction to Oracle Applications Manager (OAM) ..................................................................................10-3
Objectives ......................................................................................................................................................10-4
What is Oracle Applications Manager? .........................................................................................................10-5
Benefits of Oracle Applications Manager......................................................................................................10-6
Oracle Applications Manager Integrates with ..........................................................................................10-7
Application Management Pack for Oracle E-Business Suite.........................................................................10-9
Navigation in OAM .......................................................................................................................................10-10
Applications Dashboard ................................................................................................................................10-11
Site Map.........................................................................................................................................................10-13
Administration...............................................................................................................................................10-14
Monitoring.....................................................................................................................................................10-15
Maintenance ..................................................................................................................................................10-16
Diagnostics and Troubleshooting ..................................................................................................................10-17
Setting Up Oracle Applications Manager......................................................................................................10-18
Summary........................................................................................................................................................10-19
System Monitoring in Oracle Applications Manager...................................................................................11-1
System Monitoring in Oracle Applications Manager ....................................................................................11-3
Objectives ......................................................................................................................................................11-4
System Status Overview................................................................................................................................11-5
System Status Configuration Changes........................................................................................................11-7
System Status Web Components Status .....................................................................................................11-8
System Status System Alerts ......................................................................................................................11-10
System Status User Initiated Alerts ............................................................................................................11-12
Performance...................................................................................................................................................11-13
Critical Activities...........................................................................................................................................11-15
Critical Activities Setup.................................................................................................................................11-16
System Alerts, Metrics, Logs.........................................................................................................................11-17
Database Initialization (init.ora) Parameters..................................................................................................11-19
Copyright Oracle Corporation, 2008. All rights reserved.
iv
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
v
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
vi
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Pending Phase................................................................................................................................................13-28
Running Phase ...............................................................................................................................................13-29
Completed Phase ...........................................................................................................................................13-30
Inactive Phase................................................................................................................................................13-31
System Administrator Monitoring Privileges ................................................................................................13-32
Review Log Files...........................................................................................................................................13-33
Managing Log Files and Tables ....................................................................................................................13-34
Purge Request Results ...................................................................................................................................13-35
Grouping Concurrent Programs and Requests...............................................................................................13-36
Creating a Request Group..............................................................................................................................13-38
Using a Request Group with a Code..............................................................................................................13-39
Submitting Requests: Form Compared with Responsibility..........................................................................13-40
Implementing a Coded Request Group..........................................................................................................13-41
Customization Example.................................................................................................................................13-42
Creating the New Form Function ..................................................................................................................13-43
Passable Request Parameters.........................................................................................................................13-44
Adding the Function to the Menu..................................................................................................................13-45
Defining a Request Set ..................................................................................................................................13-46
Request Set Stages.........................................................................................................................................13-47
Stage Status ...................................................................................................................................................13-48
Linking of Stages...........................................................................................................................................13-50
Defining Request Sets Step 1: Enter Request Set Name ...............................................................................13-51
Defining Request Sets Step 2: Define a Stage ...............................................................................................13-53
Defining Request Sets Step 3: Enter Requests for Stage ...............................................................................13-54
Defining Request Sets Step 4: Enter Request Parameter...............................................................................13-55
Defining Request Sets Step 5: Link Stages ...................................................................................................13-56
Submitting a Request Set...............................................................................................................................13-57
User Request Set Privileges...........................................................................................................................13-58
System Administrator Request Set Privileges ...............................................................................................13-59
Summary........................................................................................................................................................13-60
vii
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Summary........................................................................................................................................................14-32
viii
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
ix
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
x
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
xi
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
xii
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
xiii
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Preface
xv
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Profile
xvi
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Related Publications
Part Number
B31451
B31453
B31454
B31431
Additional Publications
System release bulletins
Installation and users guides
read.me files
International Oracle Users Group (IOUG) articles
Oracle Magazine
xvii
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle Publications
Title
Oracle Applications System Administrators Guide Security
Oracle Applications System Administrators Guide Configuration
Oracle Applications System Administrators Guide Maintenance
Oracle Workflow Administrators Guide
Typographic Conventions
What follows are two lists of typographical conventions that are used specifically within text
or within code.
Convention
Uppercase
Object or Term
Commands,
functions,
column names,
table names,
PL/SQL objects,
schemas
Example
Use the SELECT command to view
information stored in the LAST_NAME
column of the EMPLOYEES table.
Lowercase,
italic
Filenames,
syntax variables,
usernames,
passwords
where: role
Initial cap
Trigger and
button names
Choose Cancel.
Italic
Quotation marks
Books, names of
courses and
manuals, and
emphasized
words or phrases
Lesson module
titles referenced
within a course
xviii
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Convention
Uppercase
Lowercase,
italic
Initial cap
Forms triggers
Lowercase
Column names,
table names,
filenames,
PL/SQL objects
. . .
OG_ACTIVATE_LAYER
(OG_GET_LAYER ('prod_pie_layer'))
. . .
SELECT last_name
FROM
employees;
Bold
xix
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
xx
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Chapter 26
Chapter
26 - Page 1 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Chapter
26 - Page 2 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Chapter
26 - Page 3 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Practice - Users
Overview
You are part of the final acceptance testing committee. Specifically, you have been assigned a
series of System Administration tasks that you will be implementing over the course of this final
week of testing.
In order to facilitate all the testing you will accomplish over this week, you will preface ALL
your exercises with your initials (e.g., JSCS for Jane S.C. Smith). This will help you find the
specific data you have created.
Tasks
Create the User
1.
Assign Responsibilities
2.
System Administrator
System Administration
Application Developer
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 4 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Your task is to create an Application user that you will utilize over the course of your testing.
3.
Functional Administrator
Functional Developer
Accept the defaults for all other fields. Use the Security Group "Standard" for a
responsibility if none defaults in.
4.
5.
Change the password when prompted. You change the password by typing the old password,
(WELCOME), and then assigning a new password. You will re-type the new password to
verify.
6.
Chapter
26 - Page 5 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Solution - Users
Create the User
1.
Log in to Oracle Applications with user name SYSADMIN and password SYSADMIN.
2.
Select the System Administrator responsibility under the Applications heading of the
Navigate region of the Personal Home Page.
3.
Navigate to the Users form: (N) Security > User > Define.
4.
Chapter
26 - Page 6 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
5.
System Administrator
System Administration
Application Developer
Functional Administrator
Functional Developer
Note: Use the Direct Responsibilities tab. The Indirect Responsibilities are assigned via
Oracle User Management.
6.
Click the Save icon to save your work. Your completed form should look similar to the
example shown in the slide.
Close the Users form. Choose File > Exit Oracle Applications to return to the home page.
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 7 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Assign Responsibilities
8.
9.
Use your new login and password (WELCOME) to log in again. You will be prompted to
change your password. Be sure to note your user name and new password for use in later
practices.
10. Verify that you have the correct Responsibilities displayed, and select the System
Administrator Responsibility. (Note: Depending on your setup, the Home Page may differ
from the illustration).
Chapter
26 - Page 8 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Tasks
Register your Custom Application
1.
Create your new custom application. Remember to put your initials at the front of your data
entries to keep your data unique.
Base Path: FND_TOP (Note: For class purposes we are using a predefined basepath. If
you were defining a true custom application, this would be a unique basepath.)
3.
Chapter
26 - Page 9 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Now that you have a functional user, your next assignment is to create a test area for
customizations. In order to do that, you will have to complete several steps.
1.
If not currently logged in, log in to Oracle Applications with your user.
2.
3.
Enter your Application: YourInitials Custom Application (e.g., JSCS Custom Application)
4.
5.
6.
7.
9.
Place your cursor in the Data Group field and query the Standard data group by selecting
View from the application menu > Query By Example > Enter.
10. Enter Standard in the Data Group field and then execute the query by selecting View from
the application menu > Query By Example > Run.
11. Ensure your cursor is in the Application field and click the New toolbar icon or select New
from the File menu to add a row.
12. Select your custom application name from the list of values for the Application field.
13. Select APPS from the list of values for the Oracle ID field.
14. Save your work. Your window should look like the example shown below.
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 10 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Chapter
26 - Page 11 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Practice - Menus
Overview
Create a System Auditor responsibility, and associate your new menu to that
responsibility
Assign the System Auditor to a new user and test the user and responsibility.
Tasks
Create your Level 3 Menu
Menus in Oracle Applications must be created bottom-up. Your first task is to create your lowest
level menu.
1.
Create a new menu. Remember to put your initials at the front of your data entries to keep
your data unique.
User Menu Name: YourInitials Flexfield Security (e.g., JSCS Flexfield Security)
Prompt
Function
Description
Grant
10
Define
Checked
20
Assign
Checked
Create a new menu. Remember to put your initials at the front of your data entries to keep
your data unique.
Chapter
26 - Page 12 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
The committee wants you to test the Menu processes. Specifically, they want you to create a
System Auditor responsibility, and to create a custom menu to assign to that responsibility. In
this testing process you will implement the following.
Prompt
10
Submenu
Function
Description
Grant
Define
Responsibilities
Responsibilities
Define
Responsibilities
Checked
20
Request Group
Request Groups
Define Request
Groups
Checked
30
Flexfield
Security
Checked
YourInitials
Flexfield Security
4.
Create a new menu. Remember to put your initials at the front of your data entries to keep
your data unique.
Prompt
Submenu
Description
Grant
10
Users
Checked
20
Responsibilities
30
Personal Profile
Checked
40
Requests
Standard Report
Submission and View
report (privileged) 4.0
Checked
Checked
Create a new responsibility. Remember to put your initials at the front of your data entries to
keep your data unique.
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 13 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
7.
Create a new user. Remember to put your initials at the front of your data entries to keep
your data unique.
Password: WELCOME
Test the new user, new responsibility, and new menu to ensure that they are working
properly.
Chapter
26 - Page 14 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Solution - Menus
Create your Level 3 Menu
1.
2.
3.
4.
User Menu Name: YourInitials Flexfield Security (e.g., JSCS Flexfield Security)
Prompt
Function
Description
Grant
10
Define
Checked
20
Assign
Checked
Save your work. You should see a note indicating that your request has been submitted to
recompile your menu. Click (B) OK to acknowledge the note. Your work should look
similar to the following.
Chapter
26 - Page 15 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
5.
6.
7.
Prompt
10
Submenu
Function
Description
Grant
Define
Responsibilities
Responsibilities
Define
Responsibilities
Checked
20
Request Group
Request Groups
Define Request
Groups
Checked
30
Flexfield
Security
Checked
YourInitials
Flexfield Security
Save your work and click (B) OK to the note window indicating that your request has been
submitted to recompile your menu in the database. Your work should look similar to the
following.
Chapter
26 - Page 16 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
8.
9.
Prompt
Submenu
10
Users
20
Responsibilities
30
Personal
Profile
40
Requests
Function
Description
Grant
Checked
YourInitials
Responsibility (i.e., Your
Level 2 Menu)
Define
Responsibilities,
Request Groups,
Security Rules
Checked
Checked
10. Save your work and click (B) OK to the note window indicating that your request has been
submitted to recompile your menu in the database. Your work should look similar to the
following.
Chapter
26 - Page 17 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Chapter
26 - Page 18 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
11. Click the (B) View Tree to see your new menu in the Menu Viewer. Your menu tree
should appear similar to the example shown in the slide. Close the Menu Viewer when done.
15. Save your work. Your work should look similar to the following.
Chapter
26 - Page 19 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Password: WELCOME
19. Save your work. Your work should look similar to the following.
20. Test the new user, new responsibility, and new menu to ensure that they are working
properly. Exit Oracle Applications and return to your home page.
