9 Setting Up Business Unit Security

This chapter contains the following topics:

9.1 Understanding Business Unit Security

JD Edwards EnterpriseOne business unit security provides the ability to filter data by business unit for UDCs and for transaction tables. For UDCs, you create subgroups of values that can be shared among various business units or may be unique to one particular business unit. This is referred to as UDC sharing. For transaction tables, business unit security enables you to limit the transaction records that a user has access to based on business unit. This is called transaction security.

9.1.1 UDC Sharing

With UDC sharing, JD Edwards EnterpriseOne provides the ability to control, or regulate, how organizational data among different business units is shared. UDC sharing enables you to define a subset of UDC values for a business unit. You can share multiple UDC values among multiple business units.

For example, a company's customer service department may provide support for appliances, consumer electronics, and sporting goods. Typically, a representative would choose from an extensive list of values to specify the repair code for a particular type of product. However, with UDC sharing, the company can associate a subset of the repair code UDC values, such as for appliances, to a business unit. As a result, the representatives associated with the business unit would only have to choose from a list of repair codes relevant to appliances.

Note:

UDC sharing can impact system performance because of the time it takes the system to determine the UDC values that are associated with each business unit.

9.1.2 Transaction Security

Another feature of JD Edwards EnterpriseOne business unit security is transaction security. Transaction security enables you to determine the transaction records a user can view. Transaction security ensures that users can only access and modify transaction data for the business unit to which they are associated.

See Also:

  • Setting Up Business Units in the JD Edwards EnterpriseOne Financial Management Solutions Application Fundamentals Guide.

9.2 Working with UDC Sharing

This section provides overviews of the UDC sharing setup and business unit security for UDC sharing and discusses how to:

  • Set up UDC sharing.

  • Set up business unit security for UDC sharing.

  • Revise a UDC group.

  • Delete a UDC group.

9.2.1 Understanding the UDC Sharing Setup

Use the UDC Sharing application (P95130) to set up UDC sharing. This wizard-like program leads you through the appropriate tasks to configure these items:

  • UDC group

    A UDC group serves as a container for the UDC values that you want to share among different business units. You create the UDC group by naming it and assigning the UDC types that contain UDC values. For example, if you are sharing UDC values that represent various states and countries in geographic regions, you might name the UDC group GEO, and then assign the UDC types that contain the appropriate UDC values for the states or countries.

  • Set-ID

    A set-ID enables you to further categorize the UDC values within a UDC group. For example, you can further categorize the UDC values in the GEO UDC group into subsets, such as Europe, Canada, Pacific Rim, and so forth. Each subset, or set-ID, can contain values that are specific to that region.

Important:

UDC sharing is available for JD Edwards EnterpriseOne Application Release 8.11 and later releases. You must use a Microsoft Windows client to set up UDC sharing. However, the actual security applied to applications that are run only on the web client.

9.2.2 Understanding Business Unit Security for UDC Sharing

JD Edwards EnterpriseOne provides a wizard-like program to assist you with setting up business unit security for UDC sharing. The program leads you through these tasks:

  • Define a business unit type.

    A business unit type serves as a logical grouping of business units. To define it, you give it a name and then specify the table (typically the F0006 table) and the data item within the table that contains the business unit values.

  • Associate a user ID or role to a business unit.

    Note:

    You can associate users to business units when setting up UDC sharing or when setting up transaction security.
  • Associate a UDC group to a business unit.

9.2.3 Setting Up UDC Sharing

Enter GH9052 in the Fast Path, select Business Unit Security, and then select Set-up UDC Sharing to access the UDC Group Revisions form.

Note:

You can access this form on the Microsoft Windows client and the web client.
  1. Complete these fields to name and describe the UDC group:

    • UDC Group

    • Group Description

  2. In the detail area, click the search button in these fields to add UDC types to the UDC group:

    • Product Code

      Select the product code of the UDC type that you want to add.

    • User Defined Code

      Select the UDC type that contains the values for the UDC group.

      Note:

      A UDC type cannot be associated with more than one UDC group.
  3. Click Next.

  4. On Set-ID Definition Revisions, complete these fields to create set-IDs for the UDC group:

    • Set-ID

      Enter a name for the set-ID.

    • Description

  5. Click Next.

    On Maintain Set-ID, in the right pane, the system displays the UDC types that you assigned to the UDC group. The left pane contains the set-IDs that you defined for the UDC group.

