Recruiter & Manager communication based on Requisition (no employee assigned)

Dear All,
Using create requisition request process, a requisition is created after required approvals, then Support Team member can see it under "My draft Requisition" POWL in recruiter's dashboard and further work on it.
My question is:
Recruiter launched the requisition from dashboard's POWL and found that some information is missing / required from request manager. how can he/she request such information from hiring manager?
Is there any activity which we can use based on requisition?
chohan

Dear Nicole,
Sorry for writing "No employee assigned", I meant "No candidate assigned" in heading.
As per my information activities are only possible if the candidate is assigned to a requisition.
but my requirement is to communicate with requesting manager only based on requisition (no candidate assigned).
Can we initiate activities only based on requisition?
Chohan.

Similar Messages

  • SAP E Recruiting - Manage future leaving employees in standalone EREC system.

    Program HRALXSYNC
    We are using E Recruiting system as a separate server and employee master data comes via ALE IDOCS
    Is report HRALXSYNC need to run in case of separate server also?
    It is creating user ids which we do want as our system administrator creates user ids and user ids comes from central CUA system with Info Type IT105.
    Can we stop this background job as it is creating unwanted user ids in our SAP E- recruiting system, as mentioned in our case both the server are different and ALE being used for master data flow.
    Processing of Future leaving / terminating employees
    If we stop this Background job then how the suture leaving / terminating employees will be processed in our SAP E-Recruiting system.
    In our case both the business function HCM_ERC_CI_3 is active and as per OSS note 1779471 (ERE: Information for processing future) Leavings it is mentioned to run program HRALXSYNC.
    1.      Considering this behavior do we need to start periodic service PROCESS_CAND_STATUS_CHANGE.
    2.      Is there any way program HRALXSYNC do not create user id ?

    Hi Nicole
    Thanks a lot for your reply.
    As you said job HRALXSYNC is must require also in case if E Recruiting system running on separate instance also along with ALE master data distribution.
    - Every one will not have user id assgned then this job should not create random users. Generation of multiple users may impact licences. 
    How we can stop randon users creation by this job?
    - Also we have multiple companies rollout implemented in E recruiting system. And one company internal candidate should not apply job to other company.  In this case if this job creates a random internal candidate user then they got assigned RCF_CAND_INT reference user and with this they are able to apply to any company. Whic is a wrong business process for us and a big issue.
    - For future leaving employee - they are not getting convert to external in our system. Meaning this job do not assign RCF_CAND_EXT to future leavinf employees.
    Please can you help us, Highly appreciated your inputs in this direction.
    Thanks and regards
    Sandeep

  • E-Recruiting -- Management Involvement

    I create new requisition in MSS (Management Involvement). I put another name in recruiter. When I log that name as recruiter, I do not see requisition? I check roles and authorization, it is correct.
    When I create requisition that role and put manager name, I see that requisition when log as manager.

    Hi,
    I think the work flow from MSS ( meaning manager) is not properly routed.
    check the workflow and the routing of requisition to the proper role ( recruiter) even there are chances it may go to different roles may be restricted recruiter or at the team level please check this and also see whether the id is generating and going to right channel.
    regards

