Using Security Workbench

This chapter provides an overview of Security Workbench (P00950) and discusses how to:

Click to jump to parent topicUnderstanding Security Workbench

Use Security Workbench to apply security to JD Edwards EnterpriseOne applications, application versions, forms, and other objects within JD Edwards EnterpriseOne that are described in this chapter. You can apply security for these objects to users, roles, or *PUBLIC. JD Edwards EnterpriseOne stores security information in the F00950 table and caches the security information in the web server's memory for the web clients and each workstation's memory on Microsoft Windows clients. Changes that you make to security are applied after the user exits JD Edwards EnterpriseOne and signs back in. For the security changes to take affect on web clients, you must restart the web server or clear the web server's cache using the Server Administration Workbench (SAW) application.

When applying object level security, you need to consider how JD Edwards EnterpriseOne checks for security. When a user signs in, the system first checks the user ID for security. If no object security is assigned to the user ID, then it checks the role (if the user is part of a specific role), and then finally it checks *PUBLIC.

Note. You can access Security Workbench on the JD Edwards EnterpriseOne web client, as well as the Microsoft Windows client.

Click to jump to parent topicCreating Security Overrides

This section provides an overview of security overrides, provides a prerequisite, and discusses how to add security overrides.

Click to jump to top of pageClick to jump to parent topicUnderstanding Security Overrides

Security overrides operate as exceptions to existing security records. They specify that users are unsecured from a JD Edwards EnterpriseOne object. In other words, security overrides allow users access to a particular object, even if another security record in the system specifies that access is not allowed.

Security overrides enable you to create object security more efficiently, with fewer security records to manage. For example, you might have a scenario that requires securing four out of five versions of an application from a group of users. Instead of creating four security records to prevent users from accessing each of the four versions, you can create two security records to achieve the same result. First, you would create a security override for the application version that you want users to access. This security override would specify that this version is not secured. These are the high level steps to create security overrides in Security Workbench:

  1. Create a security record for the version, making sure that the security options are cleared.

  2. Create a security record that secures users from accessing the application, including all versions of the application. In Security Workbench, you would select the application and then select the Run security option, which secures users from running the application.

As a result, when users try to access the application version, the security override for the version operates as an exception to the second application security record, allowing users access to the version of the application. All other versions of the application are secured.

You can create security overrides for these JD Edwards EnterpriseOne objects:

Creating security overrides simplifies the process of applying security to various JD Edwards EnterpriseOne items. The following table provides some scenarios in which you could use security overrides to set up your security:

Scenario

Method

Allow a user or group of users access to a single form in an application. These users are otherwise restricted from using the application.

To set up:

  1. Create a security override for the form.

  2. Create a security record to prevent users from accessing the application.

Secure users from using all but one push button on a form in an application. This security shall apply to all versions of the application as well.

To set up:

  1. Create a security override for the push button.

  2. Create a security record to prevent users from using all push buttons on the form.

Allow only one user in a role access to an external application.

To set up:

  1. Create a security override for the user that gives the user access to the external application.

  2. Create a security record that prevents the role from accessing the external application.

Secure users from all action buttons except Add and Copy on a form in a particular version of an application.

To set up:

  1. Create a security override to specify that Add and Copy action buttons are not secured on a form in a particular version of an application.

  2. Create a security record to secure all actions on the form.

Click to jump to top of pageClick to jump to parent topicPrerequisite

Before you can create a security override for a JD Edwards EnterpriseOne object, you must first understand how a standard security record for the object is created in Security Workbench. See the appropriate sections in this chapter for instructions on how to apply security to JD Edwards EnterpriseOne objects such as applications, processing options, tabs, and media objects.

Click to jump to top of pageClick to jump to parent topicAdding Security Overrides

Enter P00950 in the Fast Path.

 

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, and then select the menu for the type of object for which you want to create a security override.

  2. On the security form, enter the user or role ID in the User / Role field.

    Enter a complete user or role, which includes *PUBLIC.

  3. In the Display UnSecured Items region, complete the appropriate fields, and then click Find.

    This step provides a list of unsecured items for the user, role, or *PUBLIC in the UnSecured node.

  4. Expand the UnSecured node to view the individual applications or versions, and the forms associated with each, that do not already have security set for them.

    After you expand the node, each item that you select appears in the grid.

  5. Select the item in the node that you want to create a security override for.

  6. In the Create with region, make sure that the security options are cleared or not selected.

  7. Drag the item from the UnSecured node to the Secured node.

    This action creates a security override for the user or role that can operate as an exception to a another security record for the user or role.

Click to jump to parent topicManaging Application Security

This section provides an overview of application security and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding Application Security

Application security enables you to secure these types of items from users:

You can secure users from running or installing (or both) a particular application, version, or form within an application.

This section also explains how to add a *ALL object and change all of the applications for a particular user or role from unsecured to secured.

Click to jump to top of pageClick to jump to parent topicReviewing the Current Application Security Settings for a User or Role

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Application.

  2. On the Application Security form, enter the user or role ID in the User / Role field.

    Enter a complete user or role, which includes *PUBLIC but not wildcards.

  3. In the Display UnSecured Items region, complete the appropriate fields to determine which items have already been secured for the user or role, and then click Find:

  4. Expand the Secured node to view the security settings for the user or role in the detail area.

Click to jump to top of pageClick to jump to parent topicAdding Security to an Application

Enter P00950 in the Fast Path.

Note. You cannot secure the Data Browser program using the Application Security form. Security Workbench provides a separate option for securing this program.

See Managing Data Browser Security.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Application.

  2. On the Application Security form, enter the user or role ID in the User / Role field.

    Enter a complete user or role, which includes *PUBLIC but not wildcards.

  3. In the Display UnSecured Items region, complete the appropriate fields, and then click Find.

  4. Expand the UnSecured node to view the individual applications or versions, and the forms associated with each, that do not already have security set for them.

    After you expand the node, the individual items also appear in the grid.

  5. In the Create with region, select one or both of these security options:

  6. Complete one of these steps:

  7. To change the security on an item, select the item under the Secured node, select the appropriate security option, and then, from the Row menu, select Revise Security.

    In the grid, the values under the Run and Install fields change accordingly.

Click to jump to top of pageClick to jump to parent topicSecuring a User or Role from All JD Edwards EnterpriseOne Objects

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Application.

  2. On the Application Security form, enter the user or role ID in the User / Role field.

    Enter a complete user or role, which includes *PUBLIC but not wildcards.

