Introduction to the JDE Security Academy

Join us for a deep dive on Security inside of JDE, where you will learn everything you need to know to create a business focused security strategy that will pay dividends now and years into the future.  The first half of the Academy is designed to give you an understanding of JDE security, what options you have and strategies for leveraging the tools JD Edwards has provided.  The second half is geared towards applying the concepts we learned and creating a security plan for your business.  Most importantly, how can you implement best practices without breaking the bank or causing a riot within the business.

JDE Security Academy Part I

We begin with a tactical overview of security, looking at what security types are available, and what they can do for you.  How does security work in JDE and what can you do to avoid some of the basic pitfalls?

Our next step is looking at more advanced security to understand why some of the basic settings give the access they do, and how to leverage your available options.  We will then take a long look at Security change control: from how to design and implement Role Control, who can approve access to certain roles and what roles can be automatically approved, all the way through setting up a True security change control with changes validated, tested, and approved in a lower environment before being promoted to the Production environment.  We will even throw in a Segregation of Duties review as part of the promotion to ensure you can stay compliant.

Next, we tackle one of the most dreaded topics in all JDE Security, Business Unit Security!  We will help you understand why it is a vital component of your security strategy and how you can design a solution that supports your business requirements.  The newest security options will be featured next with a look at User Defined Objects.  What is the best way to manage access to these high demand objects without adding additional workload to your team? 

Who is this Security Academy for?

Finance Professionals

If you have concerns about the integrity of your financial reporting systems or looking to implement SOX controls.

Auditors

Having a strong understanding of security and user access will provide the independence that is critical to the audit process.

Business Analysts

If you are involved in implementing new features in JDE and need to know what can be secured and how to secure it.

CNC

You already play an extremely critical role in JDE and now, you'll be a Security Master when you learn how to diagnose and resolve security issues.

JDE Security Academy Part II

Part 2 of the JDE Security Academy is focused on the strategic application of the concepts we learned about in Part 1. We start by looking at options for implementing a Best Practice security model in a controlled and non-intrusive manner.  You have options, and we will go through them each and point out the pros and cons.

Any good security model will include compliance as a cornerstone.  We will look at Compliance and security reporting and how to leverage them as part of your financial and operational controls as well as your annual user access reviews.  As part of compliance, you have the option to create a preventative controls structure.  How do you do this and what options are available to you?  It is tough to put together a great security strategy if you are not looking at it holistically, considering all the parts AND everyone that is affected by it, both end users, and administrators.

We will look at security strategy, design, and planning and how you can implement a plan that will work today and for years to come.

As we near the end of our journey, we look at automating your security maintenance.  What should be automated, and what should not.  How do I automate but still retain control?

Finally, we will wrap up the Academy with a high-level review of the key points, what needs to happen first, and strategies for getting all the right players engaged in the process.

5 Reasons to Become a JDE Security Expert

  • This course is designed for all levels of experience and will provide both tactical and strategic guidance on the design and implementation of JDE security  
  • You should take this course if you are responsible for managing JDE security as it will give you the tools and information needed to optimize your security.
  • If you are having security related issues and are unable to pinpoint the cause
  • If you are involved in implementing new features in JDE and need to know what can be secured and how to secure it
  • If your security is a mess and you don’t know where to start to fix it

Whether you’re new to JDE Security or a seasoned pro, this course will bring you to Security Mastery

Time remaining until our next JDE Security Academy Course

JDE Security Academy Course Topics and Schedule

All sessions are the second Tuesday of the month beginning at 11:00AM EST, 8:00AM PST except in April due to INFOCUS.
*The dates are tentative and are subject to change.

JDE Security Academy

Session 01 - January 12, 2021 Introduction to JDE Security

Welcome to the Remote CNC Services JDE Security Academy!  

JDE security is a powerful tool that can help ensure your users have the access they need, but do you know what security types are available and what they are used for? 

Join Remote CNC Services as we delve into JDE Security to understand what security types are available, what they do, and how to leverage them to provide a secure business system. We will also look at some of the basic pitfalls and how to easily avoid them.

JDE Security Academy

Session 02 - February 9, 2021 Advanced Security Concepts

Are you having issues with users being able to do what they should have access to?  What about issues with adding records from an application where they have been restricted?   Are you assigning E1 pages to roles, but your users can’t see all of their assigned E1Pages?

There are some known issues with the recommended best practices that are easy to avoid, if you know how!  Remote CNC Services will walk you through some security pitfalls and how to avoid or remediate them.

