Adding Multiple Users

When you are ready to create user profiles for the first time, you might need to create hundreds of profiles simultaneously. In this case, EnterpriseOne provides batch processes to create the profiles. These batch processes automate the process of user profile creation.

When you decide which role to assign to a user, consider application security as the most important role because:

  • Application security has the most extensive setup.

  • Managing overrides to the role security is more difficult than, for example, managing overrides to deployment preferences.

    Note: Sign-in security is not based on roles because individuals must have their own passwords. A program exists with sign-in security to quickly create individual security records by role; however, after the records are created, security is assigned by an individual.

The following list describes the high-level steps for adding multiple user profiles simultaneously.

  1. Using the Address Book application (P01012), create address book records for roles that you will use in user profiles.

  2. Using the User Profile Revisions application, add the role profiles.

  3. Populate the various Address Book tables.

    If you are migrating data from a non-JD Edwards EnterpriseOne system, you can populate the data tables with a table conversion. Otherwise, you can manually add data to the Address Book tables.

  4. Run the Populate User Profiles (R0092) batch process to create user profile records from existing Address Book records.

    Normally, this report is based on address book records with a search type for employees (E).

  5. Adjust each user's role assignments.

    Determine the role in which you want to place an individual and manually assign each user to a role. Change the user environments if they are not standard to that role.

    These settings are dictated by role:

    • Environments

    • User Overrides

    • Application Security

  6. Run the Summary of Environments, Packages and Profiles batch process (R00921) to view the new user profiles.

  7. Use Security Workbench (P00950) to apply application, action, and processing option security for roles and any individual overrides to those roles.

  8. Create sign-in security records using the User Security application (P98OWSEC).

    You can create sign-in security records for all individuals within a role by entering one record for the role.

  9. Manually populate the F00960 table.

    This table is automatically populated each time a machine signs in to JD Edwards EnterpriseOne. However, if you intend to use schedule packages, you must manually populate this table.

  10. Create user overrides for roles.

    Normally, you will not create any overrides for individuals because they can easily create their own as they use the software.