RE: Security Procedures

ineese

Member
RE: Security Procedures

I purchased "J.D. Edwards WorldSoftware - An Administrator's Guide" by Greg
Panza and Arnie Edelstein. There is a section in the book on security. It's
not as detailed as I would have liked, but is the best I've seen. I got it
through www.techtarget.com.
 
RE: Security Procedures

Hi All,

In 1999 at the Quest Conference in Denver , there was a half day session on
Security, I was not at the Conference, but my colleague was. They were
issued with a document / booklet which I found very useful when preparing
for our Internal audit. Perhaps you can try to get a copy of the document.
(through Quest or JDE)

I also went to a presentation given by a company Q software International
(AQUILA PRODUCTS a JDE Alliance partner) ... here in South Africa, and apart
from SELLING software to assist one in set up and audit of security, I found
their presenter to be extremely knowledgeable in security issues. Perhaps
one can get some documentation from them.... or assistance ? I know they do
consulting, and I thought the person they sent here to do the demonstration
and talk , to know EVERYTHING we needed to get our system totally auditable,
secure and easy to manage. This is not an advertisement for their products,
as I am sure there are other products available, I found the STAFF knowledge
fantastic. I do have contact details.

It is very easy to tie the system up so tight that it becomes a nightmare to
deal with. But there is an easy was to do it.

I can send you a list of programs and files, that are 'sensitive' and should
be protected, but first you need the basic security in place.

I do have more information (head knowledge) , but it will take me time to
get my thoughts into order as to where to start.


Regards

Jill Bingham
Johnson & Johnson Professional Products South Africa
[email protected] <mailto:[email protected]>
A7.3 cum 8.
Opinions expressed are not necessarily those of my employer
 
A small tip but very usefull tip:

With PDM, scan your JDESRC for the following string:

/COPY JDECPY,C0001

That should give you all the programs that are eligable for action code security. Dump the spoolfile into a file and query to your hearts content. *PUBLIC *ALL N N N is one big step closer.

Aquila can also sort it out for you but, we found this one cheaper :)

Richard.

Hi All,

In 1999 at the Quest Conference in Denver , there was a half day session on
Security, I was not at the Conference, but my colleague was. They were
issued with a document / booklet which I found very useful when preparing
for our Internal audit. Perhaps you can try to get a copy of the document.
(through Quest or JDE)

I also went to a presentation given by a company Q software International
(AQUILA PRODUCTS a JDE Alliance partner) ... here in South Africa, and apart
from SELLING software to assist one in set up and audit of security, I found
their presenter to be extremely knowledgeable in security issues. Perhaps
one can get some documentation from them.... or assistance ? I know they do
consulting, and I thought the person they sent here to do the demonstration
and talk , to know EVERYTHING we needed to get our system totally auditable,
secure and easy to manage. This is not an advertisement for their products,
as I am sure there are other products available, I found the STAFF knowledge
fantastic. I do have contact details.

It is very easy to tie the system up so tight that it becomes a nightmare to
deal with. But there is an easy was to do it.

I can send you a list of programs and files, that are 'sensitive' and should
be protected, but first you need the basic security in place.

I do have moe information (head knowledge) , but it will take me time to
get my thoughts into order as to where to start.


Regards

Jill Bingham
Johnson & Johnson Professional Products South Africa
[email protected] <mailto:[email protected]>
A7.3 cum 8.
Opinions expressed are not necessarily those of my employer






--------------------------
 
Back
Top