event-icon
Description

Session ID: 110320

Abstract: Join us for this session to learn how to make your JDE security refreshed; relevant and compliant!JDE SECURITY BEST PRACTICES: Discover how to overcome challenges; use best practices; and what design decisions might cause issues if you don't approach your security with care! Learn about traditional JDE security; UDO; role design; user provisioning or other JDE security topics.USER AUDIT: How robust is your process for terminating users? Do you have user IDs but don't know if they should still be active? Are users signing on to the system and how long it has been since last sign on? Explore use of Security History Logging to review information that enables you to keep your system current.DATA PRIVACY: Laws and regulations protecting personal data are being added worldwide. JDE Data Privacy (P01138) helps hide private data in the address book using online forms. But what about data browser inquiries? Where else does private data appear in JDE and how can you secure that data?

Objective 1: Security Best Practices:Learn what to consider for a best practice JDE security model.Expose real world challenges; options; consequences.Understand how small changes in daily security decisions & procedures can have significant impacts.

Objective 2: User Audit:Use security history to find inactive users.Turn on and capture security history. Read and understand the data. What are event types? What events are being logged?Understand the related files to be considered when disabling users.

Objective 3: Understanding Data Privacy:Security types to protect personal data. What data is personal. Go beyond the 8 fields in JDE Data Privacy. Review modules where personal data might be found. Plan and conduct a personal data protection project.

Tags