21. Click on the Exit icon to open the login screen.
Chapter
26 - Page 20 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
22. Sign on again using your new login. You will be required to change your password. Note
your user name and password for future access.
23. From the home page, click on YourInitials System Auditor responsibility.
24. Verify that your Navigator menu contains the correct items. Your screen should appear
similar to the example shown in the slide.
Chapter
26 - Page 21 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Replace the Define Responsibilities function with this query-only function on your
existing System Auditor menu
Tasks
Create your Query-Only Function
1.
Create a new Form Function. Remember to put your initials at the front of your data entries
to keep your data unique.
Type: Form
Parameters: QUERY_ONLY=YES
2.
Query the YourInitials_RESPONSIBILITY menu in the Menu form. Replace the prompt,
function and description for Seq 10 Define Responsibilities.
Seq
Prompt
Function
Description
Original
10
Define Responsibilities
Responsibilities
Define Responsibilities
Replace with
10
View Responsibilities
YourInitials View
Responsibilities
View Responsibilities
Chapter
26 - Page 22 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
The committee has evaluated the System Auditor responsibility you created. The responsibility
has access to create new Responsibilities and make changes to existing ones and the committee
has decided the auditor should have the ability to only view responsibilities. In this test process
you will do the following:
1.
2.
3.
Properties tab:
Type: Form
Maintenance Mode Support: None
Context Dependence: Responsibility
Chapter
26 - Page 23 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Form tab:
Form: Define Responsibility
Application: Application Object Library
Parameters: QUERY_ONLY=YES
Save your work. Your work should look similar to the following.
6.
7.
8.
9.
Put the form in query mode by pressing F11 or by selecting (M) View > Query by
Example > Enter.
Enter YourInitials_RESPONSIBILITY in the Menu Name field and execute your query
by pressing Ctrl-F11 or by selecting (M) View > Query by Example > Run.
Replace the prompt, function and description for Seq 10 Define Responsibilities.
Seq
Prompt
Function
Description
Original
10
Define Responsibilities
Responsibilities
Define Responsibilities
Replace with
10
View Responsibilities
YourInitials View
Responsibilities
View Responsibilities
Save your work. Your work should look similar to the following.
Chapter
26 - Page 24 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
4.
Chapter
26 - Page 25 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Chapter
26 - Page 26 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Practice - Responsibilities
Overview
Modify the responsibility by excluding functions and menus from its menu
Tasks
Create New Responsibility
1.
Create a new responsibility. Remember to put your initials at the front of your data entries to
keep your data unique.
Modify access to certain menus and functions for your new Responsibility by excluding the
items below. Menu or Function Names to exclude:
Chapter
26 - Page 27 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
The committee wants you to test creating a special, limited responsibility for an assistant System
Administrator. The steps are as follows:
Function, Responsibilities
Menu, NAVSECVAL4.0
4.
In order to test this new responsibility, create a new user signon for your assistant system
administrator and assign your newly created responsibility to this user. Use the information
listed below.
Once you have defined it, sign off and back on using the new signon. Check that all the
specialized responsibilities and exclusions that you intended apply to this new user.
Query your user (YourInitialsUser) you created, and add this responsibility to that user.
Chapter
26 - Page 28 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Solution - Responsibilities
Create New Responsibility
1.
If not currently logged in, log in to Oracle Applications with your user.
2.
3.
4.
6.
Click on Type of exclusion Function or Menu then use the list of values to select the
appropriate function or menu to exclude in the name column. Continue until all items listed
are excluded.
Note: For each of the responsibilities shown below, ignore the Excluded Items and
Security Attributes tabbed regions.
Function, Responsibilities
Menu, NAVSECVAL4.0
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 29 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
7.
8.
10. Use the information listed below to create your new assistant system administrator user:
Chapter
26 - Page 30 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
14. Enter your new user name and password. You will be prompted to change your password.
15. From the home page, select YourInitials Assistant System Administrator responsibility.
16. Review the menu items for your new responsibility and verify the correct items appear.
Chapter
26 - Page 31 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Chapter
26 - Page 32 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
2.
3.
4.
5.
Click on the User Administration privileges link to show details for the grant defined for
the set of users shown, People in the Administrator's own Organization.
2.
In the Objects page, perform a search for the object with the code
UMX_PERSON_OBJECT.
3.
4.
5.
Click on the name People in the Administrators own Organization to view the details of
this object instance set.
6.
Note the predicate. The SQL statement queries the set of users based upon the party
relationships defined in TCA (the organization).
Chapter
26 - Page 33 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
1.
2.
3.
Enter the required information in the Lookup Codes fields. In this case, the name is
Administration and the description can be something about a general category for
administration roles.
4.
5.
Click the Role Categories tab to view the newly created Administration role category.
Chapter
26 - Page 34 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Vision Inc. is a computer systems company. The company offers its customers a full range of
computer systems and office equipment. Additionally, the company offers an array of services to
support its customers' products. Vision has decided to implement Oracle User Management to
have a flexible and scalable system for managing access privileges and user accounts.
The company wants to distribute some of its security and administrative tasks to local
administrators instead of having the system administrator retain them exclusively. To accomplish
this, the company will create roles for a partner administrator, a security administrator, and a
customer administrator. Individuals who are assigned these roles will manage a discrete subset
of the companys users, roles, and external contacts.
As part of the implementation team, you need to perform the following tasks:
Grant the appropriate permissions for the role so that assignees can perform specific
actions on the users they manage
Create a registration process for the role so that users can request it via self service
Assumptions
Some parts of Oracle User Management have already been implemented, including the
Partner Administrator and Security Administrator roles as well as the User Management
responsibility and several permissions.
Oracle User Management ships with seeded roles including Partner Administrator,
Security Administrator, and Customer Administrator. Assume for the purposes of this
course, the Customer Administrator role does not exist, and the students must create it.
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 35 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Business Scenario:
Tasks
Assign Security Administrator Role
Assign the Security Administrator Role to the YourInitialsUser to enable the User
Management responsibility for your user.
Create a Role Within a Desired Role Category
Chapter
26 - Page 36 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Create a customer administrator role called YourInitials Course Administrator within the
Security Administration Role Category.
1.
2.
3.
Click (B) Go
Click (B) Go
Chapter
26 - Page 37 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
5.
6.
Login as YourInitialsUsers (e.g., JSCSUSER), verify you have the User Management
responsibility
Chapter
26 - Page 38 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
4.
9.
Chapter
26 - Page 39 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
8.
Chapter
26 - Page 40 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Vision Inc. is a computer systems company. The company offers its customers a full range of
computer systems and office equipment. Additionally, the company offers an array of services to
support its customers' products. Vision has decided to implement Oracle User Management to
have a flexible and scalable system for managing access privileges and user accounts.
The company wants to distribute some of its security and administrative tasks to local
administrators instead of having the system administrator retain them exclusively. To accomplish
this, the company will create roles for a partner administrator, a security administrator, and a
customer administrator. Individuals who are assigned these roles will manage a discrete subset
of the companys users, roles, and external contacts.
As part of the implementation team, you need to perform the following tasks:
Grant the appropriate permissions for the role so that assignees can perform specific
actions on the users they manage
Create a registration process for the role so users can make a self service request
Assumptions
Some parts of Oracle User Management have already been implemented, including the
Partner Administrator and Security Administrator roles as well as the User Management
responsibility and several permissions.
Oracle User Management ships with seeded roles including Partner Administrator,
Security Administrator, and Customer Administrator. Assume for the purposes of this
course, the Customer Administrator role does not exist, and the students must create it.
Chapter
26 - Page 41 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Business Scenario:
Tasks
Assigning the User Maintenance UIs to the Course Administrator Role
Chapter
26 - Page 42 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
1.
2.
3.
4.
Click the Update icon next to YourInitials Course Administrator role and then click (B)
Create Grant.
5.
Enter a name and description for the grant (for example, UMX Menus) and click (B) Next.
6.
In the Set field, enter User Maintenance UIs, and then click (B) Next.
7.
8.
9.
Click (B) OK to the confirmation message to acknowledge that the grant has been
successfully created.
Chapter
26 - Page 43 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Vision Inc. is a computer systems company. The company offers its customers a full range of
computer systems and office equipment. Additionally, the company offers an array of services to
support its customers' products. Vision has decided to implement Oracle User Management to
have a flexible and scalable system for managing access privileges and user accounts.
The company wants to distribute some of its security and administrative tasks to local
administrators instead of having the system administrator retain them exclusively. To accomplish
this, the company will create roles for a partner administrator, a security administrator, and a
customer administrator. Individuals who are assigned these roles will manage a discrete subset
of the companys users, roles, and external contacts.
As part of the implementation team, you need to perform the following tasks:
Grant the appropriate permissions for the role so that assignees can perform specific
actions on the users they manage
Create a registration process for the role so users can make a self service request
Tasks
Assigning the User Maintenance UIs to the Course Administrator Role
Grant User Maintenance UIs to YourInitials Course Administrator role.
Chapter
26 - Page 44 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Business Scenario:
2.
Locate YourInitials Course Administrator role and click the Update icon.
4.
Click the Run Wizard icon for "User Management: Security Administration Setup".
5.
Verify User Administration tab is selected and click (B) Add More Rows.
6.
7.
Select Organization Administration tab and then click (B) Assign Organization Privileges.
9.
Perform a wildcard search in the Search By Organization Privileges, select View the
Administrators Own Organization
Chapter
26 - Page 45 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
1.
Define the Roles that can be managed through this role by performing the following:
10. Select the Role Administration tab.
11. In the Available Roles area, search for YourInitials Course Administrator role and place it
in the Selected Roles area. Assignees of YourInitials Course Administrator role will be
able to grant YourInitials Course Administrator role to other users.
12. Optionally perform a wildcard search (e.g., %Support%) on Miscellaneous in the Type field.
Then select one or more roles from the search results, move them to the Select Roles area.
Following is an example:
13. Click (B) Apply. The assignee of YourInitials Course Administrator role will be able to
assign the selected roles to the users that he or she can manage.
14. Click (B) Apply.
Chapter
26 - Page 46 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Vision Inc. is a computer systems company. The company offers its customers a full range of
computer systems and office equipment. Additionally, the company offers an array of services to
support its customers' products. Vision has decided to implement Oracle User Management to
have a flexible and scalable system for managing access privileges and user accounts.
The company wants to distribute some of its security and administrative tasks to local
administrators instead of having the system administrator retain them exclusively. To accomplish
this, the company will create roles for a partner administrator, a security administrator, and a
customer administrator. Individuals who are assigned these roles will manage a discrete subset
of the companys users, roles, and external contacts.
As part of the implementation team, you need to perform the following tasks:
Grant the appropriate permissions for the role so that assignees can perform specific
actions on the users they manage
Create a registration process for the role so that users can self service request it
Tasks
Assigning the Course Administrator Role to a User
Query a user in the system and assign the user YourInitials Course Administrator role.
View Role Capabilities by Logging on as the User to Whom the Role is Assigned
Log on as the user to whom the role is assigned and view that users administrative capabilities.
