Security Administration Guide
Security Administration Guide
EnterpriseOne
Tools
9.2
JD Edwards EnterpriseOne Tools
Security Administration Guide
9.2
This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected
by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate,
broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering,
disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report
them to us in writing.
If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then
the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or
activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or
accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the
applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display,
disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated
software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer
documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract. The
terms governing the U.S. Government's use of Oracle cloud services are defined by the applicable contract for such services. No other rights are
granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for
use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware
in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe
use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
Intel and Intel Inside are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks
or registered trademarks of SPARC International, Inc. AMD, Epyc, and the AMD logo are trademarks or registered trademarks of Advanced Micro
Devices. UNIX is a registered trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle
Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and
services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible
for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable
agreement between you and Oracle.
JD Edwards EnterpriseOne Tools
Security Administration Guide
Contents
Preface .................................................................................................................................. i
Prerequisites .................................................................................................................................................................................. 46
Setting Up Site Keys on the Security Server ......................................................................................................................... 47
Recovering Site Key Values ....................................................................................................................................................... 49
Encrypting Sensitive INI File Data Using the Deployment Server ..................................................................................... 49
Encrypting Database Proxy User Passwords (Release 9.2.1) ................................................................................................ 51
Commands for Encrypting Passwords Used by RUNUBE and RUNUBEXML .................................................................. 52
Enhanced Scheduler Password Encryption (Release 9.2.7.3) .............................................................................................. 53
18 Using Oracle Access Manager to Enable Support for Windows Native 217
Authentication with EnterpriseOne
Using Oracle Access Manager to Enable Support for Windows Native Authentication with EnterpriseOne ........... 217
Understanding Windows Native Authentication Support in OAM .................................................................................. 217
Before You Begin ........................................................................................................................................................................ 217
Performing Prerequisite Integration Tasks ............................................................................................................................ 218
Configuring OAM to Use Windows Native Authentication ............................................................................................... 220
Managing Content Security for Composite Page (Release 9.2.0.2) ................................................................................. 338
37 Glossary 399
access provisioning ................................................................................................................................................................... 399
add mode .................................................................................................................................................................................... 399
authentication ............................................................................................................................................................................. 399
authorization ............................................................................................................................................................................... 399
data encryption .......................................................................................................................................................................... 399
data masking .............................................................................................................................................................................. 399
data privacy ................................................................................................................................................................................ 400
developer security ..................................................................................................................................................................... 400
object-level security .................................................................................................................................................................. 400
power form ................................................................................................................................................................................. 400
*PUBLIC ....................................................................................................................................................................................... 400
published business service ..................................................................................................................................................... 400
secure by default ........................................................................................................................................................................ 401
Secure Socket Layer (SSL) ....................................................................................................................................................... 401
JD Edwards EnterpriseOne Tools
Security Administration Guide
Preface
Welcome to the JD Edwards EnterpriseOne documentation.
Documentation Accessibility
For information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program website at http://
www.oracle.com/pls/topic/lookup?ctx=acc&id=docacc .
Related Information
For additional information about JD Edwards EnterpriseOne applications, features, content, and training, visit the JD
Edwards EnterpriseOne pages on the JD Edwards Resource Library located at:
http://learnjde.com
Conventions
The following text conventions are used in this document:
Convention Meaning
Bold Boldface type indicates graphical user interface elements associated with an action or terms defined in
text or the glossary.
Italics Italic type indicates book titles, emphasis, or placeholder variables for which you supply particular
values.
Monospace Monospace type indicates commands within a paragraph, URLs, code examples, text that appears on a
screen, or text that you enter.
> Oracle by Example Indicates a link to an Oracle by Example (OBE). OBEs provide hands-on, step- by-step instructions,
including screen captures that guide you through a process using your own environment. Access to
OBEs requires a valid Oracle account.
i
JD Edwards EnterpriseOne Tools Preface
Security Administration Guide
ii
JD Edwards EnterpriseOne Tools Chapter 1
Security Administration Guide Introduction to EnterpriseOne Security
• Part I, Security Overview Chapters provide an overview of EnterpriseOne security, from secure architecture
for an EnterpriseOne environment to application security.
Part II provides guidelines and recommendations for configuring and deploying JD Edwards EnterpriseOne
to make it more secure in real-world, customer environments. It provides information about securing the
overall infrastructure of a deployed EnterpriseOne system. It contains practical instruction for technical
users, installers, and system administrators who implement and maintain the EnterpriseOne system. Part II
also contains system hardening configuration recommendations, including hardening of the EnterpriseOne
database and hardening of EnterpriseOne tools and administration applications.
It is not possible to address every security scenario that might be applicable to a particular implementation and
environment. Therefore, the items discussed in this part are intended to give a broad, best practices baseline
for securing EnterpriseOne.
1
JD Edwards EnterpriseOne Tools Chapter 1
Security Administration Guide Introduction to EnterpriseOne Security
• Part III, EnterpriseOne Access Provisioning Chapters describes how to set up user and role profiles in
EnterpriseOne so that you can configure sign-in security and object-level security for EnterpriseOne users.
Access provisioning is the process of setting up user and role profiles in EnterpriseOne in order for users to gain
access to EnterpriseOne and the particular applications and features they are authorized to use. After you set
up user and role profiles, you can create sign-in security records for each user. You also have the option to set
up a single sign-on configuration or configuring EnterpriseOne to manage users through third-party, LDAP-
enabled systems. See Part IV, "EnterpriseOne Authentication Security" for more information.
In addition, you use user and role profiles to create security records for authorizing access to particular
EnterpriseOne applications, features, and data. See Part V, "EnterpriseOne Authorization Security" for more
information.
EnterpriseOne authentication security ensures that anyone who attempts to sign in to EnterpriseOne is a valid,
authenticated EnterpriseOne user.
In addition to setting up sign-in security, authentication security encompasses configurations for single sign-
on, managing users and passwords in an LDAP-compliant directory service, and unified logon (prior to release
2
JD Edwards EnterpriseOne Tools Chapter 1
Security Administration Guide Introduction to EnterpriseOne Security
9.2.2 only). It is important that you carefully follow the instructions as you implement any of the configurations
discussed in this part.
Chapter 16 - Setting Up JD Edwards EnterpriseOne Single Sign-On Through Oracle Access Management 11g
Release 2
Chapter 17 - Setting Up JD Edwards EnterpriseOne Single Sign-On Through Oracle Access Management 12c
Chapter 18 - Using Oracle Access Manager to Enable Support for Windows Native Authentication with
EnterpriseOne
Chapter 19 - Configuring Long User ID and Password Support in a Single Sign-On Configuration with Oracle
Access Manager
The Object Management Workbench (OMW) in EnterpriseOne is the primary component of the change
management system for EnterpriseOne development. A change management system is vital to a productive
development environment because it helps organize a myriad of development activities and helps prevent
3
JD Edwards EnterpriseOne Tools Chapter 1
Security Administration Guide Introduction to EnterpriseOne Security
problems, such as when a developer intermixes components from different releases or when multiple
developers simultaneously change an object. OMW automates many of these change management activities.
As part of the OMW implementation, it is critical that you set up permissions to determine who can access
OMW, as well as set up and assign OMW users to roles that control the actions that they can perform.
In addition, EnterpriseOne enables you to set up security for developers who use Object Management Workbench
(OMW) to add and modify objects for custom applications. Setting up developer security ensures that developers can
only perform certain actions in OMW based on pre-defined responsibilities.
EnterpriseOne also includes reports that you can use for security auditing purposes, as well as auditing features for
supporting the 21 CFR Part 11 auditing regulations.
Before you use the EnterpriseOne administration applications to properly set up authentication security, authorization
security, developer security, and security auditing, it is important that the overall infrastructure of a deployed JD
Edwards EnterpriseOne system is properly secured. See Secure Installation and Configurationin this guide for more
information.
4
JD Edwards EnterpriseOne Tools Chapter 1
Security Administration Guide Introduction to EnterpriseOne Security
The process of setting up user and role profiles in EnterpriseOne for sign-in security (authentication) and authorization
security.
Authentication
The process of verifying that users signing into EnterpriseOne are valid EnterpriseOne users.
Authorization
The process of granting or denying users access to EnterpriseOne applications, features, data, and data sources. In
EnterpriseOne, most authorization security is applied at the object level through Security Workbench.
Object-level security
A type of authorization security that enables you to secure specific EnterpriseOne objects such as applications, forms,
and various other EnterpriseOne features. Object-level security provides flexibility and a higher level of security
integrity.
Developer security
Security that determines the actions developers can perform when customizing or developing EnterpriseOne
applications in Object Management Workbench (OMW). Actions can include checking out and checking in objects,
promoting objects, transferring objects, removing objects, and so forth. OMW's automation relies on an administrator
who carefully configures these actions.
Security auditing
EnterpriseOne contains a set of reports and tools than enable you to audit sign-in security records (for authentication)
and object security records (for authorization), as well other security-related information. In addition, EnterpriseOne
contains electronic signature and auditing tools that enable your organization to comply with the FDA 21 CFR Part 11
regulation for submitting electronic records.
Data encryption
The process of transforming information into code so that it cannot be read by a third-party system. EnterpriseOne
encrypts user passwords stored in the database.
Data privacy
In EnterpriseOne, Address Book data security enables you to restrict users from viewing Address Book information
that is determined as private, personal data. An administrator can use the Address Book Data Permissions application
(P01138) to set up Address Book data security.
Data masking
Customizing a field so that specified characters are embedded in place of sensitive data that appears in applications.
This prevents sensitive data from being displayed to unauthorized users. A developer enables data masking through the
Data Dictionary application (P92001), which is part of the EnterpriseOne suite of development tools used to customize
or create customized applications. For more information about data masking, see "Display Rule" in the JD Edwards
EnterpriseOne Tools Data Dictionary Guide.
Secure Socket Layer (SSL)
A security protocol that you can apply to various EnterpriseOne servers that provides communication privacy. SSL
enables client and server applications to communicate in a way that is designed to prevent eavesdropping, tampering,
and message forgery.
*PUBLIC
A special ID within EnterpriseOne that automatically includes all users within it. This option controls security for all users
who are designated by ID type *PUBLIC in the User or Role field. You can use this ID to apply security even if you do not
have a specific record set up for it in user profiles.
Security overrides
5
JD Edwards EnterpriseOne Tools Chapter 1
Security Administration Guide Introduction to EnterpriseOne Security
Security records that operate as exceptions to existing security records. Security overrides specify that users are
unsecured from an EnterpriseOne object. In other words, security overrides allow users access to a particular object,
even if another security record in the system specifies that access is not allowed.
6
JD Edwards EnterpriseOne Tools Chapter 2
Security Administration Guide General Principles of Security
https://support.oracle.com/rs?type=doc&id=745831.1
Patches can include fixes for the operating system, database, web application server, as well as any EnterpriseOne
server. Refer to the Certifications tab on My Oracle Support and search for the EnterpriseOne components:
https://support.oracle.com/epmos/faces/CertifyHome?_adf.ctrl-state=eyjh3ekv3_9&_afrLoop=303034385433646
CPUs include fixes for the most critical security issues, fixes to avoid patch conflict, or prerequisites for security fixes.
The release dates for CPUs are announced a year in advance and are selected based on most customers' financial
calendars. Oracle tries to avoid the blackout dates during which customers generally do not touch their financial
systems.
Refer to the Oracle Critical Patch Updates and Security Alert website for more information:
http://www.oracle.com/technology/deploy/security/alerts.htm
7
JD Edwards EnterpriseOne Tools Chapter 2
Security Administration Guide General Principles of Security
and monitor activities in your system regularly. Refer to the database and operating system documentation for audit
functionality. For JD Edwards EnterpriseOne, follow the advice in this document and regularly monitor audit records.
8
JD Edwards EnterpriseOne Tools Chapter 3
Security Administration Guide Pre-Installation Security Considerations
It is critical that you secure a JD Edwards EnterpriseOne environment in alignment with your company's enterprise
security policies. Those policies should be created based upon your established security model. When securing an
EnterpriseOne environment, you should take a comprehensive approach that is in concert with the overall corporate
security policies, guidelines, and business requirements.
It is important that EnterpriseOne and the various components involved in an EnterpriseOne setup are properly
secured. This ensures that EnterpriseOne applications deliver data in a secure and reliable fashion so that data integrity,
confidentiality, and availability are maintained. JD Edwards EnterpriseOne Tools must be installed and maintained in a
manner that prevents unauthorized access, unauthorized use, and disruptions in service.
http://docs.oracle.com/cd/E61420_01/index.htm
9
JD Edwards EnterpriseOne Tools Chapter 3
Security Administration Guide Pre-Installation Security Considerations
network infrastructure, you may opt to pass data from protocol to protocol without the complexity of decryption and
encryption. To do so securely, you must have some way to securely transfer data across network protocol boundaries.
The internet enables you to connect your corporate intranet to a broad public network. Although this capability provides
enormous business advantages, it also poses a risk to your data and your computer system. One way of protecting the
privacy and integrity of your system is to place a firewall between the public network and your intranet.
In addition, you can also place a firewall between the Web Application Server and the database or Enterprise Server to
add an additional layer of protection. See Additional Network Infrastructure Security for more information.
This illustration shows the recommended firewall setup for JD Edwards EnterpriseOne:
10
JD Edwards EnterpriseOne Tools Chapter 3
Security Administration Guide Pre-Installation Security Considerations
You should also install an Intrusion Detection System (IDS) and establish a policy to regularly monitor unauthorized
traffic.
11
JD Edwards EnterpriseOne Tools Chapter 3
Security Administration Guide Pre-Installation Security Considerations
12
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
13
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
Database Security
EnterpriseOne stores all system and business data in a supported relational database.
During a Platform Pack installation, the installer creates two initial roles (referred to as group profiles on iBMi
and groups on UDB) that define access to data source tables. You must make sure that these roles are set up in
EnterpriseOne before completing the installation. If the database administrator defines additional roles for securing
access to tables in the data source, you need to make sure that these roles are defined in the EnterpriseOne Data Source
application as well. See Managing Data Source Security in this guide for details.
For a new EnterpriseOne installation, the Platform Pack Installer uses these roles for all tables, including system and
business data in the database.
For an upgrade, the Platform Pack Installer applies the roles to secure access to system tables only. It does not apply
the roles to the business data or control tables. For these tables, you can use one of the following methods to apply the
security:
• In the business data and control tables data source, set up roles for a database administrator and database user.
Add these same roles to the Grant Data Source Privileges (P986117) application in EnterpriseOne. See Managing
Data Source Security in this guide for details. (Recommended)
OR
• Modify the scripts the Platform Pack Installer uses to apply data source security to system tables and then run
these scripts over the business data and control tables data source. Make sure the roles used in the script for
the data source security are added to Grant Data Source Privileges (P986117) application in EnterpriseOne.
OR
• Run the script for your platform as described in Revoke PUBLIC Access to Installed EnterpriseOne Database
Tables.
This last option is not recommended because if an OMW user updates a table, the security is lost and will have
to be reapplied by running the script again. Only the first two options ensure that the security persists in the
data source for any table modifications.
JD Edwards EnterpriseOne Applications release 9.1 and prior include database Platform Packs that install EnterpriseOne
tables with PUBLIC level access. PUBLIC acts as a default role granted to every database user. Oracle provides platform
specific tools to revoke PUBLIC access from EnterpriseOne database tables. Implementing the platform specific tools
enables you to ultimately grant access for each database table to one or more database roles while revoking access to
PUBLIC. The database roles will be associated to each EnterpriseOne system (proxy) user as deemed appropriate. This
ensures that the database tables are accessible by only database users associated to a particular database role.
The following sections provide links for the platform-specific tools that you can use to revoke PUBLIC access from
EnterpriseOne tables for the supported databases: Oracle, Microsoft SQL Server, and IBM databases.
14
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
https://support.oracle.com
https://support.oracle.com
15
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
You can configure the deployment server with the Secure Sockets Layer (SSL) protocol so that all communication is
over HTTPS. Starting with EnterpriseOne Tools 9.2.5.1, the SSL setting for the deployment server in server manager
is enabled for SSL by default. Therefore, you need to ensure that the deployment server is configured for SSL. This
configuration requires a certificate signed by a certificate authority to establish secure communication between servers.
See Chapter 21, Configuring SSL for EnterpriseOne Servers.
16
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
You can configure the Enterprise Server with the Secure Sockets Layer (SSL) protocol so that all communication is
over HTTPS. Starting with EnterpriseOne Tools 9.2.3, the SSL setting for the Enterprise Server in Server Manager is
enabled for SSL by default. Therefore, you need to make sure the Enterprise Server is configured for SSL, which requires
a certificate signed by a certificate authority to establish secure communication between servers. See Chapter 21,
Configuring SSL for EnterpriseOne Servers.
CAUTION: Implementing security on these files will prevent Server Manager from modifying configuration settings
within these files.
CAUTION: Implementing security on these files will prevent Server Manager from being able to display the logs.
17
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
http://docs.oracle.com/cd/E61420_01/index.htm
IBM WebSphere
If you have deployed an IBM WebSphere Application Server, follow IBM's recommendations to make the installation
more secure:
http://www.redbooks.ibm.com/abstracts/sg247660.html (WebSphere 7)
18
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
• JAS.INI
• JDBj.INI
• JDELOG.PROPERTIES
In addition, the web server can have a Tokengen.ini in a single sign-on environment. These files contain sensitive
information that should not be available to all users, so you should use operating system security to secure the files.
CAUTION: Implementing security on these files will prevent Server Manager from modifying configuration settings
within these files.
CAUTION: Implementing security on these files will prevent Server Manager from being able to display the logs.
Set up a policy for inactive session timeout and set this value accordingly. For the web application server, this value is 30
minutes by default. For more information about setting the timeout values, refer to the JD Edwards EnterpriseOne Tools
HTML Server Reference Guide for your platform located at:
http://docs.oracle.com/cd/E61420_01/index.htm
19
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
The FTP user or operating system user (in case of Windows NT Share) for whom the web server process is running
should have full access to media object queue directories. You should limit the access to any other directories on the
server where the media object queue directories are located for this FTP user or operating system user.
All other users should not have access to media object queue directories when users are not accessing media objects
from the Windows client.
When using SFTP, make sure that the SFTP user home folder is the same as the FTP user home folder for media object
operations.
To enable SFTP, configure the following HTML Server settings located in the Web Runtime group settings in Server
Manager:
• Use Secure FTP for MediaObject Fetch. Click this check box to use SFTP to access media objects.
• Timeout for SFTP connection. The amount of time, in milliseconds, the EnterpriseOne web client will wait to
make a secure SFTP connection. If you receive a connection timeout error while connecting to SFTP, increase
the timeout value.
Note: If you are using Cygwin SFTP, make sure you add the following setting to the /etc/sshd_config file:
KexAlgorithms diffie-hellman-group1-sha1
For details about the configuration settings mentioned in this section, refer to the Server Manager internal help for
each setting. For information on how to access the configuration settings in Server Manager, see the JD Edwards
EnterpriseOne Tools Server Manager Guide .
20
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
You can configure the EnterpriseOne HTML Server with the Secure Sockets Layer (SSL) protocol so that all
communication is over HTTPS. See Configuring SSL for EnterpriseOne Servers.
Disable non-secure HTTP on the web application server after making sure that HTTPS is set up and working properly.
Refer to the Network Infrastructure Security section in this guide for information about setting up network security in an
internet environment.
Denial-of-Service Attacks
Denial-of-service (DOS) attacks can occur when a large number of poorly formed requests are sent to servlets. You can
reduce the impact of DOS attacks, but it is impossible to prevent them. If an attacker throws enough data at a server to
continuously use all the available network bandwidth, it will crowd out legitimate traffic, regardless of how the software
is configured. Denial of service can only be handled at an application server level. To configure to reduce the impact of
denial of service attacks, refer to the security documentation for your application server.
21
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
Collaborative Portal
A single sign-on token is generated by Collaborative Portal. You should set up a new node to support single sign-on
for the Collaborative Portal server. You can create a single sign-on node configuration using the EnterpriseOne SSO
application.
Oracle recommends setting up an SSL configuration for the Collaborative Portal. For instructions, see "Configuring the
WSRP Consumer portal for SSL" on the IBM WebSphere Portal website:
http://www-10.lotus.com/ldd/portalwiki.nsf/xpDocViewer.xsp?lookupName=IBM+WebSphere+Portal+7+Product
+Documentation#action=openDocument&res_title=Securing_WSRP_by_SSL_for_a_Consumer_portal_wp7&content=pdcontent
The TokenGen.ini file contains node name and node password in plain text. You need to secure this file using operating
system security.
In addition to the above recommendations, follow the guidelines in the JD Edwards EnterpriseOne HTML Server Security
section in this guide to secure your web environment.
Oracle recommends setting up an SSL configuration for Oracle WebCenter Spaces. For instructions, see "Securing the
Spaces Connection to Portlet Producers with SSL" in the Oracle Fusion Middleware Administrator's Guide for Oracle
WebCenter Portal:
https://docs.oracle.com/cd/E28280_01/webcenter.1111/e12405/wcadm_security_ssl.htm#WCADM6449
You can configure the Transaction Server with the Secure Sockets Layer (SSL) protocol so that all communication is over
HTTPS. See Configuring SSL for EnterpriseOne Servers.
22
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
CAUTION: Implementing security on these files will prevent Server Manager from modifying configuration settings
within these files.
CAUTION: Implementing security on these files will prevent Server Manager from being able to display the logs.
To set up security for the Business Services Server, see "Configuring Business Services Server Security" in the JD
Edwards EnterpriseOne Tools Business Services Server Reference Guide . This chapter contains instructions on how
to implement security for the Business Services Server, which can run on Oracle WebLogic Server or IBM WebSphere
Application Server.
You can configure the Business Services Server with the Secure Sockets Layer (SSL) protocol so that all communication
is over HTTPS. See Configuring SSL for EnterpriseOne Servers.
CAUTION: Implementing security on these files will prevent Server Manager from being able to display the logs.
23
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
To create an interactive BI Publisher report, a user must be able to sign on to both BI Publisher and to the EnterpriseOne
database. The connection string for the data source, along with the EnterpriseOne JDBC Driver configuration, specifies
the database that BI Publisher will access when creating and running interactive reports. At the time that the JDBC
driver is configured, it is highly recommended that you select the Use Proxy Authentication option for the data source.
Using proxy authentication assumes that the user IDs in BI Publisher and EnterpriseOne are the same, either by
duplication or by using Lightweight Directory Access Protocol (LDAP).
Refer to "Oracle BI Publisher and JD Edwards EnterpriseOne Security" in the JD Edwards EnterpriseOne Tools BI Publisher
for JD Edwards EnterpriseOne Guide for instructions on how to configure Oracle BI Publisher with EnterpriseOne.
You can configure the BI Publisher Server with the Secure Sockets Layer (SSL) protocol so that all communication is over
HTTPS. See Configuring SSL for EnterpriseOne Servers.
• If Oracle Business Intelligence Enterprise Edition (OBIEE) and BI Publisher are installed on the same server, you
have to upload the boilerplate feature and configure permissions for users to access it. See "Missing Boilerplates
in Components Folder in BI Publisher" in the JD Edwards EnterpriseOne Tools One View Administration Guide
for details.
• For an integration with EnterpriseOne Composite Application Framework, if OBIEE is installed on the same
server as Oracle BI Publisher, you have to disable iFrame busting. For instructions on how to disable iFrame
busting, see "Disabling iFrame Busting" in the JD Edwards EnterpriseOne Tools Composite Application
Framework (CafeOne) User's Guide .
You can configure the AIS Server with the Secure Sockets Layer (SSL) protocol so that all communication is over HTTPS.
See Configuring SSL for EnterpriseOne Servers.
The AIS Server uses EnterpriseOne authentication to authenticate AIS clients. For a list of authentication methods
supported for AIS clients, see "Understanding AIS Authentication" in the JD Edwards EnterpriseOne Application Interface
Services Server Reference Guide .
24
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
Starting with EnterpriseOne Tools 9.2.2.2, an AIS Server requires a configuration with the EnterpriseOne Enterprise
Server (Security Server). This configuration ensures that login requests to the AIS Server use the site key on the
Enterprise Server for encryption. If not configured, all login requests to the AIS Server will fail. See "Configuring the AIS
Server with an EnterpriseOne Enterprise Server" in the JD Edwards EnterpriseOne Application Interface Services Server
Reference Guide .
• REST.INI
• JDELOG.PROPERTIES
These files contain sensitive information that should not be available to all users, so you should use operating system
security to secure the files.
CAUTION: Implementing security on these files will prevent Server Manager from modifying configuration settings
within these files.
Timeout Settings
A timeout interval specifies how long the user's machine can remain idle before the server automatically disconnects
the user from the application. Set up a policy for inactive session timeout and set this value accordingly.
By default, the AIS Server timeout setting is 30 minutes. If using an Oracle WebLogic Server with ADF runtime (referred
to as an ADF Server), the default timeout setting for the ADF Server is 20 minutes. If you adjust these settings, make
sure that the timeout for the ADF Server is less than the timeout for the AIS Server.
For more information, see the following topics in the JD Edwards EnterpriseOne Tools Server Manager Guide:
An ADF Server is required to run EnterpriseOne ADF applications and the JD Edwards EnterpriseOne
Orchestrator Studio.
CAUTION: Implementing security on these files will prevent Server Manager from being able to display the logs.
25
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
Connectors Security
Connectors are point-to-point, component-based interoperability models that enable third-party applications and
JD Edwards EnterpriseOne to share logic and data. JD Edwards EnterpriseOne connector architecture includes Java,
Dynamic Java, and Component Object Model (COM) connectors and provides access to JD Edwards EnterpriseOne
business logic and data.
CAUTION: Implementing security on these files will prevent Server Manager from modifying configuration settings
within these files.
Refer to the JD Edwards EnterpriseOne Tools Connectors Guide for more information about connectors.
CAUTION: : Implementing security on these files will prevent Server Manager from being able to display the logs.
Desktop Security
In the context of EnterpriseOne, a desktop is considered the working environment for end users when accessing
EnterpriseOne from a Microsoft Windows client or web browser.
For information about configuring the browser to disable caching, refer to the JD Edwards EnterpriseOne Tools HTML
Server Reference Guide for your platform located at:
http://docs.oracle.com/cd/E61420_01/index.htm
26
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
Update Browser
Update the browser when new versions are released because they often include new security features. See document
745831.1 (JD Edwards EnterpriseOne Minimum Technical Requirements Reference) on My Oracle Support for more
information about EnterpriseOne supported browsers:
https://support.oracle.com/rs?type=doc&id=745831.1
Framebusting
Framebusting is a way to prevent clickjacking, which occurs when a malicious web site pulls a page originating
from another domain into a frame and overlays it with a counterfeit page, allowing only portions of the original, or
clickjacked, page (for example, a button) to display. When users click the button, they in fact are clicking a button on the
clickjacked page, causing unexpected results.
For example, say your application is a web-based application that resides in DomainA, and a web site in DomainB
clickjacks your page by creating a page with an IFrame that points to a page in your web application at DomainA. When
the two pages are combined, the page from DomainB covers most of your page in the IFrame, and exposes only a
button on your page that deletes all records in your web application. Users, not realizing they are actually in the web
application, may click the button and inadvertently delete all records.
Framebusting prevents clickjacking by using the following JavaScript to block the application's pages from running in
frames:
27
JD Edwards EnterpriseOne Tools Chapter 4
Security Administration Guide Securing EnterpriseOne System Components
top.location.href = location.href;
In Server Manager, you can configure Security settings for the EnterpriseOne HTML Server to prevent framebusting in
EnterpriseOne. The settings include:
• frameBustingForLogin
• frameBustingForE1Menu
• frameBustingForApp
The valid values for each setting are:
• always. If the page is in an iframe, the page will take over the whole window.
Note: Starting with Tools Release 9.2.7.4, always is not available for frameBustingForApp.
• differentDomain. (Default) If the page is in a iframe and the page and parent window are from different domain,
the page will take over the whole window.
• never. Even if a page is in a iframe, the page will never take over the whole window.
For more information about the configuration group settings for the EnterpriseOne HTML Server, see the
"EnterpriseOne HTML Server" in the JD Edwards EnterpriseOne Tools Server Manager Guide .
If you configure your application to use framebusting by setting the parameter to always, then whenever a page tries to
run in a frame, the JavaScript code is run to define the page as topmost, and the page is disallowed to run in the frame.
If your application needs to use frames, you can set the parameter value to differentDomain. This setting causes
framebusting to occur only if the frame is in a page that originates from a different domain than your application. This is
the default setting.
Note: The origin of a page is defined using the domain name, application layer protocol, and in most browsers, TCP
port of the HTML document running the script. Pages are considered to originate from the same domain if and only if
all these values are exactly the same.
For example, say you have a page named DomainApage1 in your application that uses a frame to include the page
DomainApage2. Say the external DomainBpage1 tries to clickjack the page DomainApage1. The result would be the
following window hierarchy:
• DomainBpage1
DomainApage1
DomainApage2
If the application has framebusting set to be differentDomain, then the framework walks the parent window hierarchy to
determine whether any ancestor windows originate from a different domain. Because DoaminBpage1 originates from a
different domain, the framebusting JavaScript code will run for the DomainApage1 page, causing it to become the top-
level window. And because DomainApage2 originates from the same domain as DomainApage1, it will be allowed to run
in the frame.
28
JD Edwards EnterpriseOne Tools Chapter 5
Security Administration Guide Post-Installation Security Configurations
See your DBA or the administration guide for your database for help with changing default database passwords.
You should change these database user passwords after a successful installation or upgrade. After changing a database
user's password, you might have to modify configuration files for the Deployment Server and EnterpriseOne Security
Server (also known as the Enterprise Server) because these servers use information from the configuration files to
connect to the database. See Default Database User Accounts in this guide for a list of default database user accounts
for JD Edwards EnterpriseOne 9.1.
To use the long DB proxy password during an upgrade and ESU installation, you must have the Security Server on
and you must add security overrides for all the data sources related to the upgrade or ESU target environment (Tools
Release 9.2.5).
29
JD Edwards EnterpriseOne Tools Chapter 5
Security Administration Guide Post-Installation Security Configurations
The long DB proxy password is not supported during the Installation Workbench. You can only turn on the password
after completing the first Installation Workbench, as you need have the Security Server running.
For instructions on how to update the passwords in the configuration file settings on the Deployment Server and
Enterprise Server, see "Working with Database Security" in the JD Edwards EnterpriseOne Applications Installation or
Upgrade guide for your platform and database:
http://docs.oracle.com/cd/E61420_01/index.htm
Note: As of Tools Release 9.2.4.3, the Database Proxy User password exists on both Database and JD Edwards
EnterpriseOne. This Database Proxy password is used to establish the connection between JD Edwards EnterpriseOne
and the Database that contains the EnterpriseOne tables. The JD Edwards EnterpriseOne allows a maximum length
of 40 characters for the Database Proxy User Password field. This extension for the password character limit provides
consistency with other password systems used in the product.
Note: Even though the long DB proxy password is supported as of Tools Release 9.2.4.3, you must use only the short
passwords during the install and upgrade processes.
30
JD Edwards EnterpriseOne Tools Chapter 5
Security Administration Guide Post-Installation Security Configurations
3. Access the Work With System Users (P980001) program (use the fast path to P980001).
4. Select your System User. For example, select JDE.
5. Enter the short DB proxy password in the Password field and in the Password-verify field. The short DB proxy
password can have up to 10 characters.
6. Click the OK button.
7. Exit the Development Client.
8. Connect to the database and then change the password to short DB proxy password for your system user, for
example, JDE.
9. Connect to the Server Manager Console and then change the value in the ProxyPassword field to a short DB
proxy password in JDE.INI for all the services that work with the database, for example, the Enterprise Server).
10. Turn on the security server again in the Deployment Server.
11. Restart all the services and verify that your environment is working as expected.
31
JD Edwards EnterpriseOne Tools Chapter 5
Security Administration Guide Post-Installation Security Configurations
OCM F986101
32
JD Edwards EnterpriseOne Tools Chapter 5
Security Administration Guide Post-Installation Security Configurations
Note: "Using Guaranteed Events" in the JD Edwards EnterpriseOne Tools Interoperability Guide for more
information.
Refer to Configuring OMW User Roles and Allowed Actions in this guide for more information on setting up security for
OMW users.
33
JD Edwards EnterpriseOne Tools Chapter 5
Security Administration Guide Post-Installation Security Configurations
• Set up the Password Change Frequency value in the User Security (P98OWSEC) application to ensure that users
frequently change their passwords.
• Select the "Force change password for user" option when creating a new user account so that the system will
prompt the user to change the password on the next sign-in.
• Limit the number of invalid password attempts (usually three) before a user account is disabled.
See Setting Up User Sign-in Security in this guide for more information.
You can set processing options for the User Security (P98OWSEC) application to set up default sign-in policies. Refer to
Setting Processing Options for P98OWSEC in this guide for more information on setting up password policies.
See Reviewing User Sign-in Security History in this guide for more information.
34
JD Edwards EnterpriseOne Tools Chapter 5
Security Administration Guide Post-Installation Security Configurations
• Enable the Long User and Long Password features in EnterpriseOne to support long user IDs up to 254
characters in length and passwords up to 40 characters in length. For more information, see:
In this solution, Oracle single sign-on server or Collaborative Portal is responsible for authenticating a longer
user name and password. EnterpriseOne uses the single sign-on token to validate the user. You can configure
the EnterpriseOne security server to use the same LDAP Server used by the single sign-on server. User
mappings from longer user names to EnterpriseOne user names can be provided in LDAP Server. However, in
this case, EnterpriseOne non-web users (such as Windows client and Java Connector users) will not be able to
log in with more than 10 character user names and passwords. See Setting Up JD Edwards EnterpriseOne Single
Sign-On for more information.
• Configure Oracle Access Manager single sign-on with EnterpriseOne. (Requires additional license.)
Using Oracle Access Manager, you can manage long user IDs and passwords in a single sign-on configuration
with EnterpriseOne. This configuration does not change the behavior of existing EnterpriseOne user IDs, but it
requires mapping EnterpriseOne users to the long IDs. See Setting Up JD Edwards EnterpriseOne Single Sign-
On Through Oracle Access Management 11g Release 2 for more information.
35
JD Edwards EnterpriseOne Tools Chapter 5
Security Administration Guide Post-Installation Security Configurations
The Server Manager Management Console communicates with deployed Server Manager agents through a socket
connection that uses the Java Management Extension (JMX) protocol.
If you are upgrading Server Manager to EnterpriseOne Tools release 9.2, you must implement additional security for
JMX after performing the upgrade. See "Implement Security for JMX" in the JD Edwards EnterpriseOne Tools Server
Manager Guide .
Note: Implementing security for JMX applies to EnterpriseOne Tools 9.2 upgrades only. A new installation of
EnterpriseOne Tools 9.2 automatically includes a JMX security implementation for Server Manager.
36
JD Edwards EnterpriseOne Tools Chapter 6
Security Administration Guide Security for Custom Map Viewers
You can download a map viewer from the Oracle Technology Network ( http://www.oracle.com/technetwork/middleware/
mapviewer/downloads/index-100641.html ), along with instructions for installing it (http://www.oracle.com/technetwork/
middleware/mapviewer/documentation/index.html).
After you have a new mapviewer URL, you must modify the property in the build.properties file of the container ant
script with the new URL, and then rebuild and deploy the container.ear file.
37
JD Edwards EnterpriseOne Tools Chapter 6
Security Administration Guide Security for Custom Map Viewers
38
JD Edwards EnterpriseOne Tools Chapter 7
Security Administration Guide Managing Data Source Security
Data Source Role Alter Table Create Index Select Insert Update Delete
JDE Admin X X X X X X
JDE User X X X X
Note: During the installation, an administrator can modify the names of these roles in the Platform Pack Installer.
