Index

A  B  C  D  E  F  H  I  J  L  M  N  O  P  R  S  T  U  W 

A

action security
adding, 7.5.3
removing, 7.5.4
reviewing, 7.5.2
setting up, 7.5
Add Data Source form, 5.4.2
Add Roles to User form, 3.5.6
Add Users to Roles form, 3.5.6
Address Book Data Permissions program (P01138), 8.1
Address Book data security
creating permission list definitions, 8.3.3
creating permission list relationships, 8.4.3
setting up permission list definitions, 8.3
setting up permission list relationships, 8.4
Address Book Master table (F0101), 3.4.5
Administration Password Revisions form, 5.2.3, 5.2.8
Anonymous User Access Table (F00926), 3.3
application failure recovery
granting user access, 10.3
setting up, 10
application security
adding, 7.4.3
adding exclusive application security, 7.11.2
managing, 7.4
removing, 7.4.5
removing exclusive application security, 7.11.3
reviewing, 7.4.2
understanding, 7.4.1
understanding exclusive application security, 7.11
authenticate tokens
properties ofsingle sign-on, 12.2
understanding, 12.2
authentication mode, enabling for LDAP, 11.2.9
auxiliary security servers, 5.5.6

B

batch processes
creating profiles, 3.4.1
creating user profiles with, 3.4.9
Business Preferences form, 3.4.4
business unit security
setting up transaction security, 9.3.2
setting up UDC sharing, 9.2.1, 9.2.2
understanding, 9.1

C

cached security information, 2.5
clearing cache
web client, 2.5.3
web client, using Server Manager, 2.5.2
workstation client, 2.5.1
Collaborative Portal EnterpriseOne Menu, configuring for single sign-onsingle sign-on, 13.8.3
column security
deleting, 7.7.3
on a form, 7.7.1.5
on a table, 7.7.1.2
on an application, 7.7.1.3
on an application version, 7.7.1.4
options, 7.7.1.1
setting up, 7.7.2
understanding, 7.7
cookies
web runtime cookies, B
Copy User Records form, 5.2.3
Copy User Roles form, 3.5.6
CRM portlets, configuring for single sign-on, 13.8.7
Cross Reference program (P980011), 7.6.1
CSS portlet, configuring for single sign-on, 13.8.5

D

Data Browser security
adding, 7.18.2
granting permissions to search business views, 7.18
granting permissions to search tables, 7.18
removing, 7.18.3
understanding, 7.18.1
Data Browser Security Revisions form, 7.18.2
data privacy
see Address Book data security
data selection security
adding, 7.8.4
reviewing current settings, 7.8.3
understanding, 7.8
Data Source Revisions form, 5.4.2
data sources
managing for user security, 5.4.1
revising for user security, 5.4.4

E

Enable/Disable Role Chooser form, 3.5.6
encryption, of passwords, 4.1.3
enterprise server mappings, mapping from LDAP to EnterpriseOne, 11.2.7
enterprise servers
changing the jde.ini file for security, 5.5.5
ENTERPRISE TIMEZONE ADJUSTMENT setting, configuring for single sign-on, 13.9.1.1
EnterpriseOne and Crystal Enterprise single sign-on
adding Crystal Enterprise task to EnterpriseOne, 17.2.2
Crystal Enterprise web server definition, 17.2.4
EnterpriseOne default domain for CMC, 17.2.3
EnterpriseOne Links portlet, configuring for single sign-on, 13.8.6
ESS portlet, configuring for single sign-on, 13.8.5
exclusive application security
adding, 7.11.2
removing, 7.11.3
understanding, 7.2
exit security
adding, 7.10.1
removing, 7.10.2
setting up, 7.10
external calls security
adding, 7.12.2
removing, 7.12.3
understanding, 7.12

F

F00092 table, 3.3
F00921 table, 3.3
F00922 table, 3.3
F00925 table, 3.3
F00926 table, 3.3
F0093 table, 3.3
F0094 table, 3.3
F00950 table, 2.5, 7.1
F0101 table, 3.4.5
F01138 table, 8.3.1
F986180 table, 13.2.1
F986181 table, 13.2.1
F986182 table, 13.2.1
F98OWSEC table, 4.1.2

H

Hosted EnterpriseOne Portlet, configuring for single sign-on, 13.8.4

I

image securitypush button, link, and image security, 7.14
inclusive row security
activating, 7.2.2.1
understanding, 7.2

