EMERALDCUBE BLOG

ARCHIVE FOR THE “MANAGED SERVICES” CATEGORY

Databrowser Security – Part I

Recently, a client came to me with a request to give temporary databrowser access for just a few tables to a new role that was being created. My first thought – not possible, based on having to setup table security within security workbench to deny access to all tables and grant back access to the [...]

UX One: Alert, Analyze, Act

UX One is the latest advancement in the JD Edwards EnterpriseOne user experience. Utilizing the Alert, Analyze, and Act model, JD Edwards is transforming the User Experience and maximizing productivity. These 3 principles in UX One empower you to be more effective and efficient, while performing your day-to-day tasks. With Alerts, you will be notified […]

OMW Logging Security and Security Segregation

Although not officially supported by Oracle, it is a common practice to segregate JDE functional security between production and non-production environments. This is accomplished by creating a copy of Security Workbench table and mapping it to a shared data source other than System for the non-production environments, while keeping the regular table in System data […]

JDE Technical Purge Jobs

JDE has multiple technical tables where data is stored which have the capacity to become very large. This blog outlines steps for running manual purges on some of these technical tables. Purge Submitted Jobs: R9861101 R9861101 calls the R9861102 which deletes the associated PDF’s from the print queue on the server. R9861101 then deletes the […]

Web Server JDBJ Connection Pool Issues

In today’s article, I will be covering a common issue seen with JDBj connection pooling within the JD Edwards EnterpriseOne web client and its most common causes. First, let’s talk high-level details on JDBj connection pooling. This is the internal component that creates, maintains, and cleans up the JDBj connections to the backend database for […]

JDE Security – Closed vs. Open (part 3)

This is the last part of my JDE security blog series. On part 1, I presented an overview of the most popular security implementation approaches, on part 2, I talked about Open Security Model and on this third and final part, I will cover the Closed Security Model, in particular the Application and Action security […]

Subsystem Jobs in a Wait State

Recently during an audit of a client’s system that had just gone live on JDE 9.1, I discovered there were 22,000 records in the F986113 on a waiting state (screenshot below). The client had not complained about UBEs not running and I had not found any subsystem jobs setup during the initial investigation of the […]

JDE Security – Closed vs. Open (part 2)

While providing an overview of Open Model security in part 1 of this blog, I gave some examples of why an Open Model configuration is often selected, and ways it is implemented. In part 2, I will go into deeper details and provide some examples of how Open Model security configuration is used with JDE. […]

JDE Security – Closed vs. Open (part 1)

Security is a vital component of your JD Edwards environment and needs to be implemented properly to make full use of its benefits. Security is an area that can be confusing and tough to implement, regardless of whether you implement it before or after go-live. In this three part blog, I will discuss security as […]

Why Do Companies Need Technical Managed Services for JDE?

Why would companies need to utilize Managed Services for JD Edwards production support?   To answer that question, we need to look at the playing field for IT organizations tasked with maintaining the JD Edwards EnterpriseOne software. Most companies are not in the business of maintaining systems Most companies only choose to spend time managing IT […]