Therefore, the names of the roles might not reflect the names in the preceding table. For more information, see
"Working with the Platform Pack" in the JD Edwards EnterpriseOne Installation and Upgrade guides, which you can
access here: http://docs.oracle.com/cd/E61420_01/index.htm
After running the Platform Pack installation and before running the installation workbenches, you must create the
equivalent security definitions for the data source in EnterpriseOne. You create these definitions in the Grant Data
Source Privileges (P986117) application, which stores the data source security records in the F986117 table. If a database
administrator has additional roles defined for the data source, make sure that these roles are defined in P986117 as well.
This security is applied during table creation and pertains only to new tables created anywhere in EnterpriseOne
including tables created from Object Management Workbench, an ESU process, table conversions, UBEs for copying
tables, and so forth. Security is defined at the data source level and does not impact EnterpriseOne applications security
or row security that is defined for users in the Security Workbench.
JD Edwards EnterpriseOne uses only the select, insert, update, and delete privileges defined in the "JDE User" record
in P986117. The "JDE Admin" record with the alter table and create index privileges in P986117 is simply used for record
keeping and enables access to the database without having to ask the database administrator to create a database role
and login credentials.
Although not recommended, you can also disable data source security for a data source. When data source security is
disabled, new tables created in the data source have all privileges granted through the *PUBLIC role.
39
JD Edwards EnterpriseOne Tools Chapter 7
Security Administration Guide Managing Data Source Security
For an EnterpriseOne upgrade, only tables created by the Platform Pack are secured with the roles specified during the
install. Existing business data and control tables are not secured by the install. In the business data and control tables
data source, set up roles for a database administrator and database user. Add these same roles to the Grant Data Source
Privileges (P986117) application in EnterpriseOne.
To set up data source security records, you must first select the data source in the Data Sources (P986115) application,
and then you can set up security for the data source in P986117.
Navigation to P986115: In EnterpriseOne, select the Navigator menu, EnterpriseOne Menus, EnterpriseOne Life Cycle
Tools, System Administration Tools, Data Source Management, Database Data Sources.
Note: You must use role (or group) names that exist in the database. This application will not create the roles for you.
1. On Machine Search & Select, select the data source and then click the Select button.
2. On Work With Data Sources, click Find to load the data source records in the grid.
3. Select the row for the data source and from the Row menu, select Database Privilege.
EnterpriseOne displays any existing privileges defined for this data source.
4. On Work With Data Source Privilege, click the Add button.
Note: If there is an existing data source security record, you can create a new record by selecting the existing
record, selecting Copy DSrc Records from the Row menu, and then modifying the copied record with a new
name and privileges for the new record.
5. On Manage Data Source Privileges, in the Data Source field, enter the name of the data source or click the
search button in the field to select a data source.
After identifying the data source, the Data Source Type field displays the database type of the data source you
selected.
40
JD Edwards EnterpriseOne Tools Chapter 7
Security Administration Guide Managing Data Source Security
6. Make sure that the Enable Database Security check box is selected.
7. In an empty row in the grid, add a record for the database administrator role:
a. In the Data Source Database User / Role column, enter the exact name of the database administrator role
defined in the Platform Pack Installer.
b. In the Type column, enter or select 1 for the Database Administrator type.
c. Press Tab to see the "Database Administrator" description and default privileges for the record.
8. In the next empty row in the grid, add a record for the database user:
a. In the Data Source Database User / Role column, enter the exact name of the database user role defined
in the Platform Pack Installer.
b. In the Type column, enter or select 2 for the Database User type.
c. Press Tab to see the "Database User" description and the default privileges for the record.
9. In the new records, you can adjust the default security according to your security requirements or model by
selecting or clearing the check boxes in the following columns:
◦ All Privileges. Selecting this check box enables all privileges.
◦ Alter Table
◦ Allow Index
◦ Allow Select
◦ Allow Insert
◦ Allow Update
◦ Allow Delete
10. Click the OK button to save the records.
To review or modify data source security records:
1. On Machine Search & Select (P986115), select the data source and then click the Select button.
2. On Work With Data Sources, click Find to load the data source records in the grid.
3. Select a row with the data source and from the Row menu, select Database Privilege.
4. On Work With Data Source Privilege (P986117), click Find to view the current security for the selected data
source.
In the records displayed in the grid, a check mark denotes the privileges granted to each record.
5. To modify a security record, in the appropriate row, click in any column to enable or disable the table privilege. If
you enable the "All Privileges" column, then all privileges are granted.
Remember, the privileges that you define for the role must reflect the privileges for the role in the data source.
6. Click OK to save.
Note: As an alternative method to modify a data source security record, you can select a record and then
select Manage Privilege from the Row menu.
41
JD Edwards EnterpriseOne Tools Chapter 7
Security Administration Guide Managing Data Source Security
Note: As an alternative method to disable data source security, you can access the security record in the
Work With Data Source Privilege form, and then from the Row menu, select Disable Database Security.
42
JD Edwards EnterpriseOne Tools Chapter 8
Security Administration Guide Encrypting Sensitive Data in EnterpriseOne
You can set up encryption before an EnterpriseOne installation using a command line utility program on the
Deployment Server. See Encrypting Sensitive INI File Data Using the Deployment Server. You can also set up encryption
after an installation through Server Manager. Both methods involve using a site key for encryption as described later in
this chapter.
Note: Although not recommended, an administrator can still choose to manually access configuration files and edit
the passwords in plain text. Regardless, EnterpriseOne can read passwords whether they are encrypted or in plain
text.
Password=
[WORKFLOW]
WRIPassword=
[TRUSTED NODE]
43
JD Edwards EnterpriseOne Tools Chapter 8
Security Administration Guide Encrypting Sensitive Data in EnterpriseOne
NodePassword=
FtpPwd=
[EVENTS]
jndiuser=
jndipassword=
password=
certificatepasswd=
[TRUST_STORE]
truststorepasswd=
[MEDIAOBJECT]
FtpPwd=
NodePwd=
44
JD Edwards EnterpriseOne Tools Chapter 8
Security Administration Guide Encrypting Sensitive Data in EnterpriseOne
The site key is unique for each customer. A random value is selected for each data item to be encrypted. The site key is
combined with the random value and version-based values within the EnterpriseOne system to generate a 128-bit AES
key. That AES key is then used to encrypt that data item. With different random values for each data item, it is possible
to have up to 16 million different AES keys associated with each site key.
Oracle provides a command line "sitekey" utility program on the Security Server for generating and storing site keys in
the JDE.INI file on the Security Server. When sensitive data is entered in Server Manager, Server Manager accesses the
site key in the JDE.INI file and uses the site key to encrypt the data item.
Server Manager uses JDENet to retrieve the site key from the main Security Server defined for Server Manager. If the
Security Server is not running, Server Manager will retrieve the site key directly from that Security Server's JDE.INI file.
To create a site key value, a system administrator enters a unique password in the sitekey program. The sitekey program
generates a site key from this password. The site key program:
• Uses a hashing function to convert the password into a site key value.
Note: Based on the hashing, it is not possible to recover the password from the site key value.
• Encrypts the site key value and encodes it within a text string.
• Stores the site key text string in the [SITE KEYS] section of the Security Server JDE.INI file. Example of Site Key
Entries in the JDE.INI shows an example of a text string of a site key value in the SITE KEYS section.
Using site key values for data encryption provides the following benefits:
• Because site key values are generated from unique passwords, it is highly unlikely that two customers will have
the same values.
• The encryption and encoding of the site keys use randomized parameters, so multiple text representations of
the same site key will almost always be different.
• The site key values are not stored in the program code. Because site keys are stored in the JDE.INI file, each
customer has their own site key, which provides a higher level of security.
• CurrentKey. This contains the text string of the site key value used to encrypt new data items.
• PreviousKey. This contains the text string of the site key value used to decrypt previously encrypted data
items; it is never used for the encryption of new data items. If the current site key is changed, the encryption
system uses the previous site key to decrypt old data items, after which the new current site key is used to re-
encrypt these data items.
Example of Site Key Entries in the JDE.INI shows an example of site key entries in the JDE.INI file.
CurrentKey=ADOtRLI/Y93Hhgmx9Me23fCJB5j0/RtMNA+cWtZXtpB6Y2CMJ/
le0dl2ntXiPeIkybDAQievK3Rqj89tVsSac=
PreviousKey=ADk/
sKxVveqYH1gnk8wodNmzNfD07PcQN0K9M4rqqVIBhBDCjsRmATp9m5QU6iYAS1eQJuQmlxrFq2AScnA4c=
45
JD Edwards EnterpriseOne Tools Chapter 8
Security Administration Guide Encrypting Sensitive Data in EnterpriseOne
Data is always encrypted using the "CurrentKey" site key. Data will be decrypted using either the "CurrentKey" site key
or the "PreviousKey" sitekey, which allows data items to be decrypted using an old site key, and then encrypted using a
new site key.
If you change the site key value, all previously encrypted data should be re-encrypted using the new site key value. After
you convert all encrypted data using the new site key, then you can use a text editor to manually delete or comment out
the "PreviousKey" entry in the JDE.INI.
Only one "PreviousKey" entry is allowed at one time. If at a later time you need to decrypt old data encrypted with the
previous site key, you can manually re-add (or uncomment) the "PreviousKey" entry in the JDE.INI. Then the encryption
system will decrypt the data and then re-encrypt the data using the "CurrentKey" site key.
After all the data in the second system is re-encrypted, only the current site key is required for future encryption; the
previous site key entry can be manually deleted from the JDE.INI. It cannot be programmatically removed because the
programs cannot determine if there is additional data somewhere that is still encrypted with the previous site key.
Prerequisites
Before you can use site keys for encryption, you must:
• Define the EnterpriseOne Security Server name and port in the Server Manager Console. This identifies the
JDE.INI file where the site key value resides. Regardless of whether the Security Server is running, the Server
Manager agent will retrieve the site key values for the encryption of sensitive data. See "Specify the JD Edwards
EnterpriseOne Server Used for User Authentication" in the JD Edwards EnterpriseOne Tools Server Manager
Guide .
• Ensure that the Security Server is running JD Edwards EnterpriseOne Tools Release 9.2 or higher.
46
JD Edwards EnterpriseOne Tools Chapter 8
Security Administration Guide Encrypting Sensitive Data in EnterpriseOne
CAUTION: The Security Server must be defined in the Server Manager Console and the SITEKEY must be configured
in Security Server jde.ini for the encryption of sensitive data to occur. Otherwise, passwords in the INI files will not be
encrypted and will appear as plain text. Also, all servers managed by an instance of Server Manager must use the
same site key. For example, if you want to have a production environment with servers that use one site key and a test
environment with servers that use a different site key, then you would need to install two separate Server Manager
Consoles, one for all servers in the production environment and one for all servers in the test environment.
A site key value is generated from a unique password that you enter in the sitekey program. Entering a unique, strong
password ensures that the site key material that is used for the encryption is unique for each customer site. Follow these
password rules to create a strong password:
• Enter a minimum of 8 characters and a maximum of 40 characters.
• Include both upper case and lower case letters.
• Include numbers (0, 1, 2, 3, 4, 5, 6, 7, 8, 9).
• Include the special underline (_) character. No other special characters are allowed.
• Use a letter for the first character.
• Use a letter or a number for the last character.
• At a minimum, use two upper case letters, two lower case letters, two numbers, and two special underline
characters.
Only one site key is allowed in an EnterpriseOne system. If your system configuration includes more than one Security
Server, after you create a site key, you must manually copy the site key text string from the [SITEKEY] section in JDE.INI
file to all other JDE.INI files on the other Security Servers.
CAUTION: A site key is cached upon first usage, therefore, you must restart all EnterpriseOne systems to store a new
site key in the cache. If you do not refresh the cache, your system could be using two different site keys at the same
time, which is problematic because data encrypted with one site key cannot be decrypted with a different site key.
The following tasks describe how to use the commands in the sitekey program. A description of the commands is
available in the sitekey program Action Menu:
C:\builds\e900\system\bin32>sitekey
ACTION MENU
d Display site key entries found in JDE.INI
c Current site key - will prompt for password to be hashed
p Previous site key - will prompt for password to be hashed
Enter letter for action to take:
47
JD Edwards EnterpriseOne Tools Chapter 8
Security Administration Guide Encrypting Sensitive Data in EnterpriseOne
3. At the "Enter Password:" prompt, enter a password for the site key and then press Enter.
The sitekey program converts the password into a site key value that is wrapped, encoded, and converted to a
text string that is stored in the [SITEKEY] section in the JDE.INI file.
It is important to remember this password in case the generated site key text string is accidentally deleted. For
more information, see "Recovering Site Key Values."
4. If you have multiple Security Servers, manually copy the site key text string into the JDE.INI files on each
Security Server.
5. Restart all EnterpriseOne systems including Enterprise Servers, Server Manager Console, the HTML Server, and
other types of servers.
A site key is cached upon first usage, so you must restart all systems to store a new site key in the cache. To
ensure that the new site key is cached in all systems, they should be restarted in the following order:
If a new current site key is added, the "current" site key will become the "previous" site key in the JDE.INI settings. If
encrypted data is being merged from a system that had used a different site key, then that site key can be added to the
JDE.INI by entering its password for the "previous" key. An alternative method would be to copy the site key text from
the INI of the merged system, and entering it as a "previous" key directly in the INI.
1. In the sitekey program, enter -p to access the password prompt, for example:
$ sitekey -p
2. At the Enter Password prompt, enter the password that was used for the former "current" site key, and then
press Enter.
The sitekey program converts the password into a site key value that is wrapped, encoded, and converted to a
text string that is stored in the [SITEKEY] section in the JDE.INI file.
3. Restart all EnterpriseOne systems in the same order as described in the preceding steps for creating a current
site key.
$ sitekey -d
48
JD Edwards EnterpriseOne Tools Chapter 8
Security Administration Guide Encrypting Sensitive Data in EnterpriseOne
This confirms that the site key text is in a valid format. It also determines if a current site key and a previous site key
came from the same password. Because the site key text uses random numbers for encoding, the text will always be
different even for text that stores the same site key value.
If you cannot remember the original password for generating the site key, you can recover the site key by opening a
service request (SR) through My Oracle Support:
https://support.oracle.com/
In the service request, include the header portion of an encrypted data item. The header portion is the first 14
characters if it is a text encryption, and it is the first 20 hexadecimal digits if it is a binary encryption. Oracle provides
you with a new text string version of the site key that you can manually place in the [SITE KEY] section of the JDE.INI file
on the Security Server. The new text string contains the site key required to decrypt the given encrypted data item. It will
also decrypt all data items that were originally encrypted with the same site key.
As an alternative to entering a service request, if you are using the encryption only for sensitive data in INI files, you can
simply enter a new password in the sitekey program to create a new site key. Then in the Server Manager Console, re-
enter all password values, and then re-start all EnterpriseOne systems.
CAUTION: This alternate method cannot be used if you have encrypted data stored in the database (such as
encrypted data for applications).
Oracle recommends running the E1IniEncrypt program on the Deployment Server, but it will run on any EnterpriseOne
Windows client machine.
CAUTION: You must have administrative rights on the EnterpriseOne Windows client machine to run this program.
The E1IniEncrypt program is available in the Enterprise Server system for OS platforms.
49
JD Edwards EnterpriseOne Tools Chapter 8
Security Administration Guide Encrypting Sensitive Data in EnterpriseOne
Oracle recommends running the E1IniEncrypt program on the Deployment Server. It can also be run on any
EnterpriseOne Windows client machines or EnterpriseOne Enterprise Server systems that are running on the Windows,
Linux, AIX, HPUX, or SOLARIS OS platforms.
You use the following command in the E1IniEncrypt program to encrypt sensitive data in INI files:
The following example command line shows the command for encrypting passwords in a JDE.INI file:
The E1IniEncrypt program encrypts the password depending on the type of value in the original password entry:
• If the value is a plain text password, the program encrypts the password. The encrypted value is represented as
a text string.
• If the value is an encrypted value from EnterpriseOne Tools 9.1.4 or 9.1.5, then it re-encrypts the value using the
latest encryption method (AES encryption with site keys) and then represents the new encrypted value as a text
string.
• If the password field contains a value that has already been encrypted using the latest method, it remains
unchanged.
Before running E1IniEncrypt, a site key must be set up on the Security Server. See Setting Up Site Keys on the Security
Server for instructions on how to set up the site key.
1. Locate the INI file, for example the JDE.INI on an Enterprise Server or the jas.ini on the HTML Server, and copy it
to a temporary folder on the Deployment Server such as C:\tempini.
2. From the JDE.INI of the Security Server, copy the [SITE_KEYS] block with all of its key values into the JDE.INI
used by the Deployment Server. The JDE.INI file is typically located at C:\Windows\JDE.INI.
3. Use the following command for each INI file to convert the passwords to the latest encryption:
And where <path to ini> is the path to the temporary folder containing the INI files.
50
JD Edwards EnterpriseOne Tools Chapter 8
Security Administration Guide Encrypting Sensitive Data in EnterpriseOne
4. Check the INI files to verify that the password encryptions succeeded.
The original passwords in plain text or in EnterpriseOne Tools 9.1.5 format (which begin with "AC") should
now be in EnterpriseOne Tools 9.2 format (which begin with "AD"). Any passwords that were already in the
EnterpriseOne Tools 9.2 format should remain unchanged.
5. Copy the INI files with the encrypted passwords back to their original locations. For example, copy the JDE.INI
back to the Enterprise Server or jas.ini back to the HTML Server.
Encrypting Sensitive INI File Data for the Deployment Server and
EnterpriseOne Windows Client Machines
If you are using a site key for the encryption of INI file data in other EnterpriseOne Server configuration files, you can
use the same site key to encrypt the password in the following WRIPassword setting in the JDE.INI files used by the
Deployment Server and EnterpriseOne Windows clients:
[WORKFLOW]
WRIPassword=
To encrypt the data in this setting in the JDE.INI on the Deployment Server:
1. Copy the JDE.INI, typically located at C:\Windows\JDE.INI, into a temporary folder.
2. If the WRIPassword setting is blank, add the plain-text password.
3. From the JDE.INI of the Security Server, copy the [SITE_KEYS] block with all of its key values into the JDE.INI
used by the Deployment Server. The JDE.INI file is typically located at C:\Windows\JDE.INI.
4. Use the following command for each INI file to convert the passwords to the latest encryption:
And where <path to ini> is the path to the temporary folder containing the INI files.
5. Verify that the value in the WRIPassword setting has been encrypted with the Tools 9.2 encryption (which begin
with "AD"). The remainder of the JDE.INI should remain unchanged.
6. Copy the JDE.INI from the temporary folder back to its original location.
For the JDE.INI to be used by the EnterpriseOne Windows clients, follow the same steps as above, but copy and convert
the JDE.INI located in the Windows client installation folder on the Deployment Server. This installation folder contains
the JDE.INI that is used for the installation of new Windows clients.
51
JD Edwards EnterpriseOne Tools Chapter 8
Security Administration Guide Encrypting Sensitive Data in EnterpriseOne
users added by the Work With System Users program (P980001) will be stored with new encryption scheme in the
System User Security table (F98OWPU).
The enhanced encryption scheme is used to store and retrieve database proxy user passwords from the System User
Security (F98OWPU) table.
Note: If you have not set up site keys for data encryption, you cannot add new database proxy users.
Any subsequent RUNUBE invocation that uses the text file will use the encrypted password.
RUNUBEXML uses an XML file that contains a user ID and password in clear text. The password in this XML file needs to
be encrypted as well, so Oracle provides a command that encrypts the password the first time you run the RUNUBEXML.
Any subsequent run of the RUNUBEXML that uses this xml file will use the encrypted password. Use the following
command to encrypt the password in the XML file when you generate a report:
For more information about the commands that you can use to run reports with RUNUBE or RUNUBEXML, see
"Submitting at the Command Line" in the JD Edwards EnterpriseOne Tools Batch Versions Guide .
52
JD Edwards EnterpriseOne Tools Chapter 8
Security Administration Guide Encrypting Sensitive Data in EnterpriseOne
See Enhanced Scheduler Password Encryption in the JD Edwards EnterpriseOne Tools System Administration Guide
53
JD Edwards EnterpriseOne Tools Chapter 8
Security Administration Guide Encrypting Sensitive Data in EnterpriseOne
54
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
You can use P0092 to define specific users or roles. This definition includes:
• The role to which a user belongs.
Roles are an important aspect of EnterpriseOne. By assigning users to roles, system administrators can set user
preferences and security records that are based on the roles rather than the individual user. For example, an
accounts payable clerk would be part of the AP role.
• The environments that the user can select when signing in to EnterpriseOne.
• The language preference and country code for the text that appears on EnterpriseOne menus, forms, and
country-specific applications.
55
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
Note:
• "Defining Machines" in the JD Edwards EnterpriseOne Tools Package Management Guide .
• Setting Up User Profiles.
• Creating and Modifying User and Role Profiles.
• Creating Profiles by Using a Batch Process.
This section contains checklists of the high-level steps required to add a single new user or multiple new users. These
steps do not address third-party setup issues such as assigning network user IDs.
Note: If the Long User feature is enabled, you can use P0092L to set up user profiles with both short and long user
IDs. P0092L contains the same features and functionality as P0092. Therefore, the steps for using P0092 in this
chapter can also be used when working in P0092L. For information on how to enable the Long User feature, see
Setting Up Long User IDs in EnterpriseOne.
1. If you plan to create a new role for the user, add an address book record with a valid search type code (for
example, E for employee).
2. If the existing role profiles are not acceptable for the new user, add a role profile.
3. Add an address book record for the new user.
4. Add a user profile.
5. Add sign-in security records for the user.
6. Use Security Workbench (P00950) to add any security overrides for the user if the user needs different security
than the roles to which the user belongs.
7. Populate the machine table for the user's machine.
8. Use User Overrides Revision (P98950) to add any new user overrides for the user if the user needs different
user overrides than the role to which the user belongs.
56
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
When you decide which role to assign to a user, consider application security as the most important role because:
• Application security has the most extensive setup.
• Managing overrides to the role security is more difficult than, for example, managing overrides to deployment
preferences.
Note: Sign-in security is not based on roles because individuals must have their own passwords. A program
exists with sign-in security to quickly create individual security records by role; however, after the records are
created, security is assigned by an individual.
The following list describes the high-level steps for adding multiple user profiles simultaneously.
1. Using the Address Book application (P01012), create address book records for roles that you will use in user
profiles.
2. Using the User Profile Revisions application, add the role profiles.
3. Populate the various Address Book tables.
If you are migrating data from a non-JD Edwards EnterpriseOne system, you can populate the data tables with
a table conversion. Otherwise, you can manually add data to the Address Book tables.
4. Run the Populate User Profiles (R0092) batch process to create user profile records from existing Address Book
records.
Normally, this report is based on address book records with a search type for employees (E).
5. Adjust each user's role assignments.
Determine the role in which you want to place an individual and manually assign each user to a role. Change
the user environments if they are not standard to that role.
These settings are dictated by role:
◦ Environments
◦ User Overrides
◦ Application Security
6. Run the Summary of Environments, Packages and Profiles batch process (R00921) to view the new user
profiles.
7. Use Security Workbench (P00950) to apply application, action, and processing option security for roles and any
individual overrides to those roles.
8. Create sign-in security records using the User Security application (P98OWSEC).
You can create sign-in security records for all individuals within a role by entering one record for the role.
9. Manually populate the F00960 table.
This table is automatically populated each time a machine signs in to JD Edwards EnterpriseOne. However, if
you intend to use schedule packages, you must manually populate this table.
10. Create user overrides for roles.
57
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
Normally, you will not create any overrides for individuals because they can easily create their own as they use
the software.
Note: If you are setting up user profiles during the installation process, you must sign in to the deployment server
using the deployment environment. After you have completed the installation process, you can add or modify user
profiles from any machine except the deployment server.
These steps outline the high-level process for setting up user profiles:
1. Create all of the role profiles for the enterprise.
See Setting Up Roles.
2. Create a user profile for every user.
3. Assign to each role or user these preferences:
◦ Environments, to determine the environments that you want to be available to each role or user.
Environments are assigned at the role level only.
◦ Display preferences, to determine JD Edwards EnterpriseOne display characteristics such as language,
date format, and country code.
The Display preferences are controlled on the User Profile Revisions form.
58
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
of the role profiles that are needed for the enterprise. This action makes creating profiles easier; instead of defining
specific environments, packages, and machine configurations to each user, administrators can define them for the role.
If an individual in a role needs a different setup, you can assign different setups at the user level, which will override the
role settings.
If you select a country code for a user, the menu filtering process displays for that user any special menu selections
unique to that country code. For example, if you enter CA (Canada), that user would see the Canadian Tax Information
application on the appropriate menu, which users without that country code would not see.
Note: If the Long User feature is enabled, you can use P0092L to set up user profiles with both short and long user
IDs. P0092L contains the same features and functionality as P0092. Therefore, the steps for using P0092 in this
chapter can also be used when working in P0092L. For information on how to enable the Long User feature, see
Setting Up Long User IDs in EnterpriseOne.
59
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
An option that enables users to view the EnterpriseOne interface in Standard or Simplified mode. Standard
mode is for users who need access to the full range of EnterpriseOne actions. If users are in Standard mode,
they are able to view the Navigation bar, the Carousel, the Fast Path (if they have the appropriate permissions),
and Breadcrumbs.
Simplified mode is for users who need a scaled-down interface that provides only limited actions in
EnterpriseOne. In Simplified mode, users see the Banner Bar, Personalization, Help, Username, Environment,
and Sign Out options.
Set Service-only Mode (9.2 Update 6)
This option provides an additional layer of security by allowing the security administrator to designate that an
EnterpriseOne user is a service-only user, and therefore is denied access to the EnterpriseOne sign-on page
and any direct interactive access to applications while still allowing the user to execute AIS REST services and
access to Orchestrator Studio.
Date Format
The format of a date as it is stored in the database.
These date formats are valid: YMD, MDY, DMY, EMD. If you leave this field blank, the system displays dates
based on the settings of the operating system on the workstation. With NT, the Regional Settings in the Control
Panel control the settings for the operating system of the workstation.
Date Separator Character
The character to use when separating the month, day, and year of a given date. If you enter an asterisk, the
system uses a blank for the date separator. If you leave the field blank, the system uses the system value for the
date separator.
Decimal Format Character
The number of positions to the right of the decimal that you want to use. If you leave this field blank, the
system value is used as the default.
Localization Country Code
A code that identifies a localization country. It is possible to attach specific county functionality that is triggered
baed on this code using the country server methodology in the base product.
Universal Time
A code that you use to associate a time zone with a user's profile. This code represent the user's preferred time
zone, and it must be a value from the UDC table (H91/TZ).
Time Format
A value that determines the user's preferred format for time-of-day. The user can choose from a 12- or 24-hour
clock.
Daylight Savings Rule
The rule name that specifies the daylight savings rule for a region or country.
See "Creating Daylight Savings Rules" in the JD Edwards EnterpriseOne Tools System Administration Guide .
60
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
Role
If creating a new role, enter a name for the role, for example PAYROLL, and enter a description for the role in the
adjacent field.
You cannot modify this field if you are modifying an existing role.
Address Number
Enter an Address Book number if the role will be used with a workflow.
WhosWhoLineID
A value that references the Who's Who Line ID in the Address Book record.
Batch Job Queue
The computer waiting line that a particular job passes through. If blank, it defaults to the job queue specified in
the user's job description.
Sequence Number
A number that specifies the sequence number of the role in relation to other roles. For a user assigned to more
than one role, the sequence number determines which role is chosen when a security conflict exists among the
different roles.
Justification
An option that determines how text is to be read, left to right or right to left. This option is enabled only when
Arabic is selected as the language. For all other languages, the system automatically selects the left to right
option.
Set Accessibility Mode
An option that enables the JD Edwards EnterpriseOne web client to be accessible through the JAWS screen
reader software for visually impaired users. The option is deselected by default when a user profile is created.
Set Simplified Mode (9.1 Update 5)
An option that enables users to view the EnterpriseOne interface in Standard or Simplified mode. Standard
mode is for users who need access to the full range of EnterpriseOne actions. If users are in Standard mode,
they are able to view the Navigation bar, the Carousel, the Fast Path (if they have the appropriate permissions),
and Breadcrumbs.
Simplified mode is for users who need a scaled-down interface that provides only limited actions in
EnterpriseOne. In Simplified mode, users see the Banner Bar, Personalization, Help, Username, Environment,
and Sign Out options.
Set Service-only Mode (9.2 Update 6)
This option provides an additional layer of security by allowing the security administrator to designate that an
EnterpriseOne user is a service-only user, and therefore is denied access to the EnterpriseOne sign-on page
61
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
and any direct interactive access to applications while still allowing the user to execute AIS REST services and
access to Orchestrator Studio
Date Format
The format of a date as it is stored in the database.
These date formats are valid: YMD, MDY, DMY, EMD. If you leave this field blank, the system displays dates
based on the settings of the operating system on the workstation. With NT, the Regional Settings in the Control
Panel control the settings for the operating system of the workstation.
Date Separator Character
The character to use when separating the month, day, and year of a given date. If you enter an asterisk, the
system uses a blank for the date separator. If you leave the field blank, the system uses the system value for the
date separator.
Decimal Format Character
The number of positions to the right of the decimal that you want to use. If you leave this field blank, the
system value is used as the default.
Localization Country Code
A code that identifies a localization country. It is possible to attach specific county functionality that is triggered
baed on this code using the country server methodology in the base product.
Universal Time
A code that you use to associate a time zone with a user's profile. This code represent the user's preferred time
zone, and it must be a value from the UDC table (H91/TZ).
Time Format
A value that determines the user's preferred format for time-of-day. The user can choose from a 12- or 24-hour
clock.
Daylight Savings Rule
The rule name that specifies the daylight savings rule for a region or country.
See "Creating Daylight Savings Rules" in the JD Edwards EnterpriseOne Tools System Administration Guide .
62
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
In the Fast Path, enter P0092 to access the User Profiles application.
1. On the Work With User/Role Profiles form, select a user or role profile and perform one of the following actions:
◦ To copy an entire profile (the display, environment, and deployment preferences), click Copy.
The User Profile Revisions form or Role Revisions form appears depending on if you copied a user or role
profile. Because this action creates a new profile, the user or role profile that you create cannot already
exist in JD Edwards EnterpriseOne.
◦ To copy environment preferences, from the Row menu, select Copy Environment.
The User Environment Revisions form appears. This action copies environment prefaces from one user
or role profile to another. The user or role profile that you copy to must already exist.
2. If you copied a user, in the User/Role field on User Profile Revisions, enter a user ID to copy the profile into and
modify any other information if necessary.
3. If you copied a role, in the Role field on Role Revisions, enter a role to copy the profile into and modify any other
information if necessary.
4. Click OK.
Note: If environments are set up at the user level, the user will only be able to log into those environments. Also, the
same environments must be added to the user's role. If an environment is not at both the user and role level, the user
will not be able to log into that environment playing that role.
In the Fast Path, enter P0092 to access the User Profiles application.
1. On Work With User / Role Profiles, click Find and then select a user or role profile.
2. From the Row menu, select Environments.
The User Environment Revisions form appears. This form displays the list of environments available for a
particular user or role.
3. To add a new environment, in the last row, enter a number that specifies the order in which the environment is
displayed in the Display Seq. field.
4. In the Environment field, click the search button to select an environment.
5. To delete an environment from the list, select the environment and click Delete.
6. Click OK when you are finished.
63
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
For example, you assign the code CUS for a customer business preference, and then create a workflow process that
begins whenever a user or role profile with the CUS business preference enters a sales order.
In the Fast Path, enter P0092 to access the User Profiles application.
1. Click Find.
2. Select a user or profile, and then click Select.
3. On the User Profile Revisions or Role Revisions form, from the Form menu, select Bus Preferences.
4. On the Business Preferences form, complete any of these fields and click OK:
◦ Industry Code
This field associates the user profile with a specific industry, such as manufacturing.
◦ Business Partner Code
This field associates the user profile with a specific business partner.
◦ Customer Code
Note: Click Cancel on the Business Preferences form to cancel the addition of the current business
preference.
You can assign Standard, Simplified, Service-only modes to Users and Roles, Users only, or Roles only. The default mode
is Standard.
In the Fast Path, enter P0092 to access the User Profiles application.
1. Select to search on both Users and Roles, Users Only, or Roles Only.
2. Click Find.
3. Select a record or multiple records, and then click Select.
64
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
In the Fast Path, enter P0092 to access the User Profiles application.
1. From the Form exit, click User Mode.
2. In the User/Role field, if it is not already populated, in the User/Role field enter the user or role for which you
want to view Standard or Simplified modes.
3. Select Standard, Simplified, Service-only (9.2 Update 6), or All to search for corresponding records.
4. Click Find.
You can also use this batch process to assign display and environment preferences to users.
Note: If you need to add just a few users, you should use the User Profile Revisions application.
Prerequisites
Before you complete the tasks in this section:
• Create all of the role profile information by using the User Profile Revisions application.
• Define:
◦ Role profiles.
◦ Environments that each role can access.
65
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
2. Select the EnterpriseOne default version (XJDE0001) or the equivalent for the installation, and then click Select.
3. On the Versions Prompting form, click Data Selection, and then click Submit.
4. On the Data Selection form, create a logic statement that describes the set of users for which you want to create
profiles.
This form already has a search type of E (employees) populated, which assumes that the users are all
employees. You might want to narrow this selection by submitting it for only a range of employees.
After you complete the Data Selection form, the Processing Options form appears.
5. On the Processing Options form, enter:
Enter 1 to run this report in proof mode, which provides an example of what would happen if you were to
run the report in final mode.
Leave blank to run this report in final mode, which creates the user profiles that you specified and creates
a report showing the profiles created.
◦ One of these values for option 2 to define the user profile record being created for each user:
Enter 1 to populate the User ID field with the users' address book numbers plus their initials. Typically,
user profiles are created with the users' initials preceding their Address Book number.
Leave this field blank to use just the address book number.
Fast Path
Language
Date Format
Country
◦ For option 3, enter any additional environments that you want the user to have access to instead of the
environments already established for the user's role.
In the Fast Path, enter BV to access the Work With Batch Versions - Available Versions form.
66
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
Setting Up Roles
This section contains the following topics:
• Understanding User Roles
• Creating and Modifying Roles
• Migrating Roles
• Sequencing Roles
• Adding an Environment to a Role
• Assigning Business Preferences to a Role
• Setting Up a Role Relationship
• Enabling the Role Chooser
• Creating Role-to-Role Relationships
• Delegating Roles
• Adding Roles to a User
• Adding Users to a Role
• Copying User Roles
• Adding a Language Translation to a Role
After you have defined a role, you can associate users with it and apply security to it to provide the appropriate level
of access to EnterpriseOne functions. You can assign more than one user to a role, or you can assign more than one
role to a user. To establish a role relationship, you use the Role Relationships application (P95921), which enables you to
add, remove, or revise a role relationship for a user. Role relationships are revised by removing an assigned role or by
changing the expiration date for an assigned role.
67
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
Within an organization, a user might have many responsibilities, none of which are defined by a single role. A
user who is assigned multiple roles can switch roles according to the work required.
Note: Security for a user is not affected when a user changes a role after signing in to EnterpriseOne; only
menu filtering and the display of menu information is affected for that user. The security applied to a user is
based on how a user signs in to the system.
A user's access to applications, forms, table columns, data sources, and so on is based on one or more roles to
which the user is assigned.
Note: EnterpriseOne stores the role descriptions in the F00926 table. If you previously defined roles using the
UDC table H95/RL, you can run the Populate Role Descriptions From F0092 report (R89959211) to populate the
Anonymous User Access Table with those older role descriptions.
This table summarizes the steps an administrator must perform to set up roles for users:
Populate the User Profile table R89959211, R89959212 Not applicable (NA). F00926,
with roles that are stored in UDC F0092
H95/RL during Roles Phase I.
Create role relationships that P95921 (Role W95921A (Work With F95921
associate users with roles. Relationships) Role Relationships).