J

jde.ini file
changing for user security, 5.5.1
changing the timeout value, 5.5.4
changing the workstation file for security, 5.5.2
configuring settings for auxiliary security servers, 5.5.3
enabling and disabling unified logon, 5.7.2
enabling LDAP authentication mode, 11.2.9
enterprise server settings, 5.5.5
setting auxiliary security servers in the server jde.ini, 5.5.6
settings for single sign-on
configuring the ENTERPRISEONE TIMEZONE ADJUSTMENT, 13.9.1.1
modifying settings for a pre-EnterpriseOne 8.11 release, 13.5.1
sample node settings, 13.5.2
Time Zone Setting Adjustment, 14.5.1
JDENET with SSL, 18.1
JSR168 portlet, configuring for single sign-on, 13.8.2

L

Language Role Description Revisions form, 3.5.6
LDAP
application changes in LDAP-enabled EnterpriseOne
EnterpriseOne Security, 11.1.4.3
Role Relationships, 11.1.4.4
Schedule Jobs, 11.1.4.5
User Password, 11.1.4.1
User Profile Revisions, 11.1.4.2
authentication mode, 11.2.9
authentication over SSL for Windows and UNIX, 11.5.2
creating an EnterpriseOne LDAP configuration
for OID, A, A.1, A.4
understanding, 11.1
default role relationship settings, 11.3.5
default user security settings, 11.3.6
diagram of authentication process, 11.1.3.1
diagram of LDAP server data search hierarchy, 11.2.2
diagram of user data synchronization, 11.1.3.5
enterprise server mappings, 11.2.7
enterprise server mappings for OID, A.5
LDAP and EnterpriseOne relationships, 11.1.3
LDAP default user profile settings, 11.3
LDAP server settings, 11.2.6
user profile bulk synchronization, 11.4.1
using LDAP over SSLSSL, 11.5.1
using with single sign-on, 13.9.3
LDAP Bulk Synchronization report (R9200040), 11.4.1
LDAP Server Configuration Workbench program (P95928), 11.1.3, A.2
Library List Control table (F0093), 3.3
Library List Master File table (F0094), 3.3
Library User table (F00092), 3.3
link securitypush button, link, and image security, 7.14

M

Maintain Business Unit Transaction Security batch application (R95301), 9.3.1.1
Maintain Permission List Relationships form, 8.4.2
media object security
adding, 7.16.3
removing, 7.16.4
reviewing, 7.15.2, 7.16.2
understanding, 7.16
miscellaneous security
managing, 7.13.2
understanding, 7.13.1
mod_osso, 14.2.3, 14.4.3, 14.5

N

Node Configuration Table (F986180), 13.2.1
Node Lifetime Configuration Table (F986182), 13.2.1
nodes
adding a node configuration, 13.2.2
for single sign-onsingle sign-on, 12.3
revising a node configuration, 13.2.3

O

Oracle Internet Directory, 14.2.4, 14.6, A

P

P0092 program, 11.1.4.2
setting processing options, 3.4.5
usage, 3.1, 3.3, 3.4.2
P00950 program, 6.1, 7.1
P01138 program, 8.1
P91300 program, 11.1.4.5
P95130 program, 9.2.1
P95921 program, 11.1.4.4
P95922 program, 8.1
P95928 program, 11.1.3, A.2
P980011 program, 7.6.1
P98OWSEC program
setting processing options, 4.1.7
usage, 5.1
passwords
changing sign-in (administrators only), 5.2.8
encryption of, 4.1.3
Permission List Relationships program (P95922), 8.1
permission listsAddress Book data security, 8.3
portlets, configuring for single sign-on, 13.8
processing option security
adding, 7.8.4
removing, 7.8.5
reviewing current settings, 7.8.3
understanding, 7.8
profiles
user and roleuserprofilesroles, 3.1
push button, link, and image security
adding, 7.14.2, 7.15.3
removing, 7.14.3, 7.15.4
subforms
diagrams of security on subforms, 7.14.1.1
understanding, 7.14