  6. Assign UDC values to the Set-IDs.

    1. Select a set-ID in the left pane.

    2. Click a UDC type in the right pane, and then select from the list of UDC values.

    3. Click the left arrow to assign the UDC value to the chosen Set-ID.

  7. After you assign UDC values to the set-IDs, click Done.

9.2.4 Setting Up Business Unit Security for UDC Sharing

Enter GH9052 in the Fast Path, double-click Business Unit Security, and then select Set-up Business Unit Security to access the Business Unit Security Definition Revisions form.

  1. Complete these fields in this order:

    • Business Unit Type

    • Business Unit Definition Table

      Enter the table object name that contains the individual business unit values (for example, F0006).

    • Business Unit Definition Data Item

      Enter the data item in the Business Unit Definition Table that contains the unique business unit name (for example, MCU).

  2. Press Tab and then click Next to continue.

  3. On User/Role to Business Unit Relationships, assign the users or roles in the right panel to the appropriate business units in the left panel.

    You can search for particular business unit values and users or roles by clicking the search button next to the Business Unit Value and User/Role fields, respectively.

    Note:

    You can click the Skip button if you choose not to perform this step at this time. You can also assign users to business units when setting up transaction security.
  4. After securing users to the appropriate business units, click Next to continue.

  5. On Maintain Transaction Security Tables, click the Skip button.

    This form is only used for transaction security.

  6. On UDC Group/Set-ID/Business Unit Relationship, assign the set-IDs within the UDC groups to the appropriate business units in the left panel.

    You can search for particular business unit values and UDC groups by clicking the search button next to the Business Unit Value and UDC Group fields, respectively.

    Remember that you must first configure UDC sharing to be able to assign set-IDs to business units on this form.

  7. Click Done.

9.2.5 Revising UDC Groups

Enter GH9052 in the Fast Path, double-click Business Unit Security, and then select Maintain UDC Sharing to access the Work With UDC Sharing form.

You can access this form in the Microsoft Windows client and the web client.

  1. Select the UDC group that you want to revise.

  2. To add or delete a UDC type in a UDC group, from the Row menu, select Group Revisions.

  3. To add or delete a set-ID, from the Row menu, select Set-ID Definition.

    Note:

    You cannot delete a set-ID that is part of a business unit and UDC group relationship.
  4. To revise the UDC values that are assigned to the set-IDs, from the Row menu, select Maintain Set-ID.

9.2.6 Deleting a UDC Group

On the Work With UDC Sharing form, select the UDC group and then click Delete.

Note:

You cannot delete a UDC group that is part of a business unit relationship.

9.3 Working with Transaction Security

This section provides an overview of how to set up transaction security and discusses how to:

  • Set up transaction security.

  • Set processing options for Maintain Business Unit Transaction Security (R95301).

  • Set processing options for Business Unit Security Maintenance application (P95300).

  • Revise transaction security.

9.3.1 Understanding How to Set Up Transaction Security

Transaction security enables you to define which transaction records a user can access, based on the business units they are associated with. Transaction security for business units is inclusive, which means that you define which transactions users can access based on the business unit to which the user ID or role is associated. To set up transaction security, you must define these items:

  • Business unit type.

    A business unit type serves as a logical grouping of business units. To define it, you name it and then specify the table (typically the F0006 table) and the data item within the table that contains the business unit values.

    Note:

    If you are setting up transaction security for an existing business unit type, use the Maintain Business Unit Security menu to add transaction security.
  • Tables to include in a transaction security definition.

  • Users associated with the business units.

The application that you use to set up transaction security, the Business Unit Security Maintenance program (P95300), is available in two modes: a mode that you can use for the initial transaction security setup and another mode to revise transaction security. The mode for the initial setup uses a director or wizard-like process to lead you through the P95300 application forms used to set up transaction security.

See Setting Up Transaction Security.

The mode to revise transaction security provides access to the same forms that are used for the initial setup, but without the wizard functionality. You can use these forms to add, update, or delete transaction security.

See Revising Transaction Security.

9.3.1.1 Generating Transaction Security Records

When you set up or revise transaction security, JD Edwards EnterpriseOne does not automatically enable transaction security in the software. The new or revised transaction security records must be added to the Security Workbench table (F00950). JD Edwards EnterpriseOne provides different mechanisms for updating transaction security records in the F00950 table, depending on whether you are performing an initial setup of transaction security or revising transaction security.