The Portal, Solution Explorer, and EnterpriseOne clients use the role relationships data in the F95921 table (Role
Relationships) and various APIs to retrieve data and allow users to have assigned roles.
68
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
You use EnterpriseOne to administer defined roles for which you have created role relationship records. You can add
large numbers of roles to a single user, and you can add large numbers of users to a single role relationship record. You
can also use EnterpriseOne to specify the language that is used for the description of a new role.
After you have created one or more role relationships for a user, you can revise the relationships. Role relationships are
revised by removing an assigned role or by changing the expiration date for an assigned role. You can also exclude an
assigned role from *ALL or add a role to *ALL that was previously excluded.
In addition, you might want to delegate one or more of the roles to another user if a particular user will be unavailable.
When you delegate the role relationship records, you can copy existing records to another user. You cannot add role
relationships to another user unless those roles are already assigned to you.
Note:
• "Applying Roles to a Task" in the JD Edwards EnterpriseOne Tools Solution Explorer Guide .
• Setting Up Authorization Security with Security Workbench.
You use the Work With Distribution Lists form to add or remove roles from the distribution list as needed. Work With
Distribution Lists does not influence how security is applied. It only helps to define workflow e-mail distribution lists.
At the JD Edwards EnterpriseOne sign-in form, the user enters a user ID and password. The user must then enter a valid
environment and role before entering EnterpriseOne. User roles and assigned environments are dependent on each
other. The user can select an environment, which then determines the roles that appear in the Role Chooser; or the user
can select a role, which determines the environments that appear in the Environment Chooser.
The option for enabling the Role Chooser is a global setting. When enabled, it applies to all users in the system.
This table summarizes the scenarios that can occur when the user encounters the Environment and Role fields at sign-
in on the Microsoft Windows client, and the behavior of EnterpriseOne in each scenario:
User enters values in both the The software validates the role against the environment. If the role is not valid for the chosen
Environment and Role fields. environment, the Environment Chooser appears and the user must choose a valid environment for the
role.
User enters a value only in the Role field. The Environment Chooser displays only the valid environments for the chosen role.
69
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
User enters a value only the Environment The Role Chooser displays only the valid roles for the user and the chosen environment.
field.
User does not enter a value in either the The Role Chooser appears, containing the valid roles for the user and the default environment that is
Environment field or the Role field. defined in the jde.ini file, followed by the Environment Chooser, containing only the valid environments
for the chosen role.
If you do not enter an environment, the Role Chooser displays the roles that are assigned to the default
environment, which is defined in the jde.ini file.
The "Choose role on Menu filtering page" option is a global setting. When enabled, it applies to all users in the system.
Note: If a user signs in to EnterpriseOne using a particular role instead of *ALL, then the system only displays the
tasks in the EnterpriseOne Menus for that role; the user cannot select a different role in the EnterpriseOne Menus.
Note:
• Enabling the Role Chooser.
• Understanding User Roles.
70
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
The LASTROLE parameter value defines the role that appears in the sign-in screen when EnterpriseOne is launched.
◦ To create a new role, select Add Role from the Form menu.
◦ To modify an existing profile, click the Roles Only option; click Find and select a role in the detail area;
and then click Select.
Note: You cannot add a role by clicking the Add button on the toolbar of the Work With User/Role
Profiles form.
2. On Role Revisions, in the Role field, enter a name for the role, such as RECEIVING, and enter a description for the
role in the adjacent field.
When you modify a role profile, this field displays the name of the role.
3. In the Sequence Number field, enter a number to specify the sequence number of the role in relation to other
roles.
For a user assigned to more than one role, the sequence number determines which role is chosen when a
security conflict exists among the different roles.
4. Complete any of the remaining fields, as necessary, and click OK.
Migrating Roles
On a client machine, open the Batch Versions application in EnterpriseOne and run these universal batch engines
(UBEs) to migrate generic roles into the environments.
Set Up Roles
71
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
The performance of this TC is directly dependent upon the number of *GROUP records in the F0092 table. It should
finish quickly.
After processing, this TC produces no report. To verify that the table conversion completed, open the Universal Table
Browser (UTB) and check the F00926 table for some of the roles that are defined in the F0092 table. For example, check
the field USER for OWTOOL, the field ROLEDESC for OWTOOL, and the field SEQNO for a sequence number that is
greater than 1500.
• Final/Proof Modes
It is recommended that the TC be run in proof mode first. This mode inserts records to the F95921 table, but it
does not remove the group from the user's profile. After the UBE is successfully run in proof mode, check some
of the records in the F95921 table to see if they were added successfully. You can re-run the TC in final mode
with the same processing options. A new record is not inserted for the user if the effective date is the same as
the previously run TC's effective date, so you only remove the group data from the F0092.UGRP field for that
user.
• Effective Date
The start date of the role relationship. With current users (those in F0092 table), you want to use the date that
the TC is run. (When running in final mode, use the date that the TC was run in proof mode to prevent the
system from adding a new set of records into the F95921 table.) This field must not be modified within the role
relationship record later.
• Expiration Date
The end date of the role relationship. If this date is left blank, the relationship never expires. The role will expire
at the beginning of the day of the date that you enter. With the current users (those in the F0092 table), you
should leave this blank so they do not expire from their current group or role.
This field can be modified within the role relationship record later.
• Included In All
This flag indicates that the security of this role is applied when the user chooses to enter EnterpriseOne under
the role of *ALL. Use this flag if a user is being added to a sensitive role, such as Payroll or PVC. This field can be
modified within the role relationship record later.
The performance of this TC directly depends upon how many user records are in the F0092 table. It should finish
quickly.
This TC produces no report. To verify that the TC completed in proof mode, open the UTB and check the F95921 table
for some of the users who were defined in the F0092 table. See that their old group (F0092.UGRP) is now their Role
F95921.RLFRROLE. To verify that the TC has completed in final mode, view the F0092 table through the UTB, and verify
that no data is in the UGRP fields.
72
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
Add Environments
Environments can be added to roles. When a user selects a particular role at sign-in, the environments that are
associated with that role appear in the Environment Selection List form. If the user selects *ALL environments, all of the
environments that are associated with all of the users roles which have been marked as "included in all" appear in the
Environment Selection List form. All environments are validated against the user's pathcode.
[SECURITY]
DefaultRole=*ALL
[REPLICATION]
DefaultRole=*ALL
[SIGNON]
LastRole=<Users Last Role>
This value is populated when a user signs into JD Edwards EnterpriseOne.
[DB_SYSTEM SETTINGS]
DefaultRole=*ALL
Server Executables
Run a PortTest.
Set Up Security
Complete these Universal Batch Engines (UBEs) to set up user security.
Note: This UBE must be run locally because the business function resides only on the client machine.
The performance of this UBE is directly dependant upon how many system users are associated with user records in
F98OWSEC table. It should finish quickly.
73
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
To verify that the UBE completed successfully, open the UTB and check the F98OWPU table for some of the system
users that are in F98OWSEC table.
If you want to change a system user password, you have to change it only once for each system user and not for every
record in the F98OWSEC table that contains the system user.
• Proof or Final
Indicates whether to run in proof or final mode. Proof mode does not commit records.
• Password Change Frequency
For a given user, this option determines the maximum number of days before the system requires a password
change.
• Allowed Attempts
The number of times that uses can unsuccessfully attempt to log on before their JD Edwards EnterpriseOne
account is disabled.
• Enable/Disable User
Indicates if the user's account is enabled or disabled. A disabled account is not allowed into JD Edwards
EnterpriseOne.
• Daily Password Change Limit
The number of times that users can change their password in one day. Because the last ten passwords of a user
are stored in the BLOB, it is a security hole to allow users to change their password as many times as they want.
If users want to keep their current password, they can change it 11 times in one day so that they are not back to
the original.
• Force Immediate Password Change
This option requires users to immediately change their password. You might not want to set this option for all
users.
The performance of this UBE is directly dependant upon how many system users are associated with user records in the
F98OWSEC table. It should finish quickly.
To verify that the UBE completed successfully, access the User Security application (P98OWSEC), and find a user or role
whose record should have changed. Verify that the values are correct.
74
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
Sequencing Roles
The Work With Role Sequences form contains all of the roles that you defined and enables you to assign a sequence to
the roles. The sequence defines a hierarchy of roles and determines which role is used when a security conflict exists
among roles when a user signs in as *ALL.
The EnterpriseOne Windows client and Web client differ as to how they use the role sequence to determine which
security record is applied. The Web client only checks the first role in the role sequence to determine the security for an
application, form, column, row, and so forth. The Windows client checks all the roles in *ALL for security, but uses the
role sequence to determine which role to use when there are duplicate security records.
This is an example of duplicate security records in which the Windows client is forced to use the role hierarchy to
determine which security record to apply:
A user signs in as *ALL. The *ALL has two roles associated with it—Role 1 and Role 2.
In this same example, if each of these roles had different security records for the same security type, the system would
apply the security as defined by both records. For example, if Role 1 does not allow users to view column A and Role 2
does not allow users to view column B, the user would not be able to view either column on the form.
You can configure the EnterpriseOne Web client to use the same role sequencing functionality as the Windows client.
This is recommended if you are migrating from the Windows client to the Web client. To enable this functionality in the
Web client, use Server Manager to configure the following setting in the [OWWEB] section of the JAS.INI:
userRoleHierarchy=true
To sequence roles:
In the Fast Path, enter P0092 to access the User Profiles application.
1. On the Work With User/Role Profiles form, from the Form menu, select Role Sequence.
2. On Work With Role Sequences, select a role from the tree structure and drag it to the point in the sequence that
you want.
3. After you have set the order that you want, select Set Sequences from the Form menu and click Close.
4. If you decide you do not want to change the sequence, select Close Without Set from the Form menu and click
Close.
75
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
In the Fast Path, enter P0092 to access the User Profiles application.
1. On Work With User / Role Profiles, select the Roles Only option and click Find.
Note: The Both Users and Roles option also enables you to perform the same task, although the Roles Only
option is the simplest way to add an environment.
2. Select a role from the detail area of the grid, and select Environments from the Row menu.
3. On the User Environment Revisions form, in the Display Seq. (display sequence) column, specify the order in
which the environments will be presented in the Environment Chooser at JD Edwards EnterpriseOne sign-in.
4. In the Environment column, click the search button to select an environment, and then click OK:
Note: If you want to change an existing environment for a role, enter a new value for the Environment
parameter and click OK.
In the Fast Path, enter P95921 to access the Work With Role Relationships form.
1. Complete the User field and click Find.
The system displays the user's assigned roles and the available roles in separate tree controls.
2. Select a role from the Available Roles tree control and click the left arrow button to add it to the list of assigned
roles.
3. On the Role Revisions form, enter an effective date if you want an effective date that is different from today's
date.
Today's date is the default value for the Effective Date field. If you do not use the default value, enter a date later
than today's date; otherwise the software returns an error message.
4. Enter an expiration date in the Expiration Date field, if one is needed.
The role will expire at the beginning of the day of the date that you enter. The role will not expire if you do not
complete the Expiration Date field.
76
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
5. Select the Include in ALL* option if you want the role to be one that the user can play if the user enters JD
Edwards EnterpriseOne playing all roles, and click OK.
If you do not select the Include in *ALL option, this role will not be part of the active roles when the user enters
EnterpriseOne using *ALL as his role at sign-in. To activate a role that is not included in *ALL, the user must
select that particular role when signing on to the system. The role selected will be the only active role during
that session.
Note: Both the Role Chooser and Menu Filtering Role Chooser options are global settings. When enabled, they apply
to all users in the system.
77
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
Delegating Roles
To delegate roles:
1. On Work With Role Relationships (P95921), from the Form menu, select Roles Delegation.
2. On the Work With Delegation Relationships form, complete the Delegate field by entering the user ID of the
user being delegated to and click Find.
The roles of the user who is delegating appear in the Available Roles tree control. The roles of the user who is
being delegated to appear in the Assigned Roles tree control.
3. To delegate a role, select the role from the Available Roles tree control and click the left-arrow button.
4. Complete these fields and click OK:
◦ Effective date
Enter an effective date if you want the delegation to occur at a date other than the current date.
◦ Expiration date
5. Select the *ALL option if you want the role to be one that the user can play if the user enters EnterpriseOne
playing all roles.
EnterpriseOne adds the delegated role to the Assigned Roles tree control on the Work With Delegation
Relationships form.
Note: You can use the right-arrow button in the Work With Delegation Relationships form only to remove a
role that you delegated to another user. If you try to remove a role that you did not delegate to the user, the
software will display a dialog box notifying you that the action is invalid.
1. On Work With Role Relationships (P95921), from the Form menu, select Add Roles to User.
2. Complete the User ID field and click Find.
3. Select the roles that you want to add to the user and click Select.
Hold down the Control key to select more than one role to add.
4. On the Role Revisions form, complete these fields:
◦ Effective Date
Enter a date if you want the effective date to be different from the current date.
◦ Expiration Date
The role will expire at the beginning of the day of the date that you enter.
◦ Include in *All
78
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
5. Select the *ALL option if you want the role to be one that the user can play if the user enters JD Edwards
EnterpriseOne playing all roles.
6. Click OK.
7. If you are adding more than one role relationship record, complete the Role Revisions form for each record that
you are adding.
1. On Work With Role Relationships (P95921), select Add Users to Roles from the Form menu.
2. Complete the Role field and click Find.
3. Select the users that you want to add to a role and click Select.
Hold down the Control key to select more than one user to add.
4. In the Role Revisions form, complete these fields:
◦ Effective Date
Enter a date if you want the effective date to be different from the current date.
◦ Expiration Date
◦ Include in *All
5. Select the *ALL option if you want the role to be one that the user can play if the user enters JD Edwards
EnterpriseOne playing all roles.
6. Click OK.
7. If you are adding more than user record, complete the Role Revisions form for each record you are adding.
1. On Work With Role Relationships (P95921), complete the User field and click Find.
79
JD Edwards EnterpriseOne Tools Chapter 9
Security Administration Guide Provisioning User and Role Profiles
If you want to view the descriptions of any role in all the languages into which it is being translated, use the Work With
Language Role Description form.
In the Fast Path, enter P0092 to access the User Profiles application.
Note: The Both Users and Roles option also enables you to perform this task.
2. Select a role from the detail area of the grid and select Role Description from the Row menu.
3. To add a language to a role, click Add.
4. On the Language Role Description Revisions form, in the Role field, enter the name of the role to which you
want to add a language.
5. In the Language field, click the search button to select a language from the list of supported languages.
6. Enter a description of the role in the Role Description field, and then click OK.
80
JD Edwards EnterpriseOne Tools Chapter 10
Security Administration Guide Setting Up Long User IDs in EnterpriseOne
You enable the Long User feature through the User Profile Revisions Long (P0092L) application. In this same
application, you set up user profiles with long user IDs by:
• Adding long user IDs to existing user profiles that contain short user IDs.
• Add new user profiles that contain both short and long user IDs.
A user profile cannot exist with only a long user ID. It must contain both a long user ID and short user ID. Because both
user IDs are stored together in the same record in F98OWSEC table, users can use either their short user ID or long user
ID to sign in to EnterpriseOne.
If a user cannot remember his or her short user ID, you can configure the Auto Suggest feature to display both the
user's short user ID and associated long user ID when the user begins to type a long user ID in any form where there
is a User ID field. See "Setting Up Auto Suggest for the User ID Field" in the JD Edwards EnterpriseOne Tools Runtime
Administration Guide for more information.
EnterpriseOne also provides the Enable User Migration (P95LUMIG) application to add new long user IDs to existing
user profiles in bulk. See Associating Short User IDs to New Long User IDs in Bulk
P0092L includes the same features and functionality as the standard User Profile Revisions application (P0092). The
only difference is that it provides an additional column for associating a long user ID with the user's short ID. Therefore,
after adding long user IDs, you can use P0092L to manage user profiles.
Example: Comparison of P0092 and P0092L shows the difference between P0092 and the P0092L.
81
JD Edwards EnterpriseOne Tools Chapter 10
Security Administration Guide Setting Up Long User IDs in EnterpriseOne
The following image shows the DD12345678 user profile in P0092 with the "long" user ID in the User Name column:
Notice that both forms have the same name, "Work With User/Role Profiles", because both forms provide the same
features and menus for working with user profiles.
82
JD Edwards EnterpriseOne Tools Chapter 10
Security Administration Guide Setting Up Long User IDs in EnterpriseOne
• Other EnterpriseOne systems or components that requires user credentials for access or processing, such as
the Scheduler application, the Configuration Assistant and Change Assistant, RUNUBE and RUNUBEXML, the
wizard for developing business services, EnterpriseOne mobile clients and supported tablet clients, and so
forth.
For Collaborative Portal sign-in, long user IDs up to 254 characters in length are not supported. However, if you enabled
the Long User feature in EnterpriseOne, you can configure the Collaborative Portal to accept long user IDs up to 200
characters in length. See Configuring Collaborative Portal to Support "Limited" Long User IDs for more information.
Note: Once enabled, the Long User feature cannot be disabled. However, if you enable the Long User setting and you
decide to not create long user IDs, EnterpriseOne will still accept short user IDs for sign-in credentials.
1. Access P0092L.
2. On Work With User/Role Profiles (P0092L), select the Form menu, Enable Long User.
3. On Enable Long User Feature, select the Long User ID check box if it is not already selected, and then click the
Submit button.
4. In the confirmation dialog box, click Yes to continue.
5. Access Server Manager and restart the EnterpriseOne Enterprise Server and the EnterpriseOne HTML Server
for the changes to take effect.
You can also use the P95LUMIG application to associate multiple short user IDs to new long user IDs in bulk. See
Associating Short User IDs to New Long User IDs in Bulk for more information.
83
JD Edwards EnterpriseOne Tools Chapter 10
Security Administration Guide Setting Up Long User IDs in EnterpriseOne
Because P0092L contains all of the same features and functionality as P0092, you can also set up new user profiles in
this application. Remember that a long user ID cannot exist in EnterpriseOne independently. It must be associated with a
short user ID. Therefore, new records in P0092L must contain both a short user ID and a long user ID.
3. Access P95LUMIG.
4. On User Migration Revision (P95LUMIG), select the Tools menu, Import.
5. On the Import Assistant, click the Browse button to locate and select the file that contains the data that you
want to import, and then click the Open button.
6. On the Import Assistant, depending on the type of file that you are using for the import, complete the
appropriate fields to define the data that you are importing. For example, if you are importing the data from the
Excel spreadsheet in the preceding example, you would enter the following values:
84
JD Edwards EnterpriseOne Tools Chapter 10
Security Administration Guide Setting Up Long User IDs in EnterpriseOne
7. Click the Apply button and then focus on the file to make sure that the data you are importing is highlighted.
8. Click the Save button.
9. On User Migration Revision, review and verify the records, and then click the Select button.
After you click Select, EnterpriseOne imports these records as user profile records in the F0092 and F0092L
tables.
To do so:
1. Log in to Portal Integrated Solution Center (Admin Center).
2. Go to Resources, Resource Environment, Resource Environment Providers, WP ValidationService, Custom
Properties, New.
85
JD Edwards EnterpriseOne Tools Chapter 10
Security Administration Guide Setting Up Long User IDs in EnterpriseOne
3. In the "Resource environment providers" area, add or edit the following entries:
◦ user.UNIQUEID = uid
◦ group.RDN = cn
4. Update the following properties for long user validation:
◦ user.UNIQUEID.min = 6
◦ user.UNIQUEID.max = 200
◦ user.UNIQUEID.charset = unicode
◦ user.UNIQUEID.extra_chars = @._
If there are some other extra characters allowed, you can append the characters to this property.
5. Update the following properties for password validation:
◦ password.charset = unicode
◦ password.extra_chars = @._
If there are some other extra characters allowed, you can append the characters to this property.
6. Apply these changes and restart the server.
This enables users with an email address up to 200 characters in length to sign in to the Collaborative Portal.
86
JD Edwards EnterpriseOne Tools Chapter 11
Security Administration Guide Understanding Sign-in Security
Overview
JD Edwards EnterpriseOne security runs on a logic server in a dedicated internal process. EnterpriseOne uses an
encryption algorithm to ensure that applications other than EnterpriseOne cannot access passwords transmitted across
the network.You create a security table on the data server that stores information, such as:
EnterpriseOne User
The user ID used to sign in to JD Edwards EnterpriseOne.
EnterpriseOne Password
The user's password, which the software validates when the user signs in to JD Edwards EnterpriseOne.
System User and System Password
The actual user and password used to connect to all database management systems (DBMS). If the JD Edwards
EnterpriseOne environment includes more than one DBMS, you can create different system users and passwords for
each data source.
Change Frequency
The frequency of password changes required by the software.
Last Change
The date that the password was last changed.
You must define a security record for each user either by group or by individual. It is recommended that you map
multiple users to the same system user. For example, each user can use the same system user that the software uses
to connect the database management systems. By setting up the security in this manner, you can simplify database
administration of users and passwords.
You can also set up unified logon (prior to release 9.2.2 only) with EnterpriseOne to simplify sign-in security. When you
set up unified logon, EnterpriseOne uses Windows Authentication to verify security. This verification enables sign-in
security to use the network logon information that a user supplies when logging on to Windows; EnterpriseOne does
not require the user to enter another user ID and password when signing in.
You must perform all of the validation and changes of EnterpriseOne passwords through a JDENet message to the
Enterprise Server that has the F980WSEC table. Upon validating an EnterpriseOne password, the JDENet message
returns the system user and password that you enter. These words are encrypted across the network. Internally, this
system password is used for all connections to databases.
87
JD Edwards EnterpriseOne Tools Chapter 11
Security Administration Guide Understanding Sign-in Security
Using the database management system, you should place database security on the F98OWSEC table. You should also
assign EnterpriseOne object security to the F98OWSEC table so that users cannot access the object except to enter User
Password Revisions.
Password Encryption
You can enter the initial sign-in password for each user in these ways:
• Type it manually.
• Use a default password established through the sign-in security processing options.
• Have EnterpriseOne enter it automatically because the user has an existing security record.
When typing a password manually or when using the processing option default password, you cannot see the password
for a new user as you are typing it. When you revise this record, however, the system encrypts the password so that all
you see are asterisks. The number of asterisks does not represent the number of characters in the password. The user
security application does not know what the password is. The application is given a flag that indicates that a password
was entered. The system stores the actual password on the security server within a binary object in the F980WSEC
table. The system accesses the binary object when the user security application requests a change or inquiry.
Determine location of the F98OWSEC Ensure that the F98OWSEC table is located in the system data source on the Enterprise Server, and
table. ensure that the table is mapped to the correct data source through the Object Configuration Manager.
If your system data source resides on the enterprise server, the F980WSEC table should reside in the
system data source. However, if the system data source is located on the deployment server (or other
servers), the F980WSEC table should be moved to the server map data source for the enterprise server.
If you have more than one logic server, you should use only one as the security server.
Set database security on the F98OWSEC From within the DBMS, place database security on this table to prevent a user from accessing the
table. object, except to enter passwords through User Password Revisions.
Place security on the logic server's jde.ini The DBMS user ID and password to the Sign On Security table are stored in this file.
file.
Caution: Implementing jde.ini file security will prevent Server Manager from modifying configuration
settings.
88
JD Edwards EnterpriseOne Tools Chapter 11
Security Administration Guide Understanding Sign-in Security
• System password
• EnterpriseOne password
• User Status
• Allowed number of invalid sign-on attempts (optional)
• Change frequency (optional)
Note: If you intend to use a unified logon, every user in the EnterpriseOne security database
requires a unique user ID (prior to release 9.2.2 only).
Verify and modify the jde.ini file on the JD If you use a unified logon (prior to release 9.2.2 only), you need to change the settings for a unified
Edwards EnterpriseOne logic server for the logon in the [SECURITY] section as well as in the EnterpriseOne [SECURITY] settings.
platform environment.
Set up a unified logon server (prior to If you use a unified logon with the JD Edwards EnterpriseOne security, set up a unified logon server
release 9.2.2 only). for each instance of EnterpriseOne on each server. For example, if you have an NT server with multiple
releases of EnterpriseOne, you need a unified logon server for each release on the server.
The unified logon server differentiates instances of EnterpriseOne based on the port numbers for
these instances. For example, if the port number for EnterpriseOne is 6104, the port number for the
associated unified logon server is 6104. Other instances and unified logon servers use different port
numbers.
Verify and modify jde.ini file. Verify and modify the jde.ini file that will be deployed to the server's workstation installations.
Standard sign-in security for EnterpriseOne Windows clients uses this process flow:
• Users sign in to EnterpriseOne on their workstations using their user ID and password.
The workstations can be networked or standalone workstations, laptop computers, or other EnterpriseOne
hosts.
If you enter a valid user ID and password, as validated against the local workstation installation, the start-up
process continues.
• As the software starts, it tries to detect an operational network environment.
If a network is not detected, the software allows local operation in a store-and-forward mode. Because the
workstation or laptop computer is not connected to a network or an enterprise server, no validation can be
89
JD Edwards EnterpriseOne Tools Chapter 11
Security Administration Guide Understanding Sign-in Security
performed against the F980WSEC table. Therefore, security is limited to that provided by the local workstation
or laptop installation.
If a network is detected, the software encrypts the password information and sends it over the network to the
JD Edwards EnterpriseOne enterprise server.
The enterprise server checks the incoming validation request against a table of valid users and passwords. If
the user ID and password information are valid, the software accepts the sign-in values and returns the system
ID and password to the logically attached database servers. This information is also encrypted on the enterprise
server prior to broadcast on the network.
This graphic displays a process flow model for standard sign-in security:
90
JD Edwards EnterpriseOne Tools Chapter 11
Security Administration Guide Understanding Sign-in Security
The process flow for sign-in security with a unified logon (prior to release 9.2.2 only) is as follows:
• A user starts EnterpriseOne on a workstation.
• EnterpriseOne verifies that the unified logon is active and then sends an authentication request to the unified
logon server, based on the domain user ID.
Note: The unified logon server is not a physical server. It is a device that verifies sign-in security against the
domain sign-in security maintained by Microsoft Windows.
91
JD Edwards EnterpriseOne Tools Chapter 11
Security Administration Guide Understanding Sign-in Security
During jdesnet initialization, jdesnet activates the unified logon server thread. The unified logon server ends
automatically when jdesnet ends.
• The unified logon server searches its user list for an entry that matches the domain user ID. When the server
finds a match, the server sends a validation request to the enterprise server.
• The Enterprise Server verifies that the response from the unified logon server matches the security information
in the F980WSEC table.
• If the security information from the user list on the unified logon server matches the security information in the
F98OWSEC table on the enterprise server, the start-up process continues.
• The first time that a user signs in to EnterpriseOne with the unified logon, the Environment Selection appears.
The user must enter an environment in the Environment field. Select the option to set the environment as the
default, and avoid the Environment Selection form on subsequent sign-in attempts.
This illustration displays the process flow for unified logon:
92
JD Edwards EnterpriseOne Tools Chapter 11
Security Administration Guide Understanding Sign-in Security
93
JD Edwards EnterpriseOne Tools Chapter 11
Security Administration Guide Understanding Sign-in Security
ShowUnifiedLogon Setting
The ShowUnifiedLogon setting in the [SECURITY] section of the jde.ini file allows users to reset whether the
Environment Selection form appears at sign-in. This feature allows users to change the environment later. This table
describes the jde.ini file setting for the [SECURITY] section:
Value Description
0 A value of 0 for ShowUnifiedLogon disables the Environment Selection form. When you click the
option on the Environment Selection form to set a default environment, you set this value to 0.
1 A value of 1 for ShowUnifiedLogon enables the Environment Selection form. When a user signs in to
JD Edwards EnterpriseOne, the Environment Selection form appears and allows the user to choose an
environment. This setting is the default for ShowUnifiedLogon.
When web users sign in, disconnect, or make a password change, the HTML server sends the request using a JDENET
message to the security server, which, in turn, accesses the F98OWSEC table. The security server then returns the
authentication through a JDENET message to the JAS security server. If the user is authenticated, the security info is
cached to the JAS security server.
The JAS security server acts as an intermediary between the Java/HTML, Portal, and Interoperability client and the
security server.
This graphic displays a process flow for sign-in security with unified logon (prior to release 9.2.2 only) for web users:
94
JD Edwards EnterpriseOne Tools Chapter 11
Security Administration Guide Understanding Sign-in Security
As the security intermediary, the JAS security server handles these tasks:
• Connecting to the EnterpriseOne security server for user security authentication and password when a web
user signs in.
• Switching to a secondary EnterpriseOne security server when the primary server is down, provided the correct
jas.ini settings are defined.
• Notifying Java/HTML, Portal, and Interoperability client workstations when a user password has expired.
If an Interoperability user's password has expired, sign-in fails without notification of the cause.
• Sending error message to user log after the web user has attempted unsuccessfully to sign in x number of
times to EnterpriseOne, where x is the number of sign-in attempts defined in the F98OWSEC table.
• Allowing Java/HTML and Portal users to change name and password.
• Encrypting JDENET messages sent between the JAS security server and the EnterpriseOne security server.
• Keeping a valid user session open until the user signs off or the session expires.
To the web user, sign-in and sign-out function the same as they do to a user on Windows, UNIX, or IBM i platforms.
To set up security for web users through the EnterpriseOne security server, add these parameters to those that already
exist in the jas.ini file:
NumServers Total number of EnterpriseOne security servers that are available to web users signing on to the
system. If this parameter is missing, the default value is 1 and the primary security server handles the
sign-in.
95
JD Edwards EnterpriseOne Tools Chapter 11
Security Administration Guide Understanding Sign-in Security
SecurityServerN Name of the secondary security server. The value of N is 1 for the first secondary server, 2 for the
second, and so on. Assign values to this parameter if you want sign-in to switch to a secondary server
if users cannot sign in to the primary server.
UserLogonCookie= If the value is TRUE, the user can save signon information (username, password, and environment) in
an encrypted cookie on the workstation and does not have to type the information in for subsequent
sign-ins. If the value is FALSE, the feature is disabled.
#CookieLifeTime unit Unit of time used to measure a cookie's lifetime. For example, the parameter value day means that the
cookie's lifetime is measured in days.
Cookie LifeTime Amount of time before a cookie expires. The unit of measure is defined by the #CookieLifeTime unit
parameter value. If that value is day and the value of the Cookie LifeTime parameter is 7, the cookie
expires in seven days.
If you define one primary server and two secondary servers, the jas.ini file [SECURITY] settings look like this example:
NumServers=3
SecurityServer=JDED
SecurityServer1=JDEC
SecurityServer2=corowhp2
UserLogonCookie=TRUE
#CookieLifeTime unit is day
CookieLifeTime=7
If you define one or more secondary servers, sign-in fails over to the secondary server if the primary server is down. If
both the primary EnterpriseOne security server and a secondary server as defined in the jas.ini file fail, the HTML Server
fails the user sign-in.
If you do not define a server number or any secondary servers, the jas.ini [SECURITY] settings look like this example:
[SECURITY]
SecurityServer=JDED
UseLogonCookie=TRUE
CookieLifeTime unit is day
CookieLifeTime=7
96
JD Edwards EnterpriseOne Tools Chapter 11
Security Administration Guide Understanding Sign-in Security
Default
Although processing options are set up during the EnterpriseOne implementation, you can change processing options
each time that you run an application.
1. Enter a '1' to default the User ID into the password field.
3. Enter the number of sign-on attempts a user is given prior to being disabled.
Password
Although processing options are set up during the EnterpriseOne implementation, you can change processing options
each time you run an application.
1. Enter the daily password change limit that will be applied to all users when attempting to change a password.
If this field is 0 or is left blank, there will be no limit on daily password changes.
2. Enter the minimum password length that is to be used when users attempt to change a password.
If this field is 0 or is left blank, the password will not be checked for a minimum length.
3. Enter the minimum number of character that must be used within a password.
If this field is 0 or is left blank, the password will not be checked for characters.
4. Enter the minimum number of numerics that must be used within a password.
If this field is 0 or is left blank, the password will not be checked for numerics.
5. Enter the maximum number of consecutive characters that can be used in a password.
If this field is 0 or is left blank, the password will not be checked for consecutive characters.
6. Enter the minimum number of special characters that must be within a password.
If this field is 0 or is left blank, the password will not be checked for special characters.
97
JD Edwards EnterpriseOne Tools Chapter 11
Security Administration Guide Understanding Sign-in Security
98
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
You can also set up a unified logon server for an EnterpriseOne server (prior to release 9.2.2 only). The unified logon
server enables EnterpriseOne to use the domain logon information to determine user security. In an EnterpriseOne
unified logon scenario, a user needs to enter a user ID and a password only at network logon.
Typically, users within a specific role use similar security information. Oracle recommends that you create a model
user with security information that you can copy to create security records for other users. The P98OWSEC application
provides a copy function that simplifies the creation of security records.
Note: When you copy security records to a user, security records must not already exist for that user. If you try to
copy user security to a user with existing user security records, you will receive an error message.
You should keep user security simple. Managing EnterpriseOne user IDs and system (database) user IDs can become
complicated quickly. The simplest way to set up user security is to have all data sources share the same system user ID
99
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
and password by leaving the data source field blank when you initially create user security records for users or roles on
the Security Revisions form.
When you leave the data source field blank, the P98OWSEC application automatically enters DEFAULT in the field. The
DEFAULT data source enables you to create one security record for all users. Each time a user accesses a table through
an EnterpriseOne application, the software searches for a security record for that user and the specific data source
where the table resides. If the software does not find a specific record, then it uses the default data source, which is the
security record that you created with the DEFAULT data source field.
You use system user IDs to manage user access to databases. Although you should try to maintain as few system user
IDs as you can, occasions arise that require you to set up database security in addition to the EnterpriseOne object and
user security for specific users and specific tables. For example, you might need to create system users with additional
authority to what the typical system user needs.
Note:
• "Setting Up Data Sources" in the JD Edwards EnterpriseOne Tools System Administration Guide .
It is difficult to monitor and administer accounts that are not in use. An administrator should disable these accounts to
stop unauthorized access to EnterpriseOne. See Creating User Sign-in Security in this section for information on how to
disable an account.
Prerequisites
Before you complete the tasks in this section:
• For initial installations of EnterpriseOne, you must set up system user(s) using the Work With System Users
(P980001) program to populate the F98OWPU table. You must set up system users before you can add and
associate an EnterpriseOne user to a system user using EnterpriseOne Security (P98OWSEC).
CAUTION: If you attempt to add a user with the P98OWSEC program before you add the system user
through the P980001 program, the system may add an invalid record to the F98OWPU table. You might have
to delete the invalid record from F98OWPU using the SQL Query tool.
In the JD Edwards EnterpriseOne Installation and Upgrade Documentation Library, see "Working With Signon
Security" in the EnterpriseOne Installation or Upgrade guide that is applicable to your platform and database:
http://docs.oracle.com/cd/E61420_01/index.htm
100
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
Work With User Security W98OWSECE Security Maintenance Access forms to work
(GH9052), User Security with user security.
(P98OWSEC)
Security Revisions W98OWSECB On the Work With User Create user security.
Security form, click Add.
Copy User Records W98OWSECN On the Work With User Copy user security.
Security form, select the
user or role and click
Copy to copy all security
records. To copy a single
user security record,
select the security
record from the detail
area, and select Copy
Record from the Row
menu.
Security Detail Revisions W98OWSECI On the Work With User Revise user and role
Security form, select security.
the appropriate record,
and then select Revise
Security from the Row
menu.
Sign On Security - W98OWSECG On the Work With User Require all machines
Required/Not Required Security form, select to use JD Edwards
Req / Not Req from the EnterpriseOne sign-in
Form menu. security.
101
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
5. If you want to set limits on the passwords for users, complete these fields:
◦ Allowed Password Attempts
102
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
Enter the number of invalid password attempts allowed before the system disables access for the user.
◦ Password Change Frequency
Enter the number of days until the system requires the user to change the password.
◦ Daily Password Change Limit
Enter the allowed number of times a user can change a password in a day.
