Remote CNC Services Resources

Check out our growing list of Remote CNC Services Resources for members only

JDE Security Academy

Session 01 - January 12, 2021 Security Basics

Welcome to the Remote CNC Services JDE Security Academy!  

JDE security is a powerful tool that can help ensure your users have the access they need, but do you know what security types are available and what they are used for? 

Join Remote CNC Services as we delve into JDE Security to understand what security types are available, what they do, and how to leverage them to provide a secure business system. We will also look at some of the basic pitfalls and how to easily avoid them.

JDE Security Academy

Session 02 - February 9, 2021 Advanced Security Concepts

Are you having issues with users being able to do what they should have access to?  What about issues with adding records from an application where they have been restricted?   Are you assigning E1 pages to roles, but your users can’t see all of their assigned E1Pages?

There are some known issues with the recommended best practices that are easy to avoid, if you know how!  Remote CNC Services will walk you through some security pitfalls and how to avoid or remediate them.

JDE Security Academy

Session 03 - March 9, 2021 Security Change Control I: Role Control

Security Change control has been an elusive target for JD Edwards users for many years.  ALLOut Security has delivered on what most JDE users have been looking for.  Remote CNC Services and ALLOut Security will walk you through the only true Security Change Control available for JDE.  In Part 1, we will look at Role Control and how you can use this feature to ensure access has been appropriately reviewed and approved BEFORE it has been assigned. 

We make our webinars as interactive as possible so we welcome specific questions that you would like us to address during the webinar, simply email us at:

JDE Security Academy

Session 04 - April 20, 2021 Security Change Control II: Promoting Security

In the previous session, we looked at the concepts of implementing some basic security change control through role review and approval.  This month we’re going to extend security change control to making changes to the security within a role as well as role assignments. 

How can you effectively make changes to security and user access in one environment and then promote only the approved changes to Production?  We’ll lay out what you need to look at to make this happen along with the underlying configuration changes needed to support it.

JDE Security Academy

Session 05 - May 11, 2021 Row Security

Business Unit security or as it is commonly known, row security, is one of the most under-utilized aspects of JDE security, yet it provides significant value for your organization.

We will look at what you can use business unit security for and what it should not be used for.  We’ll discuss best practices and give you some practical examples that you can take back to your organization. 

We make our webinars as interactive as possible so we welcome specific questions that you would like us to address during the webinar, simply email us at:

JDE Security Academy

Session 06 - June 8, 2021 Managing UDO Security

Everyone wants to be a Citizen Developer, creating their own User Defined Objects (UDO) but how do you manage all that customization on top of your ‘regular’ development?  Should you even allow everyone to BE a citizen developer or is that asking for trouble?

We will start by looking at how to enable all the UDO functionality in your environment.  Next, what does it mean to be a citizen developer and how can you manage the coming flood of user generated UDOs. 

Once you have this information, you can make an informed decision on  who gets to be a citizen developer and how best to manage the product of their efforts.

JDE Security Academy

Session 07 - July 13, 2021 Implement Security without Impacting the Business

We’ve spent the last 6 sessions going over security strategy, design, and best practices.  You should now have a solid understanding of JDE security strategies and be able to craft your own JDE security model.

Once you have a defined security strategy and desired security model ready to go, how do you actually implement it without affecting your production users?   We’ll look at just how easy it is to do this and how you can plan your implementation without impacting your Production users.

JDE Security Academy

Session 08 - August 10, 2021 Compliance and Security Reporting

Every company, public and private, should be concerned with financial compliance.  The integrity and accuracy of your financial statements is paramount to the health of the organization.

JDE does not provide any tool for managing compliance, so you have to look at third party providers like ALLOut Security to fill the gaps.  We will look at how you can leverage AOS to provide Compliance and segregation of duties reporting and a robust set of reports for user access that are just not available anywhere else.

JDE Security Academy

Session 09 - September 14, 2021 Preventative Segregation of Duties

Once a user has been given too much access in the system you hope they do not abuse it before it has been identified and resolved through compliance reporting.

It is one thing to run detective-based reports to identify compliance violations after they have been given to users, but another entirely to stop those violations before they happen.  This month we will look at how to identify roles that cause SoD violations and options for controlling the assignment of those roles so you can prevent SoD issues rather than spend time hunting them down.

JDE Security Academy

Session 10 - October 12, 2021 Security Strategy, Design and Planning

We’ve covered a lot of ground in security, from security strategy all the way through preventive controls.  So far, everything has been centered around the security administrator running various processes.

Wouldn’t it be nice if you could automate a lot of that work rather than having it sitting there waiting for you to act on it?  We’ll cover what areas of the system can and should be automated AND what you need to know to make it happen.

Our next JDE Security Academy course is coming soon

Countdown Expired!