  3. In the Display UnSecured Items area, enter *ALL in the Application field to select all JD Edwards EnterpriseOne objects, and then click Find.

  4. Expand the UnSecured node and then click *ALL in the detail area.

  5. In the Create with region, select one or both of these options:

  6. Complete one of these steps:

Click to jump to top of pageClick to jump to parent topicRemoving Security from an Application

Access the Application Security form.

On the Application Security form, perform one of these steps:

Click to jump to parent topicManaging Action Security

This section provides an overview of action security and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding Action Security

Action security enables you to secure the buttons that enable users to perform particular actions, such as adding, deleting, inquiring, revising, or copying a record. These buttons typically reside on the toolbar in a form. Do not confuse these buttons with buttons that are located on other parts of a form.

See Also

Managing Push Button, Link, and Image Security

Click to jump to top of pageClick to jump to parent topicReviewing the Current Action Security Settings

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Action.

  2. On the Action Security form, enter the user or role ID in the User / Role field and click Find.

    You can enter *PUBLIC but not wildcards.

    Current action security settings for the user or role appear under the Secured node in the tree.

  3. To see if an action security is applied to a particular application, version, or form, complete a combination of these fields in the Display Secured Item region, and then click Find:

  4. Expand the Secured node and click a secured item to view the current security settings for the user or role in the detail area.

Click to jump to top of pageClick to jump to parent topicAdding Action Security

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Action.

  2. On the Action Security form, enter the user or role ID in the User / Role field and click Find.

    You can enter *PUBLIC but not wildcards.

    Current action security settings for the user or role appear under the Secured node in the tree.

  3. To find the applications, versions, or forms to which you want to apply action security, complete any of these fields under the Display UnSecured Items heading, and then click Find:

  4. Expand the Unsecured node to view individual applications, versions, and forms in the detail area.

  5. In the Create with region, select any of these options:

  6. To secure the actions on an application, version, or form, perform one of these steps:

  7. To change the security on an item, select the item under the Secured node, select the appropriate security option, and then, from the Row menu, select Revise Security.

    In the grid, the values for the security options change accordingly.

Click to jump to top of pageClick to jump to parent topicRemoving Action Security

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Action.

  2. On the Action Security form, enter the user or role for which you want to change action security in the User / Role field, and then click Find.

  3. To delete action security from an application, version, or form, do one of these:

Click to jump to parent topicManaging Row Security

This section provides an overview of row security and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding Row Security

Row security enables you to secure users from accessing a particular range or list of data in any table. Use row security sparingly because it can adversely affect system performance. Additional processing occurs for each data item that you set with row security.

You can set up row security at three levels:

JD Edwards EnterpriseOne first looks for row security at the user level, then at the group level, and then at the *PUBLIC level. If you set any of the security at a higher level, such as at the user level, the software ignores lower-level security settings, such as the group or *PUBLIC levels.

Before you set up row security for an item in a table, you should verify that the item is actually in that table. For example, the F0101 table contains the data item AN8. Therefore, you can set up row security for that item. However, the same table does not contain data item PORTNUM. Setting row security on this item for the F0101 table has no effect.

You set up row security on a table, not on a business view. You should verify that the object that you want to secure uses a business view over a table containing the object. For example, the Work With Environments application (P0094) uses business view V00941 over the F00941 table. You could secure the data item RLS (Release) because it is in the F00941 table. On the other hand, the same item is not in the F0094 table. If you attempt to secure the item on the F0094 table, data item RLS is not secured.

Note. You can find the tables, applications, forms, business views, and so on that use a data item by launching the Cross Reference application (P980011) after you build cross-reference tables (F980011and F980021).

Click to jump to top of pageClick to jump to parent topicPrerequisite

Before you can set up row security, you must activate row security in Data Dictionary Design.

See Creating a Data Dictionary Item.

Click to jump to top of pageClick to jump to parent topicAdding Row Security

Enter P92001 in the Fast Path.

  1. On the Work With Data Items form, click Find.

    Note. You can enter search criteria in the Search Description field and the query by example (QBE) row to narrow your search.

  2. Select the data item that you want to secure, and click Select.

    The Data Item Specifications form appears.

  3. On the Item Specifications tab, select the Row Security option and click OK.

    This option must be selected for row security to work.

  4. Click OK.

  5. Exit the data dictionary application.

  6. In Solution Explorer, enter P00950 in the Fast Path and press Enter.

  7. On the Work With User/Role Security form, select the Form menu, Set Up Security, Row.

  8. On the Row Security form, complete the User / Role field and then click Find to display current row security.

  9. Complete these fields, either in the first open detail area row (to add security) or in a pre-existing detail area row (to change security):

  10. Click OK to save the security information.

Click to jump to top of pageClick to jump to parent topicRemoving Row Security

Enter P00950 in Fast Path.

  1. On the Work With User/Role Security form, select an object.

  2. From the Form menu, select Set Up Security, Row.

  3. On the Row Security form, complete the User / Role field and click Find.

    Note. If you accessed the Row Security form from the Work With User/Role Security form for a specific record, the user or role associated with the security record appears in the User / Role field by default.

  4. Select the security record or records in the detail area, and then click Delete.

  5. On Confirm Delete, click OK.

  6. Click OK when you finish deleting row security.

    If you do not click OK after you delete the row security records, the system does not save the deletion.

Click to jump to parent topicManaging Column Security

This section provides an overview of column security and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding Column Security

This section explains how to add and revise column security. You can secure users from viewing a particular field or changing the value for a particular field. This item can be a database field, or a field that is defined in the data dictionary but is not in the database.

Note. You can find the tables, applications, forms, business views, and so on, that use a data item by launching the Cross Reference application (P980011) after you build the cross-reference tables (F980011and F980021).

You can set up column security on a table, an application, an application version, or a form. Even if an application uses a business view that does not contain the data item that you want to secure, you can still secure it, as long as the item appears on a form in the application.

Column Security on a Table

Before you set up column security on a table, do these:

For example, if you want to apply column security to data item RLS (Release Number) in the F00941 table, RLS must be an item in that table, and it must also be part of an application using a business view over that table. Finally, the business view over the F00941 table must include a column containing the data item RLS.

If all of these conditions are met, you can successfully apply column security to the data item. Setting column security on a table also means that you set security on the data item for any other applications that use the F00941 table.