◦ Force Immediate Password Change
Click this check box to require the user to change the password on the next sign-in.
6. Click OK to save the current user security information.
Note: You should create a model user with security information that you can copy to create other users. Typically,
users within a specific role use similar security information.
1. On the Work With User Security form, find the user, and then perform one of these actions:
◦To copy all user security records for a user or role, select the user or role in the tree structure, and click
Copy.
◦ To copy a single user security record for a user or role, select the security record row in the detail area,
and select Copy Record from the Row menu.
2. On the Copy User Records form, enter a valid user ID in the To User / Role field and click OK.
1. On the Work With User Security form, complete the User ID / Role field.
2. Click Find.
3. Select the appropriate record in the tree structure, and then select Revise Security from the Row menu.
103
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
◦ User Status
Note: For a role, select the appropriate option from the Change box to enable each field.
5. Click OK.
◦ User Status
◦ Frequency
◦ Attempts
◦ Change Limit
3. Complete any of these fields, and then click OK:
◦ User Status
This field requires the user to change the password on the next sign-in.
Note: You can also access Administrative Password Revisions from the User Security application. On the Work with
User Security form, find the user, select the user in the tree structure, and then select Password Revisions from the
Row menu.
User ID
Enter the user ID that you want to force a password change during sign-in. The user ID is the default value in this field
when the user record is highlighted and Password Revision is activated.
New Password
104
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
Enter a new password. On this form, the system does not restrict the password choices. Any password is valid.
New Password - Verify
Enter the password again to verify it.
Force Immediate Password Change
Select this option to force the user to change the password during the next sign-in.
Note: If you set up the security as Not Required and have security turned on through the jde.ini file on the
enterprise server, users that comment out signon security in their jde.ini files will still not be able to access
any data sources without knowing the system user ID and password. When attempting to access a table in a
secured data source, users will receive a database password entry form. If system user IDs and passwords are
confidential, no one will be able to access the secured tables.
When the Reset Password feature is enabled and the email ID is set up for the users in their Who's Who, they get
an email with a link to reset the password. The link is active for the time specified in the Work With User Security
application. When they click the link within that time, they are redirected to the JD Edwards Sign In page with the option
to reset their password enabled. The users can use this to reset their password and they can do it as many times as
needed.
Note: The self-service of password reset is available for Tools Release 9.2.7 and higher.
105
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
• Use the Address Book Revisions program (P0092L) to map each user for whom you want to enable self-service
on password reset to a valid Address Book record. Then, enter a valid Email ID for the corresponding Address
Book record using the Who's Who program (P01012).
• SMTP server should be configured with a working workflow email setup.
Work With User Security W98LPSECM Enter P98LPSEC in the Access form to define
Fast Path field. password reset rules.
Security Detail Revisions W98LPSECQ Select Revise All from Enable password reset
the Form menu on the self-service and define
Work With User Security password reset rules.
form.
1. On the Work With User Security form, select Revise All from the Form menu.
2. On the Security Detail Revisions form, select the Frequency checkbox and enter a value in the Password Change
Frequency field to specify the number of days after which the password will expire.
Note: You can set the password frequency for individual users. To specify a frequency other than the one
specified for all users, enter a user ID on the Work With User Security form and select Revise Security from
the Row menu. Enter the password frequency specific to the user and save the entry.
106
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
3. Select the Reset Password Options checkbox and complete these fields, as necessary:
◦ Password Expiry Notify Time
Specify the time in hours and minutes the time of the day at which the user will be notified about the
upcoming password expiration. This will be based on the local time of the user's country setup.
◦ Password Expiry Notification Interval
Specify the days before the password expiration on which the system should send notification to the user
about the upcoming password expiration. You can define the days separated by commas, for example, to
send notification three, five, and seven days before the password expiry date, enter 3,5,7 in this field.
◦ Reset Password Link Active Time
Specify the number of minutes for which the password reset link that the system sends on the user's
email should be active. This field has a default value of 15.
Note: If you clear out the values in the above three fields, and deselect the Reset Password Options
checkbox, the system disables the password reset self-service feature.
4. Click OK.
Use the Security History form exit from the Work with User Security application (P98OWSEC) to review this history or
audit records regularly according to your organization's security policy.
Prerequisite
The [SECURITY] section in the jde.ini on the security server must include the History=1 setting for the system to record
security history. This setting turns on the auditing for user sign-in and sign-off actions. Enabling this option will add the
record in the F9312 and F9312T tables.
Work With User Security W98OWSECE Security Maintenance Access forms to review
(GH9052), User Security security history.
(P98OWSEC)
Work With Security W98OWSECC On the Work With User Click Find to review the
History Security form, from security history records.
the Form menu, select
Security History.
107
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
The P98LPSEC application uses the new F9312T table to track the user login information. This table also records the
long user ID when long functionality is enabled in the Security History table.
You can use this information to block external access to the application by tracking the IP address or host name being
used for accessing it. You can also use this information to track and audit the user activity details and to troubleshoot
issues.
You can use these applications or reports to view the security tracking data:
Note: A UX One page records data from the P98LPSEC application and provides visibility into user access from
various types of clients. See:
• System Administrator Roles: System Administrator in the JD Edwards EnterpriseOne Applications UX One Roles
User Guide .
• Enhanced User Security Activity Tracking Quick Tour
• Enhanced User Security Activity Tracking Tutorial
108
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
Work With User Security W98OWSECE Security Maintenance (GH9052), Access forms to review security
and then User Security history.
(P98OWSEC)
Work With Security W98OWSECC On the Work With User Security Click Find to review the security
form, from the Form menu, select history records.
History Security History.
Work With Security History Long W98LPSECK On the Work With Security History Click Find to review the security
form, from the Form menu, select history detail records.
Security History.
History Detail Form W9312A On the Work With Security History Review the General, Reasons, and
Long form, select the required user Connection Info tabs to view the
name, and select Detail from the login details.
Row menu.
Note: The above applications/forms can be secured using the application security. If the system is unable to
determine the client information from where the login or logout events are triggered, UNKNOWN/Blank entries will be
logged in the F9312T table and the P9312|W9312A form.
109
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
Work With User Security W98OWSECE Security Maintenance Access forms to set up
(GH9052), User Security user security.
(P98OWSEC)
Add Data Source W98OWSECS On the Work With User Add a data source to a
Security form, from the user, role, or all users.
Form menu, select Add
Data Source.
Data Source Revisions W98OWSECH On the Work With User Change the system user
Security form, select for a data source.
a data source, and
then select Revise Data
Source from the Row
menu.
Remove Data Source W98OWSECK On the Work With Remove a data source.
Security form, select the If you chose a data
appropriate record in source for a specific
the tree structure, and user or role, this form
then click Delete. displays the user ID
or the role name with
the data source name.
If you chose only the
data source, this form
110
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
Work With System Users W980001A In Solution Explorer, Locate a system user.
enter P980001 in the
Fast Path.
System User Revisions W980001C On the Work With Change the system user
System Users form, password.
select a system user
and then click the Select
button.
◦ User ID
◦ Data Source
Leave this field blank to set the data source information for all data sources. When you leave this field
blank, the system automatically enters DEFAULT in the field.
◦ System User
Note: You can also enter both a data source and user ID/role. If you select just a data source, the change will
affect all users.
111
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
2. Select the data source in the tree structure and then, from the Row menu, select Revise Data Source.
The Data Source Revisions form appears. If you chose a specific user or role, this form displays the user ID
or the role name and the data source information. If you chose only the data source, this form automatically
selects the All Users option with the data source information.
3. Complete the System User field and click OK.
This field is necessary to access databases within the software. Depending on what you selected from the tree
on the Work With User Security form, this information will apply to a specific user, a specific role, or all users.
Note: For a user, you can also select a row in the detail area for the user, and then click Delete.
The Remove Data Source form appears. If you chose a data source for a specific user or role, this form displays
the user ID or the role name with the data source name. If you chose only the data source, this form displays
only the data source name.
Note: If you performed the search by data source without including a specific user or role, when you click OK
on Remove Data Source, you remove the data source for all users.
◦ Password
112
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
Note: For the EnterpriseOne workstations, enable security by changing settings in the workstation jde.ini file. You
should make these changes on the deployment server-resident jde.ini file that is delivered to the workstation through
a package installation.
1. Locate the jde.ini file that will be sent to the workstation as part of a package installation.
This file is located on the deployment server in the release share path:
\\xxx\CLIENT\MISC\jde.ini
Where xxx is the installed release level of the software (for example, 810).
2. Using a text editor such as Notepad, view the jde.ini file to verify this setting:
[SECURITY]
SecurityServer=Enterprise Server
113
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
NameDefaultEnvironment=Default Environment
Setting Value
Security Server The name of the enterprise server. For workstations to sign on and run batch reports on the
enterprise server, this value must be the same for both the workstation and the enterprise
server.
DefaultEnvironment A name that identifies any valid environment. If no value is specified, security is not enabled for
that workstation.
[SECURITY]
NumServers=Numeric Value
SecurityServer=Enterprise Server Name (primary)
SecurityServer1=Enterprise Server Name (auxiliary)
SecurityServer2=Enterprise Server Name (auxiliary)
This table explains the variable values:
Setting Value
NumServers The total number of security servers (primary and auxiliary) that you set under the [SECURITY] section
of the jde.ini file. For example, if you set one primary and four auxiliary servers, the NumServers value
is 5. You can set NumServers to any value between 1 and 10. If you do not include the NumServers
setting, the system assumes that you have only one server.
SecurityServern The name of an EnterpriseOne Enterprise Server. The primary and auxiliary security server names
must all correspond to valid Enterprise Servers. The values for both the workstation and the Enterprise
Servers must be the same for workstations to sign on to and run batch reports from the Enterprise
Server.
The variable value n can be a number between 1 and 10. This number defines the auxiliary security
server.
114
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
[JDENET]
connectTimeout=30
In Server Manager, locate the configuration group settings for the Enterprise Server to verify these settings:
[JDENET_KERNEL_DEF4]
dispatchDLLName=name of host dll
dispatchDLLFunction=JDEK_DispatchSecurity
maxNumberOfProcesses=1
beginningMsgTypeRange=551
endingMsgTypeRange=580
newProcessThresholdRequests=0
[SECURITY]
Security Server=Enterprise Server Name
User=user ID
Password=user password
ServerPswdFile=TRUE/FALSE
DefaultEnvironment=default environment
This table explains the variable values:
Setting Value
• HP9000, libjdeknet.sl
• RS/6000, libjdekrnl.so
• Windows (Intel), jdekrnl.dll
• Windows (Compaq AlphaServer), jdekrnl.dll
• iSeries, JDEKRNL
For UNIX platforms, values are case-sensitive.
115
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
Setting Value
SecurityServer The name of the Enterprise Server. This value must be the same for both the workstation and the
Enterprise Server for workstations to run batch reports on the Enterprise Server.
User The ID of a user with access to the F98OWSEC. This is the ID used to connect to the DBMS; therefore,
this value must match that of the target DBMS.
Password The password for the user ID with access to the F98OWSEC. This is the password used to connect to
the DBMS; therefore, this value must match that of the target DBMS.
ServerPswdFile This parameter is valid for servers operating under UNIX operating systems.
The setting of this parameter determines whether the system uses special password handling for batch
reports running on the server:
• Set the value to TRUE to instruct the system to enable special handling of passwords.
• Set the value to FALSE to disable special handling.
When the system runs a batch report on the server, it runs the report using a string of line commands
and parameters that includes the user password. Under UNIX operating systems, it is possible to use
the process status command (ps command) to query the status of a job and view the parameters that
were used to start the process.
As a security measure, you can enable special handling by the software. When enabled, the software
does not include the user password in the parameter list for a batch process. Instead, it includes the
name of a file that contains the user password. This file is deleted as soon as the batch report reads the
password.
DefaultEnvironment The name of a valid environment for accessing the security table (for example, PD810).
[SECURITY]
NumServers=Numeric Value
SecurityServer=Enterprise Server Name (primary)
SecurityServer1=Enterprise Server Name (auxiliary)
SecurityServer2=Enterprise Server Name (auxiliary)
This table explains the variable values:
Setting Value
NumServers The total number of security servers (primary and auxiliary) that you set under the [SECURITY] section
of the jde.ini file. For example, if you set one primary and four auxiliary servers, the NumServers value
116
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
Setting Value
is 5. You can set NumServers to any value between 1 and 10. If you do not include the NumServers
setting, the system assumes that you have only one server.
SecurityServerx The name of an Enterprise Server. The primary and auxiliary security server names must all be valid
enterprise servers. The values must be the same for both the workstation and Enterprise Servers for
workstations to log onto and run batch reports from the enterprise server.
The variable value x can be any number between 1 and 10. This number defines the auxiliary security
server.
[JDENET_KERNEL_DEF4]
maxNumberOfProcesses=1
When the Enterprise Server is on a non-Windows platform, you need to set up a Windows service for unified logon.
This service identifies the unified logon server for EnterpriseOne. You also need to set the unified logon settings in the
[SECURITY] section of the jde.ini file.
117
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
Note: When you use unified logon, you need to use the same user ID for the Windows domain and JD Edwards
EnterpriseOne so that the records for each are synchronized. For example, if the user ID for a user in the Windows
domain is USER1, the user ID for EnterpriseOne must also be USER1. If the user IDs are different, unified logon does
not work for the user.
1. In Server Manager, modify the Security Mode setting in the Security settings for the Enterprise Server. Valid
values are:
◦ Standard Sign-on Only. Accepts only users set up for standard sign-in security.
◦ Unified Logon Only. Accepts only users set up for unified logon.
◦ Standard and Unified Logon. Accepts users set up for both unified logon and standard sign-in security.
2. In the workstation jde.ini file, add these settings in the [SECURITY] section:
[SECURITY]
UnifiedLogon=0 or 1
Value Description
0 Disables unified logon for the workstation. This setting is the default value.
server_name Enter the name of the server on which the unified logon server data resides.
1. On the deployment server, in Windows Explorer, access the \Unified Logon directory and run the file
UniLogonSetup.exe.
The Unified Logon Server Setup form appears. On this form, you define the Windows service for unified logon
servers. You can also remove these services on this form.
118
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
The port number for the unified logon server should match the EnterpriseOne port number of the server
for which you want to set up unified logon.
◦ Service Executable Filename
Enter the directory path for the unified logon service program.
◦ Log Filename
Enter the name of the unified logon log file, including the full directory path.
Note: Generally, the default Windows list of authenticated network users lists users by group.
4. Click the Install Service button to save the service information for the unified logon server.
1. Run UniLogonSetup.exe.
119
JD Edwards EnterpriseOne Tools Chapter 12
Security Administration Guide Setting Up User Sign-in Security
120
JD Edwards EnterpriseOne Tools Chapter 13
Security Administration Guide Enabling Long Passwords in EnterpriseOne
To create and revise short passwords, you use P98OWSEC. To enable the Long Password feature and create long
passwords, you use P98LPSEC. When the Long Password feature is enabled, P98OWSEC is no longer accessible in
EnterpriseOne; users and administrators must access P98LPSEC to change their long passwords.
As part of enabling the Long Password feature, EnterpriseOne detects if there are existing password policy rules defined
in the P98OWSEC processing options and migrates these rules into the Global Password Policy form. The system then
uses the rules defined in the Global Password Policy form for all EnterpriseOne users, including P0092SS users. This
establishes a single set of password policy rules for passwords for easier maintenance.
You can define the following rules for long passwords in the Global Password Policy form:
• Minimum Password Length
• Minimum Number of Numerics
• Maximum Consecutive Characters
• Minimum Number of Characters
• Minimum Number of Special Characters
CAUTION: Remember that long passwords are case sensitive. EnterpriseOne checks the case of password characters
when the Long Password feature is enabled.
121
JD Edwards EnterpriseOne Tools Chapter 13
Security Administration Guide Enabling Long Passwords in EnterpriseOne
The Server Manager Console supports long passwords, but it does not support long user IDs. If the Long User
feature is enabled, Server Manager users must continue to use a short user ID.
• Transactions and reports that require credentials for processing.
• EnterpriseOne auditing features including the auditing of security records and 21 CFR auditing.
• Single sign-on configurations, including single sign-on with Oracle Access Manager (OAM).
• EnterpriseOne configurations with LDAP systems for managing users. An LDAP configuration does require
specific settings for supporting long passwords. See Enabling LDAP Support in JD Edwards EnterpriseOne for
details.
• Other EnterpriseOne systems or components that requires user credentials for access or processing, such as
the Scheduler application, the Configuration Assistant and Change Assistant, RUNUBE and RUNUBEXML, the
wizard for developing business services, EnterpriseOne mobile clients and supported tablet clients, and so
forth.
Scenario 1
If you have enabled the Long Password feature and if you have more than one EnterpriseOne Enterprise Server sharing
the same F98OWSEC table, you must update all Enterprise Servers to EnterpriseOne Tools 9.2 to support both long user
IDs and long passwords.
122
JD Edwards EnterpriseOne Tools Chapter 13
Security Administration Guide Enabling Long Passwords in EnterpriseOne
Scenario 2
If you want to enable the Long Password feature and you do not update all EnterpriseOne Enterprise Servers to
EnterpriseOne Tools 9.2, then you need to create two Security Server data sources: one for Enterprise Servers on Tools
9.2 and one for Enterprise Servers on a release prior to EnterpriseOne Tools 9.2. In this multiple foundation setup,
only the Enterprise Servers on EnterpriseOne Tools 9.2 will support long user IDs and long passwords. For this type of
configuration, you must perform the following steps before enabling the Long Password feature:
1. Create an additional (new) system data source, for example:
SYSTEM - 900MF or SYSTEM - 910MF or SYSTEM - 920MF
2. Copy the following security tables to this new data source:
F0092, F00921, F00927, F0093, F00941, F9312, F98OWPU, F98OWSEC, F0092L
3. Change the SYSTEM and Server Map in all environments with EnterpriseOne Tools 9.2 and above so that
the following tables are pointed to the newly created data source (SYSTEM - 900MF or SYSTEM - 910MF or
SYSTEM - 920MF):
F98OWSEC, F00921, F98OWPU, F0092, F00927
CAUTION: Do not create any OCM mappings (client or server) that point to the newly created data source.
Only change the records for the preceding tables to point to new data source in existing SYSTEM and Server
Maps.
4. On the Security Server on EnterpriseOne Tools 9.2 or above, change the Boot Strap Data Source to point to the
newly created data source. To do so, use Server Manager to locate and update the following setting, which is a
setting in the jde.ini file on the Security Server.
[SECURITY]
DataSource=<new data source name>
123
JD Edwards EnterpriseOne Tools Chapter 13
Security Administration Guide Enabling Long Passwords in EnterpriseOne
2. On Enable Long Password, select the Enable Long Password check box.
3. Click Submit.
4. On the Confirmation dialog box, click Yes if you want to continue and enable the Long Password feature.
The Confirmation box informs you that the feature cannot be disabled after it is enabled.
It also displays a notice if it detects that password rules have been set up for P0092SS, and informs you that
these password rules will be overridden with password rules defined in the processing options in P98OWSEC.
EnterpriseOne displays the Global Password Policy form with the values automatically migrated from the
password policy processing options in P98OWSEC.
5. On Global Password Policy, define the password rules for long passwords by completing the following fields:
◦ Minimum Password Length. The minimum password length that the system allows when a user
changes his or her password.
◦ Minimum Number of Numerics. The minimum number of numeric characters that each password
must contain. For example, if you enter 3 in this field, the system allows the passwords h584htnuud and
h584htn6ud, but does not allow the password h5h4htnuud.
◦ Maximum Consecutive Characters. A value that indicates the maximum number of identical,
consecutive characters that the system allows users to include in their passwords. For example, if you set
this value to 2, the system allows Tops or Tools but not Bosss.
◦ Minimum Number of Characters. The minimum number of characters that the system allows in a
password.
◦ Minimum Number of Special Characters. The minimum number of special characters that the system
allows in a password. If you leave this blank, users have the option to include special characters, but are
not required to do so.
CAUTION: If you update a password rule that prevents users from using an existing password, then
you must use the "Force Immediate Password Change" option to force users to change their passwords
during the next sign on. See Revising All User Sign-in Security.
Also, if the second row contains a *POLICY record, this indicates that global password policies have been
migrated from the processing options in P98OWSEC.
124
JD Edwards EnterpriseOne Tools Chapter 13
Security Administration Guide Enabling Long Passwords in EnterpriseOne
◦ User ID. This field contains the user ID selected on the Work With User Security form.
◦ New Password. Enter a new password.
◦ New Password - Verify. Enter the password again to verify it.
◦ Force Immediate Password Change. Click this check box to force the user to change the password
during the next sign-in.
◦ Change Password in Scheduler Table. This check box is selected by default. This ensures that the new
password is accepted by the Scheduler application.
5. Click OK.
Note: If the Long Password feature is not enabled, than the rules defined in this application apply only to User Profile
Self-Service application users.
125
JD Edwards EnterpriseOne Tools Chapter 13
Security Administration Guide Enabling Long Passwords in EnterpriseOne
4. Click OK.
126
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
You can easily maintain user profiles in a single location that serves multiple end user applications, including
EnterpriseOne applications.
• Reduced complexity.
You are not required to use several applications to maintain user profiles. In addition, users are not required to
maintain multiple passwords across multiple systems.
127
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
Note: LDAP support does not address single sign-on functionality that might exist through other EnterpriseOne
functionality.
You can manage existing user profiles in User Profile Revisions (P0092/W0092A).
Note: EnterpriseOne does not provide an application for managing LDAP user profiles.
Additionally, EnterpriseOne provides a self-service version of P0092. This self-service application is used to manage
only self-service user profile information for the Manufacturing Sourcing module; not EnterpriseOne user profiles.
However, if you are enabling EnterpriseOne for LDAP and your company is using this self-service application, you can
add parameters for it when you define the LDAP server settings. In this configuration, any self-service user profiles that
are added are synchronized with the LDAP server.
Note: Even though self-service user profiles are synchronized with the LDAP server, you cannot use this self-service
application to manage EnterpriseOne or LDAP user profiles.
The security kernel on the Enterprise Server is responsible for ensuring the integrity of the security within
EnterpriseOne. If this kernel is not running correctly or cannot locate requisite data, users cannot sign in to
EnterpriseOne. However, when the security kernel is properly configured, the system verifies the user credentials from
data within the user profiles. In this case, the following two scenarios are possible:
• You can configure EnterpriseOne to use LDAP to manage user profiles.
• You can configure EnterpriseOne to use LDAP to manage user-role relationship data.
LDAP does not support certain user profile information. Such information remains in the domain of the EnterpriseOne
Server and must be maintained by the EnterpriseOne system administrator. Therefore, two distinct and separate user
profiles may exist:
• LDAP user profile
This profile includes the user ID and password and can include user-role relationships.
128
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
In this illustration, the security kernel in the Enterprise Server performs authentication against the LDAP server when
LDAP is enabled in the [SECURITY] section of the jde.ini file of the Enterprise Server. Otherwise, when LDAP is disabled,
the security kernel authenticates the user against the Enterprise Server database.
129
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
EnterpriseOne User Yes Yes If you enable LDAP support in EnterpriseOne, the
ID security kernel validates the user from the LDAP
F0092 database. The security kernel synchronizes this data
from LDAP to EnterpriseOne only when this data is in
the LDAP server and not in EnterpriseOne.
Enterpriseone Long Yes Yes Long user ID to short user ID mapping table.
User ID
F0092L
EnterpriseOne User Yes Yes If LDAP is enabled, the user password is always
Password stored in LDAP.
F98OWSEC
If LDAP is not enabled, the user password is stored in
the F98OWSEC table in EnterpriseOne.
Definition of Role Yes Yes The user-role relationship is synchronized from the
LDAP server to the EnterpriseOne database for roles
F0092 defined in the EnterpriseOne database. However,
the system does not synchronize role definitions
from the LDAP server to the EnterpriseOne database.
Therefore, role definitions must exist in both
systems.
130
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
In this configuration, a third-party LDAP-enabled application is being used to add, modify, and delete LDAP
user information. In addition, the system uses the following methods to synchronize user data from LDAP to the
EnterpriseOne database:
R9200040 enables you to perform bulk synchronization of user profile records from the LDAP server to the
EnterpriseOne database.
131
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
When an existing single user is selected for security revisions, the User ID field contains the selected user ID.
On the Security Detail Revisions form, you can enable the User Status and Allowed Password Attempts fields by
selecting these corresponding options:
• User Status
• Attempts
When you are updating security for all users, you click the Revise All button from the Form menu in the Work With User/
Role Profiles form. The Security Detail Revisions form appears.
On the Security Detail Revisions form, you can enable the User Status and Allowed Password Attempts fields for all
users by selecting these corresponding options:
• User Status
132
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
• Attempts
If you attempt to add a role to an individual user in EnterpriseOne, the system displays this error:
Note: When LDAP is enabled and roles are managed in LDAP, you can use a third-party LDAP-enabled application to
add, delete, or modify role relationships for any user.
The Scheduler kernel validates the user ID and password stored in F91300. The job cannot be launched if the validation
fails. Therefore, if the user changes their password after the job is scheduled, the job cannot be launched. In such cases,
the user must use P91300 to revise the job.
User ID and Password Add The user ID and password values must be alphanumeric and
Values cannot exceed 10 characters in length. Unicode is supported.
Modify
If the Long User ID feature is enabled in EnterpriseOne, you can
Delete enter a user ID up to 254 characters in length.
133
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
User-Role Relationship Add At sign-in, logic on the EnterpriseOne server will automatically
perform one-way real-time synchronization of this data from the
Modify LDAP server to the EnterpriseOne database.
Role Definitions Add You must manually set up role definitions in LDAP and
EnterpriseOne because there is no automated method to
Modify synchronize this data.
Delete
System User ID and Add Required to set system values not supported by LDAP.
Password
Modify System information is used to connect to the database. It
includes database system user name, system user password,
Delete and data source name (system key).
Delete
User-Role Relationship Add Required to set attributes not supported by LDAP, such as
Attributes *ALL and Expiration Dates, when you manage user-role
Modify relationships in LDAP.
134
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
Delete
• Enabled
• Disabled
There is no automatic or batch synchronization between
LDAP and EnterpriseOne for this function.
Allow Password Attempts for Modify The number of invalid sign-on attempts a user can make
EnterpriseOne User before that user profile is disabled.
Role Definitions Modify You must always define the role definition in EnterpriseOne,
regardless of any LDAP considerations.
Note: If you are creating an LDAP configuration for Oracle Internet Directory, the specific settings for this
configuration are listed in an appendix in this guide. See Creating a JD Edwards EnterpriseOne LDAP Configuration for
OID.
135
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
1. Disable LDAP authentication on the Enterprise Server. In Server Manager, in the Enterprise Server configuration
settings, make sure that the Enable LDAP Authentication check box in the Security settings is cleared.
2. Use the LDAP Server Configuration Workbench application (P95928) to create an LDAP configuration, configure
the LDAP server settings, and configure the LDAP to Enterprise Server mappings. The P95928 application is
available on the Microsoft Windows client and the web client.
Note: EnterpriseOne provides two versions of this application. You can use ZJDE0001 to create a
template for creating an LDAP configuration. Create the template by adding specific attributes to the LDAP
configuration that can be defined later. This section uses ZJDE0002 of the application to show all possible
attributes that can be mapped in the LDAP configuration.
3. Use the Configure LDAP Defaults form to enter the required LDAP default user profile settings.
136
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
In this diagram, the EnterpriseOne application requests a search of the Directory Information Tree for a EnterpriseOne
user in the United States with an ab12345 user ID. The user can only be found if these attributes contain valid values:
Attribute Value
137
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
Attribute Value
1. EnterpriseOne starts the search using the criteria specified in the User Search Base attribute.
2. EnterpriseOne uses the value in the User Search Scope attribute to determine the scope of the search.
3. EnterpriseOne uses the following Search Filter parameter to search for the user in LDAP:
(&((User Search Filter value), ((User Search Attribute value)= "ab12345")))
4. EnterpriseOne retrieves the user ID from the EnterpriseOne User ID Attribute.
Some LDAP servers such as Microsoft Active Directory limit the distinguished name (also known as DN) of the user
to 255 total characters. If you attempt a simple LDAP bind with more than 255 characters, you might experience
authentication errors. Therefore, it is your responsibility to make sure long user IDs on these LDAP servers adheres to
these limits. For more information about setting up long user IDs in EnterpriseOne, see Setting Up Long User IDs in
EnterpriseOne.
This table, LDAP Configuration Settings for Long User IDs shows an example of LDAP configuration settings for long
User IDs. Notice that the USRSRCHATR is pointing to LDAP attribute 'cn' while E1USRIDATR is pointing to LDAP attribute
'uid'. This is different from a non-long user ID configuration where both E1USRIDATR and USRSRCHATR point to same
LDAP attribute.
Attribute Value
Prerequisites
To configure LDAP support in EnterpriseOne, you must have a system administrator who understands LDAP and
understands how to use an LDAP-compliant directory service to manage user profile information.
138
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
For more information about a specific LDAP-compliant directory service, refer to that particular directory service's
documentation.
If you are configuring the directory service with SSL/TLS (Transport Layer Security), refer to the directory service
documentation for instructions.
LDAP Server Attribute W95928E On the Available LDAP Enter LDAP server
Values Configurations form, attribute values.
select a configuration
record and then select
Values from the Row
menu.
139
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
Field Description
Server Configuration Name Enter a unique name for the server configuration, and then tab to the next field and enter a
description.
Enterprise Server Port Enter the port used to connect to the Enterprise Server.
LDAP Server Location Enter the location (machine name or IP address) of the LDAP server on the network.
LDAP Server Port Enter the port used to connect to the LDAP server.
LDAP Server Type Click the search button to select the type of LDAP server: Microsoft, IBM, or Domino.
Note: If you are configuring LDAP for Oracle Internet Directory, you must add OID to the list of options
and select it here.
LDAP Admin Password Enter the administrator's password for the LDAP server.
SSL/TLS Enabled LDAP Server Select this option if you want to set up Secure Socket Layer (SSL/TLS) communication between
EnterpriseOne security kernel and the LDAP server.
Role Enabled in LDAP Select this option if you are managing user-role relationships in LDAP.
140
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
Attribute Description
USRSRCHBAS User search base. Specifies that the system searches for user information at the root of the
directory information tree. This value specifies the "container" in which to begin the search. For
example, USRSRCHBAS=o=jdedwards,c=us
USRSRCHFLT User search filter. Specifies that a search is performed at the base level for
the user ID in the LDAP server using the specified criteria. For example,
USRSRCHFLT=objectclass=inetOrgPerson
USRSRCHSCP User search scope. Specifies the level, or scope, at which the system searches for user
information. Valid values are:
◦ base
The query searches only the value you specified in the USRSRCHBAS setting.
◦ subtree
This is the default value. The query searches the value in the Search Base field and all
entries beneath it.
◦ onelevel
The query searches only the entries one level down from the value in the Search Base
field.
ROLSRCHBAS Role search base (use only if roles are enabled in LDAP). Specifies that a search is
performed at the base level for the UserIDAttri in the LDAP database. For example,
ROLSRCHBAS=o=jdedwards,c=us
ROLSRCHFLT Role search filter (use only if roles are enabled in LDAP). This specifies that a search is
performed at the base level for the role in the LDAP database using the specified criteria. For
example, ROLSRCHFLT=objectclass=groupOfNames
141
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
Attribute Description
ROLSRCHSCP Role search scope (use only if roles are enabled in LDAP). This specifies the level, or scope, at
which the system searches for role information. Valid values are:
◦ base
The query searches only the value you specified in the ROLSRCHBAS setting.
◦ subtree
This is the default value. The query searches the value in the Search Base field and all
entries beneath it.
◦ onelevel
The query searches only the entries one level down from the value in the Search Base
field.
3. When using Secure Socket Layer (SSL/TLS) with LDAP server, enter values for these attributes:
Attribute Description
SSLPORT SSL/TLS Port for the LDAP server. Specifies the SSL/TLS port on the LDAP server.
For Windows and UNIX: This specifies the directory path to the cert7.db file (SSL/TLS). This file
should generally be located in the system\bin32 directory on the Enterprise Server.
For IBM i: This specifies the directory path and file name for the cert.kdb file on the IBM i-
based, Enterprise Server machine, for example /QIBM/USERDATA/ICSS/CERT/SERVER/
CERT.KDB. You should use the Digital Certificate Manager (DCM) to verify the location of the
certificate for your installation.
CERTDBCLBL Do not use this attribute. This is for future use only.
This is the password to the key database. Specifies the password to the key database (files
with a "kdb" extension). The key database is used to store a uniquely identified name, or label,
associated with the client private key/certificate pair.
142
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
4. If you are using the self-service version of the user profile application for the Manufacturing Sourcing module,
enter values for these attributes:
Note: You cannot use this application to manage LDAP user profiles.
Attribute Description
USRACNTCTL User Account Control. Specifies the authority attached when creating a user in Active Directory,
for example USRACNTCTL=512 creates an enabled user in Active Directory only.
USRADDLOC User Add Location. Specifies the location in LDAP where users will be added, for example
USRADDLOC=O=jdedwards.
USRCLSHRCY User Class Hierarchy. Specifies the class hierarchy needed to create a user in LDAP, for example
USRCLSHRCY=top, person, organizationalPerson, inetOrgPerson.
ROLADDLOC Role Add Location (use only if roles are enabled in LDAP). Specifies the location in LDAP that
contains the user-role relationship, for example ROLADDLOC=O=jdedwards.
ROLCLSHRCY Do not use this attribute. This is for future use only.
Access the LDAP Server Mappings form. To do so, on the Available LDAP Configurations form, select Mappings from
the Row menu.
1. Click the search button in the Enterprise Server Attribute Name column to select the attributes to include in the
mappings.
After selecting the attributes, you must enter the appropriate LDAP value for the attribute in the LDAP Server
Actual Attribute column.
2. To configure the LDAP to Enterprise Server mappings:
Attribute Description
E1USRIDATR EnterpriseOne User ID Attribute. Specifies the user ID attribute in LDAP that is used for
EnterpriseOne users. The system uses this attribute when creating users in LDAP during
EnterpriseOne sign-in, for example E1USRIDATR=cn.
143
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
Attribute Description
USRSRCHATR User ID Search Attribute. Specifies the search criteria for the sign-on user ID. This is the value
that maps the sign-on user ID in LDAP to the sign-in user ID in EnterpriseOne, for example
USRSRCHATR=cn.
The USRSRCHATR and E1USRIDATR attributes should be mapped to the same value.
ROLNAMEATR Role Name Attribute (use only if roles are enabled in LDAP). This value maps the role in LDAP to
the role in EnterpriseOne, for example ROLENAMEATR=cn
ROLSRCHATR Role Search Attribute (use only if roles are enabled in LDAP). Specifies the search attribute for
the role in the LDAP server. The system uses this attribute to search LDAP for a list of roles for a
user, for example ROLSRCHATR=member.
LANGUAGATR Language Attribute. Specifies the language attribute used within LDAP, for example
LANGUAGATR=preferredLanguage
For an EnterpriseOne long user ID configuration, enter values for these attributes:
Attribute Description
E1USRIDATR EnterpriseOne User ID Attribute. Specifies the user ID attribute in LDAP that is used for
EnterpriseOne users. The system uses this attribute when creating users in LDAP during
EnterpriseOne sign-in, for example E1USRIDATR=uid.
USRSRCHATR User ID Search Attribute. Specifies the search criteria for the sign-on user ID. This is the value
that maps the sign-on user ID in LDAP to the sign-in user ID in EnterpriseOne, for example
USRSRCHATR=uid.
For a long user ID configuration, the USRSRCHATR and E1USRIDATR attributes should be
mapped to different LDAP attributes, for example USRSRCHATR=cn. This is because JDE uses
USRSRCHATR to read the long user ID which is used during EnterpriseOne sign-in for a long
user ID configuration.
