Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


Ep 59 – JDE Security – Lessons, Naming, and Dreaming States
Manage episode 479714858 series 3549643
Hosts Chandra and Paul continue their deep dive into JD Edwards (JDE) security with guests Andrew Ostdiek, Matthias Freitag, and Nimesh Patel. The conversation kicks off with the importance of naming conventions when managing User Defined Objects (UDOs) and how early oversight in this area can prevent disorganization and headaches down the line. The panel shares candid stories and lessons learned, emphasizing the need for governance, simplicity, and structure to avoid chaos and maintain effective security management as JDE capabilities expand. As the episode unfolds, the group discusses the increasing pressure of audits, evolving security roles, and best practices for tackling the constant changes that JDE environments demand. They stress keeping security models as straightforward as possible to make troubleshooting and implementing new requirements manageable—highlighting that complexity can become an obstacle.
06:35 Why Naming Conventions Matter
10:22 Governance: It’s Not just for Data
14:50 Continuous Security Evolution
16:33 The Cost of Complexity
19:05 Audit Pressure is Real
28:20 Have you achieved your Security Dream State?
36:35 Midwesternism of the Day
Resources:
Security Administration Guide: https://docs.oracle.com/en/applications/jd-edwards/administration/9.2.x/eotsc/toc.htm
If you have concerns or feedback on this episode or ideas for future episodes, please contact us at thejdeconnection@questoraclecommunity.org.
64 episodes
Manage episode 479714858 series 3549643
Hosts Chandra and Paul continue their deep dive into JD Edwards (JDE) security with guests Andrew Ostdiek, Matthias Freitag, and Nimesh Patel. The conversation kicks off with the importance of naming conventions when managing User Defined Objects (UDOs) and how early oversight in this area can prevent disorganization and headaches down the line. The panel shares candid stories and lessons learned, emphasizing the need for governance, simplicity, and structure to avoid chaos and maintain effective security management as JDE capabilities expand. As the episode unfolds, the group discusses the increasing pressure of audits, evolving security roles, and best practices for tackling the constant changes that JDE environments demand. They stress keeping security models as straightforward as possible to make troubleshooting and implementing new requirements manageable—highlighting that complexity can become an obstacle.
06:35 Why Naming Conventions Matter
10:22 Governance: It’s Not just for Data
14:50 Continuous Security Evolution
16:33 The Cost of Complexity
19:05 Audit Pressure is Real
28:20 Have you achieved your Security Dream State?
36:35 Midwesternism of the Day
Resources:
Security Administration Guide: https://docs.oracle.com/en/applications/jd-edwards/administration/9.2.x/eotsc/toc.htm
If you have concerns or feedback on this episode or ideas for future episodes, please contact us at thejdeconnection@questoraclecommunity.org.
64 episodes
All episodes
×


1 Ep 60 – Application, Action, Row and Column Security 29:12

1 Ep 59 – JDE Security – Lessons, Naming, and Dreaming States 42:21


1 Ep 57 – Interview with Chris Laping Part 2 1:02:22


1 Ep 55 - AI: Friend, Foe, or Just Another Acronym? 43:20

1 Ep 54 – History of JDE with Ward Quarles Part 2 42:32


1 Ep 52 – Discussing Virtual Batch Queues with John Holder Part II 37:34

1 Ep 51 - Virtual Batch Queues with John Holder 34:26

1 Ep 50 - Security, Objects, Packages, and Builds with Clayton Seeley 35:52

1 Ep 49 – Zero Downtime, INIs and More with Clayton Seeley 32:32

1 Ep 48 – Intro to CNC and EnterpriseOne Architecture with Clayton Seeley 29:42
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.