Column Security on an Application

Before you set up column security on an application, do these:

For example, if you want to apply column security to data item UGRP (UserRole) in the Object Configuration Manager application (P986110), you first verify that the item is in the application. Because it is in the application, you can apply security to the data item. However, note that data items UGRP, MUSE, USER, and USR0 all contain the identical data description of User ID. Verify the item by its alias, not by its data description.

Column Security on an Application Version

You can secure users from using columns (or fields) in a version of an application. When you secure a column in a version, the system secures the column in all forms associated with that application version.

Before you set up column security on an application version, do these:

Column Security on a Form

Security Workbench enables you to secure the column in one particular form, either in an application or in a version of an application.

Before you set up column security on a form, do these:

Click to jump to top of pageClick to jump to parent topicAdding Column Security

Enter P00950 in Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Column.

  2. On the Column Security form, complete the User / Role field, and then click Find to display current column security for the user or role.

  3. To add new security, go to the last row of the detail area and enter information into any of these fields:

  4. Complete these fields:

  5. To change security, change the row values in the detail area.

  6. Click OK to save the security information.

Click to jump to top of pageClick to jump to parent topicRemoving Column Security

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Column.

  2. On the Column Security form, complete the User / Role field, and then click Find.

    Note. If you accessed the Column Security form from the Work With User/Role Security for a specific record, the user or role associated with the security record appears in the User/Role field by default.

  3. Highlight the security record or records in the detail area and click Delete,and then click OK on Confirm Delete.

  4. Click OK when you finish deleting column security.

    If you do not click OK after you delete the security records, the system does not save the deletion.

Click to jump to parent topicManaging Processing Option Security

This section provides an overview of processing option security and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding Processing Option Security

You can secure users from changing, prompting for values, and prompting for versions of specific processing options. By itself, setting security that prohibits users from prompting for versions does not prevent them from changing values in the processing option. If you do not want users to use processing option values, you might want to set security so that users are secured from the "prompt for" value and "prompt for" versions.

For example, to set prompt-for-values security, which also automatically sets change security, select the Prompt for Values option. Next, drag one application at a time from the UnSecured node to the Secured node. The detail area reflects the prompt-for-values and change security that you set for these applications. This procedure means that the user you entered cannot prompt for values or change processing options on any applications that you dragged to the Secured node.

This task also explains how to add a *ALL object and how to move all of the applications for a particular user or role from unsecured to secured.

Click to jump to top of pageClick to jump to parent topicReviewing the Current Processing Option Security Settings

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select Set Up Security, Processing Option.

  2. On the Processing Option Security form, enter a user or role ID in the User / Role field.

    Enter a complete user or role, which includes *PUBLIC but not wildcards.

  3. In the Display Secured Item region, complete these fields and then click Find:

Click to jump to top of pageClick to jump to parent topicAdding Security to Processing Options

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Processing Option.

  2. On the Processing Option Security form, enter the user or role ID in the User / Role field and then click Find.

    Enter a complete user or role, which includes *PUBLIC but not wildcards.

  3. In the Display UnSecured Items region, complete the appropriate fields and then click Find:

  4. In the Create with region, select one or more of these options and drag applications from the UnSecured node to the Secured node:

  5. Perform one of these actions:

  6. To change the security on an item, select the item under the Secured node, select the appropriate security option, and then, from the Row menu, select Revise Security.

    In the grid, the values for the security options change accordingly.

Click to jump to top of pageClick to jump to parent topicRemoving Security from Processing Options

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Processing Option.

  2. On the Processing Option Security form, enter a user or role ID to which you want to remove processing option security in the User / Role field.

    Enter a complete user or role, which includes *PUBLIC but not wildcards.

  3. Click Find.

    Current security settings for that user or role appear under the Secured node in the tree. Expand the node to view the individual secured applications. After you expand the node, the applications that are secured also appear in the detail area.

  4. Perform one of these steps:

Click to jump to parent topicManaging Tab Security

This section provides an overview of tab security and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding Tab Security

You can secure users from changing the name of the tab and viewing the form that you call by using the tab. For example, to set up change security, select the Change option. Next, drag tabs one at a time from the UnSecured node to the Secured node. The detail area reflects the changed security that you set for the tabs. This security means that the user you entered cannot change the tabs that you dragged to the Secured node.

Note. If you secure a user from an application, you cannot also secure the user from certain tabs on a form in that application. This restriction prevents redundant double security. Similarly, if you secure a user from a tab, you cannot secure the user from the application that contains the tab.

Click to jump to top of pageClick to jump to parent topicAdding Tab Security

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Tab Security.

  2. On the Tab Exit Security form, complete these fields and click Find:

  3. Complete only one of these fields in the Display UnSecured Items region and click Find:

  4. In the Create with region, select one or more of these options:

  5. Drag tabs from the UnSecured node to the Secured node.

    These tabs now appear under the Secured node.

  6. To change the security on an item, select the item under the Secured node, select the appropriate security option, and then, from the Row menu, select Revise Security.

    In the grid, the values for the security options change accordingly.

Click to jump to top of pageClick to jump to parent topicRemoving Tab Security

Access the Work With User/Role Security form.

  1. From the Form menu, select Set Up Security, Tab Security.

  2. On the Tab Exit Security form, complete these fields and click Find:

  3. Perform one of these steps:

Click to jump to parent topicManaging Hyper Exit Security

Menu bar exits, also referred to as hyper exits, call applications and allow users to manipulate data. You can secure users from using these exits. Hyper exit security also provides restrictions for menu options. This section discusses how to:

 

Click to jump to top of pageClick to jump to parent topicAdding Hyper Exit Security

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Hyper Exit Security.

  2. On the Hyper Exit Security form, complete these fields and click Find:

  3. In the Display Unsecured Items region, complete only one of these fields to locate the applications to which you want to apply exit security, and click Find:

  4. Expand the UnSecured node to view and select applications (interactive and batch) and hyper-button exits.

    After you expand the node, the hyper-button exits also appear in the detail area.

  5. In the Create with region, select the Run Security option.

  6. Drag exits one at a time from the UnSecured node to the Secured node.

    The exits that you dragged now appear under the Secured node. The grid reflects the security that you set for these exits. This security prevents the user that you entered from using the exit.

Click to jump to top of pageClick to jump to parent topicRemoving Hyper Exit Security

Enter P00950 in the Fast Path..

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Hyper Exit Security.