ROLNAMEATR Role Name Attribute (use only if roles are enabled in LDAP). This value maps the role in LDAP to
the role in EnterpriseOne, for example ROLENAMEATR=cn
ROLSRCHATR Role Search Attribute (use only if roles are enabled in LDAP). Specifies the search attribute for
the role in the LDAP server. The system uses this attribute to search LDAP for a list of roles for a
user, for example ROLSRCHATR=member.
144
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
Attribute Description
LANGUAGATR Language Attribute. Specifies the language attribute used within LDAP, for example
LANGUAGATR=preferredLanguage
3. If you are using the self-service version of the user profile application for the Manufacturing Sourcing module,
enter values for these attributes:
Note: You cannot use this application to manage LDAP user profiles.
Attribute Description
CMNNAME Common Name. Specifies the Common Name for a user in LDAP. The system uses this
attribute when creating users in LDAP, for example CMNNAME=cn
GIVENNAME Specifies the Given Name for a user in LDAP. It is used when creating users in LDAP, especially
in Active Directory, for example GIVENNAME=givenName.
SURNAME Specifies the SUR Name for a user in LDAP. This attribute is used when creating users in LDAP,
for example SURNAME=sn.
PASSWORD Specifies the password associated with the account that you specify with the ConnectDN
(distinguished name) of the LDAP server.
OBJCLASS Object Class. Specifies the Object Class attribute for a user in LDAP it is used when creating
users in LDAP, for example OBJCLASS=objectCLASS.
ACNTCTLATR Account Control Attribute. Specifies the attribute used in Active Directory for user authority
in Active Directory, for example ACNTCTLATR=userAccountControl. If the attribute
USRACNTCTL=512 is used in conjunction with ACNTCTLATR, the EnterpriseOne API will create
an enabled user in Active Directory only.
ACTNAMEATR Account Name Attribute. Specifies the attribute used only in Active Directory for creating a
signon user account, for example ACNTCTLATR=sAMAccountName.
145
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
Note: You can have only one active LDAP configuration per port.
Select a configuration record and then select Change Status from the Row menu.
The system changes the status in the Status column to AV (active) or NA (not active).
In the Security settings, click the Enable LDAP Authentication check box to enable security authentication. By default,
this setting is cleared or disabled, which disables the LDAP authentication mode.
Note: You must add the default LDAP user profile settings before enabling LDAP authentication in the jde.ini file of
the EnterpriseOne security server.
The Configuring LDAP Defaults form shows whether the following items exist for the default user:
• User profile
• Role relationships
• Data source/system user
Note: Changes made in this application can affect almost all EnterpriseOne users when synchronizing data
from LDAP to the EnterpriseOne database.
146
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
User Profile Revisions W0092A On the Configure LDAP Modify the default
Defaults form, click the user profile settings for
User Profile link. LDAP.
Work with Role W95921C On the Configure LDAP Add roles to the default
Relationships Defaults form, click the user.
Role Relationships link.
Work With User Security W98OWSECE On the Configure LDAP Add or modify the data
Defaults form, click the source or system user
Data Source/System settings.
User link.
Data Source Revisions W98OWSECH On the Work With User Assign a different
Security form, select a system user to the data
security record and then source.
click Select.
Security Revisions W98OWSECB On the Work With User Add an additional data
Security form, click Add. source.
Note: All user values are assigned per user ID the first time, and the first time only, that a user signs in. During this
initial sign-in, the values are synchronized from LDAP to the EnterpriseOne database. The default role relationship is
synchronized only if roles are managed by EnterpriseOne.
LDAP Authentication
Indicates whether LDAP authentication is enabled or disabled.
Role Management
147
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
Indicates whether roles are managed by LDAP. You can enable EnterpriseOne to manage roles in LDAP through the
P95928 application.
To revise the default role relationship, see Modifying the Default Role Relationships for LDAP.
Data Source/System User
Indicates whether a default data source or system user exists. Click this link to add or change the data source or system
user.
Note: The User ID field always contains the default user ID for the LDAP system. This field is read only.
Note: If LDAP authentication is enabled and user-role relationships are being managed by LDAP, then this option is
disabled. This means that user-role relationship functionality from within EnterpriseOne is disabled.
On the Work With Role Relationships form, you can highlight a role in either the Assigned Roles or Available Roles
menus, and then click the appropriate directional arrow button to add or remove the role for the default user.
Note: These values are only synchronized between EnterpriseOne and LDAP if the role is being managed by
EnterpriseOne.
148
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
Note: If the EnterpriseOne database contains user profile records that are not in the LDAP server, this data cannot
be synchronized from EnterpriseOne to the LDAP server using the R9200040 batch process. EnterpriseOne does not
provide a utility to perform this function.
Running the report synchronizes user profile data obtained from the LDAP server to the following EnterpriseOne
database tables:
Table Description
149
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
Table Description
150
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
1. On the Work With Batch Versions – Available Versions form, enter R9200040 in the Batch Application field and
click Select.
2. On the Version Prompting form, click Submit.
151
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
LDAP Authentication Over SSL/TLS for Windows and UNIX (Release 9.2.3.4)
The EnterpriseOne server uses Netscape's certificate database, cert7.db or cert9.db. You use the "certutil" utility, found
in \system \bin32 or \system\bin64 to create the cert9 certificate database. The "certutil" utility will only create the
cert9.db, but runtime is backward compatible with cert7.db.
Note: As of Tools Release 9.2.5.3, Mozilla Network Security Services (NSS) does not support the AIX platform.
Because of this limitation, you will not be able to use the certutil tool present in this path: \system \bin32 or \system
\bin64. The EnterpriseOne server uses Netscape's certificate database, cert7.db or cert9.db. You can obtain the
cert7.db or cert9.db certificates using the PKCS utilities distributed by Netscape.
For Windows and UNIX, establishing the secure connection between the EnterpriseOne application server and the LDAP
server requires these items:
For IBM i, establishing a secure connection between the EnterpriseOne application server and the LDAP server requires
these items:
152
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
1. Follow the documentation for your directory server to add the server certificate to the directory server.
2. Using Netscape's PKCS Utilities, add the CA's trusted root certificate to the cert7.db certificate database.
3. Enable SSL/TLS for the LDAP configuration using the LDAP Server Configuration Workbench application.
4. Specify the SSL/TLS parameters.
1. Follow the documentation for your directory server to add the server certificate to the directory server.
2. Use Digital Certificate Manager to add and export the CA's trusted root certificate to the certificate database
(.kdb file).
3. Enable the SSL for the LDAP configuration using the LDAP Server Configuration Workbench application.
4. Specify the SSL parameters.
153
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
• EnterpriseOne user ID
• Password
• Language attribute
• User-role relationship
If you do not use this utility, you would have to populate the repository manually, which can lead to data being entered
incorrectly. This illustration shows the data4ldap.exe utility uploading the EnterpriseOne user data to the LDAP server.
The Language attribute is uploaded only for those EnterpriseOne users who are specifically assigned a language.
By default, no language is assigned to a user when a user is added to EnterpriseOne. In such a case, no language is
available for the particular user in the LDAP server. For example, if User 1 is assigned language E and User 2 is not
assigned to any language, the language attribute is uploaded to the LDAP server only for User 1 and not for User 2.
Expired EnterpriseOne users and roles are also exported to the LDAP server. If an EnterpriseOne user record does not
exist in the table F98OWSEC, then the particular user would not be exported to the LDAP server.
154
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
Prerequisites
Before you use the data4ldap utility, you must:
• Use the LDAP Server Configuration Workbench application (P95928) to map these items:
If these fields are left blank, no operation is performed; the utility generates an appropriate error
message and exits.
• For Microsoft Active Directory, map the following attributes in addition to the above mentioned ones:
• Use the LDAP Administrator user ID and password. If either the LDAP Administrator user ID or password field is
blank in P95928, the utility cannot export EnterpriseOne user-role data to the LDAP server. It will generate an
error message and exit.
• Disable the password policies of the LDAP server. For further information, refer to the documentation of the
directory server that you are using for the LDAP server or contact your LDAP Administrator.
155
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
Parameter Description
UserID Enter a valid EnterpriseOne user ID that has been granted access to the utility from External Call
Security.
IsRoleIncluded Specify whether or not EnterpriseOne role information is included in the export to the LDAP server.
IsOverwriteAllowed Determine whether you want to override the LDAP server entries with the EnterpriseOne user-role
data: Enter *YES to overwrite the LDAP server entries with the EnterpriseOne user-role data. Enter *NO
if you do not want to overwrite the LDAP server entries with the EnterpriseOne user-role data.
Note: The IsOverwriteAllowed parameter is used in case the LDAP server already contains user data that is identical
to EnterpriseOne user data. In this case, you have the option to overwrite the existing LDAP server user IDs with the
current EnterpriseOne user IDs. The value of IsOverwriteAllowed parameter is valid only for user data (common name,
language, and given name whichever is configured through the application P95928) and not for user-role relationship
data.
156
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
157
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
All EnterpriseOne user-role relationship data is uploaded to the LDAP server and the existing LDAP role-relationship
data is overwritten.
However, EnterpriseOne user-role relationship data would neither be uploaded nor overwritten in the LDAP Server.
It is always recommended that if the Role data are managed by the LDAP server, include the Role data (isRoleIncluded =
*YES) while choosing the Overwrite option (isOverwriteAllowed = *YES).
http://publib.boulder.ibm.com/infocenter/iseries/v5r3/index.jsp?topic=/rzahy/rzahycontrols.htm
Note: Oracle Internet Directory (OID) does not support Tree Delete Control.
http://msdn.microsoft.com/en-us/library/cc223249.aspx
http://msdn.microsoft.com/en-us/library/cc223560.aspx
• EnterpriseOne application P95928 should be configured accordingly for "InetOrgPerson" and "userPassword".
• For Microsoft Active Directory, the EnterpriseOne data can be dynamically uploaded only over a SSL/TLS
connection. This is due to the Microsoft Active Directory restriction.
• Microsoft Active Directory user-password authentication is case sensitive. The user information uploaded from
EnterpriseOne does not include user passwords. Therefore, passwords must be entered by an administrator
or end users using the applicable LDAP tool. The passwords are stored in the case in which they are entered.
158
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
During sign-in, other LDAP servers ignore the case of the supplied password, whereas Microsoft Active
Directory fails to authenticate a user if the supplied password is not in the correct case.
• In case a user does not get uploaded to Microsoft Active Directory, all of the roles assigned to the particular
user would also not be uploaded to Microsoft Active Directory. This restriction is valid only for Microsoft Active
Directory and not for OID / IDS.
To set up the Microsoft Active Directory Server and enable it for using SSL, perform the following steps:
Note: Make sure that you have the administrator password for the server. After you install the Active Directory and
start the server, you cannot log in if you do not have the administrator password.
1. Install Active Directory Domain Services and promote this server to a domain controller by following the steps
explained in the Installing AD DS by using Server Manager section.
2. On the Server Manager page, click the Manage menu and select Add Roles and Features.
3. Install Active Directory Certificate Services by selecting the Certificate Authority option.
4. To configure the CA Certificate, click Create Active Directory Domain Services.
5. Retain the default values on all the windows except in the Cryptography for CA window. In the Cryptography
for CA window, select the value for the Hash Algorithm as SHA256 and click Next.
6. Click the Configure button on the last window to complete configuring the CA Certificate.
7. Install the latest Windows Security Updates (dated March 10, 2020).
For more information see:
159
JD Edwards EnterpriseOne Tools Chapter 14
Security Administration Guide Enabling LDAP Support in JD Edwards EnterpriseOne
160
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Note: EnterpriseOne does not support single sign-on between EnterpriseOne applications and third-party
applications.
Authenticate Tokens
EnterpriseOne uses an authenticate token to achieve single sign-on. The authenticate token contains criteria that grants
access to an EnterpriseOne application from JD Edwards Collaborative Portal. When a user signs on to either system,
after successful authentication, the system generates an authenticate token. When a user accesses an EnterpriseOne
application, the system uses the generated token to validate the user against the EnterpriseOne security server. As a
result, the user does not have to manually sign on to the system again.
When a user signs on to either system, an authenticate token is generated after successful authentication. When the
user accesses an EnterpriseOne application, the system uses the generated token to validate the user against the
EnterpriseOne security server. As a result, the user does not have to manually sign on to the system again.
For security purposes, all authenticate tokens expire after a certain period of time and contain a digital signature that
ensures the token cannot be tampered with.
Property Description
User ID The user ID that the server issued the token for. When the browser submits this token for single sign-
on, this is the user that the application server signs in to the system.
Language Code The language code of a user. When the system uses a token for single sign-on, it sets the language
code for the session based on this value.
Date and Time Issued The date and time the token was first issued. The system uses this field to enforce a time-out interval
for the single sign-on token. Any application server that accepts tokens for sign-on compares this value
against the amount of time set in the application server to accept tokens. The value is in Greenwich
Mean Time (GMT) so it does not matter which time zone the application server is in.
Note: The system date and time is used to validate the expiration of a token. Changing these values on
the server may expose a potential security risk.
Issuing Node Name The name of the machine that issued the token.
161
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Property Description
Signature A digital signature that the application server (node) uses to validate the token for single sign-on by
ensuring that the token has not been tampered with since it was originally issued. The machine issuing
the token generates the signature by concatenating the contents of the token (all the fields that appear
in this table) with the message node password for the local node. Then the system hashes the resulting
string using the SHA1 hash algorithm. For example ("+" means concatenation),
signature = SHA1_Hash (UserID + Lang + Date Time issued + Issuing Node Name+ Issuing Node
Password)
There is only one way to derive the 160 bits of data that make up the signature, and that is by hashing
exactly the same User ID, Language, Date Time, Issuing System, and node password.
Nodes
A node is a machine that can generate or validate an authenticate token. The node contains properties that you set to
control security and specify parameters for which tokens the node will accept. The system stores the node properties in
the database or the jde.ini files, depending on your particular setup.
Property Description
Node name A logical name associated with this node. The length of the node name cannot exceed 15 characters.
Node password Each node has a password which is known only by the system administrator. It serves as a key to
ensure that the token does not get tampered with after it is generated.
Physical machine name The physical machine name in which the node resides.
Trusted nodes list This property contains the list of nodes that can be trusted by this node. For security purposes, only
tokens that are generated by predefined machines can be accepted. These predefined machines are
called trusted nodes.
The trusted node is one-way, for example if you set up node A to trust node B, it does not mean that
node B trusts node A.
Token lifetime properties When validating a token, the node checks the time the token was issued against the amount of time
that you set in the token lifetime properties. For example, if you set the token lifetime for six hours,
and the node receives a token that was originally issued seven hours prior, the node will not accept the
token. You can use these two properties to specify the token lifetime:
This property specifies the expiration time for a regular token. A regular token gives a user the
authority to run a regular short-run process, such as a business function. The default value for
this property is 12 hours.
162
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Property Description
This property specifies the expiration time for an extended token. An extended token gives a user
the authority to run a long-run process, such as a UBE, after it is issued. The default value for this
property is 30 days.
Note: On the IBM i platform, GMT time calculation does not take into account daylight savings time. Consequently,
there can be a one hour difference in GMT time calculation between tokens generated on IBM i and Windows
platforms. If you set the token timeout values as 12 hours (the default) or longer, you will notice this issue in sessions
running for longer than 11 hours. If you set the token timeout values as less than one hour, then the tokens generated
on Windows will automatically expire on IBM i. To resolve this issue, on the IBM i server, you should change the
QUTCOFFSET value manually whenever there is a change in daylight savings time to ensure proper calculation of
GMT time.
163
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
• Node B cannot accept a token generated by node C, even though node C trusts node B.
• A node will not accept a token if the time between its generation and reception by the node is greater than
the token lifetime set for that node. For example, node A cannot accept a token from node B if the token was
generated more than 30 minutes prior to being received by node A.
Note: No node will accept a token if its signature has been changed. The system verifies this by comparing
the token signature and the hash value of the token body.
164
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
1. The user signs in to JD Edwards Collaborative Portal through a web browser using an EnterpriseOne user ID
and password.
2. The system sends the user ID and password to the JD Edwards Collaborative Portal.
3. JD Edwards Collaborative Portal authenticates the user ID and password against either LDAP, EnterpriseOne
tables, or WebSphere security.
4. A token is generated for the user ID.
5. When single sign-on is required for EnterpriseOne, the token is sent to either a HTML Server or a EnterpriseOne
application server.
6. The EnterpriseOne security server validates the token and grants access to the EnterpriseOne application.
165
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Setting Description
Physical machine name N/A (The default settings are all the same independent of the physical machine that it is residue in.)
As a result, the EnterpriseOne system will generate a token with node name _GLOBALNODE, and it will only accept a
token with node name _GLOBALNODE.
Note: Using default settings may expose a potential security risk. Thus, it is highly recommend to overwrite the single
sign-on settings using the single sign-on configuration applications discussed in this section.
166
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
This configuration requires that you configure the single sign-on settings in this order:
1. Set up node information.
2. Set up node lifetime.
3. Establish the trust between nodes.
You should delete the single sign-on settings in this order:
1. Delete the trusted node relationship.
2. Delete the node lifetime.
3. Delete the node information.
Alternatively, you can delete the node information directly by deleting the node record in the F986180 table. The system
will automatically delete the record's corresponding entries in the Node Lifetime (F986181) and Trusted Node (F986182)
tables.
Field Description
Node Name Enter a logical name associated with this node. The length of the node name cannot exceed 15
characters.
167
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Field Description
Machine Name Enter the physical machine name where the node resides.
Node Password Enter a password for the node. The password ensures that tokens that are generated from the node do
not get tampered with.
Select the node and then from the Row menu, select Active/Inactive to change the status of the node.
1. Select the node that you want to delete and click Delete.
A warning message appears informing you of the corresponding records that are deleted when you delete a
node configuration.
2. Click OK to delete the node configuration.
168
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
• The public key certificate used for token generation by the third party must be provided.
• You must store this certificate in a secure PKCS12 keystore (.p12) and upload it to the EnterpriseOne HTML
Server.
• You must configure the EnterpriseOne HTML Server with the keystore name, keystore password, and certificate
alias.
• Principal passed in the JWT must match the EnterpriseOne user ID.
• You must configure the EnterpriseOne HTML Server as a trusted node through a single sign-on trust
configuration.
The following image shows the authentication flow in an environment in which JWT is used for authentication.
169
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
2a. The JWT is sent in the access token URL parameter of the HTML server (E1Web Client) URL.
3a. The JWT is forwarded to the EnterpriseOne HTML by the browser through the URL parameter.
4. The JWT is validated against the public key, the token timeout is validated, and the principal (user) is extracted from
the JWT payload. A PSToken is generated for that user and sent for authorization by the Security Server (EnterpriseOne
Enterprise Server).
170
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
5. The Security Server checks the PS token with SSO node trust, and then an authorization response is returned to the
EnterpriseOne HTML Server.
6a. The authorization response is returned to the browser, and user is logged in to the Web Client or the login has failed.
7. The authorization response is returned to the AIS client (third-party). If passed, for a token request the response
includes an AIS token.
Accessing the Web Client with JSON Web Tokens (Tools Release
9.2.5.4)
Starting with Tools Release 9.2.5.4, you can use JWT to access the EnterpriseOne Web Client and Orchestrator Studio
and establish a session with a browser. To do this, you must include JWT in the URL by using the following access_token
parameter:
171
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
https://<MyE1HTMLServer>/jde/E1Menu.maf?access_token=eyJ4NXQiOiJxd0V
https://<MyAISServer>/studio/studio.html?access_token=eyJ4NXQiOiJxd0V
Additionally, you can use the JWT with an application shortcut (Parameterized URL) as shown in this example:
https://<MyE1HTMLServer>/jde/ShortcutLauncher?OID=P01012_W01012B_ZJDE0001& access_token=eyJ4NXQiOiJxd0V
Note: It is recommended by Oracle that single-use JWT are used for this purpose.
You must include the following assertions in your JWT payload to ensure that single-use JWT are used:
Note: After the token is validated and a session is established, the browser will navigate to the EnterpriseOne main
page. You can also use a shortcut to navigate directly to the required application. The system then removes the JWT
from the URL.
Notice that the Node Password is hidden because the environment is configured with a site key that encrypts all
passwords in the configuration files. You can use either configuration, with or without site key.
3. Bounce the EnterpriseOne Server and then the HTML Server.
172
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
The external section is for configuring certificates for a JWT token generated outside of the JD Edwards system.
The internal section is for configuring certificates for JWT tokens generated by AIS Servers, for communication between
the AIS and HTML Servers (for example, notifications and scheduler). By default, the demo certificate is enabled. The
demo certificate is always allowed. If you have enabled the demo certificate and included certificates in a keystore, all of
them can be used. The demo certificate will be tried first if it is enabled.
Note: Any certificates that you include in the internal keystore much match the certificates configured for each AIS
Server associating with the HTML Server (public/private key pair).
Before you start configuring the HTML Server with a certificate, you need to upload the .p12 file to the machine where
the HTML Server is deployed.
173
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
• The public key certificate used for token generation by the third party must be provided.
• You must store this certificate in a secure Java keystore (.jks) and upload it to the EnterpriseOne HTML Server.
• You must configure the EnterpriseOne HTML Server with the keystore name, keystore password, and certificate
alias.
• Principal passed in the JWT must match the EnterpriseOne user ID.
• You must configure the EnterpriseOne HTML Server as a trusted node through a single sign-on trust
configuration.
#unique_367/unique_367_Connect_42_CEGCCIEB shows the authentication flow in an environment in which JWT is used
for authentication.
174
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
175
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
2. Use the Security section of the Server Manager configuration to enter the exact Node Name and Node
Password configured for the HTML Server.
Notice that the Node Password is hidden because the environment is configured with a site key that encrypts all
passwords in the configuration files. You can use either configuration, with or without site key.
3. Bounce the EnterpriseOne Server and then the HTML Server.
176
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Note: If one token lifetime configuration record is deleted, then another token lifetime configuration for the same
node and the trusted node configurations that have this node in it will be deleted as well.
On the Work With Token Lifetime Configuration form, select a node and then click the Delete button.
Note: A dialog box appears warning you that if you delete this record, the system will delete the extended and regular
token lifetime configuration records and the trusted node configuration records of this node.
177
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Access the SSO Environment Configuration Tools form. In JD Edwards Solution Explorer, select System Administration
Tools (GH9011), User Management, User Management Advanced and Technical Operations, and then double-click SSO
Environment Configuration Tools.
1. Click the Single Signon Trusted Node Configuration link.
2. On the Work With Trusted Node Configuration form, click Find, select a record, and then click Add.
3. On the Trusted Node Configuration Revision form, enter a node in the Node Name field and then click OK.
See Understanding the Default Settings for the Single Sign-On Node Configuration.
Access the jde.ini file to modify the single sign-on node settings.
In the [TRUSTED NODE] section of the jde.ini file, add the appropriate values to these settings:
Setting Description
RegularLifeTime Enter the expiration time (in minutes) for a regular token.
ExtendedLifeTime Enter the expiration time (in minutes) for an extended token.
178
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Setting Description
MachineName1 Enter the physical machine name for the second node.
Example 1:
A system administrator wants to install the EnterpriseOne system on three machines: SUN1, IBM1 and HP1. He wants all
three machines to trust each other, and no other machines will be trusted. In this case, the administrator can configure
the jde.ini as follows and deploy it on SUN1, IBM1, and HP1:
[TRUSTED NODE]
numTrustedNodes=3
For Sun:
NodeName=NodeSUN1
MachineName=SUN1
NodePassword=NodePwd
For IBM:
NodeName1=NodeIBM1
MachineName1=IBM1
NodePassword1=IBM1Pwd
For HP:
NodeName2=NodeHP1
MachineName2=HP1
NodePassword2=HP1Pwd
Example 2:
A system administrator wants all EnterpriseOne servers in the network to trust each other. Moreover, he wants to
change the default node configuration as follows:
179
JD Edwards EnterpriseOne Tools Chapter 15
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
[TRUSTED NODE]
numTrustedNodes=1
RegularLifeTime=30
ExtendedLifeTime=60
NodeName=_GLOBALNODE (The node name must be _GLOBALNODE)
MachineName=_GLOBALNODE (The machine name must be _GLOBALNODE)
NodePassword=NewPwd
Note: If you sign in to EnterpriseOne without a security server, you can only run the business functions and UBEs that
are mapped to either the local machine or the enterprise server without a security server.
When a local token is used, the default value for regular token lifetime is 12 hours and the default value for extended
token lifetime is 30 days. You can override these default values for the local token using the SSO Environment
Configuration Tools application or by modifying the appropriate settings in the jde.ini file of the Windows client,
deployment server, and enterprise server.
These are sample jde.ini node settings to override _LOCALNODE for the local token:
[TRUSTED NODE]
numTrustedNodes=1
RegularLifeTime=4320
ExtendedLifeTime=43200
NodeName=_LOCALNODE
MachineName=_LOCALNODE
Note: You cannot override the node password for _LOCALNODE in the jde.ini file; you must use the SSO Environment
Configuration Tools application to do this.
180
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
Note: EnterpriseOne single sign-on through OAM is supported only by the EnterpriseOne web client, not
Collaborative Portal.
• OAM authentication schemes that provide single sign-on for EnterpriseOne applications:
◦ Basic Over LDAP (Lightweight Directory Access Protocol): Users enter a user name and password in a
window supplied by the web server.
This method can be redirected to Secure Socket Layer (SSL).
◦ Form: Similar to the basic challenge method, users enter information in a custom HTML form.
You choose the information that users must provide in the form.
◦ X509 Certificates: X.509 digital certificates over SSL.
A user's browser must supply a certificate.
◦ Integrated Windows Authentication (IWA): Users will not notice a difference between an OAM
authentication and IWA when they log on to the desktop, open a browser, request an OAM-protected web
resource, and complete single sign-on.
◦ Microsoft .NET Passport: NET Passport is a component of the Microsoft .NET Framework. The .NET
plug-in is a web-based authentication service that provides single sign-on for Microsoft-protected web
resources.
◦ Custom: You can use other forms of authentication through the OAM Authentication Plug-in API.
• Session timeout: OAM enables you to set the length of time that a user session is valid.
181
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
• Ability to use Oracle Identity Manager for identity management. Oracle Identity Manager provides identity
management features such as portal inserts, delegated administration, workflows, and self-registration
EnterpriseOne applications.
You can determine how much access to provide to users upon self-registration. Oracle Identity Manager
workflows enable a self-registration request to be routed to appropriate personnel before access is granted.
OAM also provides self-service, enabling users to update their own identity profiles.
Note:
• Oracle Fusion Middleware Integration Guide for Oracle Identity Management Suite and the Oracle Identity
Manager documentation.
• Protection through a WebGate, which is a plug-in that intercepts web resource (HTTP) requests and forwards
them to the Access Server for authentication and authorization.
• Populating a header variable with an attribute value that is stored in the LDAP directory used by OAM.
• Configuring EnterpriseOne to invoke the OAM authentication process, overriding the default authentication
mechanism.
182
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
a. If the user's single sign-on credentials are not in OID, OAM notifies WebGate and the user is denied
access to EnterpriseOne.
183
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
b. If OAM finds the user's single sign-on credentials in OID, OAM authenticates the credentials.
7. If the credentials are validated, the user gains access to the EnterpriseOne web client.
8. If a valid session already exists and the user is authorized to access the resource, WebGate redirects the user to
the requested EnterpriseOne resource.
https://support.oracle.com/epmos/faces/CertifyHome?_adf.ctrl-state=78o46rofa_43&_afrLoop=34652538504327
Prerequisites
In addition to single sign-on configuration instructions, this chapter contains instructions on how to install Oracle
Identity and Access Management 11gR2, which requires the following prerequisites:
Note: The Oracle Repository Utility version must match the product that you are installing.
1. Launch the Oracle Identity and Access Management run Installer (or setup.exe).
2. On the Welcome screen, click Next.
3. Select the Install Software Updates option.
184
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
Select each component schema one at a time because the schema owners are different.
The schemas should have already been created using the Oracle Repository Utility (RCU) as described in the
Prerequisites section in this chapter.
7. Click Next to verify the connections.
8. Select the Administration Server and then select the Managed Servers, Clusters, and Machines options.
You can accept the default values for the Administration Server and Port.
9. Enter or accept the default Managed Server name, oam_server1.
10. Click Next to skip the Cluster configuration.
11. Click Add to configure the Machine information.
12. Assign the servers from the left pane after the machine is created.
13. Review the Configuration Summary and click Create.
14. Click Finish when complete.
Before you start the WebLogic Administration Console, complete the steps in the remaining tasks in this
section.
185
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
• -m join
The instructions in this chapter use the create option because the join option is for additional domains to use the same
Database Security Store already created.
To configure a domain to use a database security store using the -m create option, you must run the
configureSecuirytStore.py script as follows depending on your platform:
• On Windows:
MW_home\oracle_common\common\bin\wlst.cmd <IAM_Home>\common\tools\configureSecurityStore.py -d
<domaindir> -c IAM -p <opss_schema_pwd> -m create
• On UNIX:
MW_home/oracle_common/common/bin/wlst.sh <IAM_Home>/common/tools/configureSecurityStore.py -d
<domaindir> -c IAM -p <opss_schema_pwd> -m create
186
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
5. Select your WebGate, for example 11g WebGate, and click Next.
6. In the Configuration section, enter a name and description for the WebGate.
7. In the Security Option area, select the Open option, and then click Finish.
If successful, the system displays a confirmation message and shows the location in which the artifacts are
stored. Entries are also created for the new WebGate under the Host Identifiers and Application Domains nodes.
8. To see the entry under Host Identifiers, on the Launch Pad, open the Host Identifiers from the Access Manager
section, and then click Search.
◦ E1Menu Policy
◦ ParameterizedURL Policy
◦ ShortcutLauncher Policy
7. Click the Resources tab to create HTTP Type Resources for these policies.
8. Create the following policies for the Protected Resource Policy:
◦ /
◦ /.../*
◦ /jde
/jde/E1Menu.maf
10. Create the following resource for the Parameterized URL Policy:
/jde/HostedE1Servlet
187
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
11. Create the following resources for the ShortcutLauncherPolicy:
◦ /jde/ShortcutLauncher
◦ /jde/servlet/com.jdedwards.runtime.shortcut.ShortcutLauncher
12. Enter the EnterpriseOne URL to the Success URL field in the Protected Resource Policy.
13. Create another HTTP Type Resource for the logout notification that will not be added to any Authentication or
Authorization Policy:
◦ /jde/NotificationController.mafService
188
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
14. This step applies only to Oracle Access Management (OAM) for Application Development Framework (ADF)
Container.
◦ /JDEADFContainer/**
◦ /JDEADFContainer/performHandshake
189
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
190
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
191
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
12. Click the Responses tab and click the plus (+) sign.
13. In the Add Response area, complete the following fields:
<MW_Home>/user_projects/domain/IDMDomain/output/<SSO_Agent_Name>
Copy the cwallet.sso and OBAccessClient.xml files to the WebTier home on the Oracle WebTier (OHS) Server. For
example:
<MW_Home>/Oracle_WT1/instances/instance1/config/OHS/ohs1/webgate/config
2. <MW_Home>/user_projects/domain/<oamdomain>/config/fmwconfig/components/OHS/
instances/<ohs_instance_name>/
2. Edit the mod_wl_ohs.conf file.
NameVirtualHost *:7777
<VirtualHost *:7777>
<Location /jde> <--EnterpriseOne Context
SetHandler weblogic-handler
WebLogicHost myserver.com
WebLogicPort 9003 <-- EnterpriseOne Port
</Location>
</VirtualHost>
b. If you prefer to use the single signon for the WebLogic console, then include a <Location /console>
section.
192
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
c. This step applies only to Oracle Access Management (OAM) for Application Development Framework
(ADF) Container.
If a virtual host section already exists for EnterpriseOne, you only need to add the Location section under
the same Virtual Host section.
For JAS, add a Virtual Host section for ADF container:
NameVirtualHost *:7778
<VirtualHost *:7778>
<Location /JDEADFContainer> <--ADF Container
SetHandler weblogic-handler
WebLogicHost myserver.com
WebLogicPort 9104 <-- ADF Container Port
</Location>
</VirtualHost>
For information about the configuration settings for JAS, ADF, AIS Cookies, and ADF settings using
Server Manager, see "Configuring Oracle Access Management (OAM) for ADF Container" in the JD
Edwards EnterpriseOne Tools Developer's Guide for EnterpriseOne Application Development Framework
(ADF) Applications.
Note: The HTTP port number (for example: 7777) will be the SSO port.
193
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
8. Stop and restart the EnterpriseOne HTML Server.
To set up the EnterpriseOne ADF Server for single sign-on integration with OAM through EnterpriseOne Server
Manager:
1. Open Server Manager from a web browser.
2. Select your EnterpriseOne ADF Server instance.
3. In the Configuration section, select Security Settings.
4. Add OHS host and port in the HTML server whitelist field.
http://OAMServer:OHSport
5. Click Apply.
6. At the prompt, click the Synchronize button to synchronize the changes in all .ini. files.
7. Stop and restart the EnterpriseOne ADF Server.
Note: To integrate Content and Experience Cloud with SSO enabled JD Edwards EntepriseOne HTML Server, you
must enable SSO for Content and Experience Cloud with the same on-premise OAM. See Configuring Federation SSO
in Content and Experience Cloud (Release 9.2.2 Update) for more information.
194
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
◦ Oracle Access Manager User Password
Enter value for the password for the user name you specified for the Oracle Access Manager user name.
195
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
• Configure OAM Mobile Settings for the Enterprise Server in Server Manager
The new IDS Profile creates both the IDS Profile and IDS Repository.
196
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
◦ Oracle Access Manager Mobile Authentication URL. Enter the URL for the JWT Authentication Service
from OAM. This is the URL listed next to the "User Token" setting in OAM.
◦ Oracle Access Manager Mobile Tokens URL. Enter the URL for the JWT Tokens Service from OAM. This
is the URL listed next to the "Access Token" setting in OAM.
The Oracle Access Manager Sign-Off URL setting is only for EnterpriseOne web client applications. You can
ignore it for this configuration.
5. Complete the configuration by performing the steps in the following sections, after which, users can use their
single sign-on username and password to sign on to EnterpriseOne mobile applications.
197
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
13. Click Create a new entry like this one to use the properties of an existing user for creating a new user.
This option uses the values of the existing user to minimize the effort in providing information while creating a
new user.
14. In the Entry Properties section in the New Entry dialog box, click Next.
15. In the Mandatory Properties section, specify the JD Edwards username in the *cn and the *sn fields.
The value specified in both the fields must be same.
16. Select an option from the Relative Distinguished Name list and click Next.
17. In the Optional Properties section, complete the following fields:
198
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
23. Expand the dc=com, dc=oracle, dc=us, cn=Users nodes.
24. Select the user you want to add to the group and click OK.
2. Download the on-premise Oracle Access Manager (OAM) IdP SAML 2.0 metadata:
a. Type the Identity Provider URL in a browser.
b. Log in using your OAM credentials.
c. Save the IdP SAML 2.0 metadata file on your computer.
199
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
Options Value
contained in NameID
Note: You must select User's Email Address option for User Identifier when JDE is configured with long user
ID and select User ID when JDE is configured with short user ID.
7. Click Export Metadata, and then select the Provider Metadata option to save the SP SAML 2.0 metadata file
on your computer.
200
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
If the credentials are validated, the system grants access to Content and Experience Cloud. You have
successfully configured single sign-on.
201
JD Edwards EnterpriseOne Tools Chapter 16
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 11g Release 2
202
JD Edwards EnterpriseOne Tools Chapter 17
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 12c
For more information, see Understanding JD Edwards EnterpriseOne Single Sign-On Through Oracle Access
Management.
Prerequisites
In addition to single sign-on configuration instructions, this chapter contains instructions on how to install Oracle
Identity and Access Management 12c, which requires the following prerequisites:
• Obtain the JDK 1.8 update 131 or later, and the Oracle Identity and Access Management installation images from
the Oracle Software Delivery Cloud.