  • Using container managed form-based security in JSF

    h1. Using container managed, form-based security in a JSF web app.
    A Practical Solution
    h2. {color:#993300}*But first, some background on the problem*{color}
    The Form components available in JSF will not let you specify the target action, everything is a post-back. When using container security, however, you have to specifically submit to the magic action j_security_check to trigger authentication. This means that the only way to do this in a JSF page is to use an HTML form tag enclosed in verbatim tags. This has the side effect that the post is not handled by JSF at all meaning you can't take advantage of normal JSF functionality such as validators, plus you have a horrible chimera of a page containing both markup and components. This screws up things like skinning. ([credit to Duncan Mills in this 2 years old article|http://groundside.com/blog/DuncanMills.php?title=j2ee_security_a_jsf_based_login_form&more=1&c=1&tb=1&pb=1]).
    In this solution, I will use a pure JSF page as the login page that the end user interacts with. This page will simply gather the input for the username and password and pass that on to a plain old jsp proxy to do the actual submit. This will avoid the whole problem of having to use verbatim tags or a mixture of JSF and JSP in the user view.
    h2. {color:#993300}*Step 1: Configure the Security Realm in the Web App Container*{color}
    What is a container? A container is basically a security framework that is implemented directly by whatever app server you are running, in my case Glassfish v2ur2 that comes with Netbeans 6.1. Your container can have multiple security realms. Each realm manages a definition of the security "*principles*" that are defined to interact with your application. A security principle is basically just a user of the system that is defined by three fields:
    - Username
    - Group
    - Password
    The security realm can be set up to authenticate using a simple file, or through JDBC, or LDAP, and more. In my case, I am using a "file" based realm. The users are statically defined directly through the app server interface. Here's how to do it (on Glassfish):
    1. Start up your app server and log into the admin interface (http://localhost:4848)
    2. Drill down into Configuration > Security > Realms.
    3. Here you will see the default realms defined on the server. Drill down into the file realm.
    4. There is no need to change any of the default settings. Click the Manage Users button.
    5. Create a new user by entering username/password.
    Note: If you enter a group name then you will be able to define permissions based on group in your app, which is much more usefull in a real app.
    I entered a group named "Users" since my app will only have one set of permissions and all users should be authenticated and treated the same.
    That way I will be able to set permissions to resources for the "Users" group that will apply to all users that have this group assigned.
    TIP: After you get everything working, you can hook it all up to JDBC instead of "file" so that you can manage your users in a database.
    h2. {color:#993300}*Step 2: Create the project*{color}
    Since I'm a newbie to JSF, I am using Netbeans 6.1 so that I can play around with all of the fancy Visual Web JavaServer Faces components and the visual designer.
    1. Start by creating a new Visual Web JSF project.
    2. Next, create a new subfolder under your web root called "secure". This is the folder that we will define a Security Constraint for in a later step, so that any user trying to access any page in this folder will be redirected to a login page to sign in, if they haven't already.
    h2. {color:#993300}*Step 3: Create the JSF and JSP files*{color}
    In my very simple project I have 3 pages set up. Create the following files using the default templates in Netbeans 6.1:
    1. login.jsp (A Visual Web JSF file)
    2. loginproxy.jspx (A plain JSPX file)
    3. secure/securepage.jsp (A Visual Web JSF file... Note that it is in the sub-folder named secure)
    Code follows for each of the files:
    h3. {color:#ff6600}*First we need to add a navigation rule to faces-config.xml:*{color}
        <navigation-rule>
    <from-view-id>/login.jsp</from-view-id>
            <navigation-case>
    <from-outcome>loginproxy</from-outcome>
    <to-view-id>/loginproxy.jspx</to-view-id>
            </navigation-case>