  2. Complete these fields and click Find:

  3. Perform one of these steps:

Click to jump to parent topicManaging Exclusive Application Security

This section provides an overview of exclusive application security and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding Exclusive Application Security

Exclusive application security enables you to grant access to otherwise secured information through one exclusive application. For example, assume that you use row security to secure a user from seeing a range of salary information; however, the user needs to run a report for payroll that includes that salary information. You can grant access to the report, including the salary information, using exclusive application security. JD Edwards EnterpriseOne continues to secure the user from all other applications in which that salary information might appear.

Click to jump to top of pageClick to jump to parent topicAdding Exclusive Application Security

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Exclusive Application.

  2. On the Exclusive Application Security form, complete the User / Role field.

    Enter a complete user or role, which includes *PUBLIC but not wildcards.

  3. Complete these fields in the detail area:

  4. Click OK to save the information.

Click to jump to top of pageClick to jump to parent topicRemoving Exclusive Application Access

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Exclusive Application.

  2. On the Exclusive Application Security form, complete the User / Role field and click Find.

    Note. If you accessed the Exclusive Application Security form from a specific record in the Work With User/Role Security form, the user or role associated with the security record appears in the User/Role field by default.

  3. Highlight the security records in the grid and click Delete.

  4. On the Confirm Delete message form, click OK.

  5. Click OK when you finish deleting exclusive application security.

    If you do not click OK after you delete the security records, JD Edwards EnterpriseOne does not save the deletion.

Click to jump to parent topicManaging External Calls Security

This section provides an overview of external call security and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding External Call Security

In JD Edwards EnterpriseOne, certain applications exist that are not internal to JD Edwards EnterpriseOne; they are standalone executables. For example, the Report Design Aid, which resides on the Cross Application Development Tools menu (GH902), is a standalone application. You can also call this application externally using the RDA.exe. By default, this file resides in the \E810\SYSTEM\Bin32 directory.

Click to jump to top of pageClick to jump to parent topicAdding External Call Security

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, External Calls.

  2. On the External Calls Security form, complete these fields and click Find:

  3. In the Create with region, select the Run Security option.

  4. Complete one of these steps:

  5. To change the security on an item, select the item under the Secured node, select the Run Security option, and then, from the Row menu, select Revise Security.

    In the grid, the value in the Run field changes accordingly.

Click to jump to top of pageClick to jump to parent topicRemoving External Call Security

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, External Calls.

  2. On the External Calls Security form, complete these fields and click Find:

  3. Perform one of these steps:

Click to jump to parent topicManaging Miscellaneous Security

This section provides an overview of miscellaneous security and discusses how to manage miscellaneous security features.

Click to jump to top of pageClick to jump to parent topicUnderstanding Miscellaneous Security

JD Edwards EnterpriseOne security enables you to secure users and roles from:

Read/Write Reports Security

JD Edwards EnterpriseOne enables administrators to prevent specific users and roles from running reports that update JD Edwards EnterpriseOne database tables (read/write reports). Administrators can assign users to a user profile called No Update Report Creation User (NUR), which restricts users to running only read-only reports. When an NUR user runs a report, JD Edwards EnterpriseOne prevents the report from making table input/output (I/O) calls to databases that can affect business data. Users assigned to this profile can create and run read-only reports, but are restricted from creating or running existing UR reports. NUR users can copy existing UR reports and run the copied report, although the software disables the report's ability to change business data and displays a warning that the copied report cannot be updated. NUR users can edit NUR reports in Report Design Aid, but are prevented from even opening existing UR reports in RDA.

Workflow Status Monitoring Security

Users can access Workflow Modeler, (a scaled-down version of Process Modeler) to design JD Edwards EnterpriseOne workflow models. Process Modeler Server includes a JD Edwards EnterpriseOne Portal-based component called Model Viewer, which enables users with appropriate access to monitor the status of a workflow and perform workflow administration tasks directly from the Viewer.

Miscellaneous security includes these Workflow Status Monitoring settings, which determine the operations a user can perform from the Model Viewer:

Click to jump to top of pageClick to jump to parent topicManaging Miscellaneous Security Features

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Misc Security.

  2. On the Miscellaneous Security form, complete the User / Role field and click Find.

    Enter a complete user or role, which includes *PUBLIC but not wildcards.

  3. To change Read-Only Report security, select one of these options:

  4. To change Workflow Status Monitoring security, select one of these options:

  5. Click OK to accept the changes.

Click to jump to parent topicManaging Push Button, Link, and Image Security

This section provides an overview of push button, link, and image security and discusses how to:

Note. Push button, link, and image security is enforced only for interactive applications in the JD Edwards EnterpriseOne HTML client and the Portal. It is not supported on the Microsoft Windows client.

Click to jump to top of pageClick to jump to parent topicUnderstanding Push Button, Link, and Image Security

JD Edwards EnterpriseOne enables you to secure users from using or viewing push button, link, and image controls. You can secure users from using a control but still allow them to view it. Or you can prevent users from both using and viewing a control.

Note. In JD Edwards EnterpriseOne forms, static text and text boxes can be made into links. However, you can only apply security to static text links, not to text box links.

Security Workbench displays the objects that you want to secure in a hierarchical tree structure that contains nodes for each application, application version, and form. Security Workbench only displays the forms that contain push button, link, and image controls. You can secure an individual control by dragging the control from the UnSecured node to the Secured node. In addition, you can secure all controls—push buttons, links, or images—on a form by dragging the form node to the Secured node. You can perform the same action on applications and application versions. For example, to secure all the links within an entire application, you drag the application from the UnSecured node to the Secured node to secure all the links in every form within the application as well as within any versions of the application. If you drag an application version node to the Secured node, only the links in that application version are secured.

Note. For security purposes JD Edwards EnterpriseOne does not allow cross site scripting to be executed.

Push Button, Link, and Image Security on Subforms

You can secure push buttons, links, and images on both embedded and reusable subforms in JD Edwards EnterpriseOne. If you secure controls on an embedded subform, only the controls within that subform are secured. For reusable subforms, the behavior of the security depends upon the context in which the reusable subforms are used in power forms. If you apply security to a reusable subform under a power form, then only the controls in that reusable subform for that particular power form are secured, even if the reusable subform is used by another power form, as shown in this diagram:

Push Button, Link, and Image Security on a Reusable Subform - Scenario 1

However, if you apply security to a reusable subform under a power form, and that subform is reused in the same power form, the security is applied to both subforms, as shown in this diagram:

Push Button, Link, and Image Security on a Reusable Subform - Scenario 2

Because security functions differently on embedded subforms than it does on reusable subforms, Security Workbench provides a way for you to distinguish between the two forms. To make this distinction, the tree structure in Security Workbench displays the embedded subform using its form ID, and it displays the reusable subform using its form title.

