JDE Security – Closed vs. Open (part 2)

While providing an overview of Open Model security in part 1 of this blog, I gave some examples of why an Open Model configuration is often selected, and ways it is implemented. In part 2, I will go into deeper details and provide some examples of how Open Model security configuration is used with JDE. […]

JDE Security – Closed vs. Open (part 1)

Security is a vital component of your JD Edwards environment and needs to be implemented properly to make full use of its benefits. Security is an area that can be confusing and tough to implement, regardless of whether you implement it before or after go-live. In this three part blog, I will discuss security as […]