Skip Headers
JD Edwards World Technical Foundation Guide
Release A9.3.x

E21958-06
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
PDF · Mobi · ePub

19 Work with User Profiles

This chapter contains these topics:

19.1 Defining User Profiles

To define your user profiles for the JD Edwards World software, complete the following tasks:

  • Review the IBM user profile

  • Define JD Edwards World user profiles

To review the IBM User Profile

  1. On the command line, enter DSPUSRPRF USRPRF(xxx), where xxx is a user profile. If you copy a JD Edwards user profile, you can use Function Key F8=IBM Profile from the Copy User/Group Security video. The IBM Display User Profile or Work with User Profiles screen displays.

    Figure 19-1 Display User Profile screen

    Description of Figure 19-1 follows
    Description of "Figure 19-1 Display User Profile screen"

  2. Ensure that the Group profile field is JDE.

    You must use *JOBCTL in the Special authority field if the user is compiling programs or manipulating the distribution or human resource subsystems. If the user has no need to use distribution or human resource subsystems, *NONE is acceptable.

  3. Page down to view the next portion of Display User Profile.

    Figure 19-2 Display User Profile (J98INITA) screen

    Description of Figure 19-2 follows
    Description of "Figure 19-2 Display User Profile (J98INITA) screen"

  4. Ensure that the Initial Program field is J98INITA, using the object library.

    When the Limit Capabilities field is set to *YES on the IBM User Profile, it overrides a Y setting in the Allow Command Entry field in the User Information program (P0092N) on the Security Officer menu (G9401). This restricts the use of commands on the Command Line, Group Jobs, and in Software Versions Repository (SVR). It is recommended that you review all IBM user profiles that access JD Edwards World software. Set the Limit Capabilities field to *NO or *PARTIAL to allow the user to run commands from these options. If some users' profiles have the Limit Capabilities field set to *YES, then you can set up the system to allow them to execute certain commands by entering CHGCMD on the Command Line. For example, to allow users to execute the CHGOBJ command, enter CHGCMD CHGOBJ on the Command Line and then set the Allow Limit Users (ALWLMTUSR) field to *YES.

  5. Page down to view the next portion of Display User Profile.

    Figure 19-3 Display User Profile (Limit Capabilities) screen

    Description of Figure 19-3 follows
    Description of "Figure 19-3 Display User Profile (Limit Capabilities) screen"

  6. Page down to view the next portion of Display User Profile.

    Figure 19-4 Display User Profile (Library) screen

    Description of Figure 19-4 follows
    Description of "Figure 19-4 Display User Profile (Library) screen"

19.1.1 Required IBM Object Authority for Users

All users must have *USE authority to the following commands to function properly within JD Edwards World. The JDE profile has *USE authority. JD Edwards World recommends that you use JDE as the Group Profile on the user's IBM profile.

Use the DSPOBJAUT command to view the object authority.

IBM Commands A - C IBM Commands D - O IBM Commands R - W
ALCOBJ

ADDJOBQE

ADDLIBLE

ADDMSGE

ADDRTGE

CHGJOBD

CHGLIBL

CHGOBJOWN

CHGPGMVAR

CRTDTAARA

CRTJOBD

CRTJOBQ

CRTCLPGM

CRTCLS

CRTDSPF

CRTDTAQ

CRTLF

CRTLIB

CRTMSGF

CRTMSGQ

CRTPF

CRTPRTF

CRTRPGPGM

CRTRPTPGM

CRTSBSD

CRTSRCPF

DLCOBJ

DLTF

DLTPGM

DSPBKP

DSPDBG

DSPDBR

DSPDEVD

DSPFD

DSPFFD

DSPNETA

DSPPGMVAR

DSPSYSVAL

DUPDKT

ENDDBG

INZDKT

MONMSG

MOVOBJ

OVRDBF

OVRDKTF

OVRDSPF

OVRPRTF

RGZPFM

RMVBKP

RMVLIBLE

RSTLIB

RSTOBJ

RTVJOBA

RTVMSG

SAVLIB

SAVOBJ

SAVSYS

SBMJOB

SNDBRKMSG

SNDMSG

SNDPGMMSG

STRDBG

STRSBS

STRSEU

WRKCFGSTS


Other objects include:

Object Type Authority Required
QWCCLFEC

QGPL

QADSPOBJ

QAFDMBR

*PGM

*LIB

*FILE

*FILE

*USE

*USE, *OBJMGT, and *ADD

*ALL

*ALL


To define JD Edwards World user profiles

Navigation

From Master Directory (G), choose Hidden Selection 27

From Advanced & Technical Operations (G9), choose Security & System Admin

From Security & System Administration (G94), choose Security Officer

From Security Officer (G9401), choose User Information

Use the User Information screen to establish profile defaults for each user and their library list and establish JD Edwards World security at the user level.

