Professional Documents
Culture Documents
D49195GC10
Edition 1.0
July 2007
D51749
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Copyright © 1996, 2007, Oracle. All rights reserved.
This document contains proprietary information and is protected by copyright and other intellectual property laws. You may copy and
print this document solely for your own use in an Oracle training course. The document may not be modified or altered in any way.
Except where your use constitutes "fair use" under copyright law, you may not use, share, download, upload, copy, print, display,
perform, reproduce, publish, license, post, transmit, or distribute this document in whole or in part without the express authorization
of Oracle.
The information contained in this document is subject to change without notice. If you find any problems in the document, please
report them in writing to: Oracle University, 500 Oracle Parkway, Redwood Shores, California 94065 USA. This document is not
warranted to be error-free.
If this documentation is delivered to the United States Government or anyone using the documentation on behalf of the United
States Government, the following notice is applicable:
Author
Donna Johnson, Leta Davis, Barbara Waddoups, Gary Lemmons, Roman Kratochvil, Roger
Wigenstam, Venkata Vengala, Biju Mohan, Gursat Olgun, Maxine Zasowski, Sunil Ghosh
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Table of Contents
Introduction .....................................................................................................................................................1-1
Introduction ...................................................................................................................................................1-3
Course Objectives..........................................................................................................................................1-4
Overview .......................................................................................................................................................1-5
Oracle Applications System Administration .................................................................................................1-6
Oracle Workflow Component........................................................................................................................1-7
Oracle Applications Flexfields Component...................................................................................................1-8
Additional Material........................................................................................................................................1-9
Introduction to Oracle Applications Security ...............................................................................................2-1
Introduction to Oracle Applications Security ................................................................................................2-3
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Preface
Profile
Before You Begin This Course
Prerequisites
This is an instructor-led course featuring lecture and hands-on exercises. Online demonstrations
and written practice sessions reinforce the concepts and skills introduced.
• Read-me files
• Oracle Magazine
(N) Invoice > Entry > Invoice Batches Summary (M) Query > Find (B) Approve
1. (N) From the Navigator window, select Invoice then Entry then Invoice Batches
Summary.
Notations:
(N) = Navigator
(M) = Menu
(T) = Tab
(B) = Button
(I) = Icon
(H) = Hyperlink
1. In the navigation frame of the help system window, expand the General Ledger entry.
4. Review the Enter Journals topic that appears in the document frame of the help system
window.
Introduction
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 1 - Page 1 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle University and Egabi Solutions use only
Introduction
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 1 - Page 2 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Introduction
Introduction
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 1 - Page 3 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Course Objectives
Introduction
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 1 - Page 4 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Overview
Introduction
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 1 - Page 5 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle Applications System Administration
Introduction
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 1 - Page 6 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle Workflow Component
Introduction
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 1 - Page 7 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle Applications Flexfields Component
Introduction
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 1 - Page 8 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Additional Material
Introduction
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 1 - Page 9 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle University and Egabi Solutions use only
Introduction
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 1 - Page 10 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle University and Egabi Solutions use only
Introduction to Oracle
Applications Security
Chapter 2
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 1 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle University and Egabi Solutions use only
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 2 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Function Security
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 3 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Objectives
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 4 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Overview of Function Security
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 5 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
A responsibility is a collection of authorizations that allow access to:
• A specific application or applications.
• A set of books.
• A restricted list of windows, functions, and reports. These may be associated to the
responsibility through menus.
Each user has one or more responsibilities, and several users can share the same responsibility.
A system administrator can assign users any of the standard responsibilities provided with
Oracle Applications or create new custom responsibilities as needed.
Users
A user is defined as a human being. Although the concept of a user can be extended to include
machines, networks, or intelligent autonomous agents, the definition is limited to a person in
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 6 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Defining a New Application User
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 7 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Custom Applications
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 8 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Defining an Application
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 9 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Registering an Oracle ID
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 10 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Data Groups
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 11 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
application Application Object Library is automatically included. The Application Object
Library’s Oracle ID cannot be updated or deleted.
Relating Data Groups to Forms and Programs
You can control the relationship among applications, forms, and concurrent programs by
defining a data group.
Applications, Forms, and Programs
• A window connects to the application database account designated by the responsibility
associated with the application.
• A data group determines the pairing of an application with a unique application database
account or Oracle ID.
• A program connects to the application database account associated with the application
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 12 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Securing Functions
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 13 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Defining a Menu
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 14 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
• Assign the menu structure to the new responsibility by using the responsibilities form.
• Document your menu structure by printing the Function Security Menu Report.
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 15 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Identifying Existing Menu Structures
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 16 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Menu Guidelines
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 17 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Creating a Menu
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 18 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
(Help) Applied Technology > Oracle Applications System Administration > Security >
Function Security > Menus Window
Note: If a menu entry has both a submenu and a function defined, then the behavior depends
on whether or not the function is executable. If it is executable, then the submenu is treated as
content to be rendered by the function. The submenu will not appear on the navigation tree, but
will be available in function security tests (FND_FUNCTION.TEST calls). If the function is
not executable, then it is treated as a “tag” for enforcing exclusion rules, and the submenu is
displayed on the navigation tree.
