Webinar: Little Known Security Features and Functions – Tips & Tricks in JDE
This is a “Did you Know?” session where we will discuss some of the security features in standard EnterpriseOne and in the ALLOut toolset that may not be as commonly known, although utilizing them can be incredibly beneficial. We will highlight how using these features can decrease risk and time spent on compliance and security. Walk away with new ideas, reports and methods that you can apply to your daily processes in areas such as:
•Managing Data Security
•Compliance Reporting & Risk
Webinar: Working with User Defined Web Objects (UDOs) in EnterpriseOne
JDE User Access Reviews
No matter if you are looking at user level access to support good security processes, to prepare for an internal or external audit or to ensure compliance with various regulations such as HIPAA or GDPR, ensuring that the right individuals have access to the correct processes and information is an integral part of your JD Edwards implementation. Eliminating those users that aren’t using the system and therefore managing your licensing fees is another critical step. We will identify key areas to
Working with Security Roles in JD Edwards
The ability to use security roles as a building block of your security efforts is an incredibly useful tool. So how do you make the most of it in your implementation or daily processes? This begins from the original design of steps, through user provisioning and flows forward into ongoing review and long-term cleanup. We will walk through best practices in these steps and wrap up with how the ALLOut toolset can help save you time and effort.
Segregation of Duties Management in JD Edwards
ALLOut Security provides a suite of programs that run within your E1 environment using the native JD Edwards security files to produce all the reports required for Sarbanes Oxley compliance and/or internal review of segregation of duties. These reports are ready to go and do not need an intensive project to be able to implement. We will take a look at what this offers as well as the Best Practice rule set available.
JDE Security Best Practices
Security can be a huge initiative that is often handled as users are standing over you waiting for results! During project initiatives, it normally comes together at the end of the project and there never seems to be enough time.
Join this session to learn about ideal best practices to follow to ensure your JDE system is using a security model that reduces risk while maximizing the efficiency for those responsible for it.
• Discuss the basics of security in JDE: Users, roles, role