Security Types in JD Edwards: What are they?

My son’s school recently hosted a theatre group to perform all 37 Shakespeare plays in 97 minutes, it was witty, well written and fun.  But to bring us back to business….. whilst not in any way as bawdy, irreverent, or entertaining, I have done my own ‘quick take’ on 13 Security Types in JD Edwards:    

Application security

Where can they get to?

Action security

What can they do when the get there?

Row security

Controlled access to a specific company/department,

Column security

Controlled access to a specific field eg salary, tax code

Processing option security

Prevents changes to the way a report has been set up to run.

Tab security

Who can do what to tabs on a given form.

Exit security

Secures users from menu bar exits

Exclusive application security

Overrides row security that is set for an application.

External calls security

No access to applications outside your JDE eg design tools, system monitors.

Data Browser security

Controls access to the Data Browser program.

Published business service security

Controls access a published business service

Push button, image, and link security

Can they use or view push button, link, and image controls?

Media object security

…It’s all about pictures!

Clearly your use of the security types depends on the particular requirements within your corporate security strategy.  What is clear however is that everyone should be using diligent application and action code security to have a clean conscience when it comes to your Audit.  Set up process-based roles, apply application and action code security to each and you will find yourself with a robust and easy to manage security model (especially of course if you are managing these in the ALLOut Security SuperGrid!)

Katie Herbert