user defined objects (udos) security · obiee embedded forms composite page udos ovrspring...

Post on 08-Oct-2020

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

User Defined Objects (UDOs) Security

2

Who we are

We are a team of proven experts in JD Edwards.

3

How We Will Help

Ensuring the right balance between maintenance and

innovation

Uncovering the hidden possibilities

in JDE to help organizations realize

their full potential

Creating the best path toward your business goals

OptimizedPlatform

We make EnterpriseOne work better for

people, and work harder for businesses.

Extend & Innovate

InformationClarity

OUR PEOPLE

Why work with us?

OUR VALUES

OUR FLEXIBILITY

5

Agenda

UDOs - Overview

Security Process Steps

Security Types

Approach & Recommendations

Security Implementation

Demo

Questions

6

UDOs Overview - TodayUDOs are personalized objects that users can create for their own use and share

with others depending on the permissions they and others have been granted.

Orchestration

Queries

E1Pages

Images

One View

Cafe1

Watch Lists

E1 Search

Composite Pages

Personal Form

Æ 18 UDOs TypesÆ 50 UX1 Pre-Built Roles

Æ 1700+ Pre-Built UDOs

Service Request

Rules

XReference

White Lists

Notifications

Schedule

Task Search

Grid Format

Core UDOs Ochestrator Sudio UDOs

270 350

500 180

240

100 350

Pre-Built UX1 Roles

50

7

Alert analyse Act allow users to work the way they want and be more effcient Alert analyse Act allow users to work the way they want and be more effcient

UDOs and UX1 Role Based Landing Pages

50

ÆSimplify Tasks Æ Improve Quality Æ Improve User Satisfaction

Role-based solutions across the broad portfolio of JD Edwards products

100

8

UDOs Requirements

Software Licensing: No additional license required

E1 Infrastructure: • Oracle Weblogic Server with ADF Runtime• AIS Web Instance Required (Base License)• Dedicated HTML Web Instance (Optional) – for performance processing• ADF Server (Optional)

E1 Components: • Tools Release ASI (Automated Special Instructions)• UX One ESUs• UX One ADF Components (optional)• UDOs Components (*.zip)• Data Pack: UX One Security Roles• Data Pack: UX One Demo Data (Demo / Sandbox Environment)

9

How Does UDO Security Fit In?

UDOs security is built on top of E1 Objects Security

UDOs Security

DV UDOs PY UDOs PD UDOs

E1 Object Security

DV Objects

PY Objects

PD Objects

E1 Objects security supercedes UDOs security

P00950U0/ F00950WP98220U

P00950/F00950

OMW Web / PromotionP98220W

OMW Object Promotion P98220

10

UDOs & Security Steps

CreateUDOs

ApprovalProcess

Publish Request

UDOsSharing

Grant View

Grant UDOs Action

*PUBLIC

Role(s)

User(s)

Feature Security

11

UDOs Security Components

UDOs Approval Process

UDOs Action SecurityDisable-Create-Modify- Publish

UDOs View Security *Public/Role/User Access

UDOs Content Security

Feature SecurityEnable UDOs

*Public/Role/User Access

P98220U UDO Admin Management

*Public/Role/User Access

System Wide Access

12

Enabling Content Security

Content

Content

Cafe1 UDOs

View Access(Page Frame)

Enable Content

+

Generic URLs

OBIEE

Embedded Forms

Composite Page UDOs

OVR ADFSpring Board Watch ListClassic E1Pages

Same security process as Cafe1 with additional content to secure:

13

Understanding UDOs Life Cycle

Standardized process using web-based tools

DV PY PD

OMW Web UDO Project Promotion

For UDOs ONLY

Import/Export

Using OMW Web App (P98220W)

14

• UDOs could become challenging to manage over time• Roles definition may not be optimized & User Productivity

could be affected• E1 system performance could potentially be impacted

negatively

How can your organization implement UDOs safely &

effectively?

What best practice guidelines can you

follow?

What to expect without a well-defined Security & Process framework in place ?

15

UDO Security Approach

95% Planning• Define your key players

• Assign UDOs Owners by Department (Business Owners)• Assign Approvers (Managers)• Delegate UDOs Management to UDOs Business Owners or

Managers• Define your UDOs Security Model• Define your Approval & Promotion Processes• Define your roles & UDOs View security

• Understand clearly your role requirements• Leverage / build upon the Oracle pre-defined UX1 Roles

5% Execution• Test UDOs before sharing them• Approve, share and set up UDOs Security• Manage UDOs through OMW Web

16

Other Recommendations

Assess the Oracle UX1 Roles & UDOs in a Demo Environment• Use & modify them to fit your requirements, or• Leverage them to define your own roles & UDOs

Stick to the “80/20” Rule as you grow• 80% of a role definition = 20% of the volume of UDOs generated for that role• Too many UDOs assigned to a role can be counter-productive and

overwhelming to the end users

Grant Action/View/Content at a Role Level• Manage user exception tightly• Be selective when sharing at a *Public Level

Manage UDOs Through the Web OMW(optional, but recommended)• Carefully test the performance impact of queries, E1 search, and OneView

Reports on your E1 system before promoting them to Production

17

Demo

18

Q+A

Jean-Paul (JP) SavalliSenior Architect/CNCjp.savalli@erp-one.com

top related