For JD Edwards EnterpriseOne

Integrated Security for ERP-Strength Integrity:
Security Manager Pro

The best thing since sliced bread

Security Manager Pro

Security Manager ProDesigned for companies who need to reduce the workload and complexity of managing frequent changes whilst ensuring that security is robust and sustainable.

Managing security in JD Edwards EnterpriseOne can be extremely complex and time-consuming, with lots of repetition and duplicated effort.

In an attempt to overcome this, many organizations use spreadsheets to manage Task Views, Roles and Security, but this approach is also beset with problems. Spreadsheets are notoriously prone to errors and it can be difficult to monitor changes made and be sure that you have the correct version, leading to the risk of inadvertently building problems into your live security table.

Let’s get rid of this bit.

A Single Source

Security Manager Pro is completely integrated into the JD Edwards environment. It comprises a set of custom programs and tables that enable you to manage your security very efficiently at the Role level.

Another heading here

You can import spreadsheets, but the data is then held in custom tables within the JD Edwards environment, which means that access to the security programs and tables can be restricted, all changes are fully auditable and you can report on them using our tools or your preferred reporting solution. You can always be confident in the integrity of your security and the accuracy of your reports.

Whether you are implementing JD Edwards EnterpriseOne 9.x from scratch or upgrading from an earlier release, Security Manager Pro can help you manage your security more efficiently yet more rigorously.

Another heading here

You can import spreadsheets, but the data is then held in custom tables within the JD Edwards environment, which means that access to the security programs and tables can be restricted, all changes are fully auditable and you can report on them using our tools or your preferred reporting solution. You can always be confident in the integrity of your security and the accuracy of your reports.

Whether you are implementing JD Edwards EnterpriseOne 9.x from scratch or upgrading from an earlier release, Security Manager Pro can help you manage your security more efficiently yet more rigorously.

Benefits

  • Easy to use
  • Automatically generate security to match your business processes
  • Simplified, seamless management of all security types, including User Defined Objects
  • Proactive Segregation of Duties checks
  • Even more benefits
  • Align security to your Task Views to make it easier to manage
  • Automatically generate security to match your business processes
  • Import existing security or spreadsheet data if required
  • Proactive Segregation of Duties checks

Features

All security settings are stored in a Prebuild table, allowing you to run automated checks to identify Segregation of Duties(SoD) or Multiple Role conflicts BEFORE you build live security. And something else

You can define security for commonly-used processes as Components then add them to as many Roles as required. If the process needs to be changed, you only need to update the Component rather than all the individual Roles affected.

In QSoftware V5.2, we have introduced a UDO Component to support the new UDO security types that were introduced in JD Edwards EnterpriseOne R9.2 for objects such as E1 Pages, One View reports, Grid Formats and Watchlists.

Users can set up reusable UDO Security Components and add them to Roles and/or Users alongside standard Security Components. All the security records are automatically written to the correct tables

Security Manager Pro identifies all the Hidden Programs and Associated Objects called by the headline applications and secures access to them

Preseeded SoD rules are provided, which you can tailor to suit your own SoD policy, or you can import rules supplied by your auditors.

Mitigations can be applied to accommodate and document temporary breaches (for example, when employees need to cover for absent staff or vacant posts).

Scan Prebuild security to identify SoD violations BEFORE you build your live security.

These queries enable you to quickly find out whether a user can access particular applications or data items, and at what level the prevailing security is held.

They display the applicable security settings at all levels (ie *Public, Role and User) and calculate the Net Effect to show you whether the User can access the specified item or not.

If you currently hold Task View, Roles or security data in spreadsheets, this can be imported into the Prebuild table. We’ve built integrity-checking into the import process to help you avoid carrying errors into your live security.

If you currently hold Task View, Roles or security data in spreadsheets, this can be imported into the Prebuild table. We’ve built integrity-checking into the import process to help you avoid carrying errors into your live security.

But it’s truly wonderful