• Introducing Dark Mode! Switch by clicking on the lightbulb icon next to Search or by clicking on Default style at the bottom left of the page!

World Security Flowchart


Is there any type of World security flow chart? Also, I was told that during the security classes they handed out a sheet that showed exactly which items you had to secure (like a check list) to make sure you had the item you wanted secured. Does this maek any sense?

Kenny Gravitt
1801 Waters Ridge Dr.
Lewisville, TX 75057
A73.3 Cumm12X3 V4R4M0


Active Member
I have the document 'Standard J.D. Edwards Format of Security Masking' which
I received at a JDE class. Has a wonderful flow chart on World security.
Wish you were here to see it <grin>! Stop by and take a look at it when you
are in Blue Springs MO!

You might also enjoy the article 'Implementing Application-Only Access: A
Case Study' by William C. Rausch, published in the Midrange Computing
magazine, March 1996. Discusses application-only access for JDE security.

Eric Lehti    Certified JD Edwards Professional
Fike Corporation, 704 SW 10th Street, Blue Springs, Missouri 64015
* Phone (816) 229-3405 ext. 231   * Fax (816) 229-4615
JD Edwards A73 Cume 10, AS/400 9406-730, OS/400 V4R4