Part II

Secure Installation and Configuration

Part II provides guidelines and recommendations for configuring and deploying JD Edwards EnterpriseOne to make it more secure in real-world, customer environments. It provides information about securing the overall infrastructure of a deployed EnterpriseOne system. It contains practical instruction for technical users, installers, and system administrators who implement and maintain the EnterpriseOne system. Part II also contains system hardening configuration recommendations, including hardening of the EnterpriseOne database and hardening of EnterpriseOne tools and administration applications.

It is not possible to address every security scenario that might be applicable to a particular implementation and environment. Therefore, the items discussed in this part are intended to give a broad, best practices baseline for securing EnterpriseOne.

Part II contains the following chapters: