Index

A  B  C  D  E  F  H  I  J  L  M  N  O  P  R  S  T  U  W 

A

access provisioning
adding an individual user, 7.2.1
adding multiple users, 7.2.2
adding roles, 6.4, 7.1
adding users, 6.4, 7.1
batch process for creating profiles, 7.3.8
setting up roles, 7.4
setting up user profiles, 7.3
action security
adding, 19.5.3
removing, 19.5.4
reviewing, 19.5.2
setting up, 19.5
Add Data Source form, 9.4.2
Address Book Data Permissions program (P01138), 21.1
Address Book data security
creating permission list definitions, 21.3.3
creating permission list relationships, 21.4.3
setting up permission list definitions, 21.3
setting up permission list relationships, 21.4
Address Book Master table (F0101), 7.3.7
Administration Password Revisions form, 9.2.3, 9.2.8
allowed (user) actions
setting up, 24.3
Anonymous User Access Table (F00926), 7.1.2
application query security
Data Browser query security, 19.17.3
definition, 18.3.1
enabling or disabling security records, 19.17.8
removing, 19.17.7
setting up, 19.17.2
application security
adding, 19.4.4
adding exclusive application security, 19.11.2
managing, 19.4
removing, 19.4.6
removing exclusive application security, 19.11.3
reviewing, 19.4.3
understanding, 19.4.1
understanding exclusive application security, 19.11
authenticate tokens
properties of
See single sign-on, 11.1.1
understanding, 11.1.1
authentication mode, enabling for LDAP, 10.2.9
authentication security
overview, 7.4.14, 8.1
password encryption, 8.3
process flow for EnterpriseOne web client, 8.6
process flow for EnterpriseOne Windows client sign-in, 8.5
process flow for unified logon, 8.5
revising all sign-in security records, 9.2.7
security table, 8.2
authorization security
cached security information, 18.6
data privacy, 21
object-level security overview, 18.3
overview, 1.1
security model, 18.1
Security Workbench, 19
setting up Address Book data security, 21
setting up business unit security, 22
setting up object-level security, 19
setting up Solution Explorer security, 20
setting up upload and download security, 23
auxiliary security servers, 9.5.6

B

batch processes
creating profiles, 7.3.1
creating user profiles with, 7.3.8
business unit security
setting up transaction security, 22.3.2
setting up UDC sharing, 22.2.1, 22.2.2
understanding, 22.1

C

cached security information, 18.6
chart control security
adding, 19.15.3
definition, 18.3.1
removing, 19.15.4
clearing cache
web client, using Server Manager, 18.6.2
workstation client, 18.6.1
column security
deleting, 19.7.3
on a form, 19.7.1.5
on a table, 19.7.1.2
on an application, 19.7.1.3
on an application version, 19.7.1.4
options, 19.7.1.1
setting up, 19.7.2
understanding, 19.7
configuration (ini) file security
for the Deployment Server, 4.5.2
for the Enterprise Server, 4.6.2
for the EnterpriseOne HTML Server, 4.7.3
for the Transaction Server, 4.9.1
cookies
web runtime cookies, C
Copy User Records form, 9.2.3
Cross Reference program (P980011), 19.6.1

D

Data Browser security
adding, 19.18.2
granting permissions to search business views, 19.18
granting permissions to search tables, 19.18
removing, 19.18.3
understanding, 19.18.1
Data Browser Security Revisions form, 19.18.2
data privacy
see Address Book data security, 21.1
See Address Book data security, 21
data selection security
adding, 19.8.4
reviewing current settings, 19.8.3
understanding, 19.8
Data Source Revisions form, 9.4.2
data sources
managing for user security, 9.4.1
revising for user security, 9.4.4
database user accounts, D
denial-of-service attacks, 4.7.10
developer security
See OMW security, 24.1

E

encryption
data encryption, 6
database password encryption, A
of sensitive data in configuration files, 6.2
of sensitive data in RUNUBE commands, 6.1, 6.3
of sensitive data in RUNUBEXML commands, 6.1, 6.3
encryption, of passwords, 8.3
enterprise server mappings, mapping from LDAP to EnterpriseOne, 10.2.7
enterprise servers
changing the jde.ini file for security, 9.5.5
exclusive application security
adding, 19.11.2
removing, 19.11.3
understanding, 19.2
exit security
adding, 19.10.1
removing, 19.10.2
setting up, 19.10
external calls security
adding, 19.12.2
removing, 19.12.3
understanding, 19.12

