World Security Flowchart

kennyg

Member
Is there any type of World security flow chart? Also, I was told that during the security classes they handed out a sheet that showed exactly which items you had to secure (like a check list) to make sure you had the item you wanted secured. Does this maek any sense?

Kenny Gravitt
Fourseasons
1801 Waters Ridge Dr.
Lewisville, TX 75057
A73.3 Cumm12X3 V4R4M0
 
Kenny,
I have the document 'Standard J.D. Edwards Format of Security Masking' which
I received at a JDE class. Has a wonderful flow chart on World security.
Wish you were here to see it <grin>! Stop by and take a look at it when you
are in Blue Springs MO!

You might also enjoy the article 'Implementing Application-Only Access: A
Case Study' by William C. Rausch, published in the Midrange Computing
magazine, March 1996. Discusses application-only access for JDE security.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Eric Lehti    Certified JD Edwards Professional
Fike Corporation, 704 SW 10th Street, Blue Springs, Missouri 64015
mailto:[email protected]
* Phone (816) 229-3405 ext. 231   * Fax (816) 229-4615
JD Edwards A73 Cume 10, AS/400 9406-730, OS/400 V4R4
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

@
 

Similar threads

Replies
3
Views
2K
scott_parker
Replies
4
Views
1K
Eric_Holm
Replies
9
Views
2K
ekempter
ekempter
Replies
5
Views
3K
Jlwilcox
Back
Top