  1. After reading the menu message, press F6.

    User Information Revisions displays.

    Figure 19-5 User Information screen

    Description of Figure 19-5 follows
    Description of "Figure 19-5 User Information screen"

    Field Explanation
    User ID The IBM-defined user profile, or a Group profile – group profiles must be prefixed with an ”*”.
    Description The description for a User ID records defaults from the corresponding IBM User Profile. You can use the User Information Revisions window to enter a description for a Group ID record. The system stores the description in the F0092T Tag file.
    Menu Mask You can replace Menu Mask fields with Advanced Menu Security on a user-by-user basis, using the Advanced Menu Security Y/N field.
    Authorization Mask This is Menu Mask A. Complete with a user-defined value. This field exists in the JD Edwards World user profile and within each menu and menu selection. When security is active, the value of this field in the user profile is compared with the value in the corresponding menu lock. Comparison of the values in the user profile and the menu lock is hierarchical.

    A blank represents the highest level of authority. A through Z are the next levels, then 0 through 9. The user's value must be greater than or equal to that of the menu lock in the corresponding menu field to access the menu.

    Job Mask This is Menu Mask J. Complete with a user-defined, alphanumeric value. This field exists in the JD Edwards World user profile and within each menu and menu selection record. When security is active, the value of this field in the user profile is compared with the value in the corresponding menu lock. The values must be equal in the user profile and menu lock to access the menu. A blank in this field in the user profile gives the user all authority. A blank in this field in the menu record indicates no security exists on this menu.
    Knowledge Mask This is Menu Mask K. Complete with a user-defined value. This field exists in the JD Edwards World user profile and within each menu and menu selection. When security is active, the value of this field in the user profile is compared with the value in the corresponding menu lock. Comparison of the values in the user profile and the menu lock is hierarchical.

    A blank represents the highest level of authority. A through Z are the next levels, then 0 through 9. The user's value must be greater than or equal to that of the menu lock in the corresponding menu field to access the menu.

    Department Mask This is Menu Mask DP. Complete with a two-character, user-defined, alphanumeric value. This field exists in the JD Edwards World user profile and within each menu and menu selection record. When security is active, the value of this field in the user profile is compared with the value in the corresponding menu lock. The values must be equal in the user profile and menu lock to access the menu. A blank in this field in the user profile gives the user all authority. A blank in this field in the menu record indicates no security exists on this menu.
    Future Use Mask This is Menu Mask F. Complete with a user-defined, alphanumeric value. This field exists in the JD Edwards World user profile and within each menu and menu selection record. When security is active, the value of this field in the user profile is compared with the value in the corresponding menu lock. The values must be equal in the user profile and menu lock to access the menu. A blank in this field in the user profile gives the user all authority. A blank in this field in the menu record indicates no security exists on this menu.
    Advanced Menu Security Flag Use the Advanced Menu Security flag to specify whether the user is using the Advanced Menu Security feature. You can use advanced menu security in place of menu mask fields on a user-by-user basis.

    This data field allows the values of blank, Y or N.

    Y : Use advanced menu security for the user.

    N : Use menu masking for the user.

    Menu Travel Flag Used to control menu traveling within the JD Edwards World menu program for an individual user.

    This data field allows the values of blank or ”Y”.

    blank – Indicates the user is allowed to menu travel.

    Y Indicates the user is allowed to menu travel.

    N Indicates that the user is not allowed to menu travel.

    Initial Program The name of a program that will be called when the user signs on to JD Edwards World software. This program should never be J98INITA.
    Command Entry Flag Used to control use of command entry in the JD Edwards World menu program for an individual user. You must also alter the IBM User Profile and Hidden Selections to eliminate a Command Line.

    This data field allows the values of Y or N.

    Y – Indicates the user has command entry.

    N – Indicates the user does NOT have authority to command entry.

