• Introducing Dark Mode! Switch by clicking on the lightbulb icon next to Search or by clicking on Default style at the bottom left of the page!

World Security Flowchart

kennyg

Member
Is there any type of World security flow chart? Also, I was told that during the security classes they handed out a sheet that showed exactly which items you had to secure (like a check list) to make sure you had the item you wanted secured. Does this maek any sense?

Kenny Gravitt
Fourseasons
1801 Waters Ridge Dr.
Lewisville, TX 75057
A73.3 Cumm12X3 V4R4M0
 

Eric_Lehti

Active Member
Kenny,
I have the document 'Standard J.D. Edwards Format of Security Masking' which
I received at a JDE class. Has a wonderful flow chart on World security.
Wish you were here to see it <grin>! Stop by and take a look at it when you
are in Blue Springs MO!

You might also enjoy the article 'Implementing Application-Only Access: A
Case Study' by William C. Rausch, published in the Midrange Computing
magazine, March 1996. Discusses application-only access for JDE security.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Eric Lehti    Certified JD Edwards Professional
Fike Corporation, 704 SW 10th Street, Blue Springs, Missouri 64015
mailto:Eric.Lehti@fike.com
* Phone (816) 229-3405 ext. 231   * Fax (816) 229-4615
JD Edwards A73 Cume 10, AS/400 9406-730, OS/400 V4R4
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

@
 
Top