Академический Документы
Профессиональный Документы
Культура Документы
Overview
The purpose of this document is to give a brief insight into the new feature of R12 that is “Proxy
User” in User Management (UMX)
Requirement
To allow Administrators and other Users to perform the functions of another User without
knowing their password e.g. submit and review reports, approve documents, perform
iProcurement transactions and so on.
Pre-requisites
Assumptions
The section lists the complete set of assumptions that need to be considered along with the other
constituents of this solution.
Activities
OPERATIONS - This is the User who will delegate responsibility to perform transactions on
their behalf to the user “BALA”.
BALA - This is the user who will sign on to the E-Business suite and access the responsibilities
of the user “Operations”.
Step 1:
• Connect to the R12 E-Business Suite as any User (e.g. SYSADMIN) with the
responsibility 'User Management' and open the 'Users' form.
• Search for the user name of the Operations.
• Assign the role 'Manage Proxies' to this User
Now connect as the user “OPERATIONS “and navigate to the 'Preferences' form. Click on the
'Manage Proxies' option and then, the 'Add People' button. This will allow you to add the User
Names of those Users that you wish to perform actions on your behalf. Now add the user names
of all Users that you wish to assume your responsibilities.
Step 4:
Note - the new options 'Switch User' and 'Return to Self' available:
As its’ name suggests 'Switch User' is the button that allows you to 'become' the other User
without having to enter their password i.e. BALA can become OPERATIONS and access their
responsibility list.
Step 6:
Now you are in home page of the OPERATIONS, can access any of their current responsibilities
and can perform action on their behalf in the E-Business that they themselves are allowed to
perform. To return to the original user session, select the option 'Return to Self'.
1. Provides the delegator the ability to grant/revoke the proxy privilege to individuals
2. Provide a mechanism throughout the application’s framework where the user can access
the proxy switcher feature
3. Provide a mechanism throughout the application’s framework which indicates to the user
that they are acting as a proxy
4. One of the vital benefit of proxy user is the ability to delegate proxy authority provides
great security controls and Granular control of proxy authority is provided i.e delegate
authority can be specified for date ranges
5. Simple approach with the tangible end deliverables clearly identified for each stage.