    Initial Menu to Execute The menu name of the first menu the User will see when signing on.
    Level of Display The Level of Display field contains a number or letter identifying the level at which menus and processing options are displayed. The levels of display are as follows:

    A – Product Groups (e.g. Job Cost, Manufacturing)

    B – Major Products (e.g. GL, AP)

    1 – Basic Operations

    2 – Intermediate Operations

    3 – Advanced Operations

    4 – Computer Operations

    5 – Programmers

    6 – Sr. Programmers Use F16 on any menu and skip to menu G09 (Level 9) for an illustrative example.

    User Class/Group A profile used to classify users into groups for security purposes. Some rules for creating a User Class/Group are as follows:
    • The 'Class/Group' profile must begin with * so that it does not conflict with any IBM profiles.

    • The 'User Class/Group' field must be blank for a group profile.

    User Type Defines the list of data files that are to be pre-opened at sign-on time. JD Edwards World provides 14 model user types.
    Batch Job Queue The computer waiting line that a particular job passes through. If blank, it defaults to the job queue specified in the user's job description.
    Job Scheduling Priority The scheduling priority parameters specify the priority values to be used by the system to determine the order in which the jobs are selected for processing. Each job is given a scheduling priority that is used for both job selection and spooled file output. The job scheduling priority is specified by the JOBPTY parameter in commands like CHGJOBD and CRTJOBD. The priority value may range from 1 - 9 with 1 being the highest priority and 9 being the lowest priority. You cannot schedule a job with authority greater than your own.
    Output Queue The waiting area a job goes to after it has processed. Output Queues are sometimes attached to printers. If an OUTQ is not specified, it will default from the user's job description. You can use *WKSTN, *USRPRF, and *DEVICE.
    Output Priority The scheduling priority parameters specify the priority values to be used by the system to determine the order in which spool files will be selected for processing. Each job is given a scheduling priority that is used for both job selection and spooled file output. The job scheduling priority is specified by the JOBPTY parameter in commands like CHGJOBD and CRTJOBD. The priority value may range from 1 - 9 with 1 being the highest priority and 9 being the lowest priority. You cannot schedule a job with authority greater than your own.
    Print File Library Specifies a particular library name containing alternate report files for different printer device parameters; i.e. printing uncompressed on the IBM 3262 vs. printing compressed (8 LPI) on the IBM 5224 or 5225.
    Current Library Name of the library to be assigned to the user's job as the current library. A library which is searched immediately before the users' library. JD Edwards World does not use Current libraries.
    Logging Level Specifies one of five logging levels (0 - 4) that specifies the message logging level used for job messages produced when this job description is used.

    (See CL Manual for detailed explanations of each logging level.)

    Set Attention Program Specifies the name of an executable program that can be set to execute a job or go to a menu when you press the attention key (Esc key on a PC keyboard). This name must follow the standard System i naming conventions and all of JD Edwards World standards for program names (that is, the beginning character must be a J, P, or X).

    Screen-specific information

    • The program ID must be for an interactive program. You cannot use this for a batch job. You must also ensure that the program is able to run with no parameters, as that is how the system calls the program.

    • The menu ID you enter in this field must be proceeded by an *, for example *G82.

    • The limitation on Group Job menus is 15 selections, therefore, the first 15 interactive menus selections appear.

    • A Command Line is at the bottom of the Group Jobs window (J98GRP) to use for commands, Fast Path commands, and Hidden Selections.

    You must sign off and sign on to the JD Edwards World environment after changing the user profile.

    Address Number A number that identifies an entry in the Address Book system. Use this number to identify employees, applicants, participants, customers, suppliers, tenants, special mailing addresses, and so on. If the Address Number field is populated, the Alpha Name from the Address Book file F0101 is displayed.

    A tag file, F0092T, stores the following information:

    • Description for a Group ID record

    • Advanced Menu Security Flag

    Note that Fast Path field is no longer displayed on the screen, but still resides in the file for compatibility with JD Edwards World releases prior to A9.3

    F5 – Copy User Information.

    See Section 19.6, "Copying User/Group Security."

    F8 – Display Audit Information Window is used to retrieve Audit information for a User Profile record.

    F9 – Library List Inquiry is used to access the Library List Control Inquiry screen. Use this screen to view all of the libraries associated with a particular User Profile.

    F14 – Allows you to input or view Generic Text.