R

read/write reports security
setting up, 7.13.2
understanding, 7.13.1
Remove Data Source form, 5.4.2
Role Chooser
enabling, 3.5.13
understanding, 3.5.3
Role Relationships program (P95921), changes to P95921 when LDAP is enabled, 11.1.4.4
Role Revisions form, 3.5.6
role security
copying, 7.20.1
copying a single security record, 7.20.3
deleting security on the Work with User/Role form, 7.21
roles
adding a language translation, 3.5.19
adding an environment, 3.5.10
adding environments to, 3.5.1
adding roles to a user, 3.5.16
adding users to a role, 3.5.17
assigning business preferences, 3.5.11
copying security, 7.20.1
copying user roles, 3.5.18
creating, 3.5.7
creating role-to-role relationships, 3.5.2, 3.5.14
defining, 3.5.1
delegating, 3.5.15
enabling the Role Chooser, 3.5.3, 3.5.13
migrating
R8995921 batch process, 3.5.8.2
R89959211 batch process, 3.5.8.1
sequencing, 3.5.8.3
understanding, 3.5.8
modifying, 3.5.7
removing data sources, 5.4.5
sequencing, 3.5.9
setting up, 3.5.1
workstation initialization file parameters for roles, 3.5.5
row security
removing, 7.6.5
setting up, 7.6, 7.6.4
Row Security Revisions form, 7.6.5

S

Schedule Jobs program (P91300), changes to P91300 when LDAP is enabled, 11.1.4.5
Secure Socket Layer (SSL)SSL, 11.5.1.2
security
configuring jde.ini settings for auxiliary security servers, 5.5.3
copying a single security record, 7.20.3
copying for a user or role, 7.20.1
for users, roles, and *PUBLIC, 2.3
how JD Edwards EnterpriseOne checks security, 2.4
modifying enterprise server jde.ini security settingsjde.ini file, 5.5.5
object-level security, 2.2
reviewing security history, 5.3
securing a user or role from all EnterpriseOne objects, 7.4.4
Security Workbench records reports, 7.22.1
synchronizing the security settings, 5.5.1
typessecurity types, 2.2.1
understanding cached security information, 2.5
Security Analyzer by Data Source Report (R98OWSECA)
running the report, 5.6.3
understanding, 5.6.1
Security Analyzer by User or Group Report (R98OWSECB), 5.6.4
Security Audit Report by Object (R009501), 7.22
Security Audit Report by Role (R009502, XJDE0002), 7.22
Security Audit Report by User (R009502, XJDE0001), 7.22
Security Detail Revisions form, 5.2.3
Security overrides
adding, 7.3.3
Security Revisions form, 5.2.3
security server communication error, 5.5.4
security tables
accessing, 4.1.2
F98OWSEC table, 4.1.2
Security Workbench table (F00950), 2.5, 7.1
security types
actionaction security, 7.5
applicationapplicationsecurity, 7.4
columncolumn security, 7.7
Data BrowserDataBrowser security, 7.18
data selectiondata selectionsecurity, 7.8
exclusive applicationapplication security, 7.11
exitexit security, 7.10
external callsexternalcalls security, 7.12
media objectmedia object security, 7.16
miscellaneous securitymiscellaneous security, 7.13.1
object level security types, 2.2.1
processing option processingoption security, 7.8
push button, link, and imagepush button, link,and image security, 7.14
tabtab security, 7.9.1
useruser security, 5.2
Security Workbench
security records reports, 7.22.1
Security Workbench program (P00950), 6.1, 7.1
server jde.ini, setting auxiliary security servers, 5.5.6
services
for unified logon, 5.7.3
removing for unified logon, 5.7.4
ShowUnifiedLogon setting, 4.1.5.1
Sign On Security - Required/Not Required form, 5.2.3
sign-in passwords, changing, 5.2.8
sign-in security
for web users, 4.1.6
illustration of process flow, 4.1.5
password encryption, 4.1.3
requiring, 5.2.9
revising, 5.2.6
setting up, 4.1.4
understanding, 4, 4.1.1
understanding unified logonunified logon, 4.1.1
single sign-on
adding a trusted node configuration, 13.4
adding token lifetime configuration records, 13.3
authenticate token, 12.4
between Collaborative Portal and an EnterpriseOne application, 12.5.2
between Enterprise Portal and an EnterpriseOne application, 12.5.1
between Enterprise Portal and EnterpriseOne, 13.9
between EnterpriseOne and Crystal Enterprise single sign-on, 17
between EnterpriseOne and Oracle, 14.1
diagram of, 14.4
jas.ini settings, 14.4.2.1
changing the status of a node, 13.2.4
configuring for a pre-EnterpriseOne 8.11 release, 13.5
configuring for Collaborative Portal, 13.7
configuring nodes, 13.1
configuring TokenGen.ini settings for portlets, 13.8.1
configuring without a security server, 13.6
deleting a node configuration, 13.2.5
deleting token lifetime configuration records, 13.3.2
diagram of single sign-on table relationships, 13.2.1
diagram of token validation, 12.4
for portlets, 13.8
how nodes work in single sign-on, 12.3
synchronizing user mappings between LDAP and EnterpriseOne while using LDAP authentication, 13.9.4
understanding configurations, 13.2.1
understandingauthenticatetokens, 12.1
using with LDAP, 13.9.3
viewing user ID mapping when using LDAP, 13.9.5
Solution Explorer security
settings for, 6.1
understanding, 6.1
SSL
for JDENET, 18.1
using LDAP over SSL, 11.5.1
using LDAP over SSL for iSeries, 11.5.1.2
using LDAP over SSL for Windows and UNIX, 11.5.1.1
SSS portlet, configuring for single sign-on, 13.8.5
Synchronize the LDAP and EnterpriseOne Database (R9200040), 13.9.4