        </navigation-rule>
    NOTE: This navigation rule simply forwards the request to loginproxy.jspx whenever the user clicks the submit button. The button1_action() method below returns the "loginproxy" case to make this happen.
    h3. {color:#ff6600}*login.jsp -- A very simple Visual Web JSF file with two input fields and a button:*{color}
    <?xml version="1.0" encoding="UTF-8"?>
    <jsp:root version="2.1"
    xmlns:f="http://java.sun.com/jsf/core"
    xmlns:h="http://java.sun.com/jsf/html"
    xmlns:jsp="http://java.sun.com/JSP/Page"
    xmlns:webuijsf="http://www.sun.com/webui/webuijsf">
        <jsp:directive.page
    contentType="text/html;charset=UTF-8"
    pageEncoding="UTF-8"/>
        <f:view>
            <webuijsf:page
    id="page1">
    <webuijsf:html id="html1">
    <webuijsf:head id="head1">
    <webuijsf:link id="link1"
    url="/resources/stylesheet.css"/>
    </webuijsf:head>
    <webuijsf:body id="body1" style="-rave-layout: grid">
    <webuijsf:form id="form1">
    <webuijsf:textField binding="#{login.username}"
    id="username" style="position: absolute; left: 216px; top:
    96px"/>
    <webuijsf:passwordField binding="#{login.password}" id="password"
    style="left: 216px; top: 144px; position: absolute"/>
    <webuijsf:button actionExpression="#{login.button1_action}"
    id="button1" style="position: absolute; left: 216px; top:
    216px" text="GO"/>
    </webuijsf:form>
    </webuijsf:body>
    </webuijsf:html>
            </webuijsf:page>
        </f:view>
    </jsp:root>h3. *login.java -- implent the
    button1_action() method in the login.java backing bean*
        public String button1_action() {
            setValue("#{requestScope.username}",
    (String)username.getValue());
    setValue("#{requestScope.password}", (String)password.getValue());
            return "loginproxy";
        }h3. {color:#ff6600}*loginproxy.jspx -- a login proxy that the user never sees. The onload="document.forms[0].submit()" automatically submits the form as soon as it is rendered in the browser.*{color}
    {code}
    <?xml version="1.0" encoding="UTF-8"?>
    <jsp:root xmlns:jsp="http://java.sun.com/JSP/Page"
    version="2.0">
    <jsp:output omit-xml-declaration="true" doctype-root-element="HTML"
    doctype-system="http://www.w3.org/TR/html4/loose.dtd"
    doctype-public="-W3CDTD HTML 4.01 Transitional//EN"/>
    <jsp:directive.page contentType="text/html"
    pageEncoding="UTF-8"/>
    <html>
    <head> <meta
    http-equiv="Content-Type" content="text/html;
    charset=UTF-8"/>
    <title>Logging in...</title>
    </head>
    <body
    onload="document.forms[0].submit()">
    <form
    action="j_security_check" method="POST">
    <input type="hidden" name="j_username"
    value="${requestScope.username}" />
    <input type="hidden" name="j_password"
    value="${requestScope.password}" />
    </form>
    </body>
    </html>
    </jsp:root>
    {code}
    h3. {color:#ff6600}*secure/securepage.jsp -- A simple JSF{color}
    target page, placed in the secure folder to test access*
    {code}
    <?xml version="1.0" encoding="UTF-8"?>
    <jsp:root version="2.1"
    xmlns:f="http://java.sun.com/jsf/core"
    xmlns:h="http://java.sun.com/jsf/html"
    xmlns:jsp="http://java.sun.com/JSP/Page" xmlns:webuijsf="http://www.sun.com/webui/webuijsf">
    <jsp:directive.page
    contentType="text/html;charset=UTF-8"
    pageEncoding="UTF-8"/>
    <f:view>
    <webuijsf:page
    id="page1">
    <webuijsf:html id="html1">
    <webuijsf:head id="head1">
    <webuijsf:link id="link1"
    url="/resources/stylesheet.css"/>
    </webuijsf:head>
    <webuijsf:body id="body1" style="-rave-layout: grid">
    <webuijsf:form id="form1">
    <webuijsf:staticText id="staticText1" style="position:
    absolute; left: 168px; top: 144px" text="A Secure Page"/>
    </webuijsf:form>
    </webuijsf:body>
    </webuijsf:html>
    </webuijsf:page>
    </f:view>
    </jsp:root>
    {code}
    h2. {color:#993300}*_Step 4: Configure Declarative Security_*{color}
    This type of security is called +declarative+ because it is not configured programatically. It is configured by declaring all of the relevant parameters in the configuration files: *web.xml* and *sun-web.xml*. Once you have it configured, the container (application server and java framework) already have the implementation to make everything work for you.
    *web.xml will be used to define:*