Chapter
26 - Page 47 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Business Scenario:
Name
Company
betty.lewis@hilmanassoc.com
Betty Lewis
hwolfschmidt@hilmanassoc.com
Hilda Wolfschmidt
ely.alter@test.com
Ely Alter
A.C. Network
ckim@acnetworks.com
Carlo Kim
A.C. Network
jimjohnson_bworld@yahoo.com
Jim Johnson
Business World
bill_w_smith@yahoo.com
Bill Smith
Business World
sturakhi@bw.com
Satish Turakhia
Business World
skyzer@abccorp.com
Stacey Kyzer
ABC Corporation
Americas
lpetersent@ace.test.com
Lydia Petersen
Ace Communications
10
michaelzrobertson@yahoo.com
Michael Robertson
Business World
11
guest1_crm@hotmail.com
Doug Jackson
A.C. Networks
12
rabbott@visionhr.com
Rachel Abbott
13
jsnyder@cds.com
John Snyder
CDS, Inc.
14
swhaling@worldwidecomm.com
Sean Whaling
Worldwide
Communications
15
vtyagi@test.com
Vishal Tyagi
SmartBuy
Buddy.holly@test.com
Bill Holly
Big 4 Rental
Instructor
Chapter
26 - Page 48 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Number
1.
(N) Users
2.
In the Email field within the search area enter <your assigned email address per list> and
click (B) Go.
3.
The person with your assigned email address is displayed in the result set. Click the Create
User icon for this person.
Note: The name displayed in the search result is a person in the system and not a user. As
part of this procedure you will assign this person a user account that includes your Course
Administrator role.
4.
5.
Reset the users password by typing welcome1 in the Password and Confirm Password
fields and click (B) Submit.
6.
Query the user again by searching for your assigned users email address such as
jsnyder@cds.com.
7.
Click the Update icon next to the user and then click the (B) Assign Roles.
8.
In the search window, search for YourInitials Course Administrator role. Select this role
and click (B) Select.
9.
Enter a justification in the Justification filed and click (B) Apply. You will see a
confirmation message indicating you have successfully updated the role.
Logging on as the User to Whom the Course Administrator Role is Assigned and
Viewing that Users Administrative Capabilities
10. Log out of the system and log on as your assigned users address by entering the following:
Chapter
26 - Page 49 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Password: welcome1
11. When prompted, reset the users password from welcome1 to welcome.
12. You should be able to view and use the User Maintenance UIs upon logging in.
Observe: The Organization field is populated with the name of the organization to which
your user is associated. If your assigned user is associated with more than one organization,
you will see a drop-down allowing you to select which organizations user you want to
manage. Following is an example of what you would see:
Chapter
26 - Page 50 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Vision Inc. is a computer systems company. The company offers its customers a full range of
computer systems and office equipment. Additionally, the company offers an array of services to
support its customers' products. Vision has decided to implement Oracle User Management to
have a flexible and scalable system for managing access privileges and user accounts.
The company wants to distribute some of its security and administrative tasks to local
administrators instead of having the system administrator retain them exclusively. To accomplish
this, the company will create roles for a partner administrator, a security administrator, and a
customer administrator. Individuals who are assigned these roles will manage a discrete subset
of the companys users, roles, and external contacts.
The company has created the Customer Administrator Role (referred to here as Course
Administrator), defined its delegated administration (data security policies) and assigned it, the
appropriate permission sets as well as the User Maintenance UIs. The company now wants to
define a registration process for this role so users can make a self service request.
As part of the implementation team, you need to perform the following tasks:
Grant the appropriate permissions for the role so that assignees can perform specific
actions on the users they manage
Create a registration process for the role so users can make a self service request
Tasks
Creating a Registration Process for Your Course Administrator Role
Create a registration process and tie it to YourInitials Course Administrator Role.
Chapter
26 - Page 51 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Business Scenario:
1.
Login: YourInitialsUser
2.
3.
Note: the Registration Process Code, Display Name, and Description fields should be
populated automatically based on the selected role.
4.
5.
When you choose to create a registration process for existing users, you can specify a
specific group of users for whom the registration process is available. For the purposes of
this course, select All Users from Eligible Users radio list instead of choosing a specific
group of users. Then click (B) Submit.
You should see a confirmation message populated indicating the registration process has
been successfully created.
Chapter
26 - Page 52 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Vision Inc. is a computer systems company. The company offers its customers a full range of
computer systems and office equipment. Additionally, the company offers an array of services to
support its customers' products. Vision has decided to implement Oracle User Management to
have a flexible and scalable system for managing access privileges and user accounts.
The company wants to distribute some of its security and administrative tasks to local
administrators instead of having the system administrator retain them exclusively. To accomplish
this, the company will create roles for a partner administrator, a security administrator, and a
customer administrator. Individuals who are assigned these roles will manage a discrete subset
of the companys users, roles, and external contacts.
As part of the implementation team, you need to perform the following tasks:
Grant the appropriate permissions for the role so that assignees can perform specific
actions on the users they manage
Create a registration process for the role so that users can self service request it
Tasks
Testing the Registration Process for Your Course Administrator Role
Test the registration process tied to YourInitials Course Administrator Role.
Chapter
26 - Page 53 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Business Scenario:
Username
Name
Company
aking@bw.com
aking
Albert King
Business World
jmiller_bw_us@yahoo.com
jmiller
Jay Miller
Business World
alec.stewart@bw.com
astewart
Alec Stewart
Business World
rwang@bw.com
rwang
Robert Wang
Business World
msinisi@bw.com
msinisi
Mary Sinisi
Business World
hharris@yahoo.com
hharris
Hilda Harris
efrench@email.com
efrench
Eric French
Ace Communications
ivyi@yahoo.com
ivyi
Ivy Hatfield
World of Business
emoulds@businessworld.com
emoulds
Eric Moulds
World of Business
10
david_alite@siliconpeak.com
dalite
David Alite
11
RhondaSellers@spt.com
rsellers
Rhonda Sellers
12
blam@spt.com
benlam
Ben Lam
13
ama@spt.com
ama
Albert Ma
(N) Users
2.
Perform a search for <your assigned email> in the Email field and click (B) Go.
Chapter
26 - Page 54 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
No.
4.
5.
6.
7.
Click the Preferences link at the top of the page, click Access Requests link (see example
below):
8.
9.
Select the System Administration category, select YourInitials Course Administrator role,
click (B) Add to List (which is in the Selected Roles list in the right-hand panel) and then
click (B) Next.
10. Enter a justification for requesting this role, click (B) Next.
11. Click (B) Submit.
12. YourInitials Course Administrator role and the User Management responsibility should
both appear in the resulting window, because YourInitials Course Administrator role
inherits the User Management responsibility.
Chapter
26 - Page 55 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
3.
Tasks
1.
Query the Concurrent:Request Priority profile value. Note its value, and try to update it.
2.
Query the Viewer: Default Font Size. Set the value to 10 and Save it.
3.
Query the Printer. Use the LOV to change or add a value and Save it.
4.
Query the Concurrent:Hold Requests. Change the user value to Yes and Save it.
5.
Click the Options button, and verify that the printer you selected for the Printer
profile option has defaulted in the Printer field.
Use the Find System Profile Values window to find Currency:Negative Format at the Site
level.
7.
8.
Use the Find System Profile Values window to find the Flexfields:Shorthand Entry profile
option at the Site and User level.
9.
10. At which levels can the System Administrator change the values? _______________
Chapter
26 - Page 56 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
1.
2.
3.
Query up the profile option Viewer: Default Font Size. If there is no value specified, set it
to 10 and click Save.
5.
Query up the profile option Printer. Use the List of Values to change or add a value. Click
Save.
6.
Query up the option Concurrent:Hold Requests. Change the User Value to Yes. Click
Save.
7.
8.
Click the Options button and verify that the printer you selected for the Printer
profile option has defaulted in the Printer field.
Take your request off hold by clicking the Remove Hold button.
Chapter
26 - Page 57 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
10. Use the Find System Profile Values window to find Currency:Negative Format at the Site
level.
11. What is the current setting of Currency:Negative Format for the Site? _______________
12. Use the Find System Profile Values window to find the Flexfields:Shorthand Entry profile
option at the Site and User level.
13. What is the default value at the Site level? _______________
14. At which levels can the System Administrator change the values? _______________
Chapter
26 - Page 58 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Run the Signon Audit reports to determine what concurrent programs were run
Run the Signon Audit reports to determine what responsibilities and users have been
accessed
Run the Signon Audit reports to see what forms have been accessed
Tasks
Run the Signon Audit Reports
1.
Run the complete set of Signon Audit Reports using the time frame of the last week.
2.
Which responsibilities and users were accessed in the last week? _______________
Monitor Users
3.
4.
If you dont see any users in your Monitor Users form, change the profile option Sign-On
Audit Level to Form at the user level. Then, sign on again to your user and recheck the
Monitor Users form.
Chapter
26 - Page 59 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
In this test, the committee wants to look at the results of several Signon Audit reports. They
would also like you to test the Monitor Users form. They have asked you to complete the
following tasks.
1.
2.
3.
Click the List of Values icon to get a list of all reports available for you to run.
4.
5.
From Request Start Time: one week ago (use the format DD-MMM-YY)
6.
7.
8.
9.
From Request Start Time: one week ago (use the format DD-MMM-YY)
From Request Start Time: one week ago (use the format DD-MMM-YY)
Chapter
26 - Page 60 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Which responsibilities and users were accessed in the last week? _______________
Monitor Users
Chapter
26 - Page 61 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
1.
(N) Oracle Applications Manager > Site Map > Administration > Hosts (under System
Configuration).
2.
Add the page to the Support Cart using the Add to Support Cart button at the bottom of the
page. Provide a description for the saved page. Click OK twice on the page that is returned.
3.
Navigate to the Support Cart using the Support Cart global button or link.
4.
For the Description tab, add information for the Service Request (SR) # (XXXXXXX.XXX)
and a description. Click Update.
5.
Navigate to the Applications Signature tab. Select Product Information in the Generic
region and select the Delete button. Click Collect.
6.
(Optional) Navigate to the Other Information Collected tab. You should see the page
"oam/node/nodeList" listed. Click the icon in the View column to review the Hosts page.
7.
Save the page using the Save Cart button on the bottom of the page. Click Save, and then
give your zip file a suitable name as you save it to a local drive.
8.
Navigate to the Other Information Collected tab. Select the "oam/node/nodeList" page and
click Delete to delete the page. The Hosts page will be deleted from the table.
9.
10. From the Restore Cart Contents page, use the Browse button to find and select your
previously-saved zip file. Click Restore.
11. The Hosts page is now back in the Support Cart. Note that Product Information is not
included because you deleted it in an earlier step.
Chapter
26 - Page 62 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
This demonstration illustrates the use of the Support Cart in Oracle Applications Manager, using
the Hosts page as an example. Other pages can be used also.
Tasks
Submit a Request to Run Once
1.
Submit the Active Responsibilities and Users report to run once, immediately.
Submit the Active Users report to run at two-minute intervals from the completion of the
prior run.
Submit the Reports and Sets by Responsibility report to run one week from today.
Submit a Request to Run Every Day at 2pm for just One Week
4.
Submit the Work Shifts Report to run every day at 2pm for the next one week.
After you have submitted all of your concurrent requests, examine the status of your
requests.
Chapter
26 - Page 63 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
The implementation committee has asked you to test a number of scenarios for scheduling
concurrent requests. The scenarios they would like to test are as follows.
1.
Log in to Oracle Applications using the username you created earlier in the class and select
the System Administrator responsibility.
2.
3.
4.
Select Active Responsibilities and Users report from the list of values for the Name field.
Your form should look similar to the following.
5.
6.
Chapter
26 - Page 64 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
8.
Select Active Users report from the list of values for the Name field.
Select the Periodically radio button from the Run the Job option group.
In the Re-run every fields, enter 2 and select Minute(s) from the list of values.
