action security

  1. Access Rules/logic - action+application security

    Would someone be able to advise what are the actual logical rules for granting write or read access to an object? (JDE 8.12) we already know that sec 3 (application) Run Y on its own without sec 1 (action) specified grants Read access. Would you know whether for Add Y, Change Y and Copy Y the...