  2. Choose User Display Preferences (F6) to display language and display preferences at the User level. The User Display Pref Revisions screen displays.

    Figure 19-6 User Display Pref Revisions screen

    Description of Figure 19-6 follows
    Description of "Figure 19-6 User Display Pref Revisions screen"

    Field Explanation
    User ID The IBM-defined user profile.
    Company A code that identifies a specific organization, fund, entity, and so on. This code must already exist in the Company Constants file (F0010). It must identify a reporting entity that has a complete balance sheet. At this level, you can have intercompany transactions.

    You can use company 00000 for default values, such as dates and automatic accounting instructions (AAIs). You cannot use it for transaction entries.

    Language A user defined code (system 01/type LP) that specifies a language to use in screens and printed reports. If you leave the Language field blank, the system uses the language you specify in your user profile. If you do not specify a language in your user profile, the system uses the default language for the system.

    Before any translations can appear, a language code must exist at either the system level or in your user profile.

    Version Prefix Identifies a default prefix to assign when creating DREAM Writer versions. Versions can then be suffixed with a number between 0001 and 9999.
    Date Format This is the format of a date as stored in the database.
    Date Separator Character The character entered in this field will be used to separate the month, day, and year of a given date.

    Note:

    • If an asterisk is entered (*), a blank will be used for the date separator.

    • If left blank, the system value will be used for the date separator.

    Decimal Format Character The character entered in this field will be used to signify the fractions from whole numbers - the positions to the left of the decimal.

    If left blank, the system value will be used as the default.

    Currency Symbol The character entered in this field will be used to signify the currency symbol that will be attached to certain numeric values.

    *** This field will be implemented later ***

    Country The user's country. If you use any of J.D. Edwards localized systems (systems 74, 75, or 76), the country code that you specify activates the country-server for that country.
    Emulator Type The emulator type controls system behavior when accessing email or URL addresses.

    F6 – Import/Export Preferences: Use this function key to specify preferences at the User level for using Import/Export.

  3. Press Enter to create your JD Edwards World user profile.

    Note:

    The program creates the user's job description with the same name as the user ID. Optionally, the program creates an output queue for the new user. If an output queue is created, it has the same name as the Uuer ID.
    • If the user who is entering the profiles does not have authority for the CRTJOBD, CHGJOBD or DLTJOBD commands, the system issues a warning. However, the program adds the record to the User Information files (F0092 and F0092T), but does not create a job description for this user.

    • The program also creates the Inquiry Message Reply parameter for the user's job description to *SYSRPYL, to instruct the system to use the reply list entries.

19.2 Deleting a User or Group

The Delete User/Group Security program is a full delete program for JD Edwards user profiles and security records. You can delete either individual user profiles or group profiles. To do so, specify a 'D' in the Action Code field on the User Information screen.

When you delete a user or group profile, objects owned by that profile may be deleted, versions may be unlocked or the ownership of versions may be changed to another user or group. All security records coded to the user or group profile are deleted.

Figure 19-7 Delete User/Group screen

Description of Figure 19-7 follows
Description of "Figure 19-7 Delete User/Group screen"

You can access Delete User/Group (P00922D) from User Information or from the Security Workbench. The calling program provides the user or group profile to be deleted. You fill in the parameters for how to disposition report versions etc.

If you are deleting an individual user profile, the IBM User Profile is not automatically deleted or deactivated by this program. To make changes to the IBM user profile, access the IBM 'Work with User Profiles' video.

The Delete User/Group screen enables you to specify the following information:

Versions Owned

You can specify how you want report versions to be dispositioned when you delete a user or group profile:

  • Remove versions belonging to the User/Group profile

  • Unlock versions (set the User Exclusive Flag to 0)

  • Change ownership of versions to another User/Group profile

Unattended Operations

You can specify whether to suspend Sleeper jobs for this user or group or change the ownership to another user or group profile.

Delete Output Queue

You can specify whether to delete an IBM output queue, if there is an output queue by that user profile name.

Function Keys

F6 - Continue - when the video parameters are ready, press F6 to process the delete. The delete will not be done until you press F6.

F8 - IBM Profile - if you are authorized, use this option to access the IBM 'Work with User Profiles' program to remove or deactivate the IBM User Profile.

