Security Management in JD Edwards World

Reduce the complexity and effort of managing security

Achieve and sustain watertight security in any JD Edwards World release

In releases prior to A9.3, managing security with the native JD Edwards World tools is very complex.

Most companies use a combination of Application Security and Navigation Control, but the hierarchical relationship of Users/Groups/*Public often results in complicated configuration and security settings. So it’s very difficult to ascertain exactly what users can access and restrict access appropriately to reduce the risk of fraud or error.

Release A9.3 introduced new security controls which can help you implement an All Doors Closed (ADC) security strategy.

Whichever World release you’re on, our tools make it much easier to find and fix vulnerabilities and implement robust security.

Preventive Segregation of Duties controls help you keep your system clean

Our tools enable you to store your Segregation of Duties (SoD) rules within your JD Edwards World environment.

Before security changes are applied, checks are carried out to assess whether the new settings violate your SoD rules, and display a warning if they do.

Multiple Roles for efficient security management in World A7.3+

A9.3 introduced Multiple Roles functionality, which makes it much easier to cater for users who need many different roles or groups. Managing security becomes a simple process of allocating and deallocating roles to users without the need to understand complex JDE security structures.

Our tools enable customers using A7.3+ to implement Multiple Roles. Users can have unlimited groups or roles and access them all via a single sign-on.

The Smart Way to Manage Security in JD Edwards World

Find out how our specialized tools and services can help you:
  • Provides a single location to manage all aspects of profiles and user security. It also allows you to implement Multiple Roles, where users can switch between roles without having to sign off and on again.
  • Analyzes your system to identify who has access to what, taking into account all possible access routes. It also gives you convenient enquiry screens to interrogate and manage your security settings.
  • Analyzes your system to identify who has access to what, taking into account all possible access routes. It also gives you convenient enquiry screens to interrogate and manage your security settings.
  • Integrated, automated Segregation of Duties reporting to help you identify violations in your system and provide evidence for your auditors.
  • Integrated, automated Segregation of Duties reporting to help you identify violations in your system and provide evidence for your auditors.