• Install Oracle Fusion Middleware Infrastructure 12c followed by OAM 12c and Oracle WebLogic Server.
See Installing Oracle Identity and Access Management for steps to install Oracle Identity and Access Management.
203
JD Edwards EnterpriseOne Tools Chapter 17
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 12c
204
JD Edwards EnterpriseOne Tools Chapter 17
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 12c
7. In the Security Option area, select the Open option, and then click Finish.
If successful, the system displays a confirmation message and shows the location in which the artifacts are
stored. Entries are also created for the new WebGate under the Host Identifiers and Application Domains nodes.
8. To see the entry under Host Identifiers, on the Launch Pad, open the Host Identifiers from the Access Manager
section, and then click Search.
<MW_Home>/user_projects/domain/<oamdomain>/output/<SSO_Agent_Name>
<MW_Home>/user_projects/domain/<oamdomain>/config/fmwconfig/components/OHS/instances/<ohs_instance_name>/
webgate/config
<MW_Home>/user_projects/domain/<oamdomain>/config/fmwconfig/components/OHS/
instances/<ohs_instance_name>/
205
JD Edwards EnterpriseOne Tools Chapter 17
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 12c
2. Edit the mod_wl_ohs.conf file.
NameVirtualHost *:7777
<VirtualHost *:7777>
<Location /jde> <--EnterpriseOne Context
SetHandler weblogic-handler
WebLogicHost myserver.com
WebLogicPort 9003 <-- EnterpriseOne Port
</Location>
</VirtualHost>
b. If you prefer to use the single signon for the WebLogic console, then include a <Location /console>
section.
If a virtual host section already exists for EnterpriseOne, you only need to add the Location section under
the same Virtual Host section.
NameVirtualHost *:7778
<VirtualHost *:7778>
<Location /JDEADFContainer> <--ADF Container
SetHandler weblogic-handler
WebLogicHost myserver.com
WebLogicPort 9104 <-- ADF Container Port
</Location>
</VirtualHost>
For information about the configuration settings for JAS, ADF, AIS Cookies, and ADF settings using
Server Manager, see "Configuring Oracle Access Management (OAM) for ADF Container" in the JD
Edwards EnterpriseOne Tools Developer's Guide for EnterpriseOne Application Development Framework
(ADF) Applications.
Note: The HTTP port number (for example: 7777) will be the SSO port.
206
JD Edwards EnterpriseOne Tools Chapter 17
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 12c
1. Enable SSL listen port of WebLogic managed server on which the application resides:
207
JD Edwards EnterpriseOne Tools Chapter 17
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 12c
Also, you can find the sign-off URL in the SSO agent that you set up in the OAM Console, as described in
Registering the WebGate Agent for JD Edwards EnterpriseOne HTML Server. In the OAM Console, select SSO
Agents and then search for and open the SSO agent. The sign-off URL is in the Logout Redirect URL field.
6. Click Apply.
7. At the prompt, click the Synchronize button to synchronize the changes in all .ini files.
8. Stop and restart the EnterpriseOne HTML Server.
To set up the EnterpriseOne HTML Server for ADF with OAM through EnterpriseOne Server Manager of ADF instance:
1. Open the server manager from the web browser.
2. Select the EnterpriseOne ADF server instance.
3. In the configuration section, select Security Settings.
4. Add OHS host and port in the HTML server whitelist field - http://OAMServer:OHSport.
5. Click Apply.
6. At the prompt, click Synchronize button to synchronize the changes in all .ini files.
7. Stop and restart the EnterpriseOne ADF server.
Note: To integrate Content and Experience Cloud with SSO enabled JD Edwards EntepriseOne HTML Server, you
must enable SSO for Content and Experience Cloud with the same on-premise OAM. See Configuring Federation SSO
in Content and Experience Cloud (Release 9.2.2 Update) for more information.
208
JD Edwards EnterpriseOne Tools Chapter 17
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 12c
To configure single sign-on support with OAM for AIS clients, see:
• Enable the "OAuth and OpenIDConnect Service" in OAM
• Configure OAuth Services
• Configure OAM Mobile Settings for the Enterprise Server in Server Manager
• Configuring IDCS for SSO
• Configure OAuth Services for IDCS
• Configure IDCS Settings for the HTML Server in Server Manager
See REST API for OAuth in Oracle Access Manager for more information.
1. Create OAuth Identity Domain - An identity domain corresponds to the notion of a tenant. All clients and
resource servers are created under the identity domain. You need to provide the identity store details for
creating the OAuth Identity domain.
See Creating Identity Store in OAM Console.
2. Create OAuth Resource Server - A resource server hosts protected resources. The resource server is capable
of accepting and responding to protected resource requests using access tokens. It should refer to the above
identity domain.
3. Create OAuth Client - A client is an application that makes protected resource requests on behalf of the
resource owner. The ClientID and the ClientName should be same.
209
JD Edwards EnterpriseOne Tools Chapter 17
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 12c
◦ OAuth Validation URL Enter the URL for validating Access Tokens from OAuth 12c Runtime API.
The Oracle Access Manager Sign-Off URL setting is only for EnterpriseOne web client applications. You can
ignore it for this configuration.
5. Complete the configuration by performing the steps in the following sections, after which users can use their
single sign-on user name and password to sign on to EnterpriseOne mobile applications.
https://docs.oracle.com/en/cloud/paas/identity-cloud/rest-api/api-oauth-runtime-oauth-runtime-tokens.html
https://docs.oracle.com/en/cloud/paas/identity-cloud/rest-api/op-oauth2-v1-introspect-post.html
All configurations below should be done on the existing Enterprise Application in IDCS that is used for EnterpriseOne
single sign-on. It is recommended that SSO be configured and working for single sign-on before performing this
additional configuration.
1. In the IDCS administrative console navigate to the JDE application and select it.
2. Navigate to the OAuth Configuration tab.
Refer to these links to IDCS documentation for more information about OAuth configuration:
https://docs.oracle.com/en/cloud/paas/identity-cloud/uaids/add-enterprise-application.html
https://docs.oracle.com/en/cloud/paas/identity-cloud/uaids/understand-cloud-
applications.html#GUID-29F8FC7E-DF14-4EAE-9CFF-75B125BC3FB4
3. Generate Client ID and Secret
If you have not done so already in the General Information tab, choose to generate a client id and secret.
4. Client Configuration
210
JD Edwards EnterpriseOne Tools Chapter 17
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 12c
1. In the Server Manager Console, select an HTML Server instance, Configuration (left side panel), Advanced
(from the drop-down menu, Security.
2. Oracle Access Manager Version or IDCS
Enter the URL for creating Access Token in IDCS Runtime Token API. For example:
Enter the scope used in the IDCS application setup. This is scope that you specified in the proceeding section of
this document for Configuring IDCS.
For example:
211
JD Edwards EnterpriseOne Tools Chapter 17
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 12c
212
JD Edwards EnterpriseOne Tools Chapter 17
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 12c
◦ OAuth ClientId:
Enter the URL for creating Access Token in IDCS Runtime Token API. (for example: "https://%3cIDCS-
Service-Instance%3e.identity.oraclecloud.com/oauth2/v1/token")
◦ OAuth Validation URL:
Enter the URL for validating Access Token from in IDCS Runtime Introspect API.(for example:https://
%3cIDCS-Service-Instance%3e.identity.oraclecloud.com/oauth2/v1/introspect")
5. Complete the configuration by performing the steps in the following sections, after which you can use your
single sign-on user name and password to sign on to EnterpriseOne mobile applications or perform e-
signatures in EntepriseOne.
See Adding JD Edwards EnterpriseOne HTML Server User to the OID for more information on steps to add a user to OID.
213
JD Edwards EnterpriseOne Tools Chapter 17
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 12c
• Stands alone, that is, it is detached from the OAM server and does not require an application server.
• Supports RSA SecurID pass code verification.
• Works similar to the Authenticating Webgate with greater flexibility for server scale-out and attack resilience,
credential collection UI construction, flow, and life cycle management.
The detached credential collector was introduced in OAM 11gR2 release and it is further extended to OAM 12c.
1. Click Agents and then click Search to open the 12c webgate page that functions as the DCC.
2. Select the check box Allow Credential Collector Operations.
3. Click Apply and download the webgate zip file.
4. Place the webpage zip file at two locations:
◦ MW_HOME /user_projects/domains/oam_domain/output/E1OHS12cWebgate/
◦ MW_HOME /user_projects/domains/oam_domain/config/fmwconfig/components/OHS/instances/
ohs1/webgate/config/
Take backup of the existing "cwallet.sso , cwallet.sso.lck, ObAccessClient.xml and wallet" and unzip the
downloaded webgate zip file.
To ensure that the perl script mentions the correct path for the perl executable
If the webgate is installed at MW_HOME/webgate, the perl scripts for DCC-based login can be located at
MW_HOME/webgate/ohs/oamsso-bin.
214
JD Edwards EnterpriseOne Tools Chapter 17
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 12c
◦ Name: DCCAuthScheme
Enter the OHS server URL here where you have configured the webgate for the DCC.
◦ Authentication Module: LDAP
◦ Challenge URL: /oamsso-bin/login.pl
◦ Context Type: Select the external
Click Apply.
http://<oam_server>:<OHS_port>/oamsso-bin/logout.pl?end_url=http://<oam_server>:<OHS_port>/oamsso-
bin/login.pl
5. Click Apply.
6. At the prompt, click the Synchronize button to synchronize the changes in all .ini files.
7. Stop and restart the EnterpriseOne HTML Server.
215
JD Edwards EnterpriseOne Tools Chapter 17
Security Administration Guide Setting Up JD Edwards EnterpriseOne Single Sign-On
Through Oracle Access Management 12c
216
JD Edwards EnterpriseOne Tools Chapter 18
Security Administration Guide Using Oracle Access Manager to Enable Support for
Windows Native Authentication with EnterpriseOne
Note: You can enable support of long user IDs and passwords in a JD Edwards EnterpriseOne single sign-on
configuration with OAM. See Configuring Long User ID and Password Support in a Single Sign-On Configuration with
Oracle Access Manager in this guide for more information.
217
JD Edwards EnterpriseOne Tools Chapter 18
Security Administration Guide Using Oracle Access Manager to Enable Support for
Windows Native Authentication with EnterpriseOne
[realms]
JDELDAP.COM = {
kdc = denjdeldap1.jdeldap.com
admin_server = denjdeldap1.jdeldap.com
default_domain = JDELDAP.COM
}
[domain_realm]
.jdeldap.com = JDELDAP.COM
jdeldap.com = JDELDAP.COM
218
JD Edwards EnterpriseOne Tools Chapter 18
Security Administration Guide Using Oracle Access Manager to Enable Support for
Windows Native Authentication with EnterpriseOne
Note: You can use the "-A" option, but "-S" checks for a duplicate SPN as shown in the following example. In
the examples, JDE is the Active Directory user ID.
2. Run the "ktpass" command to create the SPN and associate it with the Active Directory user ID that you created.
3. To verify that the SPN and the Key Tab file are set up correctly, view the user information from Active Directory,
as shown in the following example:
You can also use the "setspn" command to view the user information:
>setspn -L ActiveDirectoryUserID
219
JD Edwards EnterpriseOne Tools Chapter 18
Security Administration Guide Using Oracle Access Manager to Enable Support for
Windows Native Authentication with EnterpriseOne
4. Use the following command to remove the SPN:
5. After verifying the setup of the SPN and the Key Tab, copy the Key Tab file to the OAM server.
After running the command, the system should display "Authenticated to Kerberos v5".
2. Run the "klist -e" command to check the ticket:
For OAM 11gR2, the Admin Console is called the Oracle Access Management console.
220
JD Edwards EnterpriseOne Tools Chapter 18
Security Administration Guide Using Oracle Access Manager to Enable Support for
Windows Native Authentication with EnterpriseOne
2. Create an Active Directory data source and set it as the Default Store:
For OAM 11gR1: On the System Configuration tab, expand the Data Sources folder, select user identity Stores,
and then click the Create button.
For OAM 11gR2: Select the User Identity Store from the configuration area, and the click the Create button.
a. When you create the data source, select the Default Store option to make it the default identity store.
b. Click the Apply button.
c. Click the Test Connection button to test the configuration.
For OAM 11gR1: On the System Configuration tab, select the Access Manager Settings pane. Expand the
Authentication Modules node, Kerberos Authentication module, and then double-click Kerberos.
For OAM 11gR2: Select the Authentication Modules from the Access Manager area, click Search, and select
Kerberos Module.
a. Complete the following fields to enter the location of your Key Tab and krb5.conf (ini) files:
221
JD Edwards EnterpriseOne Tools Chapter 18
Security Administration Guide Using Oracle Access Manager to Enable Support for
Windows Native Authentication with EnterpriseOne
4. Verify that the authentication scheme is using the correct Kerberos authentication module you modified in the
previous step:
For OAM 11gR1: Select the Policy Configuration tab. Under the Authentication Schemes node, double-click
KerberosScheme.
For OAM 11gR2: Select Authentication Schemes from the Access Manager area. Click Search and then double-
click KerberosScheme.
5. Edit the Protected Resource Policy:
For OAM 11gR1: Expand the Application Domains node, the domain node, Authentication Policies, and then
double-click Protected Resource Policy.
For OAM 11gR2: Select the Application Domain from the Access Manager area and then click Search. Select
your domain node from the Authentication Policies, and then double-click Protected Resource Policy.
a. In the Authentication Policy area, edit the Protected Resource Policy by selecting KerberosScheme for
the Authentication Scheme.
b. Click the Apply button.
222
JD Edwards EnterpriseOne Tools Chapter 18
Security Administration Guide Using Oracle Access Manager to Enable Support for
Windows Native Authentication with EnterpriseOne
3. In the Configuration area, select Security Settings.
4. Under the Security Server Configuration section, in the Oracle Access Manager Sign-Off URL field, remove the
rest of the information starting with "?end_url=". Only the OAM server URL should remain, as shown in the
following examples:
http://server:port/oamsso/logout.html
http://server:port/oam/server/logout.html
Also, you can find the sign-off URL in the SSO agent that you set up in the OAM Console, as described in
Registering the WebGate Agent for JD Edwards EnterpriseOne HTML Server. In the OAM Console, select SSO
Agents and then search for and open the SSO agent. The sign-off URL is in the Logout Redirect URL field.
When logging out, a message stating "User logged out successfully" appears.
223
JD Edwards EnterpriseOne Tools Chapter 18
Security Administration Guide Using Oracle Access Manager to Enable Support for
Windows Native Authentication with EnterpriseOne
If the configuration was successful, you should be able to access the EnterpriseOne web client without being
prompted for credentials.
224
JD Edwards EnterpriseOne Tools Chapter 19
Security Administration Guide Configuring Long User ID and Password Support in a Single
Sign-On Configuration with Oracle Access Manager
As with releases prior to EnterpriseOne Tools 9.2, out of the box, EnterpriseOne user IDs are limited to 10 characters.
Using OAM, you can manage long user IDs and passwords in a single sign-on configuration with EnterpriseOne. This
configuration does not change the behavior of existing EnterpriseOne user IDs, but it requires mapping EnterpriseOne
users to the long IDs.
Prerequisites
Make sure the following software is properly configured:
225
JD Edwards EnterpriseOne Tools Chapter 19
Security Administration Guide Configuring Long User ID and Password Support in a Single
Sign-On Configuration with Oracle Access Manager
a. In the tree in the left pane, expand the Root node, dc=com, dc=mycompany.
b. Click the Create icon.
c. If you are planning to use an email address for your user ID, record the information in the "uid" attribute.
3. Log out and close Oracle Directory Manager.
Note: If you are using Active Directory, use "userPrincipalName" as the "mail' attribute and
"sAMAccountName" as the "uid" attribute.
226
JD Edwards EnterpriseOne Tools Chapter 19
Security Administration Guide Configuring Long User ID and Password Support in a Single
Sign-On Configuration with Oracle Access Manager
2. Select the System Administration Tools menu (GH9011), Security Maintenance, Security Maintenance
Advanced and Technical Operations, and then double-click SSO Environment Configuration Tools.
3. On SSO Environment Configuration Tools, select the Configure the UserID Mapping link.
4. On Work With SSO E/E1 UserID Mapping, click the Add button.
This is the same as the user ID entered in the "mail" field in OID or "userPrincipalName" in Active
Directory.
EnterpriseOne saves the information in the F00927 table as shown in the following screenshot:
227
JD Edwards EnterpriseOne Tools Chapter 19
Security Administration Guide Configuring Long User ID and Password Support in a Single
Sign-On Configuration with Oracle Access Manager
7. In the Users and Groups area, change the User Name Attribute to use the long ID attribute, such as "mail" for
OID.
Note: Use "userPrincipalName" for Active Directory.
228
JD Edwards EnterpriseOne Tools Chapter 19
Security Administration Guide Configuring Long User ID and Password Support in a Single
Sign-On Configuration with Oracle Access Manager
9. In the Users and Groups area, change the User Name Attribute to use the long ID attribute, such as "mail" for
OID:
229
JD Edwards EnterpriseOne Tools Chapter 19
Security Administration Guide Configuring Long User ID and Password Support in a Single
Sign-On Configuration with Oracle Access Manager
2. Click the Create Authentication Scheme button.
230
JD Edwards EnterpriseOne Tools Chapter 20
Security Administration Guide Configuring SSL/TLS for JDENET
You can configure EnterpriseOne to use SSL/TLS to encrypt all JDENET message data passed between the Enterprise
Server and clients. In this context, a client would include an HTML Server, the Deployment Server, or any other client
that makes requests to the EnterpriseOne Enterprise Server.
The following steps describe how to use the command to extract the components for SSL Programs on IBM System i:
1. Ensure the system foundation library is in your library list. If it is not in the list, you can add it by entering this
command:
ADDLIBLE E910SYS
Where E910SYS is the name of the system foundation library.
2. From an IBM System i command line, enter the following command:
INSTALLSSL
3. Press F4 to prompt the command.
4. Enter the name of your system foundation library, and then press Enter.
On Windows enterprise and deployment servers, the gencert.cmd file is used to generate a combination SSL/TLS
certificate/private key file that is suitable for use with JDENET SSL/TLS. On UNIX and Linux systems, the file is called
gencert.sh. On IBM System i, the command is GENCERT, which must be run from QSHELL. These files can be found in the
system/bin32 (or bin64) directory on the enterprise server and also on the deployment server. The following illustration
231
JD Edwards EnterpriseOne Tools Chapter 20
Security Administration Guide Configuring SSL/TLS for JDENET
shows an example of running the script to generate a certificate. Notice that the system prompts you to enter data that
is unique to your site to create the certificate/key file:
The file generated by this script should be entered as the sslKeyFile parameter in the enterprise or deployment server
JDE.INI file when using SSL/TLS. See Configuring the Enterprise Server JDE.INI File in this chapter. By default, the file
is created in a directory outside the main system directory to ensure that the certificate/key file is preserved during an
EnterpriseOne Tools release upgrade.
It is not required to generate the certificate/key file on the server that will use it. You could, for example, generate a
certificate/key file on the Deployment Server and move it to your Enterprise Server when you are ready to start using
SSL/TLS.
You can also use commercially signed certificates, such as certificates validated by a company like Verisign or
Cybertrust, to set up SSL/TLS for JDENET, with some caveats. The EnterpriseOne enterprise and deployment servers
currently require a combination certificate and key file in PEM format. In addition, the file must not be pass-phrase
protected. Currently, using a commercially signed certificate with the JDENET server does not offer any advantage over
using the self-signed, internally generated certificate as described in this section.
232
JD Edwards EnterpriseOne Tools Chapter 20
Security Administration Guide Configuring SSL/TLS for JDENET
not support SSL/TLS cannot connect with an EnterpriseOne server that is enabled with SSL/TLS. Therefore, SSL/TLS
support for JDENET requires that the release level of EnterpriseOne clients matches the release level of EnterpriseOne
servers.
The SSL/TLS settings in the "Network and Queue Settings (JDENET Configuration)" section of the jde.ini include:
• useSSL
Valid values are Enable SSL or Disable SSL. Enabling this option specifies that JDENET messages will be
exchanged using secure sockets (SSL/TLS). The setting is only set on the server, but does require that clients
accessing the server can process SSL/TLS messages (that is, all clients must be running with a matching
EnterpriseOne Tools release). Starting with EnterpriseOne Tools 9.1 Update 2.1, Disable SSL is the default setting
in EnterpriseOne Tools 9.1 Update 2.1.
• sslRetries
This setting specifies the maximum number of times the server or client will attempt to complete an SSL/TLS
handshake. If the handshake is not completed within the retry limit, the SSL/TLS connection fails. The retry
limit prevents the server from hanging on an SSL/TLS connection that may never complete. The default value
of 1000 for this setting should be appropriate for most installations, but may need to be increased to allow for
slow clients or high network latency.
• sslKeyFile
You must set this parameter to the fully qualified path of the file containing the server's SSL/TLS certificate and
private key. The server must have a valid certificate/key file in PEM format in order to use secure sockets. See
Generating an SSL/TLS Certificate and Key File in this chapter for more information.
The following is an example of a typical SSL/TLS setup viewed from Server Manager:
In Tools Release 9.2.4.3, a new field called ProxyPassword has been added to the Security section in the JDE.ini file of
the Enterprise Server. This new field contains the value of the database password and this field must be used only if the
Bootstrap User and the Database User are different.
233
JD Edwards EnterpriseOne Tools Chapter 20
Security Administration Guide Configuring SSL/TLS for JDENET
In the previous releases, the Database User and the Bootstrap User were required to have the same password. As of
Tools Release 9.2.4.3, you can choose to have different passwords for the Database User and the Bootstrap User. You
can also choose to have any combination of long or short passwords for these fields as shown in the following table:
Long Long
Short Short
Long Short
Short Long
234
JD Edwards EnterpriseOne Tools Chapter 20
Security Administration Guide Configuring SSL/TLS for JDENET
[JDENET]
sslServerAuthentication=1
sslCAFile=C:\certstore\CA.pem
From the server certificates, copy the starting and ending content with following two strings into this store:
-----BEGIN CERTIFICATE-----
….
-----END CERTIFICATE-----
3. Place the new file (certificate store) in a location accessible to connecting JDENET entity (EnterpriseOne Server/
JAS/FAT Client/Interop Cient) and set the sslCAFile key to the new location.
Note: You must enable TLS v1 in the java.security file for all the servers in the JD Edwards EnterpriseOne
environment as well as all the clients that communicate with the Enterprise Server if they are on the same JDK CPU
release, including the Server Manager Console, Server Manager Agent, EnterpriseOne web client, EnterpriseOne
development client, EnterpriseOne Server, AIS Server, Business Services Server, and so on.
In the following example, TLS v1 is set as a disabled algorithm in the java.security file:
jdk.tls.disabledAlgorithms=SSLv3, TLSv1, RC4, DES, MD5withRSA, \ DH keySize < 1024, EC keySize < 224,
3DES_EDE_CBC, anon, NULL, \ include jdk.disabled.namedCurves
To enable the TLS v1 algorithm, you must remove it from the disabled algorithms list as shown in the following example:
jdk.tls.disabledAlgorithms=SSLv3, RC4, DES, MD5withRSA, \ DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC,
anon, NULL, \ include jdk.disabled.namedCurves
235
JD Edwards EnterpriseOne Tools Chapter 20
Security Administration Guide Configuring SSL/TLS for JDENET
The SSL or TLS settings in the Network and Queue Settings (JDENET Configuration) section of jde.ini are:
• useSSL
The valid values for this field are Enable SSL or Disable SSL. If you enable this option, the JDENET messages will
be exchanged using secure sockets (SSL or TLS). This setup is done only on the deployment server, but for the
setup the enterprise servers accessing the deployment server must be able to process SSL or TLS messages
(that is, all the enterprise servers must be running on the same EnterpriseOne ToolsRelease as the deployment
server). Starting with EnterpriseOne Tools Release 9.2.5.1, Disable SSL is the default setting.
• sslRetries
This setting specifies the maximum number of times the server or client will attempt to complete an SSL or a
TLS handshake. If the handshake is not completed within the retry limit, the SSL or TLS connection fails. The
retry limit prevents the server from hanging on an SSL or a TLS connection that may never be established.
The default value of 1,000 for this setting should be appropriate for most installations, but may need to be
increased to allow for slow clients or high network latency.
• sslKeyFile
You must set this parameter to the fully qualified path of the file containing the server's SSL/TLS certificate and
private key. The server must have a valid certificate/key file in PEM format in order to use secure sockets. See
Generating an SSL/TLS Certificate and Key File in this chapter for more information.
The following is an example of a typical SSL/TLS setup viewed from Server Manager:
236
JD Edwards EnterpriseOne Tools Chapter 20
Security Administration Guide Configuring SSL/TLS for JDENET
• The numeric key sslServerAuthentication under the [JDENET] section specifies whether to enable server
certificate authentication or not. It is disabled by default, which means server authentication will not be
performed if this key is set to 0 or is missing from JDE.INI.
• The key sslCAFile under the [JDENET] section specifies the location of the trusted certificate store or file as
shown below:
[JDENET]
sslServerAuthentication=1
sslCAFile=C:\certstore\CA.pem
-----BEGIN CERTIFICATE-----
….
-----END CERTIFICATE-----
4. Place the new file (certificate store) in a location accessible to the connecting JDENET entity (EnterpriseOne
server, JAS, FAT, or Interop client) and set the sslCAFile key to specify the new location.
237
JD Edwards EnterpriseOne Tools Chapter 20
Security Administration Guide Configuring SSL/TLS for JDENET
238
JD Edwards EnterpriseOne Tools Chapter 21
Security Administration Guide Configuring Transport Layer Security (TLS) for the
Database
You must configure TLS (Transport Layer Security) on your database server in order to enable connections from JD
Edwards HTML Servers and Development Clients (also called fat clients).
The configuration of TLS on the database server includes these vendor-specific tasks:
• Configure Database for TLS (some databases are pre-configured)
• Certificate and Wallet Creation (both server and client sides)
• Wallet and Certificate Exchange
• Network configuration (both server and client sides)
https://docs.oracle.com/en/database/oracle/oracle-database/19/dbseg/configuring-secure-sockets-layer-
authentication.html
https://docs.microsoft.com/en-us/sql/database-engine/configure-windows/configure-the-d%5B
%E2%80%A6%5Dngine-to-listen-on-multiple-tcp-ports?view=sql-server-ver16
https://docs.microsoft.com/en-us/sql/database-engine/configure-windows/enable-encrypted-connections-to-the-
database-engine?view=sql-server-ver16
https://support.microsoft.com/en-us/topic/kb3135244-tls-1-2-support-for-microsoft-sql-server-e4472ef8-90a9-13c1-
e4d8-44aad198cdbe
474c456a041f097b8ac56ef57a9616a4591888e2
Refer to this IBM document for a description of how to enable TLS on an IBM DB2 for Linux, UNIX, and Windows
database:
239
JD Edwards EnterpriseOne Tools Chapter 21
Security Administration Guide Configuring Transport Layer Security (TLS) for the
Database
https://www.ibm.com/docs/en/db2/11.1?topic=db2-configuring-tls-support-instance
240
JD Edwards EnterpriseOne Tools Chapter 22
Security Administration Guide Configuring SSL for EnterpriseOne Servers
Configure SSL for all EnterpriseOne servers that run on an application server, which include:
• EnterpriseOne HTML Server
• EnterpriseOne Transaction Server
• Oracle BI Publisher Server
• EnterpriseOne Application Interface Services (AIS) Server
• EnterpriseOne Orchestrator Studio Server.
The Orchestrator Studio can be deployed only on an Oracle WebLogic Server with ADF runtime. If the other
servers in this list are deployed on Websphere, you will need to exchange certificates between the different
application server types.
• Oracle Application Development Framework (ADF) Server
• EnterpriseOne Business Services Server
In addition, you must configure SSL for the EnterpriseOne Enterprise Server, which does not run on an application
server. An SSL configuration on the Enterprise Server provides secure communication between this server and the AIS
Server.
For both Oracle WebLogic Server and IBM WebSphere Application Server, the SSL implementation should support
the latest version of the Transport Layer Security (TLS) protocol. SSL in Oracle WebLogic Server and IBM WebSphere
Application Server is an implementation of the SSL and TLS specifications.
Note: For general information about an SSL implementation for your application server type, refer to these resources:
• "Overview of Configuring SSL in WebLogic Server" in the Fusion Middleware Administering Security for Oracle
WebLogic Server .
• For IBM WebSphere Application Server, refer to "Secure Communications Using Secure Sockets Layer," located
here: https://www.ibm.com/support/knowledgecenter/en/SSEQTP_8.5.5/com.ibm.websphere.base.iseries.doc/ae/
csec_sslsecurecom.html
For JD Edwards One-Click Provisioning for Oracle Cloud, SSL is enabled on all servers using a self-signed certificate.
241
JD Edwards EnterpriseOne Tools Chapter 22
Security Administration Guide Configuring SSL for EnterpriseOne Servers
For a production environment, Oracle strongly recommends enabling SSL for all servers using a certificate from a
reputable certificate authority.
The following steps outline the process to create a keystore and generate a Certificate Signing Request (CSR), which is
described in detail in the "Configuring Keystores: Main Steps" in the Oracle Fusion Middleware Administering Security for
Oracle WebLogic Server 12.2.1.2.0 Guide . After performing these tasks, use the HTTPS protocol to verify access to each
SSL-enabled server.
1. Create the keystore that will hold the server identity certificate.
2. Create a Certificate Signing Request (CSR), and submit it to a Certificate Authority.
For a production environment, Oracle strongly recommends obtaining a certificate from a reputable certificate
authority
3. Import the identity and trust certificates returned by the Certificate Authority.
4. Configure the trust and identity keystores with Oracle WebLogic Server.
-Dweblogic.security.SSL.minimumProtocolVersion= TLSv1.2
For more information about the support of TLS in Oracle WebLogic Server, see "Specifying the SSL Protocol Version" in
the Oracle Fusion Middleware Administering Security for Oracle WebLogic Server 12.2.1.2.0 Guide .
242
JD Edwards EnterpriseOne Tools Chapter 22
Security Administration Guide Configuring SSL for EnterpriseOne Servers
If any of the EnterpriseOne servers are not on the same physical machine as Oracle HTTP Server, you must exchange
certificates between the machine with the EnterpriseOne server and the Oracle HTTP Server machine.
-Dweblogic.DefaultProtocol= t3s
After configuring SSL for managed EnterpriseOne servers, in Server Manager, update each managed server's End Point
Protocol setting to use the HTTPS protocol.
243
JD Edwards EnterpriseOne Tools Chapter 22
Security Administration Guide Configuring SSL for EnterpriseOne Servers
For IBM WebSphere Application Server, see "Secure communications using Secure Sockets Layer (SSL)" located here:
https://www.ibm.com/support/knowledgecenter/SSEQTP_9.0.0/com.ibm.websphere.base.doc/ae/csec_sslsecurecom.html
If any of the EnterpriseOne servers are not on the same physical machine as IBM HTTP server, you must exchange
certificates between the machine with the EnterpriseOne server and the IBM HTTP server machine.
Refer to the following instructions on the IBM Knowledge Center on how to configure IBM HTTP server SSL support:
http://www-01.ibm.com/support/docview.wss?uid=swg21179559
After configuring SSL for managed EnterpriseOne servers, in Server Manager, update each managed server's End Point
Protocol setting to use the HTTPS protocol.
244
JD Edwards EnterpriseOne Tools Chapter 22
Security Administration Guide Configuring SSL for EnterpriseOne Servers
http://www-01.ibm.com/support/docview.wss?uid=nas8N1012543
These instructions assume that the *SYSTEM store has already been created and that the user knows the password for
that store. If you have not created a *SYSTEM store, see "How to Create the *SYSTEM Store in DCM" located here:
https://www-01.ibm.com/support/docview.wss?uid=nas8N1010320
The preceding instructions describe how to import one certificate at a time. If you import more than one certificate,
you need to comment out (#) all the lines in first certificate or delete the lines in the first certificate, and then repeat the
process for the remaining certificates in the file.
The root certificates are typically updated every 4-6 months. The cacert.pem file is a text file. which contains the date of
the last update, so you can check the date to determine if there has been an update.
In most cases, after the SSL certificate is registered on the machine where the web application server is hosting the AIS
Server, and communication between this machine and the Enterprise Server has been configured successfully, you will
not need to update the root certificates in cacert.pem again. However, you will need to update the root certificates when
the current AIS Server SSL certificate expires and a new AIS Server SSL certificate is needed.
245
JD Edwards EnterpriseOne Tools Chapter 22
Security Administration Guide Configuring SSL for EnterpriseOne Servers
Note: To avoid having to determine which servers are in direct communication, you can simply import the certificates
from each machine's keystore into the keystore of all server machines in your EnterpriseOne configuration. This will
eliminate any gaps in your SSL implementation.
For detailed steps on how to import a certificate into a keystore on Oracle WebLogic Server, see "Importing Certificates
into the Trust and Identity Stores" in the Oracle Fusion Middleware Administering Security for Oracle WebLogic Server
Guide .
For detailed steps on how to import a certificate into a keystore on IBM WebSphere Application Server, refer to the
following site:
https://www.ibm.com/support/knowledgecenter/en/SSEQTP_8.5.5/com.ibm.websphere.base.iseries.doc/ae/
tsec_sslconfiguration.html
246
JD Edwards EnterpriseOne Tools Chapter 22
Security Administration Guide Configuring SSL for EnterpriseOne Servers
To enable SSL for the Server Manager Console, you must obtain and install CA Certificates on the Oracle WebLogic
Server machine where Server Manager Console is installed. See Obtaining and Installing CA Certificates on WebLogic
Server in this chapter for details.
To enable SSL for Server Manager agents, import the Server Manager Console certificate into each Server Manager
Agent Truststore/Keystore:
1. Export the Server Manager Console certificate to a file using these steps:
a. From the browser, click the lock icon on the left hand side of the URL of the HTTPS/SSL based Server
Manager Console URL.
b. Click Certificate Information.
c. Go to the Details tab and select the Copy to File option.
d. Click Next.
e. Select DER encoded binary X.509 (.CER) format.
f. Click Next.
g. Enter file information.
h. Click Next.
i. Click Finish.
CAUTION: Before performing the import, back up the cacerts file located at X:\jde_home_1\SCFHA\jdk\jre\lib
\security\<cacertsfile>.
This is the syntax to import the Certificate file on a Windows platform. Use the appropriate command to
perform this step on Linux/UNIX/AS400 platforms and also for Server Manager Agents installed on these
platforms.
When prompted for whether you trust the Certificate, answer Yes.
4. If the default password for cacerts file has been changed, then use the appropriate password.
5. After this step, restart the Server Manager Agent.
Perform this step on each of the Server Manager Agent machines. Without this step, the Server Manager Agent
may not be able to communicate with the Server Manager Console.
247
JD Edwards EnterpriseOne Tools Chapter 22
Security Administration Guide Configuring SSL for EnterpriseOne Servers
This completes the configuration required for running the Server Manager Console on Oracle WebLogic Server
with HTTPS/SSL enabled and completes the importing of the certificate on the Server Manager Agents.
In this case, you need to create a valid Self Signed Certificate using the keytool utility and import the certificate into
the WebLogic Custom Truststore and Custom Keystore. Also, you will need to configure WebLogic to use the Custom
Truststore and Custom Keystore. This Self Signed Certificate will also need to be imported in the cacerts file of the
Server Manager Agents.
248
JD Edwards EnterpriseOne Tools Chapter 22
Security Administration Guide Configuring SSL for EnterpriseOne Servers
Note: Refer to Document 1067411.1 on My Oracle Support ( https:\\support.oracle.com ) for information about
anonymous and weak SSL cipher suites in Oracle WebLogic Server. This document includes considerations and
guidelines for Oracle Fusion Middleware products.