19.3 Setting Up Your Initial Program (J98INITA)

Navigation

From Advanced & Technical Operations (G9), choose Security & System Admin

From Security & System Administration (G94), choose Security Officer

From Security Officer (G9401), choose User Signon List Revisions

The J98INITA program is your access to the JD Edwards World software. Your users can receive a multiple environment list where they have a choice of which library list they want to set for the JD Edwards World software.

Using J98INITA allows you to:

  • Establish a library list once and then attach multiple users to it.

  • Create multiple environments where one user profile has a choice of multiple environments.

  • Transfer easily among your software environments.

For example, you can create a custom master menu to access JD Edwards World software, your company software, and other purchased software. You then exit JD Edwards World software and return to your custom master menu without redefining your environment.

The Library List Selection screen shows a sample selection of environments:

Figure 19-8 Library List Selection screen

Description of Figure 19-8 follows
Description of "Figure 19-8 Library List Selection screen"

The Library List Selection screen displays immediately after sign-on or when the user takes hidden selection 30 from any JD Edwards World menu.

Starting with the IBM Operating System V5R1, there is a new data area, QLILMTLIBL, which resides in QUSRSYS library. The existence of this data area limits the number of libraries in the user part of the library list to 25 for all jobs on the system. Deleting or renaming this data area allows users to have up to 250 libraries in their user portion of the library list.

An additional data area was introduced with the V5R2 IBM Operating System, QLMTUSRLIB, exists with a 0 (zero) in the first position set, allowing up to 250 libraries in the user portion of the library list. Changing this value to a 1 restricts the number of libraries to 25.

The Library List Revisions program (P0094) searches the system to determine if the QLILMTLIBL data area exists. If it exists, the program then displays a maximum of 25 entry fields for libraries.

The screen below will display for a setup of a maximum of 250 libraries:

Figure 19-9 Library List Revisions screen

Description of Figure 19-9 follows
Description of "Figure 19-9 Library List Revisions screen"

If this data area does not exist, a maximum of 250 entry fields for libraries displays (as shown in the steps below).

If you intend to change the mode to 250 library lists, you need to delete or rename the data area QLILMTLIBL. If you are on V5R2 or above also verify that the first position in data area QLMTUSRLIB is set to '0' (zero).

To set up the J98INITA program

  1. On Library List Revisions, confirm that specific files are in the same library.

    If you established a Security Library when creating your environments, this step should already be complete. If not, verify that F0092, F0092T, F00921, F0093, F0093T, F0094, F00944, F0095, F00926, F009261, F009262, F009264 and all associated logical files are in the same library.

  2. Add each library list and establish the proper order of libraries for each library list. Ensure that QTEMP comes before QGPL in your library list.

  3. After you make the appropriate entries, press Enter. Exit (F3) the program.

    Field Explanation
    Library List Name The name associated with a specific list of libraries. The J98INITA initial program uses the library list names to control environments that a user can sign on to. These configurations of library lists are maintained in the Library List Master file (F0094).
    Description A user defined name or remark that describes a field.
    Program ID The RPG program name defined in the Software Versions Repository Master file.

    See also JD Edwards Standards.

    T SS XXX

    T – Member type, for example, P for program, R for report.

    SS – System number, for example, 01 for Address Book

    XXX – Specific member ID number.

    Library List Enter up to 25 or up to 250 library names depending on your settings. The libraries are numbered sequentially by 10. You can resequence the display, add libraries, and delete libraries by changing the sequence numbers or clearing the fields.

  4. To assign the appropriate library list to each user, choose User Signon List Revisions from the Security Officer menu (G9401).

    Figure 19-10 User Signon List Revisions screen

    Description of Figure 19-10 follows
    Description of "Figure 19-10 User Signon List Revisions screen"

  5. Enter the library lists you want to allow the user to access and press Enter.

    The Default Role for the User (if one exists) for each Library List is retrieved from the F0093T file and displayed.

    F11 – Exit to the Role Maintenance screen.

    F3 – To Exit the program.

    Field Explanation
    Sequence Number A number that the system uses to sequence information.
    Library List Name The name associated with a specific list of libraries. The J98INITA initial program uses the library list names to control environments that a user can sign on to. These configurations of library lists are maintained in the Library List Master file (F0094).
    Menu Identification The menu name of the first menu the User will see when signing on.
    Description A user defined name or remark that describes a field.
    Default Role The default role for the user.

