Get all data access security

get

/fscmRestApi/resources/11.13.18.05/collaborationDemandPlanners/{collaborationDemandPlannersUniqID}/child/dataAccessSecurity

Request

Path Parameters
  • This is the hash key of the attributes which make up the composite key for the Collaboration Demand Planners resource and used to uniquely identify an instance of Collaboration Demand Planners. The client should not generate the hash key value. Instead, the client should query on the Collaboration Demand Planners collection resource in order to navigate to a specific instance of Collaboration Demand Planners to get the hash key.
Query Parameters
  • This parameter specifies dependencies which are fields that are set before and rolled back after generating the response. Generally they are used to preview the effects of an attribute change. The fields specified in this parameter are always set in the resource instance in question. When a child resource collection is requested and the parameter is set, the fields will be set in the parent resource instance before generating the resource collection payload. The value of this query parameter is a set of dependency fields. Example: dependency=ProductId=2

    Format: <attr1>=<val1>,<attr2>=<value2>
  • When this parameter is provided, the specified children are included in the resource payload (instead of just a link). The value of this query parameter is "all" or "". More than one child can be specified using comma as a separator. Example: ?expand=Employees,Localizations. Nested children can also be provided following the format "Child.NestedChild" (Example: ?expand=Employees.Managers). If a nested child is provided (Example: Employees.Managers), the missing children will be processed implicitly. For example, "?expand=Employees.Managers" is the same as "?expand=Employees,Employees.Managers" (which will expand Employees and Managers).
  • This parameter filters the resource fields. Only the specified fields are returned, which means that if no fields are specified, no fields are returned (useful to get only the links). If an indirect child resource is provided (Example: Employees.Managers), the missing children will be processed implicitly. For example, "?fields=Employees.Managers:Empname" is the same as "?fields=;Employees:;Employees.Managers:Empname" (which will only return the "Empname" field for Managers). the value of this query parameter is a list of resource fields. The attribute can be a direct (Example: Employees) or indirect (Example: Employees.Managers) child. It cannot be combined with expand query parameter. If both are provided, only fields will be considered.

    Format: ?fields=Attribute1,Attribute2

    Format for fields in child resource: ?fields=Accessor1:Attribute1,Attribute2
  • Used as a predefined finder to search the collection.

    Format ?finder=<finderName>;<variableName>=<variableValue>,<variableName2>=<variableValue2>

    The following are the available finder names and corresponding finder variables

    • PrimaryKey Find data access security according to the data access security identifier.
      Finder Variables
      • DataAccessId; integer; Value that uniquely identifies the specific data security access granted to the demand planner.
  • This parameter restricts the number of resources returned inside the resource collection. If the limit exceeds the resource count then the framework will only return the available resources.
  • This parameter can be used to show only certain links while accessing a singular resource or a resource collection. The parameter value format is a comma-separated list of : <link_relation>

    Example:
    self,canonical
  • Used to define the starting position of the resource collection. If offset exceeds the resource count then no resources are returned. Default value is 0.
  • The resource item payload will be filtered in order to contain only data (no links section, for example).
  • This parameter orders a resource collection based on the specified fields. The parameter value is a comma-separated string of attribute names, each optionally followed by a colon and "asc" or "desc". Specify "asc" for ascending and "desc" for descending. The default value is "asc". For example, ?orderBy=field1:asc,field2:desc
  • This query parameter defines the where clause. The resource collection will be queried using the provided expressions. The value of this query parameter is one or more expressions. Example: ?q=Deptno>=10 and <= 30;Loc!=NY

    Format: ?q=expression1;expression2

    You can use these queryable attributes to filter this collection resource using the q query parameter:
    • CreatedBy; string; User who created the data access security.
    • CreationDate; string; Date and time when the user created the data access security.
    • CustomerId; integer; Value that uniquely identifies the customer in the customer forecast that receives the item. It's a primary key that the application creates when it creates the customer.
    • CustomerName; string; Name of the customer in the customer forecast that receives the item.
    • CustomerNumber; string; Number that identifies the customer in the customer forecast that receives the item.
    • CustomerSiteAddress; string; Address of the customer site in the customer forecast that receives the item.
    • CustomerSiteId; integer; Value that uniquely identifies the customer site in the customer forecast that receives the item. It's a primary key that the application creates when it creates the customer.
    • CustomerSiteLocation; string; Location of the customer site in the customer forecast that receives the item.
    • CustomerSiteNumber; string; Number that identifies customer site in the customer forecast that receives the item.
    • DataAccessId; integer; Value that uniquely identifies the specific data security access granted to the demand planner.
    • LastUpdateDate; string; Date and time when the user most recently updated the data access security.
    • LastUpdatedBy; string; User who most recently updated the data access security.
    • SecurityContext; string; Value that identifies the level of security applied. Values include Customer or Customer Site. The default value is Customer.
    • SecurityContextCode; string; Abbreviation that identifies the level of security applied. A list of accepted values is defined in the lookup type ORA_VCS_SECURITY_CONTEXT.
  • The resource collection representation will include the "estimated row count" when "?totalResults=true", otherwise the count is not included. The default value is "false".
Header Parameters
  • If the REST API supports runtime customizations, the shape of the service may change during runtime. The REST client may isolate itself from these changes or choose to interact with the latest version of the API by specifying this header. For example: Metadata-Context:sandbox="TrackEmployeeFeature".
  • The protocol version between a REST client and service. If the client does not specify this header in the request the server will pick a default version for the API.

There's no request body for this operation.

Back to Top

Response

Supported Media Types

Default Response

The following table describes the default response for this task.
Headers
  • If the REST API supports runtime customizations, the shape of the service may change during runtime. The REST client may isolate itself from these changes or choose to interact with the latest version of the API by specifying this header. For example: Metadata-Context:sandbox="TrackEmployeeFeature".
  • The protocol version between a REST client and service. If the client does not specify this header in the request the server will pick a default version for the API.
Body ()
Root Schema : collaborationDemandPlanners-dataAccessSecurity
Type: object
Show Source
Nested Schema : Items
Type: array
Title: Items
The items in the collection.
Show Source
Nested Schema : collaborationDemandPlanners-dataAccessSecurity-item-response
Type: object
Show Source
  • Read Only: true
    Maximum Length: 64
    User who created the data access security.
  • Read Only: true
    Date and time when the user created the data access security.
  • Value that uniquely identifies the customer in the customer forecast that receives the item. It's a primary key that the application creates when it creates the customer.
  • Maximum Length: 360
    Name of the customer in the customer forecast that receives the item.
  • Maximum Length: 360
    Number that identifies the customer in the customer forecast that receives the item.
  • Read Only: true
    Maximum Length: 960
    Address of the customer site in the customer forecast that receives the item.
  • Value that uniquely identifies the customer site in the customer forecast that receives the item. It's a primary key that the application creates when it creates the customer.
  • Read Only: true
    Maximum Length: 30
    Location of the customer site in the customer forecast that receives the item.
  • Maximum Length: 30
    Number that identifies customer site in the customer forecast that receives the item.
  • Read Only: true
    Value that uniquely identifies the specific data security access granted to the demand planner.
  • Read Only: true
    Date and time when the user most recently updated the data access security.
  • Read Only: true
    Maximum Length: 64
    User who most recently updated the data access security.
  • Links
  • Read Only: true
    Maximum Length: 80
    Value that identifies the level of security applied. Values include Customer or Customer Site. The default value is Customer.
  • Maximum Length: 30
    Abbreviation that identifies the level of security applied. A list of accepted values is defined in the lookup type ORA_VCS_SECURITY_CONTEXT.
Back to Top