Click to jump to top of pageClick to jump to parent topicAdding Push Button, Link, and Image Security

Enter P00950 in the Fast Path to access the Work With User/Role Security form.

  1. From the Form menu, select Set Up Security, and then select the menu for push buttons, links, or images, depending on the type of object that you want to secure.

  2. Complete the User / Role field and click Find.

    Enter a complete user or role, which includes *PUBLIC.

  3. In the Display UnSecured Items region, complete the appropriate fields and then click Find:

    The search results appear under the UnSecured node.

  4. Expand the UnSecured node to view the individual applications or versions, and the forms associated with each.

    Only the forms that contain controls are displayed.

  5. Under the Create with region, select the type of security that you want to apply:

  6. Use one of these actions to secure the items:

Click to jump to top of pageClick to jump to parent topicRemoving Push Button, Link, and Image Security

Enter P00950 in the Fast Path.

  1. On the Work with User/Role Security form, select the Form menu, Set Up Security, and then the menu for push buttons, links, or images.

  2. Enter a user or role ID from which you want to remove the security in the User / Role field.

    Enter a complete user or role, which includes *PUBLIC but not wildcards.

  3. Click Find.

    Current security settings for that user or role appear under the Secured node in the tree. Expand the node to view the individual secured applications. After you expand the node, the applications that are secured also appear in the detail area.

  4. Perform one of these steps:

Click to jump to parent topicManaging Text Block Control and Chart Control Security

This section provides an overview of text block control and chart control security and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding Text Block Control and Chart Control Security

JD Edwards EnterpriseOne enables you to secure users from using or viewing text block and chart controls. You can secure users from using a control but still allow them to view it. Or you can prevent users from both using and viewing a control.

In JD Edwards EnterpriseOne, a text block or chart control can have separate segments that contain links to other objects. You cannot secure these individual segments of a control. When you secure a text block or chart control, security is applied to the entire control.

See Also

Understanding Text Block Controls

Click to jump to top of pageClick to jump to parent topicReviewing Current Text Block Control and Chart Control Security Settings

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select Set Up Security from the Form menu, and then select the menu for text block control or chart control.

  2. Enter the user or role ID in the User / Role field and click Find.

    You can enter *PUBLIC but not wildcards.

    The system displays the control security settings for the user or role under the Secured node in the tree.

  3. To see if control security is applied to a particular application, version, or form, complete a combination of these fields in the Display UnSecured Items region, and then click Find:

  4. Expand the Secured node and click a secured item to view the current security settings for the user or role in the detail area.

Click to jump to top of pageClick to jump to parent topicAdding Text Block Control and Chart Control Security

Enter P00950 in the Fast Path to access the Work With User/Role Security form.

  1. From the Form menu, select Set Up Security, and then select the menu for text block control or chart control, depending on the type of control that you want to secure.

  2. Complete the User / Role field and click Find.

    Enter a complete user or role, which includes *PUBLIC.

  3. In the Display UnSecured Items region, complete the appropriate fields and then click Find:

    The search results appear under the UnSecured node.

  4. Expand the UnSecured node to view the individual applications or versions, and the forms associated with each.

    Only the forms that contain controls are displayed.

  5. Under the Create with region, select the type of security that you want to apply:

  6. Use one of these actions to secure the items:

Click to jump to top of pageClick to jump to parent topicRemoving Text Block Control and Chart Control Security

Enter P00950 in the Fast Path.

  1. On the Work with User/Role Security form, select the Form menu, Set Up Security, and then the menu for text block control or chart control security.

  2. Enter a user or role ID from which you want to remove the security in the User / Role field.

    Enter a complete user or role, which includes *PUBLIC but not wildcards.

  3. Click Find.

    Current security settings for that user or role appear under the Secured node in the tree. Expand the node to view the individual secured applications. After you expand the node, the applications that are secured also appear in the detail area.

  4. Perform one of these steps:

Click to jump to parent topicManaging Media Object Security

This section provides an overview of media object security and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding Media Object Security

JD Edwards EnterpriseOne enables you to secure users from adding, changing, deleting, or viewing media objects within interactive applications, forms, or application versions. You can apply media object security to ensure that media object attachments cannot be modified or tampered with after they have been added.

If you apply view security to media object attachments, Security Workbench automatically prevents the user from adding, deleting, or changing media objects. If you apply change security to media object attachments, Security Workbench automatically prevents the user from deleting the media object.

Media object security enables you to use media object attachments as a mechanism for recording justifications for transactions and for legal purposes. For example, your company may have a business process that requires clerks to use media object attachments to document the reason or justification for adjusting a price on an item in a transaction. In this case, you would allow the clerks to add and view media object attachments in an application, but secure them from deleting or modifying them. In addition, this type of security prevents users from modifying or deleting attachments that others have added. As a result, the media object attachments provide secured information about previous transactions. This information can be reviewed by interested parties for legal or other purposes.

Note. Media object security is enforced only in interactive applications on the JD Edwards EnterpriseOne web client and the Portal. It is not supported on the Microsoft Windows client.

Also, media object system functions enforce media object security in the web client. When running applications that have media object security applied to them, the system logs the security information for the system functions in the web client debug log file.

Click to jump to top of pageClick to jump to parent topicReviewing the Media Object Security Settings

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Media Object.

  2. On the Media Object Security form, enter the user or role ID in the User / Role field and click Find.

    You can enter *PUBLIC but not wildcards.

    The system displays current media object security settings for the user or role under the Secured node in the tree.

  3. To see if a media object security is applied to a particular application, version, or form, complete a combination of these fields in the Display UnSecured Items region, and then click Find:

  4. Expand the Secured node and click a secured item to view the current security settings for the user or role in the detail area.

Click to jump to top of pageClick to jump to parent topicAdding Media Object Security

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Media Object.

  2. On the Media Object Security form, enter the user or role ID in the User / Role field and click Find.

    You can enter *PUBLIC but not wildcards.

    Current media object security settings for the user or role appear under the Secured node in the tree.

  3. To find the applications, versions, or forms to which you want to apply media object security, complete any of these fields in the Display UnSecured Items region, and then click Find:

  4. Expand the Unsecured node to view individual applications, versions, and forms in the detail area.

  5. In the Create with region, select any of these options:

  6. To secure the media objects on an application, application version, or form, perform one of these steps:

Click to jump to top of pageClick to jump to parent topicRemoving Media Object Security

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Media Object.