On older 10.3 versions that do not support a newer JDK update, if no cipher suite is specifically mentioned in the
config.xml file, then the cipher suites that allow clear text communication may be enabled on the server by default. To
disable these clear text cipher suites, set the following as JAVA_OPTIONS during startup:
-Dweblogic.security.disableNullCipher=true
-Dweblogic.security.SSL.allowUnencryptedNullCipher=false
For all versions, the domain's config.xml file may also be configured for the cipher suite that you want to use. To specify
a cipher suite, add the attributes below and specify any cipher suites as needed (and as supported by both sides of the
communication to establish a handshake). For example:
• In WebLogic Server 12c, you may add the <ciphersuite> tag in the config.xml with ciphers you wish to use:
Ensure <ciphersuite> is added before the <listen-port> as below for admin and managed servers:
<ssl>
<name>AdminServer</name>
<enabled>true</enabled>
<ciphersuite>enter_a_cipher_of_your_choice_here</ciphersuite>
<ciphersuite>enter_another_optional_cipher_of_your_choice_here</
ciphersuite>
<listen-port>7002</listen-port>
<login-timeout-millis>25000</login-timeout-millis>
...
You may have the Admin Server with a "false" setting because of this documentation. You edit it the same way,
usually only because something is detecting an undesirable cipher.
Node Manager
To allow the Node Manager to use stronger ciphers, the WebLogic Server version must be at least 10.3.6.0.10, 12.1.2.0.4 or
12.1.3.0.3 (which are PSU versions delivered early 2015; see Document 1470197.1 on My Oracle Support for the latest). The
nodemanager.properties may be used to customize ciphers, but will not work correctly with Node Manager unless the
PSUs are applied. After the PSU is applied and JDK updated, it is recommended to allow the default processing to take
place.
249
JD Edwards EnterpriseOne Tools Chapter 22
Security Administration Guide Configuring SSL for EnterpriseOne Servers
Use caution if setting this manually. You need to discover all supported ciphers with which the Node Manager needs to
perform a handshake, including other internal middleware processes. By default, it is not required to update the ciphers
for null, under 128-bit, weak, or vulnerabilities if you are updating the JDK and applying PSUs. A manual configuration is
not recommended unless you have a strict business requirement to use a specific cipher suite.
1. Open nodemanager.properties file.
2. Access the following parameter and enter a cipher:
CipherSuite=enter_a_cipher_of_your_choice_here
3. Locate your startnodemanager script file called startNodeManager.sh or startNodemanager.cmd, which you
can usually find in the WLS_HOME/server/bin directory.
4. Add the flag for your JAVA_OPTIONS to your startnodemanger script file:
-Dweblogic.security.SSL.Ciphersuites=enter_a_cipher_of_your_choice_here
Note:
• The cipher you choose must begin with SSL_ (even if using TLS) and must be compatible with other entities
requiring a connection (such as other Oracle Fusion Middleware tools and components)
• You can only configure a cipher supported by the JDK you have installed (and certified with WebLogic Server):
https://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html#SunJSSEProvider
• Check other JAVA_OPTION settings you may have configured earlier which could conflict with this. This will
need to be compatible with the WebLogic Servers being started by node manager.
See Document 2286346.1 "Securing Node Manager Port with High Level SSL Ciphers and Disabling Undesired
Algorithms" on My Oracle Support ( https:\\support.oracle.com ).
To disable weak cipher suites such as DES and 3DES globally through Java:
1. At a command prompt, access the java.security file:
JAVA_HOME/jre/lib/security/java.security
2. Open the java.security file and locate the following parameter:
jdk.tls.disabledAlgorithms=SSLv3, RC4, MD5withRSA, DH keySize < 768
3. In this line, after =SSLv3, add DES and DESede so that the line looks like this:
250
JD Edwards EnterpriseOne Tools Chapter 22
Security Administration Guide Configuring SSL for EnterpriseOne Servers
Each command should return a failure message that looks similar to the following message:
CONNECTED(00000003)
140209911707464:error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake
failure:s23_clnt.c:672:
251
JD Edwards EnterpriseOne Tools Chapter 22
Security Administration Guide Configuring SSL for EnterpriseOne Servers
252
JD Edwards EnterpriseOne Tools Chapter 23
Security Administration Guide Working with Transport Layer Security (Release 9.2.7.3)
Overview
The following JD Edwards EnterpriseOne systems can use Transport Layer Security (TLS) to communicate with the
Database server.
• Enterprise Server
• Deployment Server
• Development Client
To enable the client communication with Database server using TLS, database server CA certificates must be imported
to these JD Edwards EnterpriseOne systems.
The below sections list the steps to import certificates and configure the database client to facilitate the TLS
communication for the following supported databases.
Oracle
Connectivity to an Oracle database server is provided by Oracle database clients, which must be already installed.
The orapki utility is available with the database client installation. You must use this utility to create a wallet and import
the database server CA certificate file to this wallet. The utility is typically located in the Oracle client installation path.
For example:
<ORACLE_CLIENT_HOME>/bin/orapki
mkdir -p <path>/wallet
Example:
mkdir -p /u01/app/oracle/wallet
2. Use the following command to create a new auto-login wallet:
Example:
253
JD Edwards EnterpriseOne Tools Chapter 23
Security Administration Guide Working with Transport Layer Security (Release 9.2.7.3)
Use the following commands to load CA-signed certificates for your Oracle database client wallet:
Root Certificate
orapki wallet add -wallet <wallet_path> -pwd WalletPasswd123 -trusted_cert -cert rootca.pem
Example:
orapki wallet add -wallet "/u01/app/oracle/wallet" -pwd WalletPasswd123 -trusted_cert -cert c:\rootca.pem
Intermediate Certificate
orapki wallet add -wallet <wallet_path> -pwd WalletPasswd123 -trusted_cert -cert interca.pem
Example:
orapki wallet add -wallet "/u01/app/oracle/wallet" -pwd WalletPasswd123 -trusted_cert -cert c:\interca.pem
WALLET_LOCATION =
(SOURCE =
(METHOD = FILE)
(METHOD_DATA =
(DIRECTORY = <wallet_location>
)
)
SQLNET.AUTHENTICATION_SERVICES = (TCPS,NTS)
SSL_CLIENT_AUTHENTICATION = FALSE
SSL_CIPHER_SUITES = (SSL_RSA_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA)
Update the Protocol and Port value in the tnsnames.ora file of the Oracle Database client.
JDEORCL=
(DESCRIPTION=
(ADDRESS=
(PROTOCOL=TCPS)
(HOST=<DB_server_host_name>)
(PORT=1522)
)
(CONNECT_DATA=
(SERVER=dedicated)
(SERVICE_NAME=JDEORCL)
)
)
254
JD Edwards EnterpriseOne Tools Chapter 23
Security Administration Guide Working with Transport Layer Security (Release 9.2.7.3)
• rootca.crt
• interca.crt
Follow the below steps to import each of the database server certificates into Trusted Root Certificates authorities of the
Client machine:
1. Right click on a CA certificate.
2. Click on Install Certificate.
3. On Welcome to the Certificate Import Wizard, click the radio button for Local Machine and click the Next button
to continue.
255
JD Edwards EnterpriseOne Tools Chapter 23
Security Administration Guide Working with Transport Layer Security (Release 9.2.7.3)
4. When you are prompted for the Certificate Store, choose Place all certificates in the following store.
5. Select the Trusted Root Certification Authorities store.
6. Complete the remaining steps of the wizard and click the Finish button.
For example, with SQL Server ODBC Driver, follow the below settings:
256
JD Edwards EnterpriseOne Tools Chapter 23
Security Administration Guide Working with Transport Layer Security (Release 9.2.7.3)
Example:
gsk8capicmd_64 -keydb -create -type cms -db /slot/ems4974/appmgr/ssl_client/slc18gjx.kdb -pw Tools123 -stash
Use the following commands to load CA-signed certificates for your IBM UDB database client wallet:
Server Certificate
Example:
Root Certificate
Example:
Intermediate Certificate
Example:
257
JD Edwards EnterpriseOne Tools Chapter 23
Security Administration Guide Working with Transport Layer Security (Release 9.2.7.3)
db2 catalog tcpip node slc18git remote <machine> server 50001 security SSL
Note: The port value varies depending on your database server. It is initially set during installation of EnterpriseOne.
You must update this value to use specific TLS port of the database server. Typically, Oracle and IBM DB2 UDB has
different ports for both secured and unsecured connections.
258
JD Edwards EnterpriseOne Tools Chapter 24
Security Administration Guide Understanding Authorization Security
The JD Edwards EnterpriseOne authorization security model is not secured by default. You should explicitly lock down
all users by setting up different types of EnterpriseOne security for *PUBLIC, and then set up inclusive security to grant
rights to roles.
EnterpriseOne applies authorization security in the following sequence for the signed-in user:
When a user attempts to access an application or perform an action, EnterpriseOne checks security for that particular
user ID. If security exists for that user ID, the software displays a message indicating that the user cannot proceed.
If the user ID has no security, the software checks role profiles (if that user is part of a specific role), and then *PUBLIC
for security. If no security is established at any of these levels, the software allows the user to continue.
EnterpriseOne also provides software license security through protection codes, and it requires user validation at sign-
in and when accessing new data sources.
259
JD Edwards EnterpriseOne Tools Chapter 24
Security Administration Guide Understanding Authorization Security
• A particular user
This option controls security by role, which enables you to group users based on similar job requirements. An
example is putting all of the accounts payable clerks in one role, such as Accounts Payable (AP).
• All users
This option controls security for all users who are designated by ID type *PUBLIC in the User or Role field. The
designation *PUBLIC is a special ID within EnterpriseOne that automatically includes all of the users within it.
You can use this ID to apply security even if you do not have a specific record set up for it in user profiles.
Object-Level Security
EnterpriseOne authorization security is at the object level. This level means that you can secure specific objects within
EnterpriseOne, which provides flexibility and integrity for your security. For example, you can secure a user from a
specific form and then, no matter how the user tries to access the form (using a menu or any application that calls that
form), the software prevents access to the form. The software simplifies the process of setting up security by enabling
you to set security for hundreds of objects at one time by securing all objects on a specific menu or by securing all
objects under a specific system code.
The Security Workbench application (P00950) enables you to secure EnterpriseOne objects, such as applications, forms,
rows, tabs, and so on. It stores all objects security records in the F00950 table.
Note: Only the objects are secured; the software does not support menu or system code security. Object security
provides a higher level of integrity. For example, if you secured a specific menu to prevent users from accessing the
applications on that menu, the users might still be able to access those applications through another menu or another
application that accesses the applications that you wanted to secure.
260
JD Edwards EnterpriseOne Tools Chapter 24
Security Administration Guide Understanding Authorization Security
Secures users from performing a particular action, such as adding, deleting, revising, inquiring, or copying a record. You
define Action security at the application, version, and form level. You cannot define Action security at the subform level.
Row security
Secures users from accessing a particular range or list of records in any table. For example, if you secure a user from
accessing data about business units 1 through 10, the user cannot view the records that pertain to those business units.
Column security
Secures users from viewing a particular field or changing a value for a particular field in an application or application
version. This item can be a database or non-database field that is defined in the data dictionary, such as the work/
calculated fields. For example, if you secure a user from viewing the Salary field on the Employee Master application, the
Salary field does not appear on the form when the user accesses that application.
Processing option security
Secures users from viewing or changing the values of processing options, or from prompting for versions and
prompting for values for specific applications or application versions. For example, if you secure a user from changing
the processing options for Address Book Revisions, the user could still view the processing options (if you did not
secure the user from prompting for values), but would not be able to change any of the values.
If you secure a user from prompting for versions, the user would not be able to see the versions for a specific
application, so the user would not be able to select a different version of an application from the version that the
administrator assigned.
Tab security
Secures users from viewing or changing fields in a tab or tabs on a given form. You define Tab security at the
application, version, and form level. You cannot define Tab security at the subform level.
Hyper exit security
Secures users from menu bar exits on JD Edwards EnterpriseOne forms. These exits call applications and allow users to
manipulate data. Exit security also restricts use of the same menu options.
Exclusive application security
Overrides row security that is set for an application. When you set exclusive application security for a user, the system
overrides row security for every table that is accessed by the application that is specified. All other security still applies.
External calls security
Secures users from accessing standalone executables that exist external to JD Edwards EnterpriseOne. These external
executables, which might include design tools, system monitors, and debugging tools, are specific to JD Edwards
EnterpriseOne.
Solution Explorer security
Secures users from performing and viewing certain features within Solution Explorer, such as Menu Filtering and Fast
Path.
Miscellaneous security
Provides additional security options to prevent users from running reports that update EnterpriseOne database tables.
You can also use Miscellaneous security to configure different levels of access to workflows.
Data Browser security
Controls access to the Data Browser application.
Push button, image, and link security
Controls whether users can user or view push button, link, and image controls.
Media object security
261
JD Edwards EnterpriseOne Tools Chapter 24
Security Administration Guide Understanding Authorization Security
Controls whether users can add, change, delete, or view media objects within interactive applications, forms, or
application versions.
Text Block and Chart Control security
Controls whether users can use or only view text block and chart controls.
Application query security
Prevents users from performing searches if they have not entered search criteria in the form filter fields or QBE fields.
Published business service security
Controls access to published business services. For published business services, EnterpriseOne uses a "secure by
default" security model which means that users cannot access a published business service unless a security record
exists that authorizes access. For all other objects in JD Edwards EnterpriseOne, access is granted unless otherwise
secured or restricted.
User defined object security
EnterpriseOne enables you to set up security for objects created by end users, otherwise referred to as user defined
objects (UDO). For instructions on how to set up UDO security, see Managing Security for User Defined Objects.
With UDC sharing, EnterpriseOne provides the ability to control or regulate how organizational data among different
business units is shared.
Transaction security enables you to determine the transaction records a user can view. Transaction security ensures
that users can only access and modify transaction data for the business unit to which they are associated.
You should set up business unit security when users are allowed to access data only for their business unit.
See Setting Up Business Unit Security in this guide for more information on business unit security.
• The resources or objects that you include in your notification, such as Watchlists or orchestrations, and the
resources that they, in turn, invoke.
• The user ID under which the notification runs.
See Managing Notifications and UDO Security in the JD Edwards EnterpriseOne Tools Notifications Guide for more
information.
262
JD Edwards EnterpriseOne Tools Chapter 24
Security Administration Guide Understanding Authorization Security
http://server_name:port/manage
2. Select the HTML Server instance for which you want to clear the cache from the Instance drop-down list box.
3. Select JDBj database caches from the Runtime Metrics section in the left pane.
4. Select the check boxes for the caches to be cleared.
5. Click Clear Cache.
263
JD Edwards EnterpriseOne Tools Chapter 24
Security Administration Guide Understanding Authorization Security
264
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
Note: The Security Workbench is available on both the JD Edwards EnterpriseOne web client and EnterpriseOne
Windows client.
When applying object level security, you need to consider how EnterpriseOne checks for security. When a user signs in,
the system first checks the user ID for security. If no object security is assigned to the user ID, then it checks the role (if
the user is part of a specific role), and then finally it checks *PUBLIC.
You can also use the Security Workbench to apply security to user defined objects (UDOs), which is described in
Managing Security for User Defined Objects.
In addition to the tools for setting up object security described in this chapter, the Security Workbench provides reports
that you can run to perform an audit of Security Workbench security records. See Running Security Workbench Records
Reports in this guide for more information.
Role-Based Authorization
Administrators prefer to set up security that can be easily managed and maintained. The easiest way to manage object
level security in EnterpriseOne is by applying security to roles. Role-based authorization prevents you from having to
set up a large number of security records for each individual user. Instead of having to revise multiple security records
when a user moves to another position or responsibility, you only have to assign that user to a different role that already
contains the required security for that position.
265
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
You use the Row Security application in the Security Workbench application (P00950) to define database values to be
excluded or included depending on your JD Edwards EnterpriseOne security configuration. You can set up row security
for a user, role, and *PUBLIC. Exclusive row security and inclusive row security are mutually exclusive; you cannot use a
combination of the two.
To illustrate exclusive and inclusive row security, assume that user MG5700778 should be able to view records in the
Address Book table (F0101) that have a business unit value from 1 through 20 and from 51 through 70. In addition, this
user should be able to update records in the Address Book table that have a business unit value from 1 through 20. This
user cannot insert or delete any records in the Address Book table. The following examples show the records you must
define and the SQL statements that the system performs for both exclusive and inclusive row security.
User Table Data item From Thru Value Add Change Delete View Alias
Value
266
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
This example shows the Select operation that the system performs against the F0101 table:
SELECT * FROM TESTDTA.F0101 WHERE ( ABMCU NOT BETWEEN ' 21' AND ' 50'
AND ABMCU NOT BETWEEN ' 71' AND ' ZZZZZZZZ' ) ORDER BY ABAN8 ASC
This example shows the Update operation that the system performs against the F0101 table:
User Table Data Item From Thru Add Change Delete View Alias
Value Value
This example shows the Select operation that the system performs against the F0101 table:
SELECT * FROM TESTDTA.F0101 WHERE ( ( ABMCU BETWEEN ' 1' AND ' 20' OR
ABMCU BETWEEN ' 51' AND ' 70' ) ) ORDER BY ABAN8 ASC
This example shows the Update operation that the system performs against the F01010 table:
Note: Row Security is applied for range of values that have Y in the Add/Change/Delete/View action
267
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
As illustrated in the examples, when you define data access security using exclusive row security, you identify a range
of values that are to be secured from the user. When you define data access security using inclusive row security,
you identify a range of values that the user can access. Depending on your security setup, inclusive row security can
increase performance over exclusive row security. The reason for the performance increase is due to the select and
update statements that the middleware generates. Performance can be improved if the use of inclusive row security
results in a small range of valid values in the row security application rather than specifying a large range of secured
values in the row security application to use exclusive row security.
Security overrides enable you to create object security more efficiently, with fewer security records to manage. For
example, you might have a scenario that requires securing four out of five versions of an application from a group of
users. Instead of creating four security records to prevent users from accessing each of the four versions, you can create
two security records to achieve the same result. First, you would create a security override for the application version
that you want users to access. This security override would specify that this version is not secured. These are the high
level steps to create security overrides in Security Workbench:
1. Create a security record for the version, making sure that the security options are cleared.
2. Create a security record that secures users from accessing the application, including all versions of the
application. In Security Workbench, you would select the application and then select the Run security option,
which secures users from running the application.
268
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
As a result, when users try to access the application version, the security override for the version operates as an
exception to the second application security record, allowing users access to the version of the application. All other
versions of the application are secured.
You can create security overrides for these JD Edwards EnterpriseOne objects:
• Applications
• Actions
• Processing options
• Tabs
• Hyper exits
• External calls
• Push buttons, links, and images
• Media objects
Creating security overrides simplifies the process of applying security to various EnterpriseOne items. The following
table provides some scenarios in which you could use security overrides to set up your security:
Scenario Method
Secure users from using all but one push To set up:
button on a form in an application. This
security shall apply to all versions of the 1. Create a security override for the push button.
application as well.
2. Create a security record to prevent users from using all push buttons on the form.
Before you can create a security override for an EnterpriseOne object, you must first understand how a standard
security record for the object is created in Security Workbench. See the appropriate sections in this chapter for
instructions on how to apply security to EnterpriseOne objects such as applications, processing options, tabs, and
media objects.
269
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
270
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
You can secure users from running or installing (or both) a particular application, version, or form within an application.
You cannot define application security at the subform level. As an alternative, you could define column security at
the form level (power form level) and every instance of the data dictionary item (either on the power form header or
subform grid) follows the defined security.
This section also explains how to add a *ALL object and change all of the applications for a particular user or role from
unsecured to secured.
For additional information, refer to the white paper "JD Edwards EnterpriseOne HCM Applications Data Security" on the
Oracle Learning Library site.
https://apexapps.oracle.com/pls/apex/f?p=44785:24:0::::P24_CONTENT_ID,P24_PREV_PAGE:27041,1
In Security Workbench, the only application security option that applies to mobile applications is the "Run" security
option.
Before you set up security for mobile applications, you must define which version of the mobile application mobile users
will use. Then you apply application security to the mobile application version.
See "Setting Up the System to Use Mobile Applications" section in the JD Edwards EnterpriseOne Applications Mobile
Enterprise Applications Implemenation Guide for a complete list of implementation tasks required to set up mobile
enterprise applications.
1. On Work With User/Role Security, select the Form menu, Set Up Security, Application.
2. On the Application Security form, enter the user or role ID in the User / Role field.
Enter a complete user or role, which includes *PUBLIC but not wildcards.
271
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
3. In the Display UnSecured Items region, complete the appropriate fields to determine which items have already
been secured for the user or role, and then click Find:
◦ Application
Enter an application name, such as P01012. You can also enter *ALL to display all applications.
◦ Version
Enter a version name, such as ZJDEC0001, if you want to check only a specific version of an application.
You can also use an asterisk to display all versions.
◦ Form Name
Enter a form name, such as W01012A. You can also enter an asterisk to display all forms.
4. Expand the Secured node to view the security settings for the user or role in the detail area.
Note: You cannot secure the Data Browser application using the Application Security form. Security Workbench
provides a separate option for securing this application. See Managing Data Browser Security.
1. On Work With User/Role Security, select the Form menu, Set Up Security, Application.
2. On the Application Security form, enter the user or role ID in the User / Role field.
Enter a complete user or role, which includes *PUBLIC but not wildcards.
3. In the Display UnSecured Items region, complete the appropriate fields, and then click Find.
◦ Application
◦ Version
Enter a particular version of the application that you entered in the Application field. If you leave this field
blank, the system displays all versions associated with the application in the UnSecured node.
◦ Product Code
Enter a product code to display all applications, versions, and forms associated with a particular product
code. This field does not work in conjunction with the Application or Version fields.
After you expand the node, the individual items also appear in the grid.
272
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
5. In the Create with region, select one or both of these security options:
◦ Run Security
Select this option to prevent the just-in-time installation (JITI) of anything necessary to run the
application.
6. Complete one of these steps:
◦ Drag applications, versions, or forms from the UnSecured node to the Secured node.
◦ From the Row menu, select All Objects to move all applications to the Secured node.
◦ From the Row menu, select Secure to All to move all objects that are under the UnSecured node to the
Secured node.
If you secured an individual form, only the form appears under the Secured node. If you secured an
application or version, the application or version and the forms associated with each appear under the
Secured node.
7. To change the security on an item, select the item under the Secured node, select the appropriate security
option, and then, from the Row menu, select Revise Security.
In the grid, the values under the Run and Install fields change accordingly.
1. On Work With User/Role Security, select the Form menu, Set Up Security, Application.
2. On the Application Security form, enter the user or role ID in the User / Role field.
Enter a complete user or role, which includes *PUBLIC but not wildcards.
3. In the Display UnSecured Items area, enter *ALL in the Application field to select all JD Edwards EnterpriseOne
objects, and then click Find.
4. Expand the UnSecured node and then click *ALL in the detail area.
5. In the Create with region, select one or both of these options:
◦ Run Security
273
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
You can define action security at the application, version, and form level. You cannot define action security at the
subform level. As an alternative, you could define column security at the form level (power form level) and every
instance of the data dictionary item (either on the power form header or subform grid) follows the defined security.
Oracle recommends that after you add action security to an application, you should test the application to make sure
that the security works as desired. For example, adding action security to an Add or OK button in some applications that
have editable grids does not prevent users from adding new records or modifying existing ones. For these applications,
you would have to add additional security to the application as well.
Note:
• Managing Push Button, Link, and Image Security.
• Managing Hyper Exit Security.
274
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
2. On the Action Security form, enter the user or role ID in the User / Role field and click Find.
Current action security settings for the user or role appear under the Secured node in the tree.
3. To see if an action security is applied to a particular application, version, or form, complete a combination of
these fields in the Display Secured Item region, and then click Find:
◦ Application
Enter a version of the application entered in the Application field to see if action security is applied to the
version.
◦ Form Name
Current action security settings for the user or role appear under the Secured node in the tree.
3. To find the applications, versions, or forms to which you want to apply action security, complete any of these
fields under the Display UnSecured Items heading, and then click Find:
◦ Application
Enter an application name, such as P01012. Enter *ALL to display all applications.
◦ Version
Enter a version of the application you entered in the Application field. If you leave this field blank, all
versions associated with the application will appear in the UnSecured node.
◦ Product Code
4. Expand the Unsecured node to view individual applications, versions, and forms in the detail area.
5. In the Create with region, select any of these options:
◦ Change
◦ Add
◦ Delete
◦ OK/Select
◦ Copy
275
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
◦ Scroll To End
When you select the OK/Select function, both the Select and OK buttons will be disabled on forms
regardless of the setting for any of the other functions. The reason that separate options exist for OK/
Select and the other functions is to allow a user to select records from a Find/Browse or Inquiry form but
not be able to perform those actions that you secured. For example, a valid setup would be to set OK/
Select to Y and set Change to N. The user will be able to select records but not change them. However, if
you set OK/Select to N and Change to Y, the OK and Select buttons will be disabled even if the form is in
update mode.
6. To secure the actions on an application, version, or form, perform one of these steps:
◦ Drag the application, version, or form from the UnSecured node to the Secured node.
◦ From the Row menu, select All Objects to move all items to the Secured node.
◦ From the Row menu, select Secure to All to move all objects under the UnSecured node to the Secured
node.
For example, to set delete security on an application, select the Delete option. Next, drag the application
from the UnSecured node to the Secured node. The detail area will reflect the delete security that you
set for this application, which means that the user you entered cannot perform the delete action on this
application.
The applications or forms now appear under the Secured node and they have the appropriate action
security.
7. To change the security on an item, select the item under the Secured node, select the appropriate security
option, and then, from the Row menu, select Revise Security.
In the grid, the values for the security options change accordingly.
◦ Under the Secured node, select an application, version, or form and click Delete.
◦ Under the Secured node, drag an application, version, or form from the Secured node to the UnSecured
node.
◦ Select Remove All from the Row menu to move all applications and forms from the Secured node to the
UnSecured node.
276
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
• Prerequisite
• Setting Up Data Dictionary Spec Files
• Adding Row Security
• Removing Row Security
Before you set up row security for an item in a table, you should verify that the item is actually in that table. For example,
the F0101 table contains the data item AN8. Therefore, you can set up row security for that item. However, the same
table does not contain data item PORTNUM. Setting row security on this item for the F0101 table has no effect.
You set up row security on a table, not on a business view. You should verify that the object that you want to secure uses
a business view over a table containing the object. For example, the Work With Environments application (P0094) uses
business view V00941 over the F00941 table. You could secure the data item RLS (Release) because it is in the F00941
table. On the other hand, the same item is not in the F0094 table. If you attempt to secure the item on the F0094 table,
data item RLS is not secured.
Note: You can find the tables, applications, forms, business views, and so on that use a data item by launching the
Cross Reference application (P980011) after you build cross-reference tables (F980011and F980021).
Prerequisite
Before you can set up row security, you must activate row security in Data Dictionary Design.
See "Creating a Data Dictionary Item" in the JD Edwards EnterpriseOne Tools Data Dictionary Guide .
277
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
• ddtext.xdb
• ddtext.ddb
• glbltbl.xdb
• glbbltbl.ddb
If you do not use data dictionary replication (prior to release 9.2.2 only), you must delete these spec files for each path
code directory on your machine and every workstation, including the enterprise server, where this security needs to be
activated. These spec files are automatically rebuilt as data dictionary items are referenced the next time the user signs
in to EnterpriseOne when just-in-time installation (JITI) is enabled for the environment.
Note: If your system is prior to JD Edwards EnterpriseOne Applications Release 8.11, and you are using terminal
servers in an environment that does not use JITI, you must rebuild the data dictionary and global table spec files using
R92TAM and R98CRTGL to get the changed data dictionary information to the terminal servers
2. Select the data item that you want to secure, and click Select.
The Data Item Specifications form appears.
3. On the Item Specifications tab, select the Row Security option and click OK.
This option must be selected for row security to work.
4. Click OK.
5. Exit the data dictionary application.
6. In Solution Explorer, enter P00950 in the Fast Path and press Enter.
7. On the Work With User/Role Security form, select the Form menu, Set Up Security, Row.
8. On the Row Security form, complete the User / Role field and then click Find to display current row security.
9. Complete these fields, either in the first open detail area row (to add security) or in a pre-existing detail area
row (to change security):
◦ Table
You can enter *ALL in this field.
◦ Data Item
This field is required.
◦ From Value
This field is required.
◦ Thru Value
◦ Add
◦ Change
278
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
◦ Delete
◦ View
10. Click OK to save the security information.
Note: If you accessed the Row Security form from the Work With User/Role Security form for a specific
record, the user or role associated with the security record appears in the User / Role field by default.
4. Select the security record or records in the detail area, and then click Delete.
5. On Confirm Delete, click OK.
6. Click OK when you finish deleting row security.
If you do not click OK after you delete the row security records, the system does not save the deletion.
Note: You can find the tables, applications, forms, business views, and so on, that use a data item by launching the
Cross Reference application (P980011) after you build the cross-reference tables (F980011and F980021).
You can set up column security on a table, an application, an application version, or a form. Even if an application uses
a business view that does not contain the data item that you want to secure, you can still secure it, as long as the item
appears on a form in the application.
279
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
field, that field does not appear on the object. Add and Change options depend on the View option being set to Y for the
field. The Add and Change options are independent of each other.
You can set the View and Add options to Y and the Change option to N. With security defined in this manner, the field
appears on the object and is enabled when the user enters the object in add mode. If the user enters the object in
update mode, the field appears but is disabled.
You can set the View and Change options to Y and the Add option to N. With security defined in this manner, the field
appears on the object and is enabled when the user enters the object in update mode. If the user enters the object in
add mode, the field appears but is disabled.
You can set all three options to Y. With security defined in this manner, the field appears on the object and is enabled in
both add and update mode.
• Verify that the object that you want to secure is in the table.
• Verify that the object that you want to secure is part of an application that uses a business view over a table
containing the object.
• Verify that the object that you want to secure uses a business view that includes the column containing the
object.
For example, if you want to apply column security to data item RLS (Release Number) in the F00941 table, RLS must
be an item in that table, and it must also be part of an application using a business view over that table. Finally, the
business view over the F00941 table must include a column containing the data item RLS.
If all of these conditions are met, you can successfully apply column security to the data item. Setting column security
on a table also means that you set security on the data item for any other applications that use the F00941 table.
• Verify that the object that you want to secure is in the application.
• Verify that you are securing the correct data item in an application (data item descriptions can be similar, if not
identical).
For example, if you want to apply column security to data item UGRP (UserRole) in the Object Configuration Manager
application (P986110), you first verify that the item is in the application. Because it is in the application, you can apply
security to the data item. However, note that data items UGRP, MUSE, USER, and USR0 all contain the identical data
description of User ID. Verify the item by its alias, not by its data description.
• Verify that the object that you want to secure is in the version of the application.
• Verify that you secure the correct data item in an application (data item descriptions can be very similar, if not
identical). Verify the item by its alias, not by its data description.
280
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
◦ Table
◦ Application
◦ Version
If you want to add column security to a particular version, enter a version of the application that you
entered in the Application field.
◦ Form Name
You can enter *ALL in any of these fields; however, after *ALL is entered for a table, application, or form
for a specific data item, you cannot enter *ALL again for that data item.
4. Complete these fields:
◦ Data Item
◦ View
If the value for View is N, the data item will not appear on any of the objects identified in Step 3, making
Add and Change functions obsolete.
◦ Add
◦ Change
5. To change security, change the row values in the detail area.
6. Click OK to save the security information.
281
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
Note: If you accessed the Column Security form from the Work With User/Role Security for a specific record,
the user or role associated with the security record appears in the User/Role field by default.
3. Highlight the security record or records in the detail area and click Delete, and then click OK on Confirm Delete.
4. Click OK when you finish deleting column security.
If you do not click OK after you delete the security records, the system does not save the deletion.
For example, to set prompt-for-values security, which also automatically sets change security, select the Prompt for
Values option. Next, drag one application at a time from the UnSecured node to the Secured node. The detail area
reflects the prompt-for-values and change security that you set for these applications. This procedure means that the
user you entered cannot modify processing options on any applications that you placed in the Secured node.
This task also explains how to add a *ALL object and how to move all of the applications for a particular user or role
from unsecured to secured.
Implementation Considerations
Data selection security only applies to web clients. You can set up data selection security by running the Security
Workbench application on the Windows client. However, the security is only enforced for end users submitting
282
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
batch applications from the web client. It is not enforced for other means of launching reports, such as RUNUBE and
RUNUBEXML commands or the scheduler.
The Data Selection row exit on the Work with Batch Versions form allows a user to modify the data selection for a
version or report. Oracle recommends that the EnterpriseOne security administrator secures the Data Selection row exit
using existing hyper exit security in addition to setting up proper data selection security.
For example, data selection security is set up for a user on a batch application version so that the user cannot modify
existing rows but can add new rows. However, the user can access the Data Selection row exit and use this row exit to
add rows to the existing data selection. When the user clicks OK, the data selection specification is saved to the version.
When the user takes the Data Selection row exit again, all rows become existing rows that are secured out. As a result,
he cannot modify rows that he just added.
You should also consider using action security to secure the ability to add and copy versions of a batch application.
Or you can set data selection security at the batch application level rather than version level. In this case, a new user-
created version that was created through add or copy will still have the same data selection security.
Prompt for Data Selection This setting prevents a user from viewing the data selection screen when submitting a report or
version. The data selection criteria defined in the version are used for submission.
Full Access for Data Selection This setting prevents a user from having a full set of the editing capabilities on the data selection
screen. Specifically, it prevents a user from deleting any existing data selection criteria. When this
setting is checked, two additional settings "Modify for Data Selection" and "Add for Data Selection" are
enabled. All three settings can be used in combination.
Modify for Data Selection This setting prevents a user from editing or deleting existing data selection criteria defined for a report
or version. It also prevents a user from adding new data selection criteria with an OR operator, in effect
either expanding or changing existing criteria. This setting is made available only when the user is not
granted with Full Access for Data Selection.
Add for Data Selection This setting prevents a user from adding new data selection criteria. This setting is made available
only when the user is not granted with Full Access for Data Selection. This setting can be used in
combination with the Modify for Data Selection setting.
All of the security settings can be set at the specific user, role, or *PUBLIC level for any report version or report.
Security Hierarchy
When multiple security records exist, the system applies security by following the existing security hierarchy:
1. Version level security for user.
2. Batch application level security for user.
3. *ALL level security for user.
4. Version level security for group.
5. Batch application level security for group.
6. *ALL level security for group.
7. Version level security for *PUBLIC.
283
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
Note: The JAS Server (EnterpriseOne HTML Server) resolves the security entries for the group based on the role
sequence number, and only returns one record for all groups at runtime.
No access to data selection form. User X Grayed out Grayed out Grayed out and
receives error when he tries to access and checked and checked checked by
data selection. by default by default default
User can modify existing rows and add N/A X N/A N/A
new rows with the 'AND' operator. User
cannot delete existing rows.
284
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
◦ Application
Enter a batch application name, such as R0006P. Enter *ALL to display all applications.
◦ Version
Enter a version of the application that you entered in the Application field.
Current security settings for that user or role appear under the Secured node in the tree. Expand the
node to view the individual secured applications. After you expand the node, the applications that are
secured also appear in the detail area.
1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Proc Opt Data Sel.
2. On the Processing Option and Data Selection Security form, enter the user or role ID in the User / Role field and
then click Find.
Enter a complete user or role, which includes *PUBLIC but not wildcards.
3. In the Display UnSecured Items region, complete the appropriate fields and then click Find:
◦ Application
Enter an application name, such as R0006P. Enter *ALL to display all applications.
◦ Version
You can enter a particular version of the application that you entered in the Application field. If you leave
this field blank, all versions associated with the application will appear in the UnSecured node.
◦ Product Code
◦ UBEs Only
You must perform this step before you can add new security. This step provides a list of applications from
which you can apply processing option or data selection security.