19.3.1 What You Should Know About

Topic Description
J98INITA Because J98INITA duplicates and changes the job description from QGPL to QTEMP, you must first authorize all users to the CRTDUPOBJ and the CHGJOBD commands.

For information regarding custom initial programs, see Appendix A, "Custom Initial Programs."


19.4 Working with Library Lists

Based on your user setup, the JD Edwards World sign on process determines which libraries the system assigns to you during your user session. This set of libraries is known as a library list. The library list specifies which files, programs, videos, and so forth the system accesses first.

It is possible for two objects with the same name to exist in different libraries in the library list. The system searches the libraries in the order set in the library list (top to bottom). You can control which objects the system uses by changing the order of the libraries in the list or by deleting or adding libraries to the list.

For example, the library list can contain two versions of a program, the standard JD Edwards World program and a custom version. These programs have the same name, such as P42565, but the custom version resides in a custom object library. The custom object library is higher in the library list than the JDFOBJ object library containing the standard program from JD Edwards World. When you select the program, the system searches the library list and retrieves the first occurrence, which is the custom program because it is higher in the list.

You can use the following commands to work with library lists:

DSPLIBL - Display Library List: Use this command to determine a user's library list and/or to investigate whether there is a custom library in the list. On the Command Line, enter DSPLIBL. Hidden Selection 38 also executes this command.

ADDLIBLE - Add Library List Entry: Use this command to add a library to the user portion of the library list. On the Command Line, enter ADDLIBLE libname, where libname is the name of the library you want to add. The system adds the library at the top of the list and it remains here until you remove it or until you sign off. Using F4, the List Position field allows you to set the library in the first or last position of your library list.

RMVLIBLE - Remove Library List Entry: Use this command to remove a library from the user portion of the library list. You can also use this command to temporarily remove a library, such as a custom object library, that is normally in the library list when a user logs on. On the Command Line, enter RMVLIBLE libname, where libname is the name of the library you want to remove. Your changes are only effective for the current session and the libraries are available the next time you sign on to the system.

EDTLIBL - Edit Library List: Use this command to edit the current user portion of the library list. You can move, add, or delete libraries from the list. On the Command Line, enter EDTLIBL. All the libraries and their sequence numbers display. To change the position of a library in the list, enter a new sequence number over the current number. To add a library, enter the library name and the sequence number. To remove a library, clear the library name. Your changes are only effective for the current session and do not exist the next time you sign on to the system.

19.4.1 Objects to Exclude from the Mirroring Process

When mirroring from one IBM i to another, you must exclude the following JD Edwards World objects. Failure to do so will result in issues after you sign on to the mirroring machine.

Area Objects
Data Areas JDEDT1

JDEDT2

QJDF

User Indexes JD Edwards World_IDX_1

JD Edwards World_IDX_2

JD Edwards World_IDX_3

JD Edwards World_IDX_4

JD Edwards World_IDX_5

JD Edwards World_IDX_6

Programs X98UBP

X0001M

Libraries SEALMS
Files F99LSF

19.4.2 Working With Invalid Library List or Library List Not Set Correctly Error Messages

To work with invalid library list or library list not set correctly error messages

  1. On the Command Line, enter DSPUSRPRF and a user profile, to display the IBM user profile.

  2. Page down and verify the Initial Program field contains J98INITA.

    If the Initial Program field does not display either of these programs, determine which program the system is using.

  3. Identify the name of the library in the Library field from which the system is calling the J98INITA program.

    The library name is in the Library field below the Initial Program field. This is the library from which the system reads the QJDF data area.

  4. On the Command Line, enter DSPDTAARA and the press F4.

  5. On Display Data Area, enter QJDF in the following field:

    • Data area

  6. Enter the name of the library in the Library field that you identified in the previous step and press Enter.

    The Display Data Area screen redisplays with QJDF data area.

  7. Identify the name of the library at the end of Offset line 150 Software Data File Library.

  8. Verify this is the correct library for the User Information (F0092) file.

    This library is usually the Security library or the Common library if you do not have a Security library.

  9. On the Command Line, enter DSPPFM and the press F4.

  10. On Display Physical File Member, enter F0092 in the following field.

    • File

  11. Enter the name of the library in the Library field that you identified in the previous step.

  12. On Display Physical File Member, enter the user profile in the Find field to locate the user profile and press F4.

    If the system does not find the user profile in the F0092 file, add the record to the file. You can use Hidden Selection 40 to verify the file layout.