Select the From the Completion of the prior run radio button from the Apply the
Interval option group. Your Schedule screen should appear similar to the following.
9.
Chapter
26 - Page 65 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
7.
Select the Once radio button from the Run the Job option group.
In the Run At field change the date to one week from today by using the popup calendar
or by typing in the date.
Select the Periodically radio button from the Run the Job option group.
In the Start At field keep the current date, but change the time to 2:00 PM (14:00:00) by
using the popup calendar or by typing it in.
In the End At field change the date to one week from today and the time to 2:00 PM
(14:00:00) by using the popup calendar or by typing it in.
Chapter
26 - Page 66 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
19. Use the appropriate buttons on this form to perform each of the tasks.
Find the Active Responsibilities request. The Phase should be Completed and the
Status should be Normal.
Select a report with Phase Completed and Status Normal (for example, the Active
Responsibilities report). Click (B) Diagnostics. The Request Diagnostics window will
appear. Review the entries and click (B) OK to close the window.
Select a report with Phase Completed and Status Normal (for example, the Active Users
report). Click (B) View Log. The log file will appear in a separate browser window.
Review the entries for the log and close the browser window.
Select a report with Phase Completed and Status Normal (for example, the Active Users
report). Click (B) View Output. The report will appear in a separate browser window.
Review the report and close the browser window.
Additional Tasks
20. Cancel the Active Users request.
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 67 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
18. Click (B) Find to view all your requests. Your form should look similar to the following.
A Decision window will warn you: Cancelling a request cannot be undone. Continue?
The Phase will be updated to Completed and the Status will be set to Cancelled.
Click (B) Hold Request. The Phase of the request will be updated to Inactive and the
Status will be set to On Hold.
Select one of the Active Users requests that completed with a normal status.
You will get a confirmation page indicating that your request for reprinting existing
output has been scheduled along with the Request ID information. Click (B) OK and
Close window.
Chapter
26 - Page 68 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Limit the Request Groups access to concurrent reports, programs, and sets
Assign the new Request Group to your YourInitials Assistant System Administrator
(e.g., JSCS Assistant System Administrator) responsibility
Tasks
Create your Request Group
1.
Create a new Request Group. Remember to put your initials at the front of your data entries
to keep your data unique.
Requests:
Type
Name
Application
Application
Program
Employee Listing
Payables
Set
Period End
Payables
Chapter
26 - Page 69 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Up until this test process, the committee has not wanted you to handle Request Groups. In this
test process, you will create a new Request Group, and assign it appropriately. The steps that will
be tested include the following.
3.
Chapter
26 - Page 70 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
1.
Log in to Oracle Applications using your username you created earlier in the class and select
the System Administrator responsibility.
2.
3.
4.
Requests:
Type
Name
Applications
Application
Program
Employee Listing
Payables
Set
Period End
Payables
Save your work. Your work should look similar to the following.
Chapter
26 - Page 71 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
7.
Query to find your YourInitials Assistant System Administrator responsibility. Choose your
request group from the list of values for the Request Group Name field.
8.
Exit and sign on again as your YourInitials Assistant System Administrator (e.g.,
JSCS_ASST_SYSADMIN)
Chapter
26 - Page 72 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
5.
Tasks
Create your Coded Request Group
1.
Create a new Coded Request Group. Remember to put your initials at the front of your data
entries to keep your data unique.
Requests:
Type
Name
Application
Program
Receivables
Create a new Form Function. Remember to put your initials at the front of your data entries
to keep your data unique. Accept default values unless otherwise specified.
Description tab:
Function: YourInitials_FNDRSRUN_JOURNAL_ENTRIES
User Function Name: YourInitials Journal Entries
Description: Journal Entries
Chapter
26 - Page 73 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Now that you have completed the committees tests on Request Groups, they want to go into the
advanced testing of a Coded Request Group. Specifically, the committee wants to test the
following.
Form tab:
Form: Run Reports
Application: Application Object Library
Parameters:
Enter the following three parameters in the Parameter field and each of them
should be separated by a space
TITLE = YourInitials Journal Entries
REQUEST_GROUP_CODE = YourInitialsJE
REQUEST_GROUP_APPL_SHORT_NAME = <your application short
name>
Assign your Form Function to an Existing Menu
3.
4.
Prompt
Function
Description
Grant
50
Journal Entries
Checked
Chapter
26 - Page 74 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Properties tab:
Type: Form
1.
Log in to Oracle Applications with the username that you created earlier in the class and
select the System Administrator responsibility.
2.
3.
Requests:
Type
Name
Application
Program
Receivables
4.
Save your work. Your work should look similar to the following.
5.
Chapter
26 - Page 75 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
7.
Properties tab:
Type: Form
Form tab:
Form: Run Reports
Parameters: Enter the following three parameters in the Parameter field and
each of them should be separated by a space:
TITLE = YourInitials Journal Entries
REQUEST_GROUP_CODE = YourInitialsJE
REQUEST_GROUP_APPL_SHORT_NAME = <your application short
name>
Chapter
26 - Page 76 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
8.
Save your work. Your work should look similar to the following.
9.
Hint: You can use the Edit Field icon to open an Editor window.
Prompt
Function
Description
Grant
50
Journal Entries
Checked
Chapter
26 - Page 77 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Chapter
26 - Page 78 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
13. Save your work and click (B) OK to acknowledge note. Your work should look similar to
the following.
Chapter
26 - Page 79 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Create a new Request Set using the Wizard. Remember to put your initials at the front of
your data entries to keep your data unique.
2.
3.
Include the following programs in your request set: Users of a Responsibility, Reports and
Sets by Responsibility, and Report Group Responsibilities.
4.
Chapter
26 - Page 80 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Tasks
1.
2.
3.
Click (B) Request Set Wizard (DO NOT enter any other information the Wizard will
prompt you for necessary information).
4.
5.
Abort your set when the status of the stage ends in Error.
6.
7.
8.
9.
Users of a Responsibility
Chapter
26 - Page 81 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
11. Click (B) OK to acknowledge the note telling you that your request set has been created and
saved.
12. Verify the Owner field has the user name of the user you are currently logged in as.
Click (B) Parameters, create the shared parameter values by typing them into the
Shared Parameter field.
Seq
Prompt
Shared Parameter
Application Name
appl
Responsibility Name
resp
Chapter
26 - Page 82 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Prompt
Shared Parameter
Application Name
appl
Responsibility Name
resp
Chapter
26 - Page 83 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Prompt
Shared Parameter
10
Application Name
appl
20
Report Name
30
Chapter
26 - Page 84 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Chapter
26 - Page 85 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Tasks
Define your Work Shifts
1.
Create a new Work Shift. Remember to put your initials at the front of your data entries to
keep your data unique.
From: 08:00
To: 17:00
From: Monday
To: Friday
Create a new Concurrent Manager. Remember to put your initials at the front of your data
entries to keep your data unique.
Enabled: (Checked)
Chapter
26 - Page 86 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
The implementation committee wants you to test several aspects of managing concurrent
processing. Specifically, they want you to test the following.
Cache Size: 1
3.
Use the following information to assign your work shift to your concurrent manager.
Workshift
Processes
Sleep Seconds
YourInitials Dayshift
60
5.
Use the information below to define your specialization rules for your Concurrent Manager.
Include/Exclude
Type
Name
Include
User
YourInitialsUser
Exclude Your User from the Standard Concurrent Manager. A concurrent program will run
in whatever concurrent manager is available, unless it has been explicitly excluded from the
manager. Exclude your user from the Standard Manager by adding the following
specialization rules to the Standard Manager.
Include/Exclude
Type
Name
Exclude
User
YourInitialsUser
In the Administer Concurrent Managers window, scroll through the list of managers until
you find the manager you defined.
7.
8.
9.
10. Go to the View Requests window to verify that your request to activate your manager
completes successfully.
Chapter
26 - Page 87 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
11. Go to the Submit Request window and submit the Active Users or Active
Responsibilities and Users report to run once every minute for the next five minutes.
12. Go to the Administer Concurrent Managers window. Your concurrent manager will show
one request pending.
13. Click on the Requests button to view your request in the Concurrent Requests screen.
14. Return to the Administer Concurrent Managers window and click on the Processes button
to view the Processes window.
Chapter
26 - Page 88 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
1.
2.
3.
From the menu, select File > New, or click the New icon on the toolbar.
4.
From: 08:00
To: 17:00
From: Monday
To: Friday
5.
Save your work. The window should appear similar to the example shown.
6.
Chapter
26 - Page 89 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Enabled: (Checked)
Cache Size: 1
Save your work. The window should appear similar to the example shown.
Processes
Sleep Seconds
YourInitials Dayshift
60
10. Save your work. The window should appear similar to the example shown.
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 90 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
8.
Type
Name
Include
User
YourInitialsUser
13. Save your work. The window should appear similar to the example shown.
14. Close the Specialization Rules window to return to the Concurrent Managers window.
15. From the Concurrent Managers window, query up the Standard Manager.
Chapter
26 - Page 91 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Type
Name
Exclude
User
YourInitialsUser
19. Navigate to the Administer Concurrent Managers window: (N) Concurrent > Manager >
Administer.
20. In the Administer Concurrent Managers window scroll through the list of managers until
you find the manager you defined. Select your manager and click (B) Activate.
21. The status will update to Activating. The window will appear similar to the example shown.
22. Go to the View Requests window (N) Requests > View to verify that your request to
activate your manager completes successfully.
23. Navigate to (N) Requests > Run.
Chapter
26 - Page 92 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Choose Periodically.
Leave the Start At time as the current time and enter five minutes from now for the
End At time.
In the Re-run every field select 1 and Minute(s) to run the report once a minute for the
next five minutes.
30. Close this window to return to the Administer Concurrent Managers window.
31. Click (B) Processes to view the Processes window.
Chapter
26 - Page 93 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
32. In the Concurrent Processes screen you see all the requests that have run in your specialized
manager, the Oracle Process ID that was used to run the request, and the UNIX Process ID
(in the System column).
Chapter
26 - Page 94 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
1.
2.
From the File menu, select Open to open the sample solution file named wfvacXX_062.wft
from the file system.
3.
4.
Save the workflow definition to the class database using File > Save As. Then close the data
store.
5.
6.
Click the Developer Studio link. In the Search region of the Developer Studio page, enter
the name of the XX Vacation Proposal workflow item type and click Go. Then, in the
Results region, click the Run icon for the XX Vacation Proposal item type.
7.
Enter a process owner, item key, user key, requestor, approver, from date, and to date. The
requestor and approver should have Workflow administrator and user responsibilities
assigned to them.
8.
9.
Select the Status Monitor tab to review the process status in the Status Monitor Web pages.
In the Search region, enter the XX Vacation Proposal item type and the item key you
chose, and click Go.
In the Results region, select your process and click the Activity History button to review
the process activities.
Click the Status Diagram button to review the graphical diagram of the status of the
process.
10. Log off and log in again as the approver. You can use either a Workflow administrator
responsibility or Workflow user responsibility.
11. Click the Notifications link.
12. In the Worklist, select the subject line for the Vacation Proposal notification sent by your
process to open the notification message.
13. On the Notification Details page, approve or reject the proposal.
Chapter
26 - Page 95 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
14. Log off and log in as the requestor. To review the updated status of the process in the Status
Monitor Web pages, select the Status Monitor tab. Then search for the process with the XX
Vacation Proposal item type and your item key, and view the status diagram again.
15. Open the Workflow Builder again and make a change to the process diagram, such as
adding a function activity by dragging and dropping the Noop function from the Standard
item type into the process. Then save the definition to the class database again.