F

F00092 table, 7.1.2
F00921 table, 7.1.2
F00922 table, 7.1.2
F00925 table, 7.1.2
F00926 table, 7.1.2
F0093 table, 7.1.2
F0094 table, 7.1.2
F00950 table, 18.6, 19.1.2
F0101 table, 7.3.7
F01138 table, 21.3.1
F986180 table, 11.3.1
F986181 table, 11.3.1
F986182 table, 11.3.1
F98OWSEC table, 8.2

H

hyper exit security
adding, 19.10.1
removing, 19.10.2

I

image security
See push button, link, and image security, 19.14
inclusive row security
activating, 19.2.2.1
understanding, 19.2

J

JD Edwards EnterpriseOne OMW
allowed (user) actionssettingup, 24.3
jde.ini file
changing for user security, 9.5.1
changing the timeout value, 9.5.4
changing the workstation file for security, 9.5.2
configuring settings for auxiliary security servers, 9.5.3
enabling and disabling unified logon, 9.6.2
enabling LDAP authentication mode, 10.2.9
enterprise server settings, 9.5.5
setting auxiliary security servers in the server jde.ini, 9.5.6
settings for single sign-on
modifying settings for a pre-EnterpriseOne 8.11 release, 11.6.1
sample node settings, 11.6.2

L

LDAP
application changes in LDAP-enabled EnterpriseOne
EnterpriseOne Security, 10.1.4.3
Role Relationships, 10.1.4.4
Schedule Jobs, 10.1.4.5
User Password, 10.1.4.1
User Profile Revisions, 10.1.4.2
authentication mode, 10.2.9
authentication over SSL for Windows and UNIX, 10.5.2
creating an EnterpriseOne LDAP configuration
for OID, B, B.1, B.4
understanding, 10.1
default role relationship settings, 10.3.5
default user security settings, 10.3.6
diagram of authentication process, 10.1.3.1
diagram of LDAP server data search hierarchy, 10.2.2
diagram of user data synchronization, 10.1.3.5
enterprise server mappings, 10.2.7
enterprise server mappings for OID, B.5
LDAP and EnterpriseOne relationships, 10.1.3
LDAP default user profile settings, 10.3
LDAP server settings, 10.2.6
user profile bulk synchronization, 10.4.1
using LDAP over SSL
See SSL, 10.5.1
LDAP Bulk Synchronization report (R9200040), 10.4.1
LDAP Server Configuration Workbench program (P95928), 10.1.3, B.2
Library List Control table (F0093), 7.1.2
Library List Master File table (F0094), 7.1.2
Library User table (F00092), 7.1.2
link security
See push button, link, and image security, 19.14
log files
enabling minimum level of logging, 2.5
for unified logon, 9.6.3
OMW logging, 20.1, 20.2
published business services security log information, 19.19.1.3
securing, 4.5.3
system function security information, 19.16.1

M

Maintain Business Unit Transaction Security batch application (R95301), 22.3.1.1
Maintain Permission List Relationships form, 21.4.2
media object security
adding, 19.16.3
definition, 18.3.1
removing, 19.16.4, 19.17.2
reviewing, 19.15.2, 19.16.2
understanding, 19.16
miscellaneous security
managing, 19.13.2
understanding, 19.13.1

N

Node Configuration Table (F986180), 11.3.1
Node Lifetime Configuration Table (F986182), 11.3.1
nodes
adding a node configuration, 11.3.2
for single sign-on
See single sign-on, 11.1.2
revising a node configuration, 11.3.3

O

OMW security
default allowed actions, 24.1.8
setting up allowed user actions, 24.3
setting up user roles, 24.2
user roles and allowed actions, 24.1
Oracle Internet Directory, B

