Remote CNC Services Resources
Check out our growing list of Remote CNC Services Resources for members only
JDE Security Academy
Session 01 - January 12, 2021 Security Basics
Welcome to the Remote CNC Services JDE Security Academy!
JDE security is a powerful tool that can help ensure your users have the access they need, but do you know what security types are available and what they are used for?
Join Remote CNC Services as we delve into JDE Security to understand what security types are available, what they do, and how to leverage them to provide a secure business system. We will also look at some of the basic pitfalls and how to easily avoid them.
JDE Security Academy
Session 02 - February 9, 2021 Advanced Security Concepts
Are you having issues with users being able to do what they should have access to? What about issues with adding records from an application where they have been restricted? Are you assigning E1 pages to roles, but your users can’t see all of their assigned E1Pages?
There are some known issues with the recommended best practices that are easy to avoid, if you know how! Remote CNC Services will walk you through some security pitfalls and how to avoid or remediate them.
JDE Security Academy
Session 03 - March 9, 2021 Security Change Control I: Role Control
Security Change control has been an elusive target for JD Edwards users for many years. ALLOut Security has delivered on what most JDE users have been looking for. Remote CNC Services and ALLOut Security will walk you through the only true Security Change Control available for JDE. In Part 1, we will look at Role Control and how you can use this feature to ensure access has been appropriately reviewed and approved BEFORE it has been assigned.
We make our webinars as interactive as possible so we welcome specific questions that you would like us to address during the webinar, simply email us at: Info@RemoteCNCServices.com
JDE Security Academy
Session 04 - April 20, 2021 Security Change Control II: Promoting Security
In the previous session, we looked at the concepts of implementing some basic security change control through role review and approval. This month we’re going to extend security change control to making changes to the security within a role as well as role assignments.
How can you effectively make changes to security and user access in one environment and then promote only the approved changes to Production? We’ll lay out what you need to look at to make this happen along with the underlying configuration changes needed to support it.
JDE Security Academy
Session 05 - May 11, 2021 Row Security
Business Unit security or as it is commonly known, row security, is one of the most under-utilized aspects of JDE security, yet it provides significant value for your organization.
We will look at what you can use business unit security for and what it should not be used for. We’ll discuss best practices and give you some practical examples that you can take back to your organization.
We make our webinars as interactive as possible so we welcome specific questions that you would like us to address during the webinar, simply email us at: Info@RemoteCNCServices.com
JDE Security Academy
Session 06 - June 8, 2021 Managing UDO Security
Everyone wants to be a Citizen Developer, creating their own User Defined Objects (UDO) but how do you manage all that customization on top of your ‘regular’ development? Should you even allow everyone to BE a citizen developer or is that asking for trouble?
We will start by looking at how to enable all the UDO functionality in your environment. Next, what does it mean to be a citizen developer and how can you manage the coming flood of user generated UDOs.
Once you have this information, you can make an informed decision on who gets to be a citizen developer and how best to manage the product of their efforts.
JDE Security Academy
Session 07 - July 13, 2021 Implement Security without Impacting the Business
We’ve spent the last 6 sessions going over security strategy, design, and best practices. You should now have a solid understanding of JDE security strategies and be able to craft your own JDE security model.
Once you have a defined security strategy and desired security model ready to go, how do you actually implement it without affecting your production users? We’ll look at just how easy it is to do this and how you can plan your implementation without impacting your Production users.
JDE Security Academy
Session 08 - August 10, 2021 Compliance and Security Reporting
Every company, public and private, should be concerned with financial compliance. The integrity and accuracy of your financial statements is paramount to the health of the organization.
JDE does not provide any tool for managing compliance, so you have to look at third party providers like ALLOut Security to fill the gaps. We will look at how you can leverage AOS to provide Compliance and segregation of duties reporting and a robust set of reports for user access that are just not available anywhere else.
JDE Security Academy
Session 09 - September 14, 2021 Preventative Segregation of Duties
Once a user has been given too much access in the system you hope they do not abuse it before it has been identified and resolved through compliance reporting.
It is one thing to run detective-based reports to identify compliance violations after they have been given to users, but another entirely to stop those violations before they happen. This month we will look at how to identify roles that cause SoD violations and options for controlling the assignment of those roles so you can prevent SoD issues rather than spend time hunting them down.
JDE Security Academy
Session 10 - October 12, 2021 Security Strategy, Design and Planning
We’ve covered a lot of ground in security, from security strategy all the way through preventive controls. So far, everything has been centered around the security administrator running various processes.
Wouldn’t it be nice if you could automate a lot of that work rather than having it sitting there waiting for you to act on it? We’ll cover what areas of the system can and should be automated AND what you need to know to make it happen.