    - Type of security - We will be using "form based". The loginpage.jsp we created will be set as both the login and error page.
    - Security Roles - The security role defined here will be mapped (in sun-web.xml) to users or groups.
    - Security Constraints - A security constraint defines the resource(s) that is being secured, and which Roles are able to authenticate to them.
    *sun-web.xml will be used to define:*
    - This is where you map a Role to the Users or Groups that are allowed to use it.
    +I know this is confusing the first time, but basically it works like this:+
    *Security Constraint for a URL* -> mapped to -> *Role* -> mapped to -> *Users & Groups*
    h3. {color:#ff6600}*web.xml -- here's the relevant section:*{color}
    {code}
    <security-constraint>
    <display-name>SecurityConstraint</display-name>
    <web-resource-collection>
    <web-resource-name>SecurePages</web-resource-name>
    <description/>
    <url-pattern>/faces/secure/*</url-pattern>
    <http-method>GET</http-method>
    <http-method>POST</http-method>
    <http-method>HEAD</http-method>
    <http-method>PUT</http-method>
    <http-method>OPTIONS</http-method>
    <http-method>TRACE</http-method>
    <http-method>DELETE</http-method>
    </web-resource-collection>
    <auth-constraint>
    <description/>
    <role-name>User</role-name>
    </auth-constraint>
    </security-constraint>
    <login-config>
    <auth-method>FORM</auth-method>
    <realm-name/>
    <form-login-config>
    <form-login-page>/faces/login.jsp</form-login-page>
    <form-error-page>/faces/login.jsp</form-error-page>
    </form-login-config>
    </login-config>
    <security-role>
    <description/>
    <role-name>User</role-name>
    </security-role>
    {code}
    h3. {color:#ff6600}*sun-web.xml -- here's the relevant section:*{color}
    {code}
    <security-role-mapping>
    <role-name>User</role-name>
    <group-name>Users</group-name>
    </security-role-mapping>
    {code}
    h3. {color:#ff6600}*Almost done!!!*{color}
    h2. {color:#993300}*_Step 5: A couple of minor "Gotcha's"_ *{color}
    h3. {color:#ff6600}*_Gotcha #1_*{color}
    You need to configure the "welcome page" in web.xml to point to faces/secure/securepage.jsp ... Note that there is *_no_* leading / ... If you put a / in there it will barf all over itself .
    h3. {color:#ff6600}*_Gotcha #2_*{color}
    Note that we set the <form-login-page> in web.xml to /faces/login.jsp ... Note the leading / ... This time, you NEED the leading slash, or the server will gag.
    *DONE!!!*
    h2. {color:#993300}*_Here's how it works:_*{color}
    1. The user requests the a page from your context (http://localhost/MyLogin/)
    2. The servlet forwards the request to the welcome page: faces/secure/securepage.jsp
    3. faces/secure/securepage.jsp has a security constraint defined, so the servlet checks to see if the user is authenticated for the session.
    4. Of course the user is not authenticated since this is the first request, so the servlet forwards the request to the login page we configured in web.xml (/faces/login.jsp).
    5. The user enters username and password and clicks a button to submit.
    6. The button's action method stores away the username and password in the request scope.
    7. The button returns "loginproxy" navigation case which tells the navigation handler to forward the request to loginproxy.jspx
    8. loginproxy.jspx renders a blank page to the user which has hidden username and password fields.
    9. The hidden username and password fields grab the username and password variables from the request scope.
    10. The loginproxy page is automatically submitted with the magic action "j_security_check"
    11. j_security_check notifies the container that authentication needs to be intercepted and handled.
    12. The container authenticates the user credentials.
    13. If the credentials fail, the container forwards the request to the login.jsp page.
    14. If the credentials pass, the container forwards the request to *+the last protected resource that was attempted.+*
    +Note the last point! I don't know how, but no matter how many times you fail authentication, the container remembers the last page that triggered authentication and once you finally succeed the container forwards your request there!!!!+
    +The user is now at the secure welcome page.+
    If you have read this far, I thank you for your time, and I seriously question your ability to ration your time pragmatically.
    Kerry Randolph