P

P0092 program, 10.1.4.2
setting processing options, 7.3.7
usage, 7.1, 7.1.2, 7.2
P00950 program, 19.1.2, 20.1
P01138 program, 21.1
P91300 program, 10.1.4.5
P95130 program, 22.2.1
P95921 program, 10.1.4.4
P95922 program, 21.1
P95928 program, 10.1.3, B.2
P980011 program, 19.6.1
P98OWSEC program
setting processing options, 8.7
usage, 9.1
passwords
changing sign-in (administrators only), 9.2.8
encryption of, 6, 8.3
Permission List Relationships program (P95922), 21.1
permission lists
See Address Book data security, 21.3
principle of least privilege, 2.5
processing option security
adding, 19.8.4
removing, 19.8.5
reviewing current settings, 19.8.3
understanding, 19.8
profiles
user and role, 7.1
published business service security
adding, 19.19.3
definition, 18.3.1
deleting, 19.19.5
push button, image, and link security
definition, 18.3.1
push button, link, and image security
adding, 19.14.2
removing, 19.14.3
subforms
diagrams of security on subforms, 19.14.1.1
understanding, 19.14

R

read/write reports security
setting up, 19.13.2
understanding, 19.13.1
Remove Data Source form, 9.4.2
Role Chooser
understanding, 7.4.1.2
Role Relationships program (P95921), changes to P95921 when LDAP is enabled, 10.1.4.4
role security
copying, 19.20.1
copying a single security record, 19.20.3
deleting security on the Work with User/Role form, 19.21
roles
adding a language translation, 7.4.14
adding an environment, 7.4.5
adding environments to, 7.4.1
adding roles to a user, 7.4.11
adding users to a role, 7.4.12
copying security, 19.20.1
copying user roles, 7.4.13
creating role-to-role relationships, 7.4.1.1, 7.4.9
defining, 7.4.1
enabling the Role Chooser, 7.4.1.2
migrating
R8995921 batch process, 7.4.3.1
R89959211 batch process, 7.4.3.1
sequencing, 7.4.3.1
understanding, 7.4.3
removing data sources, 9.4.5
sequencing, 7.4.4
setting up, 7.4.1
workstation initialization file parameters for roles, 7.4.1.4
row security
removing, 19.6.5
setting up, 19.6, 19.6.4
Row Security Revisions form, 19.6.5

S

Schedule Jobs program (P91300), changes to P91300 when LDAP is enabled, 10.1.4.5
Secure Socket Layer (SSL)
See SSL, 10.5.1.2
security
configuring jde.ini settings for auxiliary security servers, 9.5.3
copying a single security record, 19.20.3
copying for a user or role, 19.20.1
for users, roles, and *PUBLIC, 18.2
introduction to EnterpriseOne security, 1.1
modifying enterprise server jde.ini security settings
see jde.ini file, 9.5.5
object-level security, 18.3
reviewing security history, 9.3
securing a user or role from all EnterpriseOne objects, 19.4.5
security types, 18.3.1
Security Workbench records reports, 25.3.1
setting up OMW security
See also OMW security, 24.1
synchronizing the security settings, 9.5.1
understanding cached security information, 18.6
Security Analyzer by Data Source Report (R98OWSECA)
running the report, 25.2.3
understanding, 25.2.1
Security Analyzer by User or Group Report (R98OWSECB), 25.2.4
Security Audit Report by Object (R009501), 25.3
Security Audit Report by Role (R009502, XJDE0002), 25.3
Security Audit Report by User (R009502, XJDE0001), 25.3
Security Detail Revisions form, 9.2.3
Security overrides
adding, 19.3.2
security principles, 2.1
Security Revisions form, 9.2.3
security server communication error, 9.5.4
security tables
accessing, 8.2
F98OWSEC table, 8.2
Security Workbench table (F00950), 18.6, 19.1.2
security types
action
See action security, 19.5
application
See application security, 19.4
column
See column security, 19.7
Data Browser
See Data Browser security, 19.18
data selection
See data selection security, 19.8
exclusive application
See application security, 19.11
exit
See exit security, 19.10
external calls
See external calls security, 19.12
media object
See media object security, 19.16
miscellaneous security
See miscellaneous security, 19.13.1
object level security types, 18.3.1
processing option
See processing option security, 19.8
push button, link, and image
See push button, link,and image security, 19.14
See also user security, 9.2
tab
See tab security, 19.9.1
Security Workbench
security records reports, 25.3.1
Security Workbench program (P00950), 19.1.2, 20.1
server jde.ini, setting auxiliary security servers, 9.5.6
services
for unified logon, 9.6.3
removing for unified logon, 9.6.4
set up allowed (user) actions, 24.3
ShowUnifiedLogon setting, 8.5.1
Sign On Security - Required/Not Required form, 9.2.3
sign-in passwords, changing, 9.2.8
sign-in security
for web users, 8.6
illustration of process flow, 8.5
password encryption, 8.3
requiring, 9.2.9
revising, 9.2.6
setting up, 8.4
understanding, 8.1
understanding unified logon
See also unified logon, 8.1
single sign-on
adding a trusted node configuration, 11.5
adding token lifetime configuration records, 11.4
authenticate token, 11.1.3
between Collaborative Portal and an EnterpriseOne application, 11.1.4
changing the status of a node, 11.3.4
configuring for a pre-EnterpriseOne 8.11 release, 11.6
configuring nodes, 11.2
configuring without a security server, 11.7
deleting a node configuration, 11.3.5
deleting token lifetime configuration records, 11.4.2
diagram of single sign-on table relationships, 11.3.1
diagram of token validation, 11.1.3
how nodes work in single sign-on, 11.1.2
understanding
See authenticate tokens, 11.1
understanding configurations, 11.3.1
Solution Explorer security
settings for, 20.1
understanding, 20.1
SSL
configuration for One View Reporting, 17.1
configuring jde.ini file for JDENET, 16.4
for JDENET on IBM i, 16.2
generating certificate for JDENET, 16.3
generating key file for JDENET, 16.3
understanding SSL for JDENET, 16.1
using LDAP over SSL, 10.5.1
using LDAP over SSL for IBM i, 10.5.1.2
using LDAP over SSL for Windows and UNIX, 10.5.1.1

