Setting Up Security for Base EnterpriseOne Applications Used by Mobile Enterprise Applications

In addition to setting up permissions to access EnterpriseOne mobile enterprise applications, you must make sure that mobile users have permissions to access the base EnterpriseOne applications and application data that the mobile enterprise applications use.

In the Enterpriseone Security Workbench, the following types of security applied to base EnterpriseOne applications also applies to mobile enterprise applications:

  • Application security

  • Exclusive application security

  • Row security

If row security is defined that prevents users from seeing certain data in the base EnterpriseOne application, mobile users will not be able to see the data in the mobile enterprise application.