  2. In the User / Role field, enter a user or role ID from which you want to remove media object security.

    Enter a complete user or role, which includes *PUBLIC but not wildcards.

  3. Click Find.

    Current security settings for that user or role appear under the Secured node in the tree. Expand the node to view the individual secured applications. After you expand the node, the applications that are secured also appear in the detail area.

  4. Perform one of these steps:

Click to jump to parent topicManaging Data Browser Security

This section provides an overview of Data Browser security and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding Data Browser Security

Data Browser security enables you to grant permission to users, roles, or *PUBLIC to access the Data Browser program. There are two levels of Data Browser security that you can assign to users. The first level grants access to the Data Browser, which users can use to perform public or personal queries. After you grant this access, you can grant an additional level of security that allows Data Browser users to select a particular table or business view that they wish to query.

You can also use the Copy feature in Security Workbench to copy Data Browser security from one user or role to another.

See Also

Viewing the Data in Tables and Business Views

Click to jump to top of pageClick to jump to parent topicAdding Data Browser Security

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Data Browser.

  2. On the Data Browser Security form, enter the user or role ID in the User / Role field and click Find.

    You can enter *PUBLIC but not wildcards.

  3. In the Data Browser hierarchical security permissions region, select one or both of these options, depending on the level of security that you want to grant:

  4. Click OK.

    Note. To activate Data Browser security changes, you must refresh the jdbj security cache using the SAW.

Click to jump to top of pageClick to jump to parent topicRemoving Data Browser Security

You can remove Data Browser security using the Data Browser Security form or the Work With User/Role Security form. To remove security using the Data Browser Security form, clear the security check boxes for a user, role, or *PUBLIC. Using the Work With User/Role Security form, search for the security record and then delete the Data Browser security record from the grid.

Click to jump to parent topicManaging Published Business Services Security

This section provides an overview of published business services security and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding Published Business Services Security

JD Edwards EnterpriseOne provides security to ensure that web service consumers are authenticated in the JD Edwards EnterpriseOne system and authorized to access published business services. The authentication of users of published business service users is handled by the Business Services Server and EnterpriseOne security server. After a user is authenticated by the JD Edwards EnterpriseOne security server, the system checks if the user is authorized to run a published business service by retrieving records from the JD Edwards EnterpriseOne F00950 security table, which contains all the object security records.

Note. This section discusses only the authorization of users to access published business services.

For published business services, JD Edwards EnterpriseOne uses a “secure by default” security model which means that users cannot access a published business service unless a security record exists that authorizes access. For all other objects in JD Edwards EnterpriseOne, access is granted unless otherwise secured or restricted.

You manage published business services security using Security Workbench (P00950), the application used to manage all object security in JD Edwards EnterpriseOne. In P00950, you can add, copy, modify, or delete security records for published business services. When a user tries to access or run a published business service, verification of authorization is done through an API that queries records in the F00950 security table.

As with all object security in JD Edwards EnterpriseOne, you can assign published business service security to a user, role, or *PUBLIC. You can create a security record that allows a user or role access to:

It is recommended that you set up security by role first. This method makes setting up published business services security easier; instead of defining security for individual users, you can define security for the role and then assign users to the appropriate roles. If an individual in a role needs a different security setup, you can assign security at the user level, which overrides the role settings.

In addition, you can create a security record that disallows access to a published business service. Typically, there is no need to add security records that disallow access because by default, access to published business services is not allowed. However, creating a security record that disallows access can be an efficient method to set up published business services security. For example, to allow a role access to all but a small subset of published business services, you can:

Inherited Security

When creating a published business service, a developer can configure it to pass its context to any published business service that it calls. In this configuration, authorization for the called published business service is inherited; that is, if the calling business service is authorized, then the called business service is authorized as well. In this scenario, the system does not check the security for the called business service.

However, it is possible (though not supported) to configure a published business service so that it does not pass its context to another business service. In this scenario, the security or authorization for the called published business service is not inherited. Even if a user is authorized to access the calling or parent business service, the system also checks if access to the called business service is allowed. As a result, if there is not a security record that allows access to the called business service, the system will produce an exception or error, denying access to the called business service.

How JD Edwards EnterpriseOne Checks Published Business Services Security

JD Edwards EnterpriseOne checks security for published business services in the same sequence that it checks security for all other JD Edwards EnterpriseOne objects—first by user, then role, and finally *PUBLIC. The system applies the first security record found. In addition, for the user, role, and *PUBLIC, the system checks for published business services security in this sequence:

Note. Using *ALL to set up object security in Security Workbench is not related to the *ALL functionality that is used to sign into JD Edwards EnterpriseOne. *ALL in Security Workbench enables you to assign a user, role, or *PUBLIC to all objects of a particular type. *ALL during sign-in enables users to sign into JD Edwards EnterpriseOne with all the roles that have been assigned to them.

This illustration shows how the system checks for published business services security for a user signed in with *ALL and a user signed in with a specific role:

*Role 1 has the highest role sequence.

If a user is assigned to multiple roles and signs in as *ALL, the system uses role sequencing to determine which security record is used. A system administrator sets up role sequencing when setting up user and role profiles.

See Sequencing Roles.

Published Business Services Security Log Information

The log file provides administrators with information that you can use for troubleshooting business service security without revealing details that could possibly create a gap in the security.

When a web service attempts to access a published business service in JD Edwards EnterpriseOne, the system records the authorization information in the log file. If the logging level is set to “Debug,” the log file records whether authorization was granted or denied. If the log level is set to “Severe,” the system only logs information if the attempt to access a web service fails. This is an example of the information provided in the log file:

Access to <method name> in <published business service name> is <granted/denied> for <user name> with <role name>.

See Also

Server Manager Guide for information on how to view business service security log file information.

JD Edwards EnterpriseOne Business Services Server Reference Guide for information on how to configure JD Edwards EnterpriseOne to authenticate users of published business services.

Click to jump to top of pageClick to jump to parent topicReviewing the Current Published Business Services Security Records

You can use the Work With User/Role Security form in P00950 to review existing published business services security records. The query by example row of the grid enables you to display all security records for published business services. You can further narrow the search by locating the records for a user, role, or a particular published business service.

In addition, you can review published business services security records by running the Security Audit Reports—Security by Object (R009501) and Security by User/Role (R009502).

See Running a Report that Lists Published Business Service Security Records.

From the Security Maintenance menu (GH9052), select Security Workbench (P00950).

