JD Edwards Security
I have recently joined a new security role and have been assigned the task to assess their JDE Security. Although I have extensive experience in developing UBEs and applications I have no practical experience in implementing or maintaining JDE security and am looking for advice.
Basically, they want to ensure that the existing security is appropriate, reflects role assignments and enforces suitable segregation of duties. Their JDE security has been set up as role based with individual roles being applied to a user as required to complete their day to day tasks. Generally the roles are quite broad with a number of objects included within each one and in order to give a user one specific program or report, an additional full role has been given to the user. This has created some concern over segregation of duties and conflict within the security workbench.