Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 Tiffany Yu — Smashing Stereotypes and Building a Disability-Inclusive World 30:23
Ep 63 Securing Processing Options, Data Selection, Hyper Exits, and more
Manage episode 485419791 series 3549643
This episode is sponsored by AllOut Security.
In this episode, hosts Chandra and Paul dive deep into JD Edwards (JDE) security. The conversation explores how security settings are structured within JDE. Chandra and Paul walk listeners through the hierarchy and sequence of various security types, explaining their real-world usage, potential pitfalls, and best practices. Listeners receive candid advice on navigating security workbench complexity, understanding user/group/public security precedence, and practical ways to troubleshoot or lock down access as needed. The episode also highlights challenges like ensuring data integrity when multiple people manipulate processing options or data selections. The hosts touch on useful tools, desired system enhancements, and the importance of balancing robust security with efficient user experience.
01:08 What's new in JDE?
06:13 JD Edwards Security Hierarchy
08:30 Processing Option Security
09:25 Data Selection
15:23 Hyper Exit Security
17:07 Tab Security
22:10 Exclusive Application Security in Payroll
24:28 Midwesternism of the Day
69 episodes
Manage episode 485419791 series 3549643
This episode is sponsored by AllOut Security.
In this episode, hosts Chandra and Paul dive deep into JD Edwards (JDE) security. The conversation explores how security settings are structured within JDE. Chandra and Paul walk listeners through the hierarchy and sequence of various security types, explaining their real-world usage, potential pitfalls, and best practices. Listeners receive candid advice on navigating security workbench complexity, understanding user/group/public security precedence, and practical ways to troubleshoot or lock down access as needed. The episode also highlights challenges like ensuring data integrity when multiple people manipulate processing options or data selections. The hosts touch on useful tools, desired system enhancements, and the importance of balancing robust security with efficient user experience.
01:08 What's new in JDE?
06:13 JD Edwards Security Hierarchy
08:30 Processing Option Security
09:25 Data Selection
15:23 Hyper Exit Security
17:07 Tab Security
22:10 Exclusive Application Security in Payroll
24:28 Midwesternism of the Day
69 episodes
All episodes
×
1 Ep 66 – Security Workbench Part III – Media Objects, Push Buttons, and more. 31:33

1 Ep 64 – Live from Blueprint4D: ‘Do For vs Do With’ and Lingo Bingo 32:57

1 Ep 63 Securing Processing Options, Data Selection, Hyper Exits, and more 30:00

1 Ep 60 – Application, Action, Row and Column Security 29:12

1 Ep 59 – JDE Security – Lessons, Naming, and Dreaming States 42:21

1 Ep 57 – Interview with Chris Laping Part 2 1:02:22

1 Ep 55 - AI: Friend, Foe, or Just Another Acronym? 43:20

1 Ep 54 – History of JDE with Ward Quarles Part 2 42:32

1 Ep 52 – Discussing Virtual Batch Queues with John Holder Part II 37:34

1 Ep 51 - Virtual Batch Queues with John Holder 34:26

1 Ep 50 - Security, Objects, Packages, and Builds with Clayton Seeley 35:52

1 Ep 49 – Zero Downtime, INIs and More with Clayton Seeley 32:32

1 Ep 48 – Intro to CNC and EnterpriseOne Architecture with Clayton Seeley 29:42

1 Ep 47 – Deciphering Naming Conventions and Object Types 31:53






1 Ep 40 – De-customization with Pete Cotton Part 2 30:16

1 Ep 39 – De-customization with Pete Cotton Part 1 28:12

Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.