  1. On the Work with User/Role Security form, enter S in the Security Type column and then click Find.

  2. To narrow the search by user or role, enter a user or role in the query by example field in the User / Role column and then click Find.

  3. To view the security records for a particular published business service, complete the query by example field at the top of the Published BSSV column and then click Find.

Click to jump to top of pageClick to jump to parent topicAuthorizing Access to Published Business Services

In P00950, you can create security records that allow a user, role, or *PUBLIC access to:

From the Security Maintenance menu (GH9052), select Security Workbench (P00950).

  1. On Work with User/Role Security, select the Form menu, Set Up Security, Published BSSV.

    By default, *PUBLIC is in the User / Role field. If any records exist for *PUBLIC, those records appear in the grid.

  2. On Published Business Service Security Revision, enter the user, role, or *PUBLIC to which you want to allow access to a published business service.

  3. To allow access to a particular method in a published business service:

    1. On Published Business Service Security Revision, click the visual assist in the Published BSSV column to search for and select a published business service.

    2. On the same form, click the visual assist in the Published BSSV Method column to select the method that you want to allow access to.

      On Published BSSV Method, you must enter the published business service again in the Published BSSV column to see a list of all the methods for the published business service. The system displays published business services by the method that is being exposed in the published business service. A published business service that contains multiple methods will have multiple rows in the grid, one for each method.

    3. Select the row that contains the method that you want to secure and then click the Select button.

    4. On Published Business Service Security Revision, click the visual assist in the Execute Allowed column and then select Y to allow access to the published business service method.

  4. To allow access to a published business service (including all its methods):

    1. Click the visual assist in the Published BSSV column to search for published business services.

    2. On Select Business Service, complete the Business Service field and click the Find button.

    3. Select the published business service that you want to secure and then click the Select button.

    4. On Published Business Service Security Revision, in the row that contains the published business service, enter *ALL in the Published BSSV Method column.

    5. In the same row, click the visual assist in the Execute Allowed column and then select Y to allow access to the published business service.

  5. To allow access to all published business services:

    1. Enter *ALL in the row under the Published BSSV column.

    2. Enter *ALL in the row under the Published BSSV Method column.

    3. Click OK.

    4. In the same row, click the visual assist and then select Y to allow access to the published business services objects.

      By default, users are not allowed access to published business services objects in JD Edwards EnterpriseOne. However, you can select N to create a security override that disallows access to an object.

Click to jump to top of pageClick to jump to parent topicAdding Multiple Published Business Services Security Records at a Time

Security Workbench provides a form that you can use to add multiple published business services security records at a time.

From the Security Maintenance menu (GH9052), select Security Workbench (P00950).

  1. On Work with User/Role Security, select the Form menu, Set Up Security, Published BSSV.

  2. On Published Business Service Security Revision, from the Form menu, select Secure by Method.

  3. On the Secure by Method form, enter the user, role, or *PUBLIC for which you want to set up published business services security, and then click the Find button.

    The system displays published business services by the method that is being exposed in the published business service. A published business service that contains multiple methods will have multiple rows, one for each method.

  4. Use the query-by-example fields at the top of the grid to refine your search. For example, if you want to set up security for all methods that perform an add or delete, you search for those methods by typing add* or delete* in the Published BSSV Method query by example field in the grid.

  5. Select the check box next to the items that you want to secure.

  6. Click either the Allow Execute or Disallow Execute button.

  7. On Confirm Batch Secure, click OK.

    The system displays the number of records that were added or updated.

Click to jump to top of pageClick to jump to parent topicDeleting Published Business Services Security

To delete published business services security records, you can use the same form that you used to authorize access to published business services.

In addition to this method, you can use the Work with User/Role Security form in P00950 to delete the records in the same way that you would delete any other object security record.

See Deleting Security on the Work With User/Role Security Form.

From the Security Maintenance menu (GH9052), select Security Workbench (P00950).

  1. On Work With User/Role Security, select the Form menu, Set Up Security, Published BSSV.

  2. On Published Business Service Security Revision, enter the user, role, or *PUBLIC from which you want to delete a published business services security record and then click Find.

  3. Click the check box next to the each record that you want to delete and then click the Delete button.

  4. Click OK to confirm the delete.

Click to jump to parent topicCopying Security for a User or a Role

This section provides an overview of copying security for a user or a role and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding How to Copy Security for a User or a Role

You can copy the security information for one user or role, and then use this information for another user or role. When you copy security, you can either overwrite the current security for the user or role, or you can add the new security information to the existing security information. You can also copy all of the security records for a user or role, or you can copy one security record at a time for a user or role.

Click to jump to top of pageClick to jump to parent topicCopying All Security Records for a User or a Role

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, select the Form menu, and then select Copy Security.

  2. Select one of these options:

  3. Complete these fields and click OK:

Click to jump to top of pageClick to jump to parent topicCopying a Single Security Record for a User or a Role

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, locate a security record.

  2. Select the security record row that you want to copy, and then click Copy.

  3. Complete the To User / Role field and click OK.

    The system saves the security information and returns you to the Work With User/Role Security form.

Click to jump to parent topicReviewing and Deleting Security Records on the Work With User/Role Security Form

This section provides an overview on how to review security records and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding How to Review Security Records

On the Work With User/Role Security form in P00950, you can review security records for a user or role based on security type, such as action, application, row, or any of the other types of security that can be added in P00950. The system displays all the security records for the user or role based on the security type that you select. For example, when you search for application security records for the AP Role, the system displays all the application security records for the AP role in the application grid.

The settings for each security type are displayed as columns in the grid. The columns that appear in the grid are based on the security type that you select. For example, application security provides two different levels of security: run and install. When you search for application security records, P00950 displays only the columns for Run and Install in the grid. However, action security contains several settings, such as OK/Select, Copy, Delete, OK, and so forth. When you search for action security records, the grid displays only columns for each of these security settings. The value in the column, either Y or N, indicates whether or not each setting is secured.

In addition, you can search on all security records of a particular security type. As a result, the system displays records for every user and role with the security type that was specified. You can search on all Security Workbench records by clicking the Find button.

Note. You can also review and delete security records on the form used to add a particular type of object security record, such as application, action, row, and so forth. Refer to the section on how to manage a particular type of object security for more information.

Click to jump to top of pageClick to jump to parent topicReviewing Security on the Work With User/Role Security Form

Enter P00950 in the Fast Path to access the Work With User/Role Security form..

