The Worklist pages let you view and respond to your notifications using a Web browser. The Advanced Worklist provides an overview of your notifications, from which you can drill down to view an individual notification in the Notification Details page. You can also reassign notifications to another user, request more information about a notification from another user, respond to requests for information, and define vacation rules to handle notifications automatically in your absence.
Oracle Workflow also provides the Personal Worklist, which includes additional options to specify what notifications to display in your Worklist and what information to display for those notifications. Before you can use the Personal Worklist, your system administrator must give you access to it.
Worklist Access

The Advanced Worklist also lets you grant access to your worklist to another user. That user can then act as your proxy to handle the notifications in your list on your behalf. You can either grant a user access for a specific period or allow the user’s access to continue indefinitely.
The worklist access feature lets you allow another user to handle your notifications without giving that user access to any other privileges or responsibilities that you have in Oracle Applications. However, note that a user who has access to your worklist can view all the details of your notifications and take most actions that you can take on the notifications. Ensure that you take all necessary security considerations into account when you choose to grant worklist access to another user.
If another user has granted you access to his or her worklist, you can switch the Advanced Worklist to display that user’s notifications instead of your own. When viewing another user’s worklist, you can perform the following actions:
View the details of the user’s notifications.
Respond to notifications that require a response.
Close notifications that do not require a response.
Reassign notifications to a different user.
Request more information about a notification from a different user.
Respond to a request for more information.
If the user whose worklist you are accessing has a notification sent from you, you can only view that notification and cannot take any action on it. For example, you cannot respond to a notification that you reassigned to the other user, nor to a notification marked as being sent from you by special logic in the workflow, such as an expense report that you submitted to the other user for approval.
You cannot define vacation rules for the user whose worklist you are viewing. You also cannot grant access to that user’s worklist to anyone else.

Web ADI brings Oracle E-Business Suite functionality to the desktop where the familiar  Microsoft Excel, Word, and Project applications can be used to complete your Oracle E-Business Suite tasks. This guide provides instructions on using the Microsoft Excel functionality.
The Web ADI integration with Microsoft Excel enables you to bring your E-Business Suite data to a spreadsheet where familiar data entry and modeling techniques can be used to complete Oracle E-Business Suite tasks. You can create formatted spreadsheets on your desktop that allow you to download, view, edit, and create Oracle E-Business Suite data. Use data entry shortcuts (such as copying and pasting or dragging and dropping ranges of cells) or Excel formulas to calculate amounts to save time. You can combine speed and accuracy by invoking lists of values for fields within the spreadsheet.
After editing the spreadsheet, you can use Web ADI’s validation functionality to validate the data before uploading it to the Oracle E-Business Suite. Validation messages are returned to the spreadsheet, allowing you to identify and correct invalid data.
The fields that appear in the spreadsheet, their positions, and their default values can all be customized through Web ADI’s Layout functionality. This allows you to create a more productive work environment by removing unnecessary fields from the spreadsheet, and by organizing the spreadsheet in a way that conforms to your
Key Features
Oracle Web ADI includes the following features:

Works Via Internet

Web ADI uses Internet computing architecture to lower the total cost of ownership by having the product centrally installed and maintained. No installation is required on client machines; you need only a Web browser and Microsoft Excel. This architecture also provides superior performance over a WAN or dialup connection, since the exchange between client and server is simplified through the use of HTML.
Presents E-Business Suite Data in a Spreadsheet Interface
Spreadsheets provide a familiar interface that is common in the business environment. You can use familiar editing capabilities such as copying and pasting data, and moving ranges of cells to create or edit large amounts of data. Recurring data entry is possible by saving a spreadsheet, and then uploading it at needed intervals, such as every month or every quarter. Spreadsheets offer additional flexibility in the way work is done; they can be sent to others for approval or review, and they can be edited when disconnected from a network.
Validates Data
All data in the spreadsheet can be validated against Oracle E-Business Suite business  rules before it is uploaded. This includes validation against key and descriptive flexfields. Data is validated against accounts, segment security rules, and cross validation rules. If any errors are found, messages are returned directly to the spreadsheet, enabling you to correct the errors and successfully upload the data.
Enables Customizations
You can use the layout functionality to determine what fields appear in your spreadsheet, where they appear, and if they contain default values. These definitions can be saved, reused, and modified as needed.
Automatically Imports Data
Wed ADI automatically imports data into your Web ADI spreadsheets whenever you create them. This information can come from the Oracle E-Business Suite or from a text file. Imported information can be quickly modified in Excel, validated, and uploaded to the Oracle E-Business Suite. This feature can be useful when migrating data from a legacy system to the Oracle E-Business Suite.
The base layer of access control within Oracle Applications is Function Security. Function  Security restricts user access to the individual menus and menu options within the system.
The next layer of access control within Oracle Applications is Data Security. Working in  conjunction with Function Security, Data Security provides additional access control on the data  a user can see and what actions a user can perform on that data, within Oracle Applications.  Using Data Security, for example, you could control access to the set of orders that an order  administrator can update within the Order Management application.
User Management (UMX) provide the UIs for modeling data security within Oracle Applications.