After you perform an initial setup, you must run the Maintain Business Unit Transaction Security batch application (R95301) to generate the transaction security records. You can set processing options for this batch application that enable you to review the records in a "proof" mode before the records are updated in the F00950 table.

See Setting Processing Options for Maintain Business Unit Transaction Security (R95301).

If you are revising transaction security, you can set processing options to control how the transaction security records are updated in the F00950 table. You can set these processing options on the Maintain Business Unit Security menu, which is the JD Edwards EnterpriseOne menu that launches the forms used for revising transaction security.

See Setting Processing Options for Business Unit Security Maintenance Application (P95300).

When you change (add, update, delete) transaction security, you must run the Maintain Business Unit Transaction Security Records (R95301) batch program for the changes to take effect.

Note:

Because the data in the F00950 table is cached, you must clear the cache in order for the updated security records to take affect. See Cached Security Information.

9.3.2 Setting Up Transaction Security

Access the Business Unit Security Definition Revisions form. Enter GH9052 in the Fast Path, and then select Business Unit Security, Set-up Business Unit Security.

  1. On the Business Unit Security Definition Revisions form, complete these fields in order:

    • Business Unit Type

    • Business Unit Definition Table

      Enter the table object name that contains the individual business unit values (for example, F0006).

    • Business Unit Definition Data Item

      Enter the data item in the Business Unit Definition Table that contains the unique business unit name (for example, MCU).

  2. Press Tab and then click Next to continue.

  3. On User/Role to Business Unit Relationships, assign the users or roles in the right panel to the appropriate business units in the left panel.

    You can search for particular business unit values and users or roles by clicking the search button next to the Business Unit Value and User/Role fields, respectively.

  4. After securing users to the appropriate business units, click Next to continue.

  5. On Maintain Transaction Security Tables, complete these columns in the grid:

    • Transaction table

      Enter the table name that contains the data item that you want to secure.

    • Data item

      Enter the data item of the column that you want to secure.

      You can use this form to secure multiple tables.

  6. Click Next to continue.

  7. On UDC Group/Set-ID/Business Unit Relationship, click Done.

  8. Run the R95301 batch program.

  9. Clear the workstation or web client cache

9.3.3 Setting Processing Options for Maintain Business Unit Transaction Security (R95301)

Processing options enable you to specify the default processing for programs and reports.

9.3.3.1 Transaction Security

These processing options are used to specify how the system processes the transaction security records.

Processing Option Description
1. Add Transaction Security Records Specify whether to run the report in Final mode or Proof mode. Use the Proof mode to generate a report of the transaction security records that will be updated in the Security Workbench table (F00950). Use the Final mode to update the records.
2. Add Transaction Security Records Specify whether to add or to not add transaction security records. Values are:

1: Add

0: Do not add

3. Delete Transaction Security Records Specify whether to delete or to not delete transaction security records. Values are:

1: Delete

0: Do not delete


9.3.4 Setting Processing Options for Business Unit Security Maintenance Application (P95300)

Processing options enable you to specify the default processing for programs and reports.

You can access these processing options from the JD Edwards EnterpriseOne Menu by right-clicking the Maintain Business Unit Security menu, and then selecting Prompt for Values.

9.3.4.1 Mode

This processing option is used to specify the business unit security mode.

Processing Option Description
1. Business Unit Security Mode Specify whether to run the report in Director Mode (A) or Maintenance Mode (D).

9.3.4.2 Transaction Security

These processing options are used when working with business unit security in Maintenance mode only.

Processing Option Description
1. In Maintenance mode, automatically add transaction security records. Specify whether to automatically add transaction security records. Values are:

1: Add

0: Do not add

2. In Maintenance mode, automatically delete transaction security records. Specify whether to automatically delete transaction security records. Values are:

1: Delete

0: Do not delete


9.3.5 Revising Transaction Security

Access the Work With Business Unit Security form. Enter GH9052 in the Fast Path, and then select Business Unit Security, Maintain Business Unit Security.

  1. On the Work With Business Unit Security form, select the business unit security type record that you want to revise.

  2. To revise the users or roles associated to a business unit, from the Row menu, select Associate User/Role.

  3. To revise the UDC values that are assigned to business units, from the Row menu, select UDC Groups for BU.

  4. To revise a transaction table record, from the Row menu, select Transaction Tables.

  5. To delete transaction security for a business unit type, select the record and then click Delete.

  6. Run the R95301 batch program.

  7. Clear the workstation or web client cache.