16. Repeat steps 5 through 9 to show the new version of the workflow definition in use.
Chapter
26 - Page 96 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Team: 01
Descriptive Flexfield Title: Accounting Calendar: Periods
Navigation Path: Setup > Financials > Calendars > Accounting (Periods region)
Team: 02
Descriptive Flexfield Title: AutoPost Criteria
Navigation Path: Setup > Journal > AutoPost
Team: 03
Descriptive Flexfield Title: Budgetary Control Group: Rules
Navigation Path: Budgets > Define > Controls (Budgetary Control Rules region)
Team: 04
Chapter
26 - Page 97 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
To perform the practices in this lesson (and the next three as well), you will need a descriptive
flexfield to work on. Your instructor will assign you a descriptive flexfield that has not yet been
used in the database you are accessing. You will use the same flexfield for practices throughout
these four lessons. The list below assigns each team number a unique descriptive flexfield and
shows the navigation path to the flexfield. The paths are accessed via the General Ledger Super
User responsibility. Your instructor will inform you of which flexfield you are to configure.
Team: 10
Team: 12
Chapter
26 - Page 98 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Team: 11
Scenario
Tasks
Define your Value Sets
1.
Define an independent value set named YourInitials_WHO_HELD. Give the value set a
description, a format type of Char, and a maximum size of 2. Enable Non-Hierarchical
Security for the value set.
Define an independent value set named YourInitials_WHY_HELD. Give the value set a
description, a format type of Char, and a maximum size of 3. Enable Non-Hierarchical
Security for the value set.
After defining your value sets, use the Descriptive Flexfield Segments window to define the
structure for the descriptive flexfield assigned to you. Do not allow overrides for the context.
Define three segments for the Global Data Elements context.
Define a segment named Who Held, with a prompt of Who. Assign the segment the
number 10, the column ATTRIBUTE1, and the value set YourInitials_WHO_HELD.
Define a segment named Why Held, with a prompt of Why. Assign the segment the
number 20, the column ATTRIBUTE2, and the value set YourInitials_WHY_HELD.
Define a segment named How Long, with a prompt of Length. Assign the segment the
number 30, the column ATTRIBUTE3, and the value set
YourInitials_HOW_LONG_HELD.
Chapter
26 - Page 99 ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Descriptive flexfields use two types of segments: global and context-sensitive. In this practice,
you will create a descriptive flexfield using only global segments. You will also create value sets
that provide lists of values for your user. The descriptive flexfield is designed to track the
following additional information about orders that have been held:
Ensure all three segments are displayed and enabled. When you finish defining the
structure, freeze and compile your flexfield definition.
3.
After defining the value sets and segments for your flexfield, use the Segment Values
window to define the values associated with each of the independent value sets.
4.
Define and enable the following values for the YourInitials_WHO_HELD value set.
5.
6.
Value
Description
01
Helen Myers
02
Mien Chan
03
Michael Keller
04
Luis Galvez
Define and enable the following values for the YourInitials_WHY_HELD value set.
Value
Description
FIR
MAR
AJR
Define and enable the following values for the YourInitials_HOW_LONG_HELD value set.
Value
Description
100
200
300
400
After defining your value sets, segments, and values, navigate to your descriptive flexfield
and test the results of your work. When you are finished, exit without saving.
Chapter
26 - Page 100ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
1.
2.
Enter the information for the first value set in the following fields:
Maximum Size: 2
3.
4.
Enter the information for the second value set in the following fields:
Maximum Size: 3
5.
6.
Enter the information for the third value set in the following fields:
Chapter
26 - Page 101ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
7.
Maximum Size: 3
8.
9.
10. In the Context Field region, ensure the Displayed check box is cleared.
11. In the Context Field Values region, select the Global Data Elements context and click (B)
Segments to navigate to the Segments Summary window.
12. Enter the following information for the three new segments:
Note: Be sure to save after each segment, you may need to click (B) OK to acknowledge the
Caution message before proceeding.
Number
Name
Window
Prompt
Column
Value Set
Displayed Enabled
10
Who Held
Who
ATTRIBUTE1
YourInitials_WHO_HELD
Checked Checked
20
Why Held
Why
ATTRIBUTE2
YourInitials_WHY_HELD
Checked Checked
30
Chapter
26 - Page 102ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Value
Description
Enabled
01
Helen Myers
Checked
02
Mien Chan
Checked
03
Michael Keller
Checked
04
Luis Galvez
Checked
Description
Enabled
FIR
Checked
MAR
Checked
AJR
Checked
Description
Enabled
100
Checked
200
Checked
300
Checked
400
Checked
26. Save your work and close the Segment Values window.
Test your Descriptive Flexfield
27. After defining your value sets, segments, and values, navigate to your descriptive flexfield
using the General Ledger Super User responsibility and test the results of your work. When
you are finished, exit without saving.
Chapter
26 - Page 103ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
21. In the Segment Values window, verify Value Set radio button is selected and your cursor is
in the header region, then query the YourInitials_WHY_HELD value set in the Name field.
This practice reinforces the concept of global segments for a descriptive flexfield and
demonstrates the use of the None validation type. In this scenario, you will define a descriptive
flexfield to track the following information about employees:
Height
Weight
Tasks
Define your Value Sets
1.
Use the Value Sets window to define three value sets as follows:
Define an independent value set named YourInitials_WHO_REFER. Give the value set a
description, a format type of Char, and a maximum size of 3. Enable Non-Hierarchical
Security for the value set.
Define a value set of validation type None named YourInitials_EMP_HEIGHT. Give the
value set a description, a format type of Number, a maximum size of 4, and a precision
of 2.
After defining your value sets, use the Descriptive Flexfield Segments window to define the
structure for your descriptive flexfield. For the purposes of this practice, use the same
descriptive flexfield you worked on previously to enter your new structure. Unfreeze the
flexfield definition first in order to make changes to the structure.
3.
Delete the segments that you defined previously, and define three new segments for the
Global Data Elements context.
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 104ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
To perform the practices in this lesson (and the next 2 as well), you will need a descriptive
flexfield to work on. In the previous lesson, you were assigned a descriptive flexfield by your
instructor. Please use your assigned descriptive flexfield for this exercise. If you were not
assigned a descriptive flexfield, please reference the previous lesson, and have your instructor
assign one now.
Define a segment named Who Referred, with a prompt of Who. Assign the segment the
number 10, the column ATTRIBUTE1, and the value set YourInitials_WHO_REFER.
Define a segment named Height, with a prompt of Height. Assign the segment the
number 20, the column ATTRIBUTE2, and the value set YourInitials_EMP_HEIGHT.
Define a segment named Weight, with a prompt of Weight. Assign the segment the
number 30, the column ATTRIBUTE3, and the value set YourInitials_EMP_WEIGHT.
Ensure all three segments are displayed and enabled. When you finish defining the
structure, freeze and compile your flexfield definition.
After defining the value sets and segments for your flexfield, use the Segment Values
window to define the values associated with the independent value set.
5.
Define and enable the following values for the YourInitials_WHO_REFER value set.
Value
Description
100
President
200
300
After defining your value sets, segments, and values, navigate to your descriptive flexfield
and test the results of your work. When you are finished, exit without saving.
Chapter
26 - Page 105ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
1.
2.
Enter the information for the first value set in the following fields:
Maximum Size: 3
3.
4.
Enter the information for the second value set in the following fields:
Maximum Size: 4
Precision: 2
Note: You cannot enable security for a value set of validation type None.
5.
6.
Enter the information for the third value set in the following fields:
Chapter
26 - Page 106ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Maximum Size: 3
Precision: 0
Min Value: 90
9.
10. Clear the Freeze Flexfield Definition check box and click (B) OK to acknowledge caution.
11. In the Context Field Values region, select the Global Data Elements context and click (B)
Segments to navigate to the Segments Summary window.
12. Delete the segments that you defined previously.
13. Save your work.
14. Enter the following information for the three new segments.
Note: Be sure to save after each segment, you may need to click (B) OK to acknowledge the
Caution message before proceeding.
Number
Name
Window
Prompt
Column
Value Set
Displayed Enabled
10
Who Referred
Who
ATTRIBUTE1
YourInitials_WHO_REFER
Checked Checked
20
Height
Height
ATTRIBUTE2
YourInitials_EMP_HEIGHT
Checked Checked
30
Weight
Weight
ATTRIBUTE3
YourInitials_EMP_WEIGHT
Checked Checked
Chapter
26 - Page 107ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
7.
18. Click (B) Compile to compile the flexfield definition. Click (B) OK to each note about
submitting your request to generate the flexfield view.
Define your Values
19. (N) Application > Validation > Values.
20. In the Find window, select YourInitials_WHO_REFER value set and click (B) Find.
Value
Description
Enabled
100
President
Checked
200
Checked
300
Checked
22. Save your work and close the Segment Values window. Click (B) OK to acknowledge
message.
Test your Descriptive Flexfield
23. After defining your value sets, segments, and values, navigate to your descriptive flexfield
using the General Ledger Super User responsibility and test the results of your work. When
you are finished, exit without saving.
Chapter
26 - Page 108ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
21. In the Values, Effective region of the Segment Values window, define the following values:
In this practice, you will set up a context-sensitive segment and create a table-validated value set.
By using context sensitivity, you increase the number of questions you can ask without
increasing the number of columns necessary in the table. In this scenario, you will track
additional information for a transaction based on whether or not the transaction is a project. If it
is not a project, then you do not need to capture additional information. If it is a project, then the
flexfield should track the salesperson, the salespersons region, and the project name. To avoid
some repetitive data entry, you will use a table that already exists within Oracle Applications to
validate the project name.
Tasks
Define your Value Sets
1.
Define an independent value set named YourInitials_SALES_REP. Give the value set a
description, a format type of Char, and a maximum size of 3. Specify that the values
must be uppercase only, and enable non-hierarchical security for the value set.
Define an independent value set named YourInitials_LOCATION. Give the value set a
description, a format type of Char, and a maximum size of 3. Specify that the values
must be uppercase only, and enable non-hierarchical security for the value set.
Define a table-validated value set named YourInitials_PROJECT. Give the value set a
description, a format type of Char, and a maximum size of 30. Enable security for the
value set. Specify ARBV_CUSTOMERS in the Oracle Receivables application as the
validation table. Assign the Value column the column name CUSTOMER_NUMBER, a
type of VarChar2, and a size of 30. Assign the Meaning column the column name
CUSTOMER_NAME, a type of VarChar2, and a size of 50.
After defining your value sets, use the Descriptive Flexfield Segments window to define the
structure for your descriptive flexfield. For the purposes of this practice, use the same
Chapter
26 - Page 109ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
To perform the practices in this lesson (and the next one as well), you will need a descriptive
flexfield to work on. In the previous lesson, you were assigned a descriptive flexfield by your
instructor. Please use your assigned descriptive flexfield for this exercise. If you were not
assigned a descriptive flexfield, please reference the previous lesson, and have your instructor
assign one now.
3.
For the context field, enter the prompt Is this a project? Specify that a value is required
and context override is allowed.
4.
Delete the segments you defined previously for the Global Data Elements context.
5.
Define and enable a new context named Yes with the code Yes. Define three new segments
for the Yes context.
Define a segment named Sales Rep, with a prompt of Sales Rep. Assign the segment the
number 10, the column ATTRIBUTE1, and the value set YourInitials_SALES_REP.
Define a segment named Location, with a prompt of Location. Assign the segment the
number 20, the column ATTRIBUTE2, and the value set YourInitials_LOCATION.