    If you want login security on your web app, this is one way to do it. (the easiest way i have seen).
    This method allows you to create a custom login form and error page using JSF.
    The container handles the actual authentication and protection of the resources based on what you declare in web.xml and sun-web.xml.
    This example uses a statically defined user/password, stored in a file, but you can also configure JDBC realm in Glassfish, so that that users can register for access and your program can store the username/passwrod in a database.
    I'm new to programming, so none of this may be a good practice, or may not be secure at all.
    I really don't know what I'm doing, but I'm learning, and this has been the easiest way that I have found to add authentication to a web app, without having to write the login modules yourself.
    Another benefit, and I think this is key ***You don't have to include any extra code in the pages that you want to protect*** The container manages this for you, based on the constraints you declare in web.xml.
    So basically you set it up to protect certain folders, then when any user tries to access pages in that folder, they are required to authenticate.
    --Kerry                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                   

  • Retention Policy and Managed folder based retention

    What is difference between "Retention Policy/ Policy Tags" and " Managed Content Settings"?
    In my setup , my managed folder folder become general folder after following steps
    1. Created Managed folder
    2. Created managed content settings for IPM.post and IPM.Appointment with retention action "Delete and Allow recovery".
    3. Created managed policy and applied to 1 mailbox, and this is working properly
    But After that,
    1. Created 3 retention tags(1 for inbox, 1 for sent, 1 personal).
    2. Created retention policy combining these 3 tags.
    3. Applied to SAME mailbox
    4. Ran 'ManagedFolderAssitant'
    **After this, Managed folder become general outlook folder.
    So, cant I have "Managed folder based retention for managed folders" and General retention for "Inbox,Sent"

    Exchange 2010 RTM introduced Retention Policies as the successor to the Message Records Management (MRM) technology introduced in Exchange 2007. MRM was the successor to Mailbox Manager Policies in Exchange 2003. Message Records Management is called MRM
    1.0 and Retention Policies is being called MRM 2.0 for short. MRM 1.0 as well as MRM 2.0 are both available in Exchange 2010. Only difference is we can manage Retention Policies from the EMC and EMS, but the Managed Folder Mailbox Policy is only Managed from
    the EMS through cmdlets in Exchange 2010 SP1.
    It completely depends on your requirements when to use MRM 1.0 and when to Use MRM 2.0.
     Certain new features are added in MRM 2.0 (Retention Policy) which allow us to manage our mailbox email items at very granular level. But if we are still happy with earlier version MRM 1.0 then we can continue using Managed folder mailbox
    Policy in Exchange 2010.
    [ Note: If we are Using the Retention Policy (MRM 2.0) then we can view the expiry of  each and every email items of the folders on which the retention Policy is tagged and this can be only view from OWA and Outlook 2010, But this feature
    is not available  for  Managed Folder Mailbox Policy (MRM 1.0) ]
    We cannot use the Base Folder only switch in MRM 2.0 because it is TAG  specific (DPT, RPT, and PPT) not Managed Folder specific.
    Managed folder Mailbox Policy is folder specific this would be the major difference.
    Refer to this link :
    Retention policies vs Managed folders

  • MM-Based inventory management & Replenishment -based Inventory Management

    Hi,
    Can any one through me some light on the difference between "MM-Based inventory management" & "Replenishment -based Inventory Management" in IS-Retail.
    Is it something related to planning, If so what is the difference.
    Thanks in Advance,
    Shakthi Rajkumar.

