ALLOut Blog


Once your UDO is approved for sharing, security still needs to be put into place to enable it for users.

Access management is the process of identifying, tracking, controlling and managing authorized or specified user's access to a system, application or any IT instance.

Did you know you can switch on your security logging in the JDE ini file?  (Enter 1).  Once it's turned on the F9312 table will provide audit logging.  But it tracks more than just sign on!  It wil

UDOs are personalized web-based objects that can be created by users to improve their JDE experience and reduce the requirement for developer involvement.

Security is a vital component of your JD Edwards environment and needs to be implemented properly to make full use of its benefits.

Mitigating controls are never as desirable as an effective segregation of duties, but in some situations, a breach of a security rule may just have to exist.

The standard security mechanism both for World and EnterpriseOne is very complex. End-users need to create security restrictions in the applications to authorize the right users for the right conte

Allocating roles to users in JDE? Will that create a security breach?

Using EnterpriseOne has never been easier than now with the new tools available with User Defined Web Objects (UDOs) and even UX1.

  1. Identify your internal business processes
  2. Identify rules (or buy the ALLOut rule set)
  3. Identify conflicts (run ALLOut’s automated SOD reports)

49% of organisations globally said they’ve been a victim of fraud and economic crime* – up from 36% in the previous 24 months.  But what ab

For many organizations, preparing for the European Union’s (EU) General Data Protection Regulation (GDPR) has been a time-consuming endeavor. Unfortunately, the work is not over.