EMERALDCUBE BLOG

ARCHIVE FOR THE “MANAGED SERVICES” CATEGORY

Impact Analysis: Useful Tool, or Auditor’s Check Box?

We CNCs have 101 tasks to do every day.  Some of them you WANT to do, and many are ones you HAVE to do.  Generating an Impact Analysis is one of those tasks that is both.  You should have to do it, AND you should want to do it.  In the long run it will save you and your company lots of valuable time and reduce the risks associated with change.

Comparing Specs Using P98780H – Work with Repository History

Repository History is created when you apply an ESU, check an object in, promote an object in OMW, etc. You can access the Repository to get information about all historical actions that have been taken affecting object specifications. For this example, after application of an ESU, errors were being received that indicated there was a problem with the structure of one of the JDE tables. The ESU was reapplied using Force Merge for this object, but the error remained. In order to verify that specs were updated by application of the ESU, P98780H was used to export objects and compare them.

Databrowser Security – Part II – The 9.1 Remix

So, way back last year (okay, just a few weeks ago), Chris wrote Part 1 of this blog, and promised a Part 2 with a 9.1 workaround for the same problem. To recap – a client wanted to grant access via Databrowser to just a few tables for a role. We knew we couldn’t use object level security, as that would completely limit that user in all of E1 to just those few tables. In the first part of this blog – I’ll pause here in case you want to go re-read – Chris talked about how to accomplish this in 9.2 with UDO View security. But there are still E1 customers on 9.1, so how could they accomplish something similar without the cool UDO features you get in 9.2?

Highlights: JDE E1 Applications Release 9.2 Update 3

ERP Notification Enhancements - Delivered Notifications JD Edwards EnterpriseOne Notifications enable you to stay connected with critical conditions and events that occur continuously throughout the enterprise. These notifications can be pushed to subscribers even when they are not actively using EnterpriseOne, raising awareness of the situation and enabling them to act upon them using application [...]

Databrowser Security – Part I

Recently, a client came to me with a request to give temporary databrowser access for just a few tables to a new role that was being created. My first thought – not possible, based on having to setup table security within security workbench to deny access to all tables and grant back access to the [...]

UX One: Alert, Analyze, Act

UX One is the latest advancement in the JD Edwards EnterpriseOne user experience. Utilizing the Alert, Analyze, and Act model, JD Edwards is transforming the User Experience and maximizing productivity. These 3 principles in UX One empower you to be more effective and efficient, while performing your day-to-day tasks. With Alerts, you will be notified […]

OMW Logging Security and Security Segregation

Although not officially supported by Oracle, it is a common practice to segregate JDE functional security between production and non-production environments. This is accomplished by creating a copy of Security Workbench table and mapping it to a shared data source other than System for the non-production environments, while keeping the regular table in System data […]

JDE Technical Purge Jobs

JDE has multiple technical tables where data is stored which have the capacity to become very large. This blog outlines steps for running manual purges on some of these technical tables. Purge Submitted Jobs: R9861101 R9861101 calls the R9861102 which deletes the associated PDF’s from the print queue on the server. R9861101 then deletes the […]

Web Server JDBJ Connection Pool Issues

In today’s article, I will be covering a common issue seen with JDBj connection pooling within the JD Edwards EnterpriseOne web client and its most common causes. First, let’s talk high-level details on JDBj connection pooling. This is the internal component that creates, maintains, and cleans up the JDBj connections to the backend database for […]

JDE Security – Closed vs. Open (part 3)

This is the last part of my JDE security blog series. On part 1, I presented an overview of the most popular security implementation approaches, on part 2, I talked about Open Security Model and on this third and final part, I will cover the Closed Security Model, in particular the Application and Action security […]