Define a segment named Project, with a prompt of Project. Assign the segment the
number 30, the column ATTRIBUTE3, and the value set YourInitials_PROJECT.
6.
Define and enable another new context named No with the code No.
7.
When you finish defining the structure, freeze and compile your flexfield definition.
After defining the value sets and segments for your flexfield, use the Segment Values
window to define the values associated with each of the independent value sets.
9.
Define and enable the following values for the YourInitials_SALES_REP value set.
Value
Description
CLJ
Charles L. Jefferson
AMR
Ana M. Rodriguez
PAL
Philippe A. Lebeau
10. Define and enable the following values for the YourInitials_LOCATION value set.
Value
Description
NYC
New York
MAD
Madrid
PAR
Paris
Chapter
26 - Page 110ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
descriptive flexfield you worked on previously to enter your new structure. Unfreeze the
flexfield definition first in order to make changes to the structure.
11. After defining your value sets, segments, and values, navigate to your descriptive flexfield
using the General Ledger Super User responsibility and test the results of your work. When
you are finished, exit without saving.
Chapter
26 - Page 111ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
1.
2.
Enter the information for the first value set in the following fields:
Maximum Size: 3
3.
4.
Enter the information for the second value set in the following fields:
Maximum Size: 3
5.
6.
Enter the information for the third value set in the following fields:
Chapter
26 - Page 112ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Maximum Size: 30
7.
Click (B) Edit Information to navigate to the Validation Table Information window.
8.
Enter Receivables as the table application and ARBV_CUSTOMERS as the table name.
Note: ARBV_CUSTOMERS will not appear in the list of values because it has not been
registered as a table, but you can still use it for validation purposes.
9.
Type
Size
Value
CUSTOMER_NUMBER
VarChar2
30
Meaning
CUSTOMER_NAME
VarChar2
50
10. Save your work and close the Value Set window.
Define your Structure
11. (N) Application > Flexfield > Descriptive > Segments.
12. Query your descriptive flexfield in the Descriptive Flexfield Segments window.
13. Clear the Freeze Flexfield Definition check box, click (B) OK to acknowledge Caution
message.
14. In the Context Field region, enter information in the following fields:
Required: Selected
Displayed: Selected
15. In the Context Field Values region, select the Global Data Elements context and click (B)
Segments to navigate to the Segments Summary window.
16. Delete the segments that you defined previously.
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 113ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Name
Yes
Yes
Description Enabled
Yes
Checked
Name
Window
Prompt
Column
Value Set
Displayed Enabled
10
ATTRIBUTE1
20
Location
Location
ATTRIBUTE2
YourInitials_LOCATION
Checked Checked
30
Project
Project
ATTRIBUTE3
YourInitials_PROJECT
Checked Checked
Name
No
No
Description Enabled
No
Checked
Chapter
26 - Page 114ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
30. In the Values, Effective region of the Segment Values window, define the following values:
Value
Description
Enabled
CLJ
Charles L. Jefferson
Checked
AMR
Ana M. Rodriguez
Checked
PAL
Philippe A. Lebeau
Checked
32. In the Segment Values window, verify Value Set radio button is selected and your cursor is
in the header region, then query the YourInitials_LOCATION value set in the Name field
33. In the Values, Effective region, define the following values:
Value
Description
Enabled
NYC
New York
Checked
MAD
Madrid
Checked
PAR
Paris
Checked
34. Save your work and close the Segment Values window.
Test your Descriptive Flexfield
35. After defining your value sets, segments, and values, navigate to your descriptive flexfield
using the General Ledger Super User responsibility and test the results of your work. When
you are finished, exit without saving.
Chapter
26 - Page 115ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
In this practice, you will create a dependent value set to validate a descriptive flexfield segment.
The descriptive flexfield will track the country and region for a salesperson. The list of values for
the region segment will change depending on the country selected.
Remember, when defining a dependent value set, you must perform the steps in the following
order:
Tasks
Define your Value Sets
1.
Define an independent value set named YourInitials_COUNTRY. Give the value set a
description, a format type of Char, and a maximum size of 3. Specify that the values
must be uppercase only, and enable Non-Hierarchical Security and Longlist for the value
set.
Define a dependent value set named YourInitials_REGION. Give the value set a
description, a format type of Char, and a maximum size of 3. Specify that the values
must be uppercase only, and enable Non-Hierarchical Security for the value set.
Associate the dependent value set with the independent value set
YourInitials_COUNTRY. Assign the dependent value set a dependent default value of
YourInitials, and give the default value a description.
Chapter
26 - Page 116ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
To perform the practices in this lesson (and the next one as well), you will need a descriptive
flexfield to work on. In the previous lesson, you were assigned a descriptive flexfield by your
instructor. Please use your assigned descriptive flexfield for this exercise. If you were not
assigned a descriptive flexfield, please reference the previous lesson, and have your instructor
assign one now.
2.
After defining your value sets, use the Descriptive Flexfield Segments window to define the
structure for your descriptive flexfield. For the purposes of this practice, use the same
descriptive flexfield you worked on previously to enter your new structure. Unfreeze the
flexfield definition first in order to make changes to the structure.
3.
Define two new segments for the Global Data Elements context.
Define a segment named Country Code, with a prompt of Country. Assign the segment
the number 10, the column ATTRIBUTE4, and the value set YourInitials_COUNTRY.
Define a segment named Region Code, with a prompt of Region. Assign the segment the
number 20, the column ATTRIBUTE5, and the value set YourInitials_REGION.
Ensure both segments are displayed and enabled. When you finish defining the structure,
freeze and compile your flexfield definition.
After defining the value sets and segments for your flexfield, use the Segment Values
window to define the values associated with the independent and dependent value sets.
5.
Define and enable the following values for the YourInitials_COUNTRY value set.
6.
7.
Value
Description
USA
United States
CAN
Canada
UK
United Kingdom
Define and enable the following values in the YourInitials_REGION value set for the
independent value USA.
Value
Description
OK
Oklahoma
TX
Texas
WI
Wisconsin
Define and enable the following values in the YourInitials_REGION value set for the
independent value CAN.
Value
Description
SAS
Saskatchewan
BC
British Columbia
Chapter
26 - Page 117ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Description
YT
Yukon Territory
Define and enable the following values in the YourInitials_REGION value set for the
independent value UK.
Value
Description
WA
Wales
SL
Scotland
EN
England
After defining your value sets, segments, and values, navigate to your descriptive flexfield
and test the results of your work. When you are finished, exit without saving.
Chapter
26 - Page 118ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
8.
Value
1.
2.
Enter the information for the first value set in the following fields:
Maximum Size: 3
3.
4.
Enter the information for the second value set in the following fields:
Maximum Size: 3
5.
Click (B) Edit Information to navigate to the Dependent Value Set Information window.
6.
In the Independent Value Set region, enter YourInitials_COUNTRY in the Name field.
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 119ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
7.
In the Dependent Default Value region, enter NA in the Value field and Not Specified in the
Description field.
8.
11. Clear the Freeze Flexfield Definition check box, click (B) OK to acknowledge Caution
message.
12. In the Context Field Values region, select the Global Data Elements context and click (B)
Segments to navigate to the Segments Summary window.
13. Enter the following information for the two new segments:
Note: Be sure to save after each segment, you may need to click (B) OK to acknowledge the
Caution message before proceeding.
Number
Name
Window
Prompt
10
Country Code
Country
20
Region Code
Region
ATTRIBUTE5
Column
Value Set
YourInitials_REGION
Displayed Enabled
Checked Checked
Description
Enabled
USA
United States
Checked
Chapter
26 - Page 120ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
10. Query your descriptive flexfield in the Descriptive Flexfield Segments window.
Value
Description
Enabled
CAN
Canada
Checked
UK
United Kingdom
Checked
Value
Description
Enabled
OK
Oklahoma
Checked
TX
Texas
Checked
WI
Wisconsin
Checked
Description
Enabled
SAS
Saskatchewan
Checked
BC
British Columbia
Checked
YT
Yukon Territory
Checked
Description
Enabled
WA
Wales
Checked
SL
Scotland
Checked
EN
England
Checked
30. Save your work and close the Segment Values window.
Chapter
26 - Page 121ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
23. Define and enable the following values for the Independent Value USA.
31. After defining your value sets, segments, and values, navigate to your descriptive flexfield
using the General Ledger Super User responsibility and test the results of your work. When
you are finished, exit without saving.
Chapter
26 - Page 122ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Flexfield definitions can be created under many different responsibilities. However, the System
Administrator responsibility has access to all functions needed to create the definitions in these
practices. In this practice you will create a key flexfield structure and values for your chart of
accounts. The design of the structure has already been determined. The flexfield will have four
segments: a company segment, a cost center segment, an account segment, and a segment
labeled Future for possible future expansion, in that order. Before you define the structure, you
must first create the value sets, then create the structure, identifying the segments by their
respective flexfield qualifiers. Finally, you will create the valid values for each segment. After
creating the values, test your structure by performing the first steps in the process for creating a
new set of books.
Note: After saving your accounting flexfield structure, you may receive a message that the key
flexfield is not compiled. There is no need to take action. The flexfield will be compiled
automatically.
Tasks
Define your Value Sets
1.
Define an independent value set named YourInitials_CO. Give the value set a
description, a format type of Char, and a maximum size of 2. Enable Non-Hierarchical
Security for the value set. Specify that the values should be right-justified and zerofilled.
Define an independent value set named YourInitials_COST. Give the value set a
description, a format type of Char, and a maximum size of 3. Enable Non-Hierarchical
Security for the value set. Specify that the values should be right-justified and zerofilled.
Define an independent value set named YourInitials_ACCOUNT. Give the value set a
description, a format type of Char, and a maximum size of 4. Enable Non-Hierarchical
Security and Longlist for the value set. Specify that the values should be right-justified
and zero-filled.
Chapter
26 - Page 123ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Because many students access the system and create structures during this course, you need a
way to distinguish between the structures created by you and by your classmates. Therefore, you
will use your initials (e.g., JS) as a prefix wherever you need to define something. In this way,
you can ensure the definitions you create are unique.
Define an independent value set named YourInitials_FUTURE. Give the value set a
description, a format type of Char, and a maximum size of 4. Enable Non-Hierarchical
Security for the value set. Specify that the values should be right-justified and zero-filled
Define a segment named CO, with a prompt of Company. Assign the segment the
number 1, the column SEGMENT1, and the value set YourInitials_CO. Ensure the
segment is displayed and enabled. Enable security for the segment. Give the segment a
display size of 2 and a description size of 30. Enable the Balancing Segment flexfield
qualifier for the segment.
Define a segment named CC, with a prompt of Cost Center. Assign the segment the
number 2, the column SEGMENT2, and the value set YourInitials_COST. Ensure the
segment is displayed and enabled. Enable security for the segment. Give the segment a
display size of 3 and a description size of 30. Enable the Cost Center Segment flexfield
qualifier for the segment.
Define a segment named ACCT, with a prompt of Account. Assign the segment the
number 3, the column SEGMENT3, and the value set YourInitials_ACCOUNT. Ensure
the segment is displayed and enabled. Enable security for the segment. Give the segment
a display size of 4 and a description size of 30. Enable the Natural Account Segment
flexfield qualifier for the segment.
Define a segment named RFU, with a prompt of Future Use. Assign the segment the
number 4, the column SEGMENT4, and the value set YourInitials_FUTURE. Ensure the
segment is displayed and enabled. Specify a default type of Constant and a default value
of 0000. Enable security for the segment. Give the segment a display size of 4 and a
description size of 30.
When you finish defining the structure, freeze and compile your flexfield definition.
