Prerequisites

Before you configure JD Edwards EnterpriseOne for auditing and electronic signatures:

  • Use Security Workbench (P00950) to secure the audit applications (P9500001, P9500002, P9500003, and P9500005) in JD Edwards EnterpriseOne to ensure that only the appropriate users have access.

  • Create a backup of the database before configuring audit tables and make sure that the restore process works.

  • Plan the audit:

    • Research and determine which tables and columns need to be audited.

    • Research and determine if database triggers and database views are currently in use for the tables that you plan to audit. If this is the case, you must manually remove those objects before auditing is configured. Once auditing is configured, those objects must be manually enabled.

    • Research and determine which applications, forms, and reports require electronic signature approvals.

    • Research and determine which roles are required for electronic approval. If needed, set up additional roles in JD Edwards EnterpriseOne.

      See "Setting Up Roles" in the JD Edwards EnterpriseOne Tools Security Administration Guide.

    • Plan for additional disk space for audit tables.

  • Make sure that the proposed audited table names are not called tablename_ADT.If they are, rename them.