Webinar: Working with User Defined Web Objects (UDOs) in EnterpriseOne

Wednesday, November 28, 2018

Using EnterpriseOne has never been easier than now with the new tools available with User Defined Web Objects (UDOs) and even UX1. UDOs are web objects that streamline your interface with E1 information and applications. What do you need to know in working with them? How do you go about granting permissions quickly and easily to put these tools in the hands of the right users? Let us walk you through options of what you will need to know to implement them successfully.

Working with Security Roles in JD Edwards

Thursday, December 6, 2018

The ability to use security roles as a building block of your security efforts is an incredibly useful tool. So how do you make the most of it in your implementation or daily processes? This begins from the original design of steps, through user provisioning and flows forward into ongoing review and long-term cleanup. We will walk through best practices in these steps and wrap up with how the ALLOut toolset can help save you time and effort.

Segregation of Duties Management in JD Edwards

Thursday, January 10, 2019

ALLOut Security provides a suite of programs that run within your E1 environment using the native JD Edwards security files to produce all the reports required for Sarbanes Oxley compliance and/or internal review of segregation of duties. These reports are ready to go and do not need an intensive project to be able to implement. We will take a look at what this offers as well as the Best Practice rule set available.

JDE Security Best Practices

Tuesday, February 12, 2019

Security can be a huge initiative that is often handled as users are standing over you waiting for results! During project initiatives, it normally comes together at the end of the project and there never seems to be enough time.

Join this session to learn about ideal best practices to follow to ensure your JDE system is using a security model that reduces risk while maximizing the efficiency for those responsible for it.

• Discuss the basics of security in JDE: Users, roles, role assignments, environments
• How to achieve a best practice security model
• ‘Deny All’ or ‘All Doors Closed’ security model
• Best practice for defining security roles
• Some monitoring you should do with or without a tool
We will wrap up with a brief look at how the ALLOut toolset can assist with some of these processes.