    Hi
    In retail scenario the replenishment can happen in two ways
    (1) From DC to Stores
    (2) Directly from vendor to Distribution center.
    However the above two scenarios follow the following push / pull strategy to replenish the material.
    Case 1 : From DC to Stores
    How the push occurs ?
    Store orders/sales orders
    Automatic store orders/sales orders from different POS system
    Auto replenishment
    How the pull occurs ?
    Allocation of merchandise purchased
    Case 2 : Directly from vendor to Distribution center.
    How the push occurs?
    Reorder point planning
    Forecast based planning
    Time phased planning
    How the pull occurs?
    Allocation
    Manual purchase orders
    Hope this clarifies your doubts how the replenishment happens in retail scenario
    Reward if useful
    Regards
    edwin

  • Is there a screen that allows a manager to change details of their employee

    Is there a screen that allows a manager to change details of their employee?
    Using Manager Self Service, we would like to be able to have our users change the job title, department etc. of their 'reports' i.e. their employees. Is there a way to do this using standard Manager Self Service functionality?

    Yes, it is possible to change the department related changes through Manager self service using function Change Cost Center, Location and Manager and it is possible to change the job using Change Job.
    Hope this clarifies your Question.

  • Manage controls based on user

    Hi,
    How to manage controls based on login user .
    Ex : if admin i want to hide some components and if user i want to show some components like menu items, buttons etc
    Thanks,
    Nitesh

    This is all described in Frank's article
    >
    Using Security Expressions
    For checking security in the user interface or in the Oracle ADF binding layer, Oracle ADF provides the following set of specialized security expressions: 
    #{securityContext.authenticated}
    #{securityContext.userName}
    #{securityContext.userInRole['roleList']}
    #{securityContext.userInAllRoles['roleList']}
    #{securityContext.taskflowViewable['target']}
    #{securityContext.regionViewable['target']}
    #{securityContext.userGrantedResource['permission']}
    #{securityContext.userGrantedPermission['permission']} 
    To add a security expression to a user interface component, select the component in the visual page editor and open the Property Inspector. Click the down-arrow icon to the right of the property to which you want to add the expression (such as the disabled property on an af:showDetail item on a panel tab). Choose Expression Builder from the context menu that appears.
    >
    Timo

  • Server (Tomcat) Managed "Role-Based" Authentication (isUerInRole)

    I am using the Tomcat 5.0.27. In order to use server managed "role-based" authentication, we supply the server with two tables. One of the tables containes userID and password, and the other tables contains userID and userRole (a person can have more than one role). (We must map each user to his/her role somewhere, and it is in the $TOMCAT/conf/server.xml file)
    My difficulty stems from the tables are structured in my database. I do have a table that contains userID and password; however, I do not have a table that contains userID and userRole. In order to know a person's role, I have to navigate from one table to another using foreign key and primary key.
    Is there a way to tell the server to navigate from one table to another to find a person's role? Or we "must" create a table that contains userID and userRole for us to use the isUserInRole() method for security check?

    check out the tomcat docs
    http://jakarta.apache.org/tomcat/tomcat-5.0-doc/realm-howto.html#JDBCRealm
    according to docs you have to create these tables
    create table users (
    user_name varchar(15) not null primary key,
    user_pass varchar(15) not null
    create table user_roles (
    user_name varchar(15) not null,
    role_name varchar(15) not null,
    primary key (user_name, role_name)

  • How to enhance Rule-based Employee assignment

    Hi,
    we would like to enhance the Rule-based Employee assignment with additional Attributes from the BP Organisational Data.
    Does anyone know, what we need to do?
    Cheers,
    D.H.

    Hello!
    You can maintain Conditions and Actions within the Rule-Modeler. Here there is a context to maintain Rule-Policies related to the Business-Partner.
    Have you already checked the attributes you can use for the Conditions? To my knowledge there are many attributes you can use and have also several options within the actions (not only assigning/removing the Employee, but also Partner-Functions, etc.).
    BTW: The rule-based assignment can be triggered manually by the user within the account/contact overview page, or via scheduled batch program. (Report: CRM_BUPA_ASSIGN_EMPLOYEE)
    Best regards
    Arno

  • How to create the PO based on requisition through interface.

