Webinar: Working with User Defined Web Objects (UDOs) in EnterpriseOne
Working with Security Roles in JD Edwards
The ability to use security roles as a building block of your security efforts is an incredibly useful tool. So how do you make the most of it in your implementation or daily processes? This begins from the original design of steps, through user provisioning and flows forward into ongoing review and long-term cleanup. We will walk through best practices in these steps and wrap up with how the ALLOut toolset can help save you time and effort.
Segregation of Duties Management in JD Edwards
ALLOut Security provides a suite of programs that run within your E1 environment using the native JD Edwards security files to produce all the reports required for Sarbanes Oxley compliance and/or internal review of segregation of duties. These reports are ready to go and do not need an intensive project to be able to implement. We will take a look at what this offers as well as the Best Practice rule set available.
JDE Security Best Practices
Security can be a huge initiative that is often handled as users are standing over you waiting for results! During project initiatives, it normally comes together at the end of the project and there never seems to be enough time.
Join this session to learn about ideal best practices to follow to ensure your JDE system is using a security model that reduces risk while maximizing the efficiency for those responsible for it.
• Discuss the basics of security in JDE: Users, roles, role