ARCHIVE FOR THE “MANAGED SERVICES” CATEGORY
We CNCs have 101 tasks to do every day. Some of them you WANT to do, and many are ones you HAVE to do. Generating an Impact Analysis is one of those tasks that is both. You should have to do it, AND you should want to do it. In the long run it will save you and your company lots of valuable time and reduce the risks associated with change.
Repository History is created when you apply an ESU, check an object in, promote an object in OMW, etc. You can access the Repository to get information about all historical actions that have been taken affecting object specifications. For this example, after application of an ESU, errors were being received that indicated there was a problem with the structure of one of the JDE tables. The ESU was reapplied using Force Merge for this object, but the error remained. In order to verify that specs were updated by application of the ESU, P98780H was used to export objects and compare them.
So, way back last year (okay, just a few weeks ago), Chris wrote Part 1 of this blog, and promised a Part 2 with a 9.1 workaround for the same problem. To recap – a client wanted to grant access via Databrowser to just a few tables for a role. We knew we couldn’t use object level security, as that would completely limit that user in all of E1 to just those few tables. In the first part of this blog – I’ll pause here in case you want to go re-read – Chris talked about how to accomplish this in 9.2 with UDO View security. But there are still E1 customers on 9.1, so how could they accomplish something similar without the cool UDO features you get in 9.2?
UX One is the latest advancement in the JD Edwards EnterpriseOne user experience. Utilizing the Alert, Analyze, and Act model, JD Edwards is transforming the User Experience and maximizing productivity. These 3 principles in UX One empower you to be more effective and efficient, while performing your day-to-day tasks. With Alerts, you will be notified […]
Although not officially supported by Oracle, it is a common practice to segregate JDE functional security between production and non-production environments. This is accomplished by creating a copy of Security Workbench table and mapping it to a shared data source other than System for the non-production environments, while keeping the regular table in System data […]
JDE has multiple technical tables where data is stored which have the capacity to become very large. This blog outlines steps for running manual purges on some of these technical tables. Purge Submitted Jobs: R9861101 R9861101 calls the R9861102 which deletes the associated PDF’s from the print queue on the server. R9861101 then deletes the […]
In today’s article, I will be covering a common issue seen with JDBj connection pooling within the JD Edwards EnterpriseOne web client and its most common causes. First, let’s talk high-level details on JDBj connection pooling. This is the internal component that creates, maintains, and cleans up the JDBj connections to the backend database for […]
This is the last part of my JDE security blog series. On part 1, I presented an overview of the most popular security implementation approaches, on part 2, I talked about Open Security Model and on this third and final part, I will cover the Closed Security Model, in particular the Application and Action security […]