Understanding this Guide

This guide contains comprehensive instructions and recommendations for setting up a secure EnterpriseOne environment. It contains pre- and post installation security considerations, as well as instructions on how to use EnterpriseOne security applications to ensure only authorized individuals have access to EnterpriseOne applications, features, and data.

This guide is organized into the following parts: