Go to main content
1/36
Contents
List of Figures
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Information
Conventions
Part I JD Edwards World Security Overview
1
Introduction to JD Edwards World Security
1.1
Understand JD Edwards World Security
1.2
JD Edwards World Security Overview
2
General Principles of Security
2.1
Keep Software Up to Date
2.2
Restrict Network Access to Critical Services
2.3
Minimize the Attack Surface
2.4
Follow the Principle of Least Privilege
2.5
Define and Report Separation of Duties
2.6
Construct an In-depth Defense
2.7
Monitor System Activity
2.8
Configure User Accounts Securely
2.9
Set Up a Change Management Process
Part II JD Edwards World Authentication Security
3
Installation Overview
3.1
Understand Your Environment
3.2
Common Deployment Topologies
3.2.1
Single-Server Deployment
3.2.2
Deployment Using DMZ
4
Installing JD Edwards World Components
4.1
Downloading Software from the Oracle Software Delivery Cloud
4.2
Installing JD Edwards World Base
4.3
Installing JD Edwards World Web Enablement
4.4
Installing JD Edwards World Service Enablement
4.5
Installing the JD Edwards World JDBC Driver
5
Configuring IBM i Security
5.1
IBM i Network Security
5.2
Configure the IBM i Security Level
5.3
IBM i User Security
5.4
IBM i Resource Security
Part III JD Edwards World Authorization Security
6
Overview to JD Edwards World User Security
6.1
Objectives
6.2
About JD Edwards World User Security
7
Set Up User and Group Security
7.1
Setting Up User Security
7.2
Securing Command Entry
7.3
Setting Up Group Security
8
Work with Menu Security
8.1
Understanding Advanced Menu Security
8.1.1
Set Up Advanced Security Records
8.1.2
Activate Advanced Menu Security at the User Level
8.1.3
Advanced Menu Security - Functional Details
8.1.4
Advanced Menu Security - Examples
8.1.5
Wildcard Search
8.1.5.1
Wildcard Search Examples
8.2
Menu Masking Security
8.3
What are the Types of Comparisons in Menu Masking?
8.4
An Example of Menu Masking
8.5
Using Group Profile or *PUBLIC with Menu Masking
8.6
Verifying Menu Security Setup
8.7
Securing Hidden Selections
8.7.1
Securing Hidden Selection 60 (HS60)
8.7.2
Preventing Users from Receiving a Send Window Message
8.7.3
Securing Hidden Selection 33 (HS33)
8.8
Considerations for Menu Masking
9
Set Up Action Code, Fast Path, Generic Text, and Search Type Security
9.1
Setting Up Action Code Security
9.1.1
General Guidelines
9.2
Setting Up Fast Path Security
9.3
Setting Up Generic Text Security
9.3.1
Setup Guidelines
9.3.1.1
No Role or Group Setup
9.3.1.2
No Role Setup, User Belongs to a Group
9.3.1.3
User Signs on with a Security Role
9.3.2
Security Setup Examples
9.3.2.1
Example 1
9.3.2.2
Example 2
9.3.3
Wildcard Search
9.3.3.1
Wildcard Search Examples
9.4
Setting Up Search Type Security
9.4.1
Activating Search Type Security
9.4.2
General Guidelines
9.4.3
Check Sequence for Action Type and Search Type Security
9.4.3.1
Examples
10
Work with Business Unit Security
10.1
About Business Unit Security
10.1.1
Setting up Business Unit Security
10.2
Considerations for Business Unit Security
10.2.1
Files Secured Using Business Unit Security
10.2.2
Alphanumeric and Numeric Characters for Business Unit Setup
10.2.2.1
Alphanumeric Business Unit Definition
10.2.2.2
Numeric Business Unit Definition
10.2.2.3
Planning Business Unit Setup
10.2.3
Business Unit Ranges
10.3
Checking Business Unit Security
10.4
Technical Considerations for Business Unit Security
11
Work with Function Key Security
11.1
About Function Key Security
11.2
Working with Function Key Security
11.2.1
General Guidelines
11.2.2
Function Code Security - Helpful Hints
11.3
Standard Function Keys
11.3.1
Examples
11.3.1.1
Example 1
11.3.1.2
Example 2
11.3.1.3
Example 1
12
Work with Field Level Masking
12.1
Understanding Field Level Masking
12.2
Reviewing the Field Level Masking Flow
12.3
Tasks to Set up Field Level Masking
12.4
Field Masking Inclusions
12.4.1
File Name Selection Window (P941SLW)
12.5
Setting up Data Item Masking Definitions
12.5.1
Examples of Data Item Masking Definitions
12.5.2
Data Item Selection window (P941SLW)
12.6
Setting up Database Field Level Masking
12.6.1
File Name Selection window (P941SLW)
12.7
Working with Field Level Masking Workbench
12.8
Setting Field Level Masking
12.9
Dropping Field Level Masking
13
Set Up User Defined Codes Security
13.1
Setting Up User Defined Codes Security
13.1.1
General Guidelines
13.1.2
User Defined Codes Security - Helpful Hints
14
Set Up Batch Approval/Post Security
14.1
Setting Up Batch Approval/Post Security
15
Set Up Report Writer Security
15.1
Setting up Report Writer Form Security
15.1.1
General Guidelines
15.2
Updating Report Writer Version Security
15.3
Masking DREAM Writer Processing Options
16
Change User Profile Ownership
16.1
Changing User Profile Ownership
17
Work With the Security Workbench
17.1
Understanding the Security Workbench
17.2
Using the Security Workbench
17.2.1
Security Workbench Options
17.2.2
Security Workbench Function Keys
17.2.3
DREAM Writer Considerations
17.2.4
Security Workbench Examples
17.2.4.1
Example 1
17.2.4.2
Example 2
17.2.5
Exporting Security Data from the Security Workbench
17.3
Working With the Security Tester
17.3.1
Security Tester Options
17.3.2
Security Tester Examples
17.3.2.1
Example 1
17.3.2.2
Example 2
17.3.3
Wildcard Search
17.3.3.1
Wildcard Search Examples
17.3.4
Detail Column
17.4
Understanding the Security Detail Report
17.4.1
DREAM Writer Considerations
17.4.2
Exporting Security Data from the Security Detail Report
18
Work with Configuration Master Records
18.1
Working with Configuration Master Records
19
Security Reporting
19.1
General Guidelines
19.2
Configuring and Using User Activity Reporting
19.3
Configuring and Using Database Audit Manager
19.4
Configuring and Using Segregation of Duties Reports
Part IV JD Edwards World Developer Security
20
Development Environments
20.1
Developer Access
20.2
Libraries
20.3
Program Source
21
Application Security Policies
21.1
Menu Security
21.2
Action Code Security
21.3
Function Key Security
21.4
Video Design
21.5
DREAM Writer
21.6
Data Dictionary and User Defined Codes
21.7
File Audit Fields
21.8
User Authentication
22
Object Security Policies
22.1
File Objects
22.2
Program Objects
22.3
Adopted Authority
Part V Appendices
A
Secure Deployment Checklist
A.1
About Secure Deployment Checklist
B
Example of Setting a Field with Field Level Masking
B.1
Proof of Field Level Masking Set
B.2
Test the Masking Field on a Screen and a Report
C
IBM Authorization Lists – Object Authority Information
C.1
Object Authority - Help
C.2
Field Level Masking – Authority Rights
Glossary
Index
Scripting on this page enhances content navigation, but does not change the content in any way.