    Hi,
    In P2P,
    How to create the PO based on requisition through interface.
    Regards,
    Srikanth

    Hi Srikanth,
    I knew it from frontend.
    But i want from backend using INTERFACE .please see if this can help you
    http://appshub-hussy.blogspot.com/2010/10/requisition-and-purchase-order-queries.html
    http://oraclemaniac.com/2012/04/17/sql-queries-to-get-requisition-po-and-po-receipt-details/
    SQL to link Requisitions with Purchase Orders
    http://oracle.ittoolbox.com/groups/technical-functional/oracle-apps-l/how-to-find-the-po-number-if-we-give-requisition-number-3161211
    http://oracle.ittoolbox.com/groups/technical-functional/oracle-apps-l/need-requisition-sql-query-1338985
    ;) AppSmAstI ;)
    sharing is CAring

  • HR-ABAP.How to Find the Employees assigned to the Appraisal Template

    Hi ,
    Please help me out.how to find the employees assigned to the Appraisal template.
    Ex. 7825232 is a appraisal template id and i want to know in the system how many employees assigned to it..
    Please let me know if the post is missing something.
    Suggestion also appreciated ...
    Thanks Inadvance!
    Law.

    check this fm HRHAP_DOCUMENT_GET_LIST_XXL
    Thanks
    Bala Duvvuri

  • Table/FM for getting Employees Assigned to PM Order

    Hi All,
    Please let me know the table name or function module to get the list of employees assigned to PM Order through HRMS. I need the list of persons assigned to operations which are assigned in Requirements Tab of operation details.
    Sundar

    Hi Sundar,
    Please check BAPI_ALM_ORDER_GET_DETAIL or BAPI_ALM_OPERATION_GET_DETAIL, the operations output does give personnel number. I didnt test though if this number is same as person assigned to operation.
    Regards
    Shrikant
    Edited by: Shrikant Rakate on Nov 17, 2011 11:30 AM

  • Employee Assignment Termination status as 'Terminate Process Assignment'

    hi everybody ,
    can any body tell me what is the API i need to use to terminate an Employee Assignment with the status as 'Terminate Process Assignment' .currentely i am using "hr_assignment_api.actual_termination_emp_asg" but it is terminating the assignment with the status as 'Terminate Assignment' . please help me its urgent.
    Thanks in advance.
    Surfraz

    Final standard process is not used for US legislation, we use Final Process Date for US. You can use any kind of assignment status, which has SYSTEM_STATUS as TERM_ASSIGN.

  • Table/FM for getting Employees Assigned to Workcenter

    Hi All,
    Please let me know table name or function module to get the list of employees assigned to workcenter through HRMS.
    Sundar

    Sundar,
    These tables should give you what you need:
    CRHD > HRP1000 > HRP1001 > PA0001
    Paul

Maybe you are looking for

  • Remote Access Disk Management

    I am wanting to be able to manage the new installation of windows 2012r2 core, which is a workgroup. I can see the event logs etc, but when I try device manager or disk manager I receive rpc error. What do I need to configure?

  • Mountain Lion randomly crashes and reboots

    Please can someone give me some guidance as this is starting to drive me crazy. I have a 2011 21.5" imac core i7 2.8 Ghz with 4GB DDR 3 memory AMD Radeon HD 6770M 512MB graphics. Running OS X 10.8.2 A few weeks ago I noticed that when I returned that

  • For j in (select a, (select 1 from dual),c ) loop ..end loop;...... error

    declare begin for cur in (select (select 1 from dual) col from dual) loop   null; end loop; end;in TOAD, OK, BUT IN FORM ERROR! Edited by: indoracle on Feb 23, 2012 2:38 AM Edited by: indoracle on Feb 23, 2012 2:40 AM

  • How can i get my iphone and ipad to sync

    My iPhone and iPad don't seem to sync the calendar information.  How can I fix this?

  • Memory leak linux

    I'm running Ubuntu Linux and it looks like I see a memory leak that I'm not seeing when I ran it on my PC. I get heap exception everntually. I was using sam maxm heap size of 500M. Is there anything I have to do special for linux? Thanks