  13. Verify that there is an IBM Job Description for the user profile.

    If no Job Description exists for the user profile, you must create one.

  14. On the Command Line, enter CHGJOBD and press F4.

    On Change Job Description, the value in the Job description field is the user name of the profile you are confirming. The library is QGPL.

  15. On Change Job Description, press Enter to display the job description.

  16. Press F10 for Additional Parameters.

  17. Page down and locate the value in the Initial library list field. The value should be *NONE or the library list in this filed should not contain access JD Edwards World Software.

  18. Verify the following:

    • Access the User Signon List Revisions program on the Security Officer menu (G9401) to confirm the library lists for the user. Access the Library List Revisions program on the Security Officer menu (G9401) to review the list of libraries for each library list the user has.

J98INITA Sign On Messages

When J98INITA is the initial program, you might receive either of the following messages when you attempt to sign on to a JD Edwards World environment:

Message Description
Conversion did not occur message The user's Coded Character Set Identifier might be set to 65535 (do not translate) or *SYSVAL. If this field is set to *SYSVAL and you receive this message, then the QCCSID system value is set to 65535. This message generally does not cause a problem.
F0005 cannot be found message The J98INITVL program adds the libraries from position 701 in the QJDF data area to the user's IBM profile. The J98INITVL program then opens the F0005, F9220, and F9200 files for shared processing. If the F0005 is not in one of the libraries which were added to the user's library list, the system generates this message.

19.5 Setting Up Pre-Open Files

The pre-open of database files for users at time of sign-on is a performance consideration. How often do your users sign-on and -off? Will this process of pre-opens be utilized in such a nature to help or hinder performance?

You need to look at pre-opens like a house full of doors. You open the front door and that opens all the doors in the house, so as when you go room to room, you do not have to stop to open each of the doors. However, if you leave all the doors opened in the house and you don't go into those rooms, you are losing energy. The pre-open data base files and the computer are similar in nature to the doors in the house.

Different categories of users use different groups of files. You can define a User Type at the individual User level or associate a User Type with a Role. To assist you in determining these common user categories, as sample list of User Types has been provided in the F0095 file in JDFDATA. This includes the following profiles:

Profile Description
ABENTRY Maintains People, Places, and Things (Address Book)
ABUSER ABENTRY plus DREAM Writer reporting
APREVW Accounts Payable Review, Name Search, Supplier Inquiry, DREAM Writer
APENTRY Accounts Payable Entry, Name Search, Inquiry, Voucher Entry
APSUPR Accounts Payable Supervisor, APENTRY plus Speed Release, Checks, and DW
ARREVW Accounts Receivable Review, Name Search, Customer Inquiry, DREAM Writer
ARENTRY Accounts Receivable Entry, Name Search, Inquiry, Invoice Entry, Cash Rcpts
ARSUPR Accounts Receivable Supervisor, ARENTRY plus Online Journal Review
GLREVW General Ledger Review, Online T/Bs, G/Ls, Budget Compare, DREAM Writer
GLENTRY General Ledger Entry, Journal Entry functions
GLSUPR General Ledger Supervisor, GLENTRY plus Business Unit, Acct Master, and DW
INVENTORY Inventory system profile
SALES Order processing profile
PURCHASING Purchasing system profile

From System Administration menu (G944), you can also access:

  • Valid Library Lists, which provides an inquiry, list of currently defined library lists, and their descriptions.

  • Library List Users, which lets you view all users for a particular library.

  • Library List Global Update, which provides a program to allow mass changes to library lists in both the User Profile (F0092) file and the Master Library List (F0094) file.

To set up pre-open files

Navigation

From Advanced & Technical Operations (G9), choose Security & System Admin

From Security & System Administration (G94), choose Security Administration

From System Administration (G944), choose Pre-open Files Setup

  1. On Pre-open Files Setup, set up the lists of files you want the system to open.

    Figure 19-11 Pre-Open FIles Setup screen

    Description of Figure 19-11 follows
    Description of "Figure 19-11 Pre-Open FIles Setup screen"

  2. Enter the name of the list on the User Information screen.

  3. Exit (F3) the program.

  4. From Security Officer (G9401), choose User Information.

    Figure 19-12 User Information (Security Officer) screen

    Description of Figure 19-12 follows
    Description of "Figure 19-12 User Information (Security Officer) screen"

  5. For each end user, enter the name of the list in the User Type field.

  6. Exit (F3) the program.

    JD Edwards World also gives you a set of pre-defined files for use in the pre-opens. If you access HELP through F24, you see the ones identified for your use.

