While Exclusive can be used to “Manage Exceptions” and the E1 installation defaults to this setting, Inclusive is considered the stronger method for effectively managing data security.
Over time there are frequently Users or Roles in your system that are no longer used, but they still have records associated with them. Time for a clean up and maintenance schedule!
... or perhaps you will?! "How is this going to be beneficial to me?" "Here we go again, advice from people who don't know our business like me" "This is going to be so time consuming"
Whilst 'Cloud' is the on point buzzword of today, are you looking at something simply available online/via the Web, or is it Oracle's cloud computing service itself?
Discover out how to set up Row Security on your install. Read our full Case Study based on an international company, restricting access to country specific data.
Why not ask us how to run your own internal audit to ensure you are ready BEFORE the auditors arrive? It may not even cost you a penny!
JD Edwards records some changes to users’ system access to its F9312 table – but this information is not accessible via a JD Edwards report.