JDE Security Academy

Session 03 - March 9, 2021 Security Change Control I: Role Control

Security Change control has been an elusive target for JD Edwards users for many years.  ALLOut Security has delivered on what most JDE users have been looking for.  Remote CNC Services and ALLOut Security will walk you through the only true Security Change Control available for JDE.  In Part 1, we will look at Role Control and how you can use this feature to ensure access has been appropriately reviewed and approved BEFORE it has been assigned. 

We make our webinars as interactive as possible so we welcome specific questions that you would like us to address during the webinar, simply email us at: Info@RemoteCNCServices.com

JDE Security Academy

Session 04 - April 20, 2021 Security Change Control II: Promoting Security

In the previous session, we looked at the concepts of implementing some basic security change control through role review and approval.  This month we’re going to extend security change control to making changes to the security within a role as well as role assignments. 

How can you effectively make changes to security and user access in one environment and then promote only the approved changes to Production?  We’ll lay out what you need to look at to make this happen along with the underlying configuration changes needed to support it.

JDE Security Academy

Session 05 - May 11, 2021 Row Security

Business Unit security or as it is commonly known, row security, is one of the most under-utilized aspects of JDE security, yet it provides significant value for your organization.

We will look at what you can use business unit security for and what it should not be used for.  We’ll discuss best practices and give you some practical examples that you can take back to your organization. 

We make our webinars as interactive as possible so we welcome specific questions that you would like us to address during the webinar, simply email us at: Info@RemoteCNCServices.com

JDE Security Academy

Session 06 - June 8, 2021 Managing UDO Security

Everyone wants to be a Citizen Developer, creating their own User Defined Objects (UDO) but how do you manage all that customization on top of your ‘regular’ development?  Should you even allow everyone to BE a citizen developer or is that asking for trouble?

We will start by looking at how to enable all the UDO functionality in your environment.  Next, what does it mean to be a citizen developer and how can you manage the coming flood of user generated UDOs. 

Once you have this information, you can make an informed decision on  who gets to be a citizen developer and how best to manage the product of their efforts.

JDE Security Academy

Session 07 - July 13, 2021 Implement Security without Impacting the Business

We’ve spent the last 6 sessions going over security strategy, design, and best practices.  You should now have a solid understanding of JDE security strategies and be able to craft your own JDE security model.

Once you have a defined security strategy and desired security model ready to go, how do you actually implement it without affecting your production users?   We’ll look at just how easy it is to do this and how you can plan your implementation without impacting your Production users.

JDE Security Academy

Session 08 - August 10, 2021 Compliance and Security Reporting

Every company, public and private, should be concerned with financial compliance.  The integrity and accuracy of your financial statements is paramount to the health of the organization.

JDE does not provide any tool for managing compliance, so you have to look at third party providers like ALLOut Security to fill the gaps.  We will look at how you can leverage AOS to provide Compliance and segregation of duties reporting and a robust set of reports for user access that are just not available anywhere else.

JDE Security Academy

Session 09 - September 14, 2021 Preventative Segregation of Duties

Once a user has been given too much access in the system you hope they do not abuse it before it has been identified and resolved through compliance reporting.

It is one thing to run detective-based reports to identify compliance violations after they have been given to users, but another entirely to stop those violations before they happen.  This month we will look at how to identify roles that cause SoD violations and options for controlling the assignment of those roles so you can prevent SoD issues rather than spend time hunting them down.

JDE Security Academy

Session 10 - October 12, 2021 Security Strategy, Design and Planning

We’ve covered a lot of ground in security, from security strategy all the way through preventive controls.  So far, everything has been centered around the security administrator running various processes.

Wouldn’t it be nice if you could automate a lot of that work rather than having it sitting there waiting for you to act on it?  We’ll cover what areas of the system can and should be automated AND what you need to know to make it happen.

JDE Security Academy

Session 11 - November 9, 2021 Automating Security Maintenance

Implementing a solid JDE security model requires a deliberate focus and the ability to look at it holistically, considering all the parts AND everyone that is affected by it, both end users, and administrators. 

We’ll look at security strategy, design, and planning and how you can implement a plan that will work today and for years to come.

JDE Security Academy

Session 12- December 14, 2021 Putting it all Together

Congratulations!  You have made it to the end of the Remote CNC Services JDE Security Academy.

Implementing a security model in JDE requires a lot of planning and effort to get it right.  There are many parts of the business that need to be involved and provide input or it just will not work.

In our final session of the JDE Security Academy we will be going over a high-level review of the key points, what needs to happen first, and strategies for getting all of the right players engaged in the process.

Contact Us

For More Information

Call Now ButtonCall Us Now