T

tab security
adding, 7.9.2
removing, 7.9.3
setting up, 7.9.1
token lifetime configuration records
adding, 13.3
deleting, 13.3.2
TokenGen.ini, configuring settings for single sign-on for portlets, 13.8.1
transaction security
revising, 9.3.5
setting up, 9.3.2
understanding, 9.3
Trusted Node Configuration Table (F986181), 13.2.1
trusted nodes
adding, 13.4

U

UDC groups, revising for UDC sharing, 9.2.5
UDC sharing
revising UDC groups, 9.2.5
setting up, 9.2.1
understanding, 9.1.1
UDC Sharing application (P95130), 9.2.1
UDCs
for the Crystal Enterprise Task Type, 17.2.1
unified logon
enabling and disabling in the jde.ini file, 5.7.2
removing a service, 5.7.4
setting up a service, 5.7.3
ShowUnifiedLogon setting, 4.1.5.1
understanding, 4.1.1, 5.7.1
usage, 11.1.4.2
User Access Definition table (F00925), 3.3
User Default Revisions, changes to application when LDAP is enabled, 11.1.4.1
User Display Preferences table (F00921), 3.3
User Display Preferences Tag table (F00922), 3.3
User Environment Revisions form, 3.4.4, 3.5.6
User Profile Revisions form, 3.4.4, 3.5.6
User Profile Revisions program (P0092), 3.1, 3.4.2
changes to P0092 when LDAP is enabled, 11.1.4.2
setting processing options, 3.4.5
tables used by, 3.3
user profiles
assigning business preferences to, 3.4.8
assigning environments to, 3.4.1
copying, 3.4.7
creating using a batch process, 3.4.1, 3.4.9
default settings for an LDAP configurationLDAP, 11.3
removing data sources from, 5.4.5
understanding, 3.1, 3.4.1
User Profiles Revision form, 3.4.6
user rolesroles, 3.5.1
user security
changing the jde.ini file, 5.5.1
copying, 5.2.5, 7.20.1
copying a single security record, 7.20.3
creating, 5.2.4
deleting security on the Work with User/Role form, 7.21
managing data sources, 5.4.1
modifying the workstation jde.ini file, 5.5.2
removing data sources, 5.4.5
revising, 5.2.1, 5.2.7
revising data sources, 5.4.4
understanding, 5.1
User Security program (P98OWSEC)
setting processing options, 4.1.7
usage, 4
users
adding an individual user, 3.4.2
adding multiple users, 3.4.2.2

W

web user sign-in security
configuring jas.ini file settings, 4.1.6
diagram of process flow, 4.1.6
understanding, 4.1.6
Work With Delegation Relationships form, 3.5.6
Work With Distribution Lists form, 3.5.2, 3.5.6
Work With Language Role Descriptions form, 3.5.6
Work With Permission List Relationships form, 8.4.2
Work With Role Relationships form, 3.5.6
Work With Role Sequences form, 3.5.6
Work With Security History form, 5.3.2
Work With User Security form, 5.2.3, 5.3.2, 5.4.2
Work with User/Role form, 7.21
Work With User/Role Profiles form, 3.4.4, 3.5.6
Work With User/Role Security form, 7.14.2, 7.15.3
workflow status monitoring security
setting up, 7.13.2
understanding, 7.13.1