After defining the value sets and segments for your flexfield, use the Segment Values
window to define the values associated with each of the independent value sets.
Chapter
26 - Page 124ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
2.
5.
6.
7.
Define and enable the following values for the YourInitials_CO value set.
Value
Description
01
Red Co.
02
Orange Co.
03
Yellow Co.
04
Green Co.
05
Blue Co.
Define and enable the following values for the YourInitials_COST value set.
Value
Description
000
Not Specified
100
Sales
200
Services
300
Development
Define and enable the following values for the YourInitials_ACCOUNT value set. Specify
the account type segment qualifier for each value as shown.
Value
Description
Account Type
1110
Cash
Asset
1120
Cash Clearing
Asset
2110
Accounts Payable
Liability
3110
Salaries
Liability
4110
Travel Expense
Expense
Define and enable the following value for the YourInitials_FUTURE value set.
Value
Description
0000
Not Specified
Chapter
26 - Page 125ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
4.
(N) Setup > Financials > Accounting Setup Manager > Accounting Setups.
9.
Name: YourInitials_COA
Currency: USD
12. Click Next and Finish to save your accounting structure.
13. Click Define Accounting Options in the confirmation page.
14. In the Primary Ledger region, click the Update icon for Ledger Options.
15. Click Next to access the Update Ledger: Ledger Options window.
16. In the Year End Processing region, click the Search icon for the Retained Earnings Account
field to display the list of values. The Accounting Flexfield appears.
17. Enter values in the Accounting Flexfield to test your work.
18. Cancel your entries and exit without saving.
Chapter
26 - Page 126ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
10. Click Next to access the Create Accounting Setups: Define Accounting Representations
window.
1.
2.
Enter the information for the first value set in the following fields:
Maximum Size: 2
3.
4.
Enter the information for the second value set in the following fields:
Maximum Size: 3
5.
6.
Enter the information for the third value set in the following fields:
Chapter
26 - Page 127ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Maximum Size: 4
7.
8.
Enter the information for the fourth value set in the following fields:
9.
Maximum Size: 4
Code: YourInitials_COA
Chapter
26 - Page 128ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Enabled: Selected
Number: 1
Name: CO
Column: SEGMENT1
Displayed: Selected
Enabled: Selected
Display Size: 2
Description Size: 30
Number: 2
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 129ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
14. Enter the information for the first segment in the following fields:
Name: CC
Column: SEGMENT2
Displayed: Selected
Enabled: Selected
Display Size: 3
Description Size: 30
Number: 3
Name: ACCT
Column: SEGMENT3
Displayed: Selected
Enabled: Selected
Chapter
26 - Page 130ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
32. Enter the information for the third segment in the following fields:
Display Size: 4
Description Size: 30
35. Select the Enabled check box for the Natural Account Segment flexfield qualifier.
36. Save your work.
37. Navigate back to the Segments Summary window.
38. Enter the information for the fourth segment in the following fields:
Number: 4
Name: RFU
Column: SEGMENT4
Displayed: Selected
Enabled: Selected
Display Size: 4
Description Size: 30
Chapter
26 - Page 131ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
34. Click (B) Flexfield Qualifiers to navigate to the Flexfield Qualifiers window.
42. Close the Segment Summary window to avigate back to the Key Flexfield Segments
window.
43. Select the Freeze Flexfield Definition check box. Click (B) OK to acknowledge Caution
message.
44. Click (B) Compile to compile the flexfield definition. You will find two notes indicating
that the flexfield was compiled successfully. Click (B) OK to each note about submitting
your request to generate the flexfield view.
Description
Enabled
01
Red Co.
Checked
02
Orange Co.
Checked
03
Yellow Co.
Checked
04
Green Co.
Checked
05
Blue Co.
Checked
Description
Enabled
000
Not Specified
Checked
100
Sales
Checked
200
Services
Checked
300
Development
Checked
Chapter
26 - Page 132ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Value
Description
Enabled
Account Type
1110
Cash
Checked
Asset
1120
Cash Clearing
Checked
Asset
2110
Accounts Payable
Checked
Liability
3110
Salaries
Checked
Liability
4110
Travel Expense
Checked
Expense
Note: Click in the Qualifiers field in the Values, Hierarchy, Qualifiers region to display the
Segment Qualifiers window and enter a value in the Account Type field. Accept the default
values for the other fields in the Segment Qualifiers window.
54. Save your work.
55. In the Segment Values window, select Value Set and find the YourInitials_FUTURE value
set. Click (B) Find.
56. In the Values, Effective region, define the following value:
Value
Description
0000
Not Specified
57. Save your work and close the Value window. Click (B) OK to the note about submitting
your request to compile 4 value set hierarchies.
Test your Key Flexfield
After defining your value sets, segments, and values, navigate to the Accounting Flexfield to test
the results of your work. To view the Accounting Flexfield, you will perform the beginning steps
in the process for creating your accounting structure and then view the accounting flexfield you
created earlier in this practice.
Responsibility: General Ledger Super User
58. (N) Setup > Financials > Accounting Setup Manager > Accounting Setups.
59. In the Accounting Setups window, click (B) Create Accounting Setup.
60. Click (B) Next to access the Create Accounting Setups: Define Accounting Representations
window.
61. Enter the following information:
Name: YourInitials_COA
Chart of Accounts: YourInitials Chart of Accounts
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 133ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Values, Effective
66. In the Year End Processing region, click the Search icon for the Retained Earnings Account
field to display the list of values. The Accounting Flexfield appears.
67. Enter values in the Accounting Flexfield to test your work.
68. Cancel your entries and exit without saving.
Chapter
26 - Page 134ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
65. Click (B) Next to access the Update Ledger: Ledger Options window.
Tasks
Define your Security Rule
1.
Use the Define Security Rules window to define a security rule for the ACCT segment of
the Accounting Flexfield structure, YourInitials Chart of Accounts, that you defined in the
Define a Key Flexfield lesson. Name the rule YourInitials_SR01, and give the rule a
description. Enter an error message to explain the rule to users.
Define the first security rule element to include all the possible account values, from
0000 to zzzz.
Define the second security rule element to exclude the account 4110.
Use the Assign Security Rules window to assign your security rule to the General Ledger
Super User responsibility in the Oracle General Ledger application.
(N) Setup > Financials > Accounting Setup Manager > Accounting Setups.
4.
5.
6.
In the Primary Ledger region, click the Update icon for Ledger Options.
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 135ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Note: Before you can use security for a flexfield segment, you must enable security both at
the value set level and at the segment level.
7.
8.
In the Year End Processing region, click the Search icon for the Retained Earnings Account
field to display the list of values. The Accounting Flexfield appears.
9.
Chapter
26 - Page 136ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
1.
2.
In the Find window, select Key Flexfield and find the ACCT segment of the YourInitials
Chart of Accounts structure for the Accounting Flexfield in the General Ledger application.
3.
In the Security Rules region of the Define Security Rules window, enter information in the
following fields:
4.
5.
Name: YourInitials_SR01
In the Security Rule Elements region, enter following information Security Rule Elements:
Type
From
To
Include
0000
zzzz
Exclude
4110
4110
7.
In the Security Rules region of the Assign Security Rules window, enter information in the
following fields:
8.
Name: YourInitials_SR01
Chapter
26 - Page 137ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
in the process for creating your accounting structure and then view the accounting flexfield you
created earlier in this practice.
Responsibility: General Ledger Super User
9.
(N) Setup > Financials > Accounting Setup Manager > Accounting Setups.
10. In the Accounting Setups window, search by Ledger YourInitials_COA, click (B) Go.
11. Select Update Accounting Options icon.
13. Click (B) Next to access the Update Ledger: Ledger Options window.
14. In the Year End Processing region, click the Search icon for the Retained Earnings Account
field to display the list of values. The Accounting Flexfield appears.
15. Enter values in the Accounting Flexfield to test your work.
16. Cancel your entries and exit without saving.
Chapter
26 - Page 138ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
12. In the Primary Ledger region, click the Update icon for Ledger Options.
Tasks
Define your Cross-Validation Rule
1.
Use the Cross-Validation Rules window to define a cross-validation rule for the Accounting
Flexfield structure you defined in the Define a Key Flexfield lesson, YourInitials Chart of
Accounts. Name the rule YourInitials_CVR:01, give the rule a description, and ensure the
rule is enabled. Enter an error message to explain the rule to users, and specify the CO
segment as the error segment.
Define the first cross-validation rule element to include all the possible code
combinations, from lowest to highest.
Define the second cross-validation rule element to exclude any code combinations
containing both the Orange Company and the Development cost center.
After defining the cross-validation rule, recompile the flexfield structure definition.
(N) Setup > Financials > Accounting Setup Manager > Accounting Setups.
4.
5.
Chapter
26 - Page 139ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Whenever you add or change cross-validation rules, you must recompile the flexfield structure to
ensure your changes are reflected in the applications.
6.
In the Primary Ledger region, click the Update icon for Ledger Options.
7.
8.
In the Year End Processing region, click the Search icon for the Retained Earnings Account
field to display the list of values. The Accounting Flexfield appears.
9.
Chapter
26 - Page 140ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Solution - Cross-Validations
Define your Cross-Validation Rule
1.
2.
Query the YourInitials Chart of Accounts structure for the Accounting Flexfield in the
General Ledger application.
3.
In the Cross-Validation Rules region, enter the information for the rule in the following
fields:
Name: YourInitials_CVR:01
Enabled: Selected
Error Segment: CO
From
To
Include
00.000.0000.0000 zz.zzzz.zzzz.zzzz
Exclude
02.300.0000.0000 02.300.zzzz.zzzz
5.
6.
7.
Query the YourInitials Chart of Accounts structure for the Accounting Flexfield in the
General Ledger application.
8.
Click (B) Compile to compile the flexfield definition. You will find two notes indicating
that the flexfield was compiled successfully. Click (B) OK to each note about submitting
your request to generate the flexfield view.
Chapter
26 - Page 141ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
(N) Setup > Financials > Accounting Setup Manager > Accounting Setups.
Chapter
26 - Page 142ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
10. In the Accounting Setups window, search by Ledger YourInitials_COA, click (B) Go.
Tasks
Define your Shorthand Alias
1.
Use the Shorthand Aliases window to define shorthand aliases for the Accounting Flexfield
structure, YourInitials Chart of Accounts that you defined in the Define a Key Flexfield
lesson. Enable aliases for this structure, a maximum size of 15, and a prompt of Shorthand.
2.
Define an alias named YourInitials_SA_1, give the alias a description, and specify the
complete combination 03.100.1110.0000.
3.
Define an alias named YourInitials_SA_2, give the alias a description, and specify the
partial combination 04...0000.
Chapter
26 - Page 143ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Shorthand aliases speed data entry for end users. Aliases can be used either to define a complete
key flexfield combination or to create a template providing values for some segments, thus
allowing the user to complete the flexfield entry. Users can determine whether to use aliases in
the Flexfields: Shorthand Entry user profile option. In this practice, you will define both a
complete shorthand alias and a partial alias template for the Accounting Flexfield structure you
defined in the Define a Key Flexfield lesson.
1.
2.
Query the YourInitials Chart of Accounts structure for the Accounting Flexfield in the
General Ledger application.
3.
4.
Enabled: Selected
Prompt: Shorthand
Template
Alias Description
YourInitials _SA_1
03.100.1110.0000
YourInitials _SA_2
040000
Green
5.
6.
7.
Query the YourInitials Chart of Accounts structure for the Accounting Flexfield in the
General Ledger application.
8.