    Use these lists as starting points for creating your own lists.

    Note:

    Use a user type of *SYS to set up files opened for every user.

19.6 Copying User/Group Security

The Copy User/Group Security program (P00922C) provides full copy capability for JD Edwards user profiles and security records. You can copy either individual user profiles or group profiles, as well as all or selected parts of the 'From' profile and the 'From' profile's security setup. If you are authorized, you can access programs where you can setup IBM User Profiles and Address Book records.

You access Copy User/Group Security by pressing F5 on User Information or by selecting option 3 on a user or group subfile record on Security Workbench.

Figure 19-13 Copy User/Group Security screen

Description of Figure 19-13 follows
Description of "Figure 19-13 Copy User/Group Security screen"

When you access Copy User/Group Security, the 'From' profile is populated from the calling program. Complete the 'To' Profile field and select the security types that you want to copy. You must copy from individual users to individual users and from groups to groups.

If you are copying an individual user profile, the 'To' profile must already have an IBM user profile. If you are copying a group profile, no IBM user profile is needed, and you can enter a descriptive name for the group profile.

From User Attributes

You can override the following user attributes that are derived from the 'From' user profile:

  • Allow Menu Travel: Only available when you copy a user

  • Allow Command Entry: Only available when you copy a user

  • Level of Display

  • Advanced Menu Security: Only available when you copy a user

Copy Security Selections

You can specify whether to copy the following types of security information from the 'From' user's security records:

  • Role membership

  • Menu security

  • Business unit security

  • Action code security

  • Name search security

  • Batch approval security

  • Report form security

  • Generic text security

  • Function code security

  • UDC security

  • Fast path security

  • File/field security

Additional Selections

The program provides the following additional selections for copying user profile and security records:

  • Copy User Display Preferences: This selection is available only for copying a user.

  • Create Output Queue: If you create an output queue for the 'To' user, the Output Queue will be the same name as the 'To' User Profile. This selection is available only for copying a user.

  • User Address Number: This is the 'To' user's address book number.

  • User Default IFS: This selection enables you to specify a default IFS folder for the 'To' user.

Function Keys

The following function keys are available on the screen:

  • F2 - Long Name: Use this function key to access a video that displays the full length available for the user default IFS path.

  • F4 - IFS Path: Use this function key to access a video that displays the IFS directory structure to find or create the IFS Folder to use for the 'To' Profile.

  • F6 - Continue: Use this function key to a start the actual copy process when the video parameters are ready. The system does not copy the information until you press F6.

  • F8 - IBM Profile: If you are authorized, use this function key to access the IBM 'Work with User Profiles' program to view or set up the IBM user profile if needed.

  • F10 - Default Locations: Use this function key to access the Default Locations video (V400951) to set up a default branch/plant for the 'To' user profile if needed.

  • F11 - Address Book: Use this function key to access the Address Book Addition window (V01AB) to set up a new address book record for the 'To' user profile if needed.

19.6.1 DREAM Writer Considerations

DREAM Writer provides processing options for the Copy User/Group Security program to control how this program functions.

  1. User Default IFS: Enter '1' to automatically populate the 'User Default IFS' field. The default value is set to 'HOME/' + TO user ID. The default value automatically populate the User Default IFS Folder field in the copy parameters video. The User Default IFS folder requires that you copy the user display preferences.

  2. Output Queue: Enter 1' to allow the creation of a new output queue with the name of the user ID being created. If you leave this processing option blank, the default value for the output queue is the user ID being copied.

  3. Employee Search Type: Use this processing option to specify the search type to write on address book records entered for the 'To' User. The default value is E (Employees).

19.6.2 Technical Considerations

When you copy a user profile, the copy program ensures that the 'To' user has the same security setup as the 'From' user. Therefore, for every security type, any pre-existing security records for the 'To' user are removed before the copy.

The default IFS folder is part of the user display preferences. If you set up a default IFS folder for the 'To' user profile, the system also sets up a User Display Preferences record, which is either copied from the 'From' user or set up with defaults.