A function is considered executable if it can be executed directly from the current running user
interface.
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 19 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Modifying an Existing Menu Definition
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 20 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Navigator Menus
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 21 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
The Menu Viewer
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 22 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Viewing Node Properties in the Menu Viewer
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 23 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Adding a Custom Form Function
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 24 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Using Responsibilities
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 25 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
After you have defined a new responsibility, you can associate it with an application user.
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 26 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Responsibility Components
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 27 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Defining a New Responsibility
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 28 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Responsibility Creation Process
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 29 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Defining a New Responsibility
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 30 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Excluding Functions and Menus
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 31 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Summary
Function Security
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 3 - Page 32 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle University and Egabi Solutions use only
Introduction to Data Security
Chapter 4
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 1 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle University and Egabi Solutions use only
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 2 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Managing Profile Options
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 3 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Objectives
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 4 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Personal Profile Values
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 5 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
System Profile Options - Profile Hierarchy Types
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 6 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Profile Hierarchy Levels - Security
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 7 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Profile Hierarchy Levels – Organization
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 8 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Profile Hierarchy Levels - Server
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 9 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
System Profile Options
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 10 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Using User Profile Values as Defaults
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 11 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Profile Categories
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 12 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Auditing Related Profile Options
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 13 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
• Form – performs the Responsibility-level audit and also tracks the forms the users choose
and how long each form is used.
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 14 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Currency-Related Options
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 15 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Flexfield-Related Options
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 16 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
BiDi Direction
This option controls the appearance of the flexfields window in Applications running in
Semitic languages.
LOV Warning Limit
Sometimes an LOV can take a very long time to run if there is a very significant amount of
data in it. Set this option to the number of rows to be returned before you are asked to continue
retrieving the entire list.
Open Descr Window
This option allows you to control whether a descriptive flexfield window automatically opens
when you navigate to a customized descriptive flexfield.
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 17 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Online Reporting-Related Options
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 18 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Personal Output Viewer Options
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 19 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
User-Related Concurrent Request Profile Options
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 20 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Concurrent: Sequential Requests
Setting this option to Yes forces requests to run sequentially in the order in which they were
submitted.
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 21 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Security Signon Profile Options
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 22 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Signon Password Length sets the minimum length of an Applications signon password. If no
value is entered, the minimum length defaults to 5.
Signon Password No Reuse
This profile option specifies the number of days that a user must wait before being allowed to
reuse a password.
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 23 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Summary
Profile Options
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 7 - Page 24 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle University and Egabi Solutions use only
Auditing System Resources
Chapter 8
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 1 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle University and Egabi Solutions use only
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 2 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Managing Printers
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 3 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Objectives
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 4 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle Print Definition Components
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 5 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Printer Drivers Versus SRW
• A printer driver formats the destination printer.
• An SRW driver formats text and sets page breaks in an Oracle Reports file.
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 6 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Relationships of the Printer Components
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 7 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Formatting Information
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 8 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
• A printer driver defines initialization and reset strings.
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 9 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Defining Printers
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 10 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Finding Existing Printer Types
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 11 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Registering a New Printer
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 12 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Defining a New Printer Type
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 13 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Printing with Pasta
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 14 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Setup for Basic Printing with Pasta
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 15 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
The pasta.cfg file
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 16 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Modifying an Existing Printer Type to Use Pasta
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 17 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
2. In the Style field, select the style to which you want to assign a Pasta driver. Or, if you are
assigning Pasta to a style already defined for the printer type, delete the driver in the
Driver Name field currently associated with the style.
3. In the Driver Name field, select the appropriate Pasta driver.
Adding a New Printer Type to Use Pasta
If you want to add a new printer type, you can also add Pasta to your new printer type.
1. Navigate to the Printer Types window.
2. Enter the Type of printer.
3. In the Style field use the list of values to select the style to which you want to assign a
Pasta driver.
4. In the Driver Name field, select the appropriate Pasta driver from the list of values:
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 18 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Generating Other Formats using the Preprocessing Option
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 19 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Using Pasta with XML Publisher
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 20 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
To use a converter, change the Pasta configuration file to call a third party package to convert
the PDF to PS or PCL. Pasta can use a preprocessing command to invoke any executable that
supports an input file and an output file (a filter program). The third party package can be an
open source solutions such as Ghostscript and XPdf.
Pasta invokes the filter program to preprocess the XML Publisher output before passing it to
the printing command. By using the preprocess option, you can generate output formats other
than the formats currently supported by Pasta.
For more information, see the “Pasta 3.0.4.0 User's Guide for Release 12” in OracleMetaLink
Note 239196.1.
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 21 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Other Customization Materials for Oracle Applications Printing
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 22 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Summary
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 23 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle University and Egabi Solutions use only
Managing Printers
THESE eKIT MATERIALS ARE FOR YOUR USE IN THIS CLASSROOM
Chapter 9 - Page 24 ONLY. COPYING eKIT MATERIALS FROM THIS
COMPUTER IS STRICTLY PROHIBITED
Oracle University and Egabi Solutions use only
Introduction to Oracle
Applications Manager
Chapter 10