  1. On the Work With User/Role Security form, click Find.

  2. To search for records by user or role, complete the User/Role field and then click Find.

  3. To narrow the search by security type, click the Search button in the Security Type column to select a code and then click the Find button.

Click to jump to top of pageClick to jump to parent topicDeleting Security on the Work With User/Role Security Form

Enter P00950 in the Fast Path.

  1. On the Work With User/Role Security form, click Find.

  2. To search for records by user or role, complete the User/Role field and then click Find.

  3. To narrow the search by security type, click the Search button in the Security Type column to select a code and then click the Find button.

  4. Select a record in the grid, and then click Delete.

  5. On Confirm Delete, click OK.

    Security Workbench deletes the security record and refreshes the grid.

Click to jump to parent topicRunning Security Workbench Records Reports

This section provides an overview of the Security Workbench Records reports and discusses how to:

Click to jump to top of pageClick to jump to parent topicUnderstanding the Security Workbench Records Reports

JD Edwards EnterpriseOne provides two Security Workbench Records reports—Security by Object (R009501) and Security by User/Role (R009502)—that you can run to review the current security records by object type and user or role. The Security Workbench Records reports list security records for these objects:

Before choosing which report to run, you should consider the data that you want the report to produce. Run the Security by Object report (R009501) to generate a report that lists the security records based on a particular object, object type, or product code. You can refine the data selection for this report to list only records for a particular user ID, role, or a combination of user ID and role. Run the Security by User/Role report (R009502) to generate a report that lists all the application, row, column, and published business service security records for a particular user ID, role, or *PUBLIC.

Each report contains processing options that you can use to define the output of the report. Along with the processing options, you can use the Data Selection form in the Batch Version program (P98305W) to further refine the data that the report produces.

Each security record in the report indicates the level of security, or type of security, that is applied to the object. For application security, each record indicates if a user or role has permission to install, run, or both install and run the application. For row security, each record indicates if view, add, change, or delete security have been applied. For column security, each record indicates if view, add, or change security have been applied. For published business service security, each record indicates whether a user or role has access to the published business service object.

How you set up your report determines how readily you can find gaps in your security plan. For example, if you have a highly sensitive application and you want to ensure that only the appropriate users have access to it, you can refine the R009501 report (Security Audit Report by Object) to list only the security records for that particular application.

Example of Security by Object Report (R009501)

This example shows the results of running the R009501 report. The report has been set up to list all the security records for the P00950 program.

Example of Security by Object Report.

Example of Security Audit Report by User (R009502, XJDE0001)

This example shows the results of running the Security Audit Report by User version of the R009502 report. The report lists the security records for a particular user in order of application, row, and then column. This example shows only the first page of the report, which lists the application security records for the user ID.

Example of Security Audit Report by User Report

Example of Security Audit Report by Role (R009502, XJDE0002)

This example shows the results of running the Security Audit Report by Role version of the R009502 report. The data selection of the report has been defined to list security records for the OWTOOL role. This example shows the third page of the report, which lists the row and column security records for the OWTOOL role.

Example of Security Audit Report by Role

Click to jump to top of pageClick to jump to parent topicRun the Security Audit Report by Object Version (R009501, XJDE0001)

Access the Work With Batch Versions - Available Versions form. To do so, enter P98305W in the Fast Path.

  1. In the Batch Application field, enter R009501 and click the Find button.

  2. Select the Security Audit Report by Object version.

  3. To define processing options for the report, select Processing Options from the Row menu, and then complete the processing options as appropriate:

  4. On the Work With Batch Versions - Available Versions form, click Select.

  5. On the Versions Detail form, select the Data Selection check box and click the Submit button.

  6. On the Data Selection form, you can add a condition to filter on a particular object, object type, or product code.

    If the processing option is set to list published business service security records, you must add the following condition after the default Where condition:

    And BC Source Language (F9860) (SRCLNG) [BC] is equal to "SBF"

  7. Click the OK button.

  8. On the Printer Selection form, define the location for the output of the report and then click OK to submit it.

Click to jump to top of pageClick to jump to parent topicRun the Security Audit Report by User Version (R009502, XJDE0001)

Access the Work With Batch Versions - Available Versions form. To do so, enter P98305W in the Fast Path.

  1. In the Batch Application field, enter R009502 and click the Find button.

  2. Select the Security Audit Report by User version.

  3. To define processing options for the report, select Processing Options from the Row menu, and then complete the processing options as appropriate:

  4. On the Work With Batch Versions - Available Versions form, click Select.

  5. On the Versions Detail form, select the Data Selection check box and click the Submit button.

  6. On the Data Selection form, use the User ID left operand to define the user ID that you want the report to list security records for.

  7. Click OK.

  8. On the Printer Selection form, define the location for the output of the report and then click OK to submit it.

Click to jump to top of pageClick to jump to parent topicRun the Security Audit Report by Role Version (R009502, XJDE0002)

Access the Work With Batch Versions - Available Versions form. To do so, enter P98305W in the Fast Path.

  1. In the Batch Application field, enter R009502 and click the Find button.

  2. Select the Security Audit Report by Role version.

  3. To define processing options for the report, select Processing Options from the Row menu, and then complete the processing options as appropriate:

  4. On the Work With Batch Versions - Available Versions form, click Select.

  5. On the Versions Detail form, select the Data Selection check box and click the Submit button.

  6. On the Data Selection form, use the User ID left operand to define the role that you want the report to list security records for.

  7. Click OK on the Data Selection form.

  8. On the Printer Selection form, define the location for the output of the report and then click OK to submit it.

Click to jump to top of pageClick to jump to parent topicRunning a Report that Lists Published Business Service Security Records

You can use the Security Workbench Records reports to generate a list of published business service security records by object, user, or role. However, before you run the report, you must use the Data Selection form to specify the published business service object type.

Access the Work With Batch Versions - Available Versions form. To do so, enter P98305W in the Fast Path.

  1. In the Batch Application field, enter either R009501or R009502 and click the Find button.

  2. Select the version of the report that you want to run.

  3. On the Work With Batch Versions - Available Versions form, click Select.

  4. On the Versions Detail form, select the Data Selection check box and click the Submit button.

  5. On the Data Selection form, enter these conditions and then click OK:

    Where BC Object Type (F9860) (FUNO) is equal to "BSFN" And BC Source Language (F9860) (SRCLNG) [BC] is equal to "SBF"

  6. On the Printer Selection form, define the location for the output of the report and then click OK to submit it.