T

tab security
adding, 19.9.2
removing, 19.9.3
setting up, 19.9.1
text block security
adding, 19.15.3
definition, 18.3.1
removing, 19.15.4
token lifetime configuration records
adding, 11.4
deleting, 11.4.2
transaction security
revising, 22.3.5
setting up, 22.3.2
understanding, 22.3
Trusted Node Configuration Table (F986181), 11.3.1
trusted nodes
adding, 11.5

U

UDC groups, revising for UDC sharing, 22.2.5
UDC sharing
revising UDC groups, 22.2.5
setting up, 22.2.1
understanding, 22.1.1
UDC Sharing application (P95310), 22.2.1
unified logon
enabling and disabling in the jde.ini file, 9.6.2
removing a service, 9.6.4
setting up a service, 9.6.3
ShowUnifiedLogon setting, 8.5.1
understanding, 8.1, 9.6.1
usage, 10.1.4.2
User Access Definition table (F00925), 7.1.2
User Default Revisions, changes to application when LDAP is enabled, 10.1.4.1
user defined object security, 18.5
User Display Preferences table (F00921), 7.1.2
User Display Preferences Tag table (F00922), 7.1.2
User Profile Revisions program (P0092), 7.1, 7.2
changes to P0092 when LDAP is enabled, 10.1.4.2
setting processing options, 7.3.7
tables used by, 7.1.2
user profiles
assigning business preferences to, 7.3.5
assigning environments to, 7.3.1, 7.3.4
copying, 7.3.3
creating using a batch process, 7.3.1, 7.3.8
default settings for an LDAP configuration
See LDAP, 10.3
removing data sources from, 9.4.5
understanding, 7.1, 7.3.1
user roles
See roles, 7.4.1
user security
changing the jde.ini file, 9.5.1
copying, 9.2.5, 19.20.1
copying a single security record, 19.20.3
creating, 9.2.4
deleting security on the Work with User/Role form, 19.21
managing data sources, 9.4.1
modifying the workstation jde.ini file, 9.5.2
removing data sources, 9.4.5
revising, 9.2.1, 9.2.7
revising data sources, 9.4.4
understanding, 9.1
User Security program (P98OWSEC)
setting processing options, 8.7
users
adding an individual user, 7.2
adding multiple users, 7.2.2

W

web user sign-in security
configuring jas.ini file settings, 8.6
diagram of process flow, 8.6
understanding, 8.6
Work With Distribution Lists form, 7.4.1.1
Work With Permission List Relationships form, 21.4.2
Work With Security History form, 9.3.2
Work With User Security form, 9.2.3, 9.3.2, 9.4.2
Work with User/Role form, 19.21
Work With User/Role Security form, 19.14.2
workflow status monitoring security
setting up, 19.13.2
understanding, 19.13.1