Click (B) Compile to compile the flexfield definition. Click (B) OK to each note about
submitting your request to generate the flexfield view.
Chapter
26 - Page 144ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Tasks
Define your Value Set
1.
Use the Value Sets window to define a table-validated value set named
YourInitials_EMP_NUM. Give the value set a description, a format type of Char, and a
maximum size of 30. Enable Non-Hierarchical Security and Longlist for the value set.
Specify the table PER_ALL_PEOPLE_F in the Oracle Human Resources application as the
validation table. Assign the Value column the column name EMPLOYEE_NUMBER, a
type of Varchar2, and a size of 30. Assign the Meaning column the column name
FULL_NAME, a type of Varchar2, and a size of 240. Restrict the value set to include only
active employees by specifying the following Where/Order By clause:
WHERE CURRENT_EMPLOYEE_FLAG = Y
After defining your value set, use the Descriptive Flexfield Segments window to define the
structure for your descriptive flexfield. For the purposes of this practice, use the same
descriptive flexfield you worked on previously to enter your new structure. Unfreeze the
flexfield definition first in order to make changes to the structure.
3.
You can keep the two segments that you defined previously for the Global Data Elements
context. Now define a new segment for the Global Data Elements context. Name the
segment Employee Number, with a prompt of Employee Number. Assign the segment the
number 30, the column ATTRIBUTE6, and the value set YourInitials_EMP_NUM.
4.
Ensure the new segment is displayed and enabled. When you finish defining the structure,
freeze and compile your flexfield definition.
After defining your value set and segment, navigate to your descriptive flexfield and test the
results of your work. When you are finished, exit without saving.
Chapter
26 - Page 145ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
In this practice, you will use an application table to validate a descriptive flexfield segment. You
will create a table-validated value set to validate employee numbers based on a Human
Resources application table called PER_ALL_PEOPLE_F. Then you will add an additional
segment to the descriptive flexfield structure you defined in the Define a Descriptive Flexfield
lesson to track the salespersons employee number.
1.
2.
Enter the information for the value set in the following fields:
Maximum Size: 30
3.
Click (B) Edit Information to navigate to the Validation Table Information window.
4.
Use the lists of values in the Table Application to select Human Resources as the table
application type PER_ALL_PEOPLE_F as the table name.
5.
In the Table Columns region, use the lists of values in the following fields:
Name
Type
Size
Value
EMPLOYEE_NUMBER
VarChar2
30
Meaning
FULL_NAME
VarChar2
240
6.
7.
WHERE CURRENT_EMPLOYEE_FLAG = Y
8.
10. Query your descriptive flexfield in the Descriptive Flexfield Segments window.
Chapter
26 - Page 146ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
30
Name
Window
Prompt
Column
Value Set
Displayed Enabled
Employee Employee
ATTRIBUTE6 YourInitials_EMP_NUM Checked Checked
Number Number
Chapter
26 - Page 147ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Number
CAR_MAKERS
MANUFACTURER_NAME MANUFACTURER_DESCRIPTION MANUFACTURER_ID
Ford
Ford
01
Nissan
Nissan
02
Chevrolet
Chevrolet
03
Chrysler
Chrysler
04
CAR_MODELS
MODEL_NAME MODEL_DESCRIPTION MODEL_ID MANUFACTURER_ID
Mustang
Mustang
011
01
Windstar
Windstar
012
01
240SX
240SX
013
02
Altima
Altima
014
02
Corvette
Corvette
015
03
Camaro
Camaro
016
03
Sebring
Sebring
017
04
Concorde
Concorde
018
04
CAR_COLORS
COLOR_NAME COLOR_DESCRIPTION COLOR_ID MODEL_ID MANUFACTURER_ID
Red
Red
0101
011
01
Black
Black
0102
011
01
Green
Green
0103
011
01
Black
Black
0104
012
01
Chapter
26 - Page 148ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
To set up the cascading dependencies, you will create table-validated value sets using the
following tables:
Blue
Blue
0105
012
01
White
White
0106
012
01
Champagne
Champagne
0107
013
02
Red
Red
0108
013
02
Sea Green
Sea Green
0109
013
02
Silver
Silver
0110
014
02
Gold
Gold
0111
014
02
Teal
Teal
0112
014
02
Black
Black
0113
015
03
Red
Red
0114
015
03
Yellow
Yellow
0115
015
03
Purple
Purple
0116
016
03
Blue
Blue
0117
016
03
Green
Green
0118
016
03
Maroon
Maroon
0119
017
04
Silver
Silver
0120
017
04
Green
Green
0121
017
04
White
White
0122
018
04
Blue
Blue
0123
018
04
Silver
Silver
0124
018
04
Tasks
Define your Value Sets
1.
Define a table-validated value set named YourInitials_MFG. Give the value set a
description, a format type of Char, and a maximum size of 10. Enable non-hierarchical
security for the value set. Specify the table CAR_MAKERS as the validation table.
Assign the Value column the column name MANUFACTURER_NAME, a type of
Varchar2, and a size of 10. Assign the Meaning column the column name
MANUFACTURER_DESCRIPTION, a type of Varchar2, and a size of 30. Assign the
ID column the column name MANUFACTURER_ID, a type of Number, and a size of 2.
Define a table-validated value set named YourInitials_MODEL. Give the value set a
description, a format type of Char, and a maximum size of 10. Enable non-hierarchical
security for the value set. Specify the table CAR_MODELS as the validation table.
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 149ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Assign the Value column the column name MODEL_NAME, a type of Varchar2, and a
size of 10. Assign the Meaning column the column name MODEL_DESCRIPTION, a
type of Varchar2, and a size of 30. Assign the ID column the column name MODEL_ID,
a type of Number, and a size of 3. Specify the following Where/Order By clause:
Define a table-validated value set named YourInitials_COLOR. Give the value set a
description, a format type of Char, and a maximum size of 10. Enable non-hierarchical
security for the value set. Specify the table CAR_COLORS as the validation table.
Assign the Value column the column name COLOR_NAME, a type of Varchar2, and a
size of 10. Assign the Meaning column the column name COLOR_DESCRIPTION, a
type of Varchar2, and a size of 30. Assign the ID column the column name COLOR_ID,
a type of Number, and a size of 4. Specify the following Where/Order By clause:
WHERE MODEL_ID = :$FLEX$. YourInitials_MODEL
ORDER BY COLOR_NAME
After defining your value sets, use the Descriptive Flexfield Segments window to define the
structure for your descriptive flexfield. For the purposes of this practice, use the same
descriptive flexfield that you worked on previously to enter your new structure. Unfreeze the
flexfield definition first so that you can change the structure.
3.
Delete the segments that you defined previously for the Global Data Elements context. Then
define three new segments for the Global Data Elements context.
Define a segment named Model, with a prompt of Model. Assign the segment the
number 20, the column ATTRIBUTE2, and the value set YourInitials_MODEL.
Define a segment named Color, with a prompt of Color. Assign the segment the number
30, the column ATTRIBUTE3, and the value set YourInitials_COLOR.
Ensure that all three segments are displayed and enabled. When you finish defining the
structure, freeze and compile your flexfield definition.
After defining your value sets and segments, navigate to your descriptive flexfield and test
the results of your work. When you are finished, exit without saving.
Chapter
26 - Page 150ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
1.
2.
Enter the information for the first value set in the following fields:
Maximum Size: 10
3.
4.
5.
In the Table Columns region, enter the following information for the Value column:
Name
Type
Size
MANUFACTURER_NAME
VarChar2
10
30
Value
ID
MANUFACTURER_ID
Number
6.
7.
Enter the information for the second value set in the following fields:
Maximum Size: 10
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 151ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
8.
9.
Name
Type
Size
Value
MODEL_NAME
VarChar2
10
Meaning
MODEL_DESCRIPTION
VarChar2
30
ID
MODEL_ID
Number
Maximum Size: 10
14. Click Edit Information to navigate to the Validation Table Information window.
15. Enter CAR_COLORS as the table name.
16. In the Table Columns region, enter the following information for the Value column:
Name
Type
Size
Value
COLOR_NAME
VarChar2
10
Meaning
COLOR_DESCRIPTION
VarChar2
30
ID
COLOR_ID
Number
Chapter
26 - Page 152ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
10. In the Table Columns region, enter the following information for the Value column:
22. Select the Global Data Elements context and click (B) Segments to navigate to the
Segments Summary window.
23. Delete the segments that you defined previously.
24. Save your work.
25. Enter the following information for the segments:
Note: Save after each segment.
Number
10
Name
Window
Prompt
Column
Value Set
Displayed Enabled
YourInitials_MFG
Checked Checked
20
Model
Model
ATTRIBUTE2
YourInitials_MODEL
Checked Checked
30
Color
Color
ATTRIBUTE3
YourInitials_COLOR
Checked Checked
Chapter
26 - Page 153ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Set the profile option to control modifications of the folder by the user
Tasks
1.
Log on to Oracle Applications using the username you defined earlier, such as
YourInitialsUSER.
2.
Select General Ledger Super User responsibility and navigate to (N) Journals > Enter.
3.
The first window you see is the Find Journals window. Note that once you create your folder
and assign it to your user this window will not appear.
4.
5.
Click Find.
Chapter
26 - Page 154ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
The committee wants you to test setting up and administering a Folder form. But, they are
willing to do a single test. You will see the following demonstrated.
7.
8.
9.
11. In the Enter Journals window, the upper left corner next to the Folder icon is the name you
entered for your folder.
12. Click on the Folder icon to launch the Open Folder window.
Note: the other folders that are available for your selection. These appear because they are
defined as Public.
13. Click Cancel.
14. Click on the Folder Tools icon on the toolbar (the second icon from the right) to launch the
Folder Tools window palette. Move your cursor over each icon to view its function.
Copyright Oracle Corporation, 2008. All rights reserved.
Chapter
26 - Page 155ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
6.
15. Click the Show Field icon to launch the Show Field selection window. This allows you to
add any of the listed fields to the Enter Journals window display.
16. Choose Category from the Show Field window if the Category column has not been added
to the display in the Enter Journals window or select another value when needed and click
OK.
Chapter
26 - Page 156ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
17. Click the Save icon on the Folder Tools window, or choose Save from the Folder menu to
add the Category column to your folder definition.
Chapter
26 - Page 157ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
25. In the Find System Profile Values window enter the following.
User: YourInitialsUser
Chapter
26 - Page 158ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
27. Set the Profile Option to disallow modification by your user. In the System Profile Values
screen enter No as the User value for the profile option.
Tasks
Create your Concurrent Program Definition
1.
Given the executable program already created, you need to create a concurrent program to
contain it. Query up the Completed Concurrent Requests Report program in the Concurrent
Programs window and use the Copy to button to create your custom program.
Add your concurrent program to your existing YourInitials Assistant SysAdmin request
group. Once you have added it to this group, it will have already been assigned to the Your
Initials Assistant System Administrator responsibility and to the YourInitials_Assist_SA
user.
Sign-on as the YourInitials_Assist_SA user, and submit a concurrent request for your new
report.
Chapter
26 - Page 159ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
The committee wants you to test the process for adding a custom program. In order to speed the
testing, the committee has agreed to use an existing program, the Completed Concurrent
Requests report, to test this functionality. In order to test this process, you will do the following.
1.
2.
3.
4.
5.
6.
Save your work. Your completed form should appear similar to the example shown.
Chapter
26 - Page 160ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
Chapter
26 - Page 161ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED
7.
Chapter
26 - Page 162ONLY. COPYING eKIT MATERIALS FROM THIS
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS
CLASSROOM
COMPUTER IS STRICTLY PROHIBITED