EMERALDCUBE BLOG

ARCHIVE FOR THE AUTHOR “CHRIS BULLOCK”

Databrowser Security – Part I

Recently, a client came to me with a request to give temporary databrowser access for just a few tables to a new role that was being created. My first thought – not possible, based on having to setup table security within security workbench to deny access to all tables and grant back access to the [...]

Running the UBE R9698711

Are you experiencing system performance issues, installing multiple ESUs, heavy development or getting ready for go-live after an upgrade? Do you want to be more proactive with knowing the health of your JDE tables?  If you answered yes to any of those questions, the R9698711 UBE could be your best friend. The R9698711 identifies all […]

JDE Security – Closed vs. Open (part 3)

This is the last part of my JDE security blog series. On part 1, I presented an overview of the most popular security implementation approaches, on part 2, I talked about Open Security Model and on this third and final part, I will cover the Closed Security Model, in particular the Application and Action security […]

Subsystem Jobs in a Wait State

Recently during an audit of a client’s system that had just gone live on JDE 9.1, I discovered there were 22,000 records in the F986113 on a waiting state (screenshot below). The client had not complained about UBEs not running and I had not found any subsystem jobs setup during the initial investigation of the […]

JDE Security – Closed vs. Open (part 2)

While providing an overview of Open Model security in part 1 of this blog, I gave some examples of why an Open Model configuration is often selected, and ways it is implemented. In part 2, I will go into deeper details and provide some examples of how Open Model security configuration is used with JDE. […]

JDE Security – Closed vs. Open (part 1)

Security is a vital component of your JD Edwards environment and needs to be implemented properly to make full use of its benefits. Security is an area that can be confusing and tough to implement, regardless of whether you implement it before or after go-live. In this three part blog, I will discuss security as […]