The search results appear under the UnSecured node. Expand the node to view applications (interactive
and batch) and menus with interactive or batch applications. After you expand the node, the applications
appear in the detail area.
For example, to set security on applications within the 00 product code, you enter 00 in the Product
Code field and click Find. All of the applications (interactive and batch) attached to product code 00
appear after you expand the UnSecured node.
285
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
4. In the Create with region, select one or more of these options and drag applications from the UnSecured node
to the Secured node:
◦ Change
◦ Prompt for Values
When you select this option, you automatically activate the Change option.
◦ Prompt for Versions
◦ Prompt for Data Selection
◦ Full Access Data Selection
When you select this option, you automatically activate the following two options:
◦ Modify Data Selection
◦ Add Data Selection
The applications now appear under the Secured node and have the appropriate security.
6. To change the security on an item, select the item under the Secured node, select the appropriate security
option, and then, from the Row menu, select Revise Security.
In the grid, the values for the security options change accordingly.
Enter a complete user or role, which includes *PUBLIC but not wildcards.
3. Click Find.
Current security settings for that user or role appear under the Secured node in the tree. Expand the node to
view the individual secured applications. After you expand the node, the applications that are secured also
appear in the detail area.
4. Perform one of these steps:
◦ Under the Secured node, select an application or application version and click Delete.
◦ Under the Secured node, drag an application or application version from the Secured node to the
UnSecured node.
◦ On the Row menu, select Remove All to move all items from the Secured node to the UnSecured node.
286
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
The R009505 runs over the F00950 table with data selection on records of Security Type 5 (Processing Option and Data
Selection Security). These records must have a value in the Object Name field that is a batch application or *ALL (since
Security Type 5 can be set up for interactive application objects as well, those will be ignored by this batch application.)
The batch application can be run in Proof or Final Mode where Final Mode will update the F00950 table records
according to the values in the processing options. The F00950 table will be updated as follows given the processing
option values:
PO Y or N Actual Record
287
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
PO Y or N Actual Record
Note: If you secure a user from an application, you cannot also secure the user from certain tabs on a form in that
application. This restriction prevents redundant double security. Similarly, if you secure a user from a tab, you cannot
secure the user from the application that contains the tab.
You can define Tab security at the application, version, and form level. You cannot define Tab security at the subform
level. As an alternative, you could define column security at the form level (power form level) and every instance of the
data dictionary item (either on the power form header or subform grid) follows the defined security.
Note: Portlets are handled by the system as if they are subforms; therefore, portlets have the same Tab security
limitation.
288
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
◦ User / Role
Enter a complete user or role, which includes *PUBLIC but not wildcards.
◦ Application
You can view security for a specific application or enter *ALL to display all applications.
Current security settings for the user or role appear under the Secured node in the tree. Expand the
nodes to view the secured tabs. After you expand the node, the secured tabs also appear in the grid.
3. Complete only one of these fields in the Display UnSecured Items region and click Find:
◦ Application
In the detail area, this special object appears as *ALL and displays the security that you defined for the
object, such as Run Security or Install Security. The *ALL object acts as any other object, and you can use
the Revise Security and Remove All options from the Row menu.
◦ Product Code
You must perform this step before you can add new security. This step provides a list of applications from
which to select.
The search (application or product code) appears under the UnSecured node. Expand the node to view
applications (interactive and batch) and the associated tabs. After you expand the node, the applications
or tabs also appear in the detail area.
For example, to set security for tabs in applications within the 00 product code, you enter 00 in the
Product Code field and click Find. All of the applications (interactive and batch) attached to product code
00 appear after you expand the UnSecured node.
4. In the Create with region, select one or more of these options:
◦ Change
Select this option to prohibit a user or role from changing information on the tab page.
◦ View
Select this option to hide the tab from the user or the role.
5. Drag tabs from the UnSecured node to the Secured node.
In the grid, the values for the security options change accordingly.
289
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
290
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
3. In the Display Unsecured Items region, complete only one of these fields to locate the applications to which you
want to apply exit security, and click Find:
◦ Application
If you enter *ALL in this field and select the Run Security option, all action buttons (except Close and
Cancel on the web client only) including every exit under the Form, Row, and Tools options are disabled.
To avoid disabled action buttons, apply Hyper Exit security at the individual application level.
◦ Product Code
You can search for all of the applications within a product code. For example, to set security on hyper-
buttons in applications within the 00 product code, you enter 00 in the Product Code field and click Find.
All of the applications (interactive and batch) attached to product code 00 appear after you expand the
UnSecured node.
The search (application, product code, or menu) appears under the UnSecured node. Expand the node to
view applications (interactive and batch) and hyper-button exits. After you expand the node, the hyper-
button exits also appear in the detail area.
4. Expand the UnSecured node to view and select applications (interactive and batch) and hyper-button exits.
After you expand the node, the hyper-button exits also appear in the detail area.
5. In the Create with region, select the Run Security option.
When you select this option, the grid shows an N in the Run column for each object.
6. Click Find.
7. Drag exits one at a time from the UnSecured node to the Secured node.
The exits that you dragged now appear under the Secured node. The grid reflects the security that you set for
these exits. This security prevents the user that you entered from using the exit.
Note: Hyper Exit security with Run=N for *ALL objects is ignored on the web client for Tools Release 8.97 and earlier
releases.
1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Hyper Exit.
2. Complete these fields and click Find:
◦ User / Role
Enter a complete user or role ID, which includes *PUBLIC but not wildcards.
◦ Application
View security for a specific application. Enter *ALL to display all applications.
Current security settings for the user or role appear under the Secured node in the tree. Expand the node
to view the individual secured applications, such as interactive and batch. After you expand the node, the
secured hyper-button exits also appear in the detail area.
291
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
292
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
Note: If you accessed the Exclusive Application Security form from a specific record in the Work With User/
Role Security form, the user or role associated with the security record appears in the User/Role field by
default.
◦ User / Role
Enter a complete user or group ID, which includes *PUBLIC but not wildcards.
◦ Executable
Enter the name of the external application, such as debugger.exe. When you enter information into this
field, the software searches only for the indicated application.
Current security settings for that user or group appear under the Secured node in the tree. Expand the
node to view the individual secured applications, such as debugger.exe.
3. In the Create with region, select the Run Security option.
4. Complete one of these steps:
293
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
◦ To move all applications to the Secured node, select All Objects from the Row menu.
The external call applications now appear under the Secured node and have the appropriate security.
For example, to set run security on the Business Function Design application, select the Run Security
option and then drag the Business Function Design node from the UnSecured node to the Secured node.
The detail area reflects the run security that you set for this application, which means that the user you
entered could not run the Business Function Design application.
5. To change the security on an item, select the item under the Secured node, select the Run Security option, and
then, from the Row menu, select Revise Security.
In the grid, the value in the Run field changes accordingly.
294
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
EnterpriseOne prevents the report from making table input/output (I/O) calls to databases that can affect business
data. Users assigned to this profile can create and run read-only reports, but are restricted from creating or running
existing UR reports. NUR users can copy existing UR reports and run the copied report, although the software disables
the report's ability to change business data and displays a warning that the copied report cannot be updated. NUR users
can edit NUR reports in Report Design Aid, but are prevented from even opening existing UR reports in RDA.
1. On the Work With User/Role Security form, select the Form menu, Set Up Security, Misc Security.
2. On the Miscellaneous Security form, complete the User / Role field and click Find.
Enter a complete user or role, which includes *PUBLIC but not wildcards.
3. To change Read-Only Report security, select one of these options:
◦ Read / Write
◦ Read Only
4. To change Workflow Status Monitoring security, select one of these options:
◦ Secured
Allows users to view workflow but prevents them from making changes.
◦ Full
Note: Push button, link, and image security is enforced only for interactive applications in the JD Edwards
EnterpriseOne HTML client and the Portal. It is not supported on the Microsoft Windows client.
295
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
Note: In EnterpriseOne forms, static text and text boxes can be made into links. However, you can only apply security
to static text links, not to text box links.
Security Workbench displays the objects that you want to secure in a hierarchical tree structure that contains nodes for
each application, application version, and form. Security Workbench only displays the forms that contain push button,
link, and image controls. You can secure an individual control by dragging the control from the UnSecured node to the
Secured node. In addition, you can secure all controls—push buttons, links, or images—on a form by dragging the form
node to the Secured node. You can perform the same action on applications and application versions. For example, to
secure all the links within an entire application, you drag the application from the UnSecured node to the Secured node
to secure all the links in every form within the application as well as within any versions of the application. If you drag an
application version node to the Secured node, only the links in that application version are secured.
Note: For security purposes JD Edwards EnterpriseOne does not allow cross site scripting to be executed.
However, if you apply security to a reusable subform under a power form, and that subform is reused in the same power
form, the security is applied to both subforms, as shown in this diagram:
296
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
Because security functions differently on embedded subforms than it does on reusable subforms, Security Workbench
provides a way for you to distinguish between the two forms. To make this distinction, the tree structure in Security
Workbench displays the embedded subform using its form ID, and it displays the reusable subform using its form title.
◦Version
You can enter a particular version of the application that you entered in the Application field. If you leave
this field blank, Security Workbench displays all unsecured versions associated with the application in the
UnSecured node.
◦ Product Code
Enter a product code to display all applications, versions, and forms associated with a particular product
code. This field does not work in conjunction with the Application and Version fields.
The search results appear under the UnSecured node.
4. Expand the UnSecured node to view the individual applications or versions, and the forms associated with
each.
Only the forms that contain controls are displayed.
297
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
5. Under the Create with region, select the type of security that you want to apply:
◦ View
This option prevents the user from using and viewing the control.
◦ Enable
This option prevents the user from using the control. However, the control is still visible.
6. Use one of these actions to secure the items:
The system displays the items under the Secured node that have the appropriate security. You can view
the security for each item in the grid.
1. On the Work with User/Role Security form, select the Form menu, Set Up Security, and then either the Push
Button, Link, or Image menu.
2. Enter a user or role ID from which you want to remove the security in the User / Role field.
Enter a complete user or role, which includes *PUBLIC but not wildcards.
3. Click Find.
Current security settings for that user or role appear under the Secured node in the tree. Expand the node to
view the individual secured applications. After you expand the node, the applications that are secured also
appear in the detail area.
4. Perform one of these steps:
◦ Under the Secured node, select an application or application version and click Delete.
◦ Under the Secured node, drag an application or application version from the Secured node to the
UnSecured node.
◦ On the Row menu, select Remove All to move all items from the Secured node to the UnSecured node.
298
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
In JD Edwards EnterpriseOne, a text block or chart control can have separate segments that contain links to other
objects. You cannot secure these individual segments of a control. When you secure a text block or chart control,
security is applied to the entire control.
Note: "Understanding Text Block Controls" in the JD Edwards EnterpriseOne Tools Form Design Aid Guide .
1. On the Work With User/Role Security form, select the Form menu, Set Up Security and then select the Text
Block Control or Chart Control menu.
2. Enter the user or role ID in the User / Role field and click Find.
The system displays the control security settings for the user or role under the Secured node in the tree.
3. To see if control security is applied to a particular application, version, or form, complete a combination of these
fields in the Display UnSecured Items region, and then click Find:
◦ Application
Enter a version of the application entered in the Application field to see if control security is applied to the
version.
◦ Form Name
1. On Work With User/Role Security, select the Form menu, Set Up Security, and then select the Text Block
Control or Chart Control menu, depending on the type of control that you want to secure.
299
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
◦Version
You can enter a particular version of the application that you entered in the Application field. If you leave
this field blank, Security Workbench displays all unsecured versions associated with the application in the
UnSecured node.
◦ Product Code
Enter a product code to display all applications, versions, and forms associated with a particular product
code. This field does not work in conjunction with the Application and Version fields.
The search results appear under the UnSecured node.
4. Expand the UnSecured node to view the individual applications or versions, and the forms associated with
each.
Only the forms that contain controls are displayed.
5. Under the Create with region, select the type of security that you want to apply:
◦ View
This option prevents the user from using and viewing the control.
◦ Enable
This option prevents the user from using the control. However, the control is still visible.
6. Use one of these actions to secure the items:
◦ Drag the text block or chart control from the UnSecured node to the Secured node.
◦ Select the control that you want to secure and then select Secure Selected from the Row menu.
◦ From the Row menu, select All Objects to move all applications to the Secured node.
The system displays the items under the Secured node that have the appropriate security. You can view
the security for each item in the grid.
300
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
Current security settings for that user or role appear under the Secured node in the tree. Expand the node to
view the individual secured applications. After you expand the node, the applications that are secured also
appear in the detail area.
4. Perform one of these steps:
◦ Under the Secured node, select an application or application version and click Delete.
◦ Under the Secured node, drag an application or application version from the Secured node to the
UnSecured node.
◦ On the Row menu, select Remove All to move all items from the Secured node to the UnSecured node.
As of Tools Release 9.2.6, JD Edwards EnterpriseOne enables you to secure users from adding, changing, deleting, or
viewing media objects through AIS REST APIs or Orchestrations based on the media object structure being accessed in
the APIs.
If you apply view security to media object attachments, Security Workbench automatically prevents the user from
adding, deleting, or changing media objects. If you apply change security to media object attachments, Security
Workbench automatically prevents the user from deleting the media object.
Media object security enables you to use media object attachments as a mechanism for recording justifications for
transactions and for legal purposes. For example, your company may have a business process that requires clerks to use
media object attachments to document the reason or justification for adjusting a price on an item in a transaction. In
this case, you would allow the clerks to add and view media object attachments in an application, but secure them from
deleting or modifying them. In addition, this type of security prevents users from modifying or deleting attachments
that others have added. As a result, the media object attachments provide secured information about previous
transactions. This information can be reviewed by interested parties for legal or other purposes.
Note: Media object security is enforced only in interactive applications on the JD Edwards EnterpriseOne web client
and the Portal. It is not supported on the Microsoft Windows client. Also, media object system functions enforce
media object security in the web client. When running applications that have media object security applied to them,
the system logs the security information for the system functions in the web client debug log file.
301
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
302
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
4. To find the applications, versions, or forms to which you want to apply media object security, complete any of
these fields in the Display UnSecured Items region, and then click Find:
◦ Application
Enter an application name, such as P01012. Enter *ALL to display all applications.
◦ Version
Enter a version of the application you entered in the Application field. If you leave this field blank, all
versions associated with the application will appear in the UnSecured node.
◦ Product Code
5. Expand the Unsecured node to view individual applications, versions, and forms in the detail area.
6. In the Create with region, select any of these options:
◦ Change
◦ Add
◦ Delete
◦ View
Note: If you apply view security to media object attachments, Security Workbench automatically
prevents the user from adding, deleting, or changing media objects. If you apply change security to
media object attachments, Security Workbench automatically prevents the user from deleting the
media object.
7. To secure the media objects on an application, application version, or form, perform one of these steps:
◦ Drag the application, version, or form from the UnSecured node to the Secured node.
◦ From the Row menu, select All Objects to move all items to the Secured node.
◦ From the Row menu, select Secure to All to move all objects beneath the UnSecured node to the Secured
node.
For example, to set delete security, select the Delete option. Next, drag the application from the
UnSecured node to the Secured node. The detail area will reflect the media object security that you set
for this application.
The applications or forms now appear under the Secured node, and they have the appropriate media
object security.
303
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
3. On the Media Object Security form, enter the user or role ID in the User / Role field and click Find.
You can enter *PUBLIC but not wildcards.
Current media object security settings for the user or role appear under the Secured node in the tree.
4. To find the services to which you want to apply media object security, complete any of these fields in the
Display Secured Items or Display UnSecured Items region, and then click Find:
◦ Services
Enter the service (GT Structure).
◦ Product Code
5. Expand the Unsecured node to view individual applications, versions, and forms in the detail area.
6. In the Create with region, select any of these options:
◦ Change
◦ Add
◦ Delete
◦ View
7. To secure the media objects on an application, application version, or form, perform one of these steps:
◦ Drag the application, version, or form from the UnSecured node to the Secured node.
◦ From the Row menu, select All Objects to move all items to the Secured node.
◦ From the Row menu, select Secure to All to move all objects beneath the UnSecured node to the Secured
node.
For example, to set delete security, select the Delete option. Next, drag the application from the
UnSecured node to the Secured node. The detail area will reflect the media object security that you set
for this application.
The services (GT Structures) now appear under the Secured node, and they have the appropriate media
object security.
304
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
◦ Under the Secured node, drag the item that is secured from the Secured node to the UnSecured node.
◦ On the Row menu, select Remove All to move all items from the Secured node to the UnSecured node.
1. On Work with User/Role Security, select the Form menu, Set Up Security, and then click App Query Security.
305
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
5. In the Form Name field, enter the form name to which you are adding query security, or click the Search button
and select a form from the Interactive Application Search and Select form.
For example, if you enter W01012B in the Form Name field, then the options you assign for the query security will
apply to the Work With Address Book (W01012B) form.
6. Select one of the following Field Entry Requirements:
◦ At Least One Form Filter or QBE Field
Select this option if users must enter search criteria into at least one filter field on the form or QBE
column.
◦ Configured Fields
Select this option to select one or more required form filter fields or QBE fields for the form.
7. Select one of the following Message Types:
◦ Error
Select this option if you want an error message to pop up when users try to execute a query that does not
satisfy the Field Entry Requirements specified previously.
◦ Warning
Select this option if you want a warning message to pop up when users try to execute a query that does
not satisfy the Field Entry Requirements specified previously.
8. Click OK.
306
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
Select this option to select one or more required form filter fields or QBE fields for the form.
6. Select one of the following Message Types:
◦ Error
Select this option if you want an error message to pop up when users try to execute a query that does not
satisfy the Field Entry Requirements specified previously.
◦ Warning
Select this option if you want a warning message to pop up when users try to execute a query that does
not satisfy the Field Entry Requirements specified previously.
7. Click OK.
The Work with Application Query Security form displays. Any query security instances that have already been
set up display in the grid.
4. From the grid, select the existing record, and then click Select.
The Setup Application Query Security form displays with all of the application and form name query security
information.
5. Select one of the following Message Types:
◦ Error
Select this option if you want an error message to pop up when users try to execute a query that does not
satisfy the Field Entry Requirements specified above.
◦ Warning
Select this option if you want a warning message to pop up when users try to execute a query that does
not satisfy the Field Entry Requirements specified previously.
6. Click OK.
307
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
308
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
The Work with Application Query Security form displays. Any query security instances that have already been
set up display in the grid.
4. From the grid, select the existing record, and then click Delete.
A dialog box displays that says, "Are you sure you want to delete the selected item?"
5. Click OK.
The Work with Application Query Security form displays. Any query security instances that have already been
set up display in the grid.
4. From the grid, select the existing record, and then click Select.
The Setup Application Query Security form displays with all of the application and form name query security
information.
5. Select one of the following options:
◦ Enable
Select this option if you want application query security to be turned on for the application you are
editing.
◦ Disable
Select this option if you want application query security to be turned off for the application you are
editing.
6. Click OK.
309
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
Excluding Users
Application Query Security is applied to all users (*PUBLIC), which encompasses all users. Some users may need to
perform an open ended fetch for a particular reason. Therefore, some users need to be excluded from the application
query security. The Exclude Users form enables you to exclude one or more users from the application security record.
The Work with User/Role Security form displays. Any query security instances that have already been set up
display in the grid.
3. From the Form menu, select Set Up Security, and then App Query Security.
The Work with Application Query Security form displays. Any query security instances that have already been
set up display in the grid.
4. From the grid, select the existing record, and then click the Row exit.
5. Click Exclude Users.
310
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
You can also use the Copy feature in Security Workbench to copy Data Browser security from one user or role to
another.
Note: "Viewing the Data in Tables and Business Views" in the JD Edwards EnterpriseOne Tools Foundation Guide .
311
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
3. In the Data Browser hierarchical security permissions region, select one or both of these options, depending on
the level of security that you want to grant:
This option gives users access to the Data Browser, which they can use to perform personal or public
queries.
◦ Allow access to Search and Select for Tables or Business View Queries.
This option gives users the ability to search and select the table or business view that they want to query.
Note: This option is enabled only after you select the first option.
4. Click OK.
Note: To activate Data Browser security changes, you must use Server Manger to refresh the jdbj security
cache.
To set up Data Browser security through the Work With User Defined Object View Security form:
1. Access P00950.
2. Select the Form menu, User Defined Object View.
3. On Work With User Defined Object View Security, click the Add button.
4. In an empty row in the grid, complete the following fields:
◦ User/Role. Enter a user or role for which you want to enable access to the Data Browser.
◦ Form Name. Click the search button to locate a form or table that you want a user or role to be able to
search over in the Data Browser. You can enter *ALL if you want to enable a user or role to search over all
forms and tables. You can also enter a product code or reporting code if you want to limit the search to
one of these items.
5. Click the OK button.
6. Set up additional records as necessary.
312
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
Note: This section discusses only the authorization of users to access published business services.
For published business services, JD Edwards EnterpriseOne uses a "secure by default" security model which means that
users cannot access a published business service unless a security record exists that authorizes access. For most other
objects in JD Edwards EnterpriseOne, access is granted unless otherwise secured or restricted.
You manage published business services security using Security Workbench (P00950), the application used to
manage all object security in JD Edwards EnterpriseOne. In P00950, you can add, copy, modify, or delete security
records for published business services. When a user tries to access or run a published business service, verification of
authorization is done through an API that queries records in the F00950 security table.
As with all object security in JD Edwards EnterpriseOne, you can assign published business service security to a user,
role, or *PUBLIC. You can create a security record that allows a user or role access to:
In addition, you can create a security record that disallows access to a published business service. Typically, there is
no need to add security records that disallow access because by default, access to published business services is not
allowed. However, creating a security record that disallows access can be an efficient method to set up published
313
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
business services security. For example, to allow a role access to all but a small subset of published business services,
you can:
• Enter *ALL in the fields for the published business service and published business service method to create a
security record that allows the role access to all published business services.
• Create security records for the same role that disallows access to a subset of published business services.
Inherited Security
When creating a published business service, a developer can configure it to pass its context to any published business
service that it calls. In this configuration, authorization for the called published business service is inherited; that is, if
the calling business service is authorized, then the called business service is authorized as well. In this scenario, the
system does not check the security for the called business service.
However, it is possible (though not supported) to configure a published business service so that it does not pass its
context to another business service. In this scenario, the security or authorization for the called published business
service is not inherited. Even if a user is authorized to access the calling or parent business service, the system also
checks if access to the called business service is allowed. As a result, if there is not a security record that allows access to
the called business service, the system will produce an exception or error, denying access to the called business service.
Note: Using *ALL to set up object security in Security Workbench is not related to the *ALL functionality that is used
to sign into JD Edwards EnterpriseOne. *ALL in Security Workbench enables you to assign a user, role, or *PUBLIC to
all objects of a particular type. *ALL during sign-in enables users to sign into JD Edwards EnterpriseOne with all the
roles that have been assigned to them.
This illustration shows how the system checks for published business services security for a user signed in with *ALL
and a user signed in with a specific role:
314
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
If a user is assigned to multiple roles and signs in as *ALL, the system uses role sequencing to determine which security
record is used. A system administrator sets up role sequencing when setting up user and role profiles.
When a web service attempts to access a published business service in JD Edwards EnterpriseOne, the system
records the authorization information in the log file. If the logging level is set to "Debug," the log file records whether
authorization was granted or denied. If the log level is set to "Severe," the system only logs information if the attempt to
access a web service fails. This is an example of the information provided in the log file:
315
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
See Also
• JD Edwards EnterpriseOne Tools Server Manager Guide for information on how to view business service
security log file information.
• JD Edwards EnterpriseOne Tools Business Services Server Reference Guide for information on how to configure
JD Edwards EnterpriseOne to authenticate users of published business services.
In addition, you can review published business services security records by running the Security Audit Reports—
Security by Object (R009501) and Security by User/Role (R009502).
See Running a Report that Lists Published Business Service Security Records.
1. On the Work with User/Role Security form, enter S in the Security Type column and then click Find.
2. To narrow the search by user or role, enter a user or role in the query by example field in the User / Role column
and then click Find.
3. To view the security records for a particular published business service, complete the query by example field at
the top of the Published BSSV column and then click Find.
1. On Work with User/Role Security, select the Form menu, Set Up Security, Published BSSV.
By default, *PUBLIC is in the User / Role field. If any records exist for *PUBLIC, those records appear in the grid.
2. On Published Business Service Security Revision, enter the user, role, or *PUBLIC to which you want to allow
access to a published business service.
316
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
a. On Published Business Service Security Revision, click the search button in the Published BSSV column to
search for and select a published business service.
b. On the same form, click the search button in the Published BSSV Method column to select the method
that you want to allow access to.
On Published BSSV Method, you must enter the published business service again in the Published BSSV
column to see a list of all the methods for the published business service. The system displays published
business services by the method that is being exposed in the published business service. A published
business service that contains multiple methods will have multiple rows in the grid, one for each method.
c. Select the row that contains the method that you want to secure and then click the Select button.
d. On Published Business Service Security Revision, click the search button in the Execute Allowed column
and then select Y to allow access to the published business service method.
4. To allow access to a published business service (including all its methods):
a. Click the search button in the Published BSSV column to search for published business services.
b. On Select Business Service, complete the Business Service field and click the Find button.
c. Select the published business service that you want to secure and then click the Select button.
d. On Published Business Service Security Revision, in the row that contains the published business service,
enter *ALL in the Published BSSV Method column.
e. In the same row, click the search button in the Execute Allowed column and then select Y to allow access
to the published business service.
5. To allow access to all published business services:
By default, users are not allowed access to published business services objects in JD Edwards
EnterpriseOne. However, you can select N to create a security override that disallows access to an object.
The system displays published business services by the method that is being exposed in the published
business service. A published business service that contains multiple methods will have multiple rows, one for
each method.
317
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
4. Use the query-by-example fields at the top of the grid to refine your search. For example, if you want to set up
security for all methods that perform an add or delete, you search for those methods by typing add* or delete*
in the Published BSSV Method query by example field in the grid.
5. Select the check box next to the items that you want to secure.
6. Click either the Allow Execute or Disallow Execute button.
7. On Confirm Batch Secure, click OK.
The system displays the number of records that were added or updated.
In addition to this method, you can use the Work with User/Role Security form in P00950 to delete the records in the
same way that you would delete any other object security record.
318
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
3. On the Work With User Defined Object View Security form, select the Form menu, and then select Copy
Security.
Alternatively, access Work With User Defined Object View Security (W00950UOG) from the Work with User
Defined Objects application (P98220U), select Form menu and then select Copy View Security. (Release 9.2.3)
4. Select one of these options:
319
JD Edwards EnterpriseOne Tools Chapter 25
Security Administration Guide Setting Up Authorization Security with Security Workbench
system displays all the security records for the user or role based on the security type that you select. For example,
when you search for application security records for the AP Role, the system displays all the application security records
for the AP role in the application grid.
The settings for each security type are displayed as columns in the grid. The columns that appear in the grid are based
on the security type that you select. For example, application security provides two different levels of security: run and
install. When you search for application security records, P00950 displays only the columns for Run and Install in the
grid. However, action security contains several settings, such as OK/Select, Copy, Delete, OK, and so forth. When you
search for action security records, the grid displays only columns for each of these security settings. The value in the
column, either Y or N, indicates whether or not each setting is secured.
In addition, you can search on all security records of a particular security type. As a result, the system displays records
for every user and role with the security type that was specified. You can search on all Security Workbench records by
clicking the Find button.
Note: You can also review and delete security records on the form used to add a particular type of object security
record, such as application, action, row, and so forth. Refer to the section on how to manage a particular type of object
security for more information.
Security Workbench deletes the security record and refreshes the grid.
320
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
Note: Click here to view a recording of UDO Feature, Action, and View security .
Feature UDO feature security activates or deactivates each UDO feature globally in the EnterpriseOne system.
UDO features are secure by default; they are not available in EnterpriseOne until you activate them in
the "Revise Feature Enablement" form in the Security Workbench.
Action UDO action security determines the actions users can perform with a particular UDO feature. UDO
action security is set up by UDO feature for a user, role, or *PUBLIC (all users). UDO Action security
options include:
• Create. Authorize users to create UDOs for their own personal use.
• Create and Publish. Authorize users to create and share personal UDOs with other users.
• Create, Publish, and Modify. Includes the preceding permissions plus the ability to modify UDOs
created by other users.
View UDO view security authorizes access to shared UDOs. You can apply UDO view security to each
individual shared UDO for a user, role, or *PUBLIC. Or you can apply UDO view security to all shared
UDOs of a particular UDO type.
(Release 9.2.4) Beginning with Tools Release 9.2.4, as part of view security, system administrators can
restrict access to the base EnterpriseOne forms so that users can access only the personalized forms
and not the base forms.
321
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
Content (Composite Page and Application UDO content security applies to Composite Page and Composite Application Framework UDOs. In
Framework UDOs only) (Release 9.2.0.2) addition to setting up view security for Composite Page and Composite Application Framework UDOs,
you must also set up content security to authorize users to view or work with the contents of a
Composite Page and Composite Application Framework UDO.
For more information on how to manage UDOs in P98220U, see the JD Edwards EnterpriseOne Tools Using and
Approving User Defined Objects Guide.
Prerequisites
You must perform the following prerequisites before you can set up UDO security:
• Define Allowed Actions for UDO Types
322
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
The "Configuring Activity Rules" chapter in the JD Edwards EnterpriseOne Tools Object Management Workbench for the
Web Guide describes how to set up allowed actions in P98230. When setting up allowed actions for each UDO type:
To (Project Status) = 21
• For each UDO type, apply the following allowed actions:
05 (Check-Out/Get/Reserve)
02 (Delete Only)
04 (Check-in/Publish)
The following image shows the allowed actions defined for the grid format UDO type:
323
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
Note: This section includes recommendations for the types of users you should authorize access to the UDO security
and administration applications. You can adapt these recommendations based on your company's needs.
This is the application for approving UDOs for sharing with other users. Oracle recommends that only an
administrator, manager, or power user responsible for approving UDOs has access to this application. Typically,
the approver of a shared UDO should not be the same as the user who created the UDO. Use EnterpriseOne
Application security in Security Workbench to secure this application. See Managing Application Security in this
guide.
• Work With User Defined Object View Security application (P00950UO).
This application is accessible from the User Defined Object Management (P98220U) application, the application
used for approving UDOs. It is an alternative to setting up UDO view security through the Security Workbench.
This form gives you the option of providing a non-Security Workbench user, or the same user who is
responsible for reviewing and approving shared UDOs in P98220U, the ability to set up view security for shared
UDOs. All view security records created in this application are reflected in the view security form in Security
Workbench. Use Hyper Exit security in the Security Workbench to authorize access to this form from P98220U.
See Managing Hyper Exit Security in this guide.
• Object Management Workbench for the Web (Web OMW).
This application is used to manage the life cycle of user defined objects. Oracle recommends that only
developers and system administrators have access to this application.
In addition to determining who has access to Web OMW, you have to define the actions that Web OMW users
can perform, for example which users are allowed to check out and modify a UDO through the Web OMW,
check in a UDO, advance a UDO to another status, and so forth. See Configuring OMW User Roles and Allowed
Actions in this guide for more information.
In addition to the preceding applications, the Security Workbench contains forms for setting up UDO feature, action,
content and view security. Only security administrators who have access to the Security Workbench have access to
these forms.
If the green circle is displayed in the Access column, the feature is active. If the red square is displayed, the
feature is inactive. Also, you can hover your cursor over the icon to display the status in text.
324
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
Note: When you change the status of a UDO feature to active or inactive, EnterpriseOne displays a message
reminding you to clear security cache for the changes to take effect. Security cache must be cleared on the
EnterpriseOne HTML Server (JAS Server). You can clear this cache using Server Manager.
Note: You must activate the UDO feature in EnterpriseOne before setting up UDO action security. See Managing UDO
Feature Security.
The following list describes the actions you can allow users to perform:
• Create. Enables users to create user defined objects for personal use. Without this permission, users can only
use shared UDOs to which they have been granted access through UDO view security.
• Create and Publish. Enables users to create and "Request to Publish" UDOs to share UDOs with other users.
"Create and Publish" security inherits the "Create" permission.
With this permission, a user can select the "Request to Publish" button to share a UDO. However, the UDO
must be approved before it can be shared with other users. For more information on how to approve UDOs in
P98220U, see the JD Edwards EnterpriseOne Tools Using and Approving User Defined Objects Guide.
• Modify. Enables users to modify shared UDOs. "Modify" action security inherits "Create" and "Create and
Publish" permissions.
When setting up UDO action security, remember that application security supersedes UDO action security. That is,
users can only work with UDOs in applications to which they have been granted access through Security Workbench
application security.
UDO action security records can be set up for a particular application, form, or application version. Or you can use *ALL
(all objects) to apply action security to all applications, forms, application version in which the UDO feature exists. You
also have the option to apply UDO action security to a particular EnterpriseOne product code or reporting code.
Note: If you add, modify, or delete action security, users must clear the cache in their browser for the changes to take
effect.
4. In a row in the grid, complete the following fields to create a security record for the selected UDO type:
325
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
Note: In each cell, you can click the search button to search for specific values. The search form displays only
the objects that make use of the UDO feature.
- Create
- Create and Publish
- Create, Publish, Modify
- Disable Create, Publish, and Modify
Use this last option to expedite the creation of UDO action security records. For example, if you
want to authorize all but two members of a role to "create, publish, and modify" UDOs, you create
one record for the role authorizing "Create, Publish, Modify;" and then create two records using this
"Disable Create, Publish, and Modify" option to prevent the two users from creating UDOs.
5. As an alternative to using the Access Level drop-down menu, you can click the icons in the Create, Publish, or
Modify columns to activate or deactivate the action security level. A green circle indicates the action is active, a
red square indicates the action is inactive.
When using the icons to select the security level, the security level is reflected in the Access Level column in the
grid.
6. Click the Save button to save the record.
◦ Create
◦ Publish
◦ Modify
The Access Level field in the row will change to reflect the modified action security.
Also, a warning appears reminding you to clear the security cache for the changes to take effect.
326
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
Note: To disable UDO action security, you do not have to delete the UDO action security record. Instead, you
can disable the security record by making it inactive. This enables you to save the record in case you choose
to make it active again at another time.
Note: To share a UDO, the creator of the UDO has to click the "Request to Publish" button, which sends it through
an approval process. After the UDO is approved by an approver in the User Defined Object Management (P98220U)
application, it is considered a "shared UDO." See Also: JD Edwards EnterpriseOne Tools Using and Approving User
Defined Objects Guide for information on how to approve UDOs.
Note: You cannot use *ALL for Classic EnterpriseOne Pages and Composed Pages. This restriction prevents
users from being able to access all Classic and Composed Pages from the EnterpriseOne Welcome screen.
(Release 9.2.0.2)
Note: You must first request to share the Classic EnterpriseOne Page and receive View permissions from
your system administrator before your page is available in run time.
• (Release 9.2.4) *BASE value for the personal forms UDO type.
327
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
System administrators can use the *BASE value to restrict access to an EnterpriseOne form so that users can
access only the personalized forms available to them and not the base form.
Note: When setting up base form security using the *BASE value, system administrators cannot use a
combination of *ALL in the Application Name column and *BASE in the User Defined Object Name column.
This restriction prevents system administrators from restricting access to all applications.
You set up UDO view security records for a user, role, or *PUBLIC (all users). In addition, you can define a particular
application, form, application version, product code, or reporting code to which to apply the security. Or you can use
*ALL (all objects) to apply view security to all applications, forms, application version to which the user has access.
EnterpriseOne provides two versions of the "Work With User Defined Object View Security" form:
• W00950UOG. Access this form through Security Workbench. Use this form to set up view security for
individual UDOs or all shared UDOs of a particular UDO type. Setting up view security for all shared UDOs of
a particular UDO type can only be performed using this form. Starting with EnterpriseOne Tools Release 9.2.3,
you can access W00950UOG from the User Defined Object Management (P98220U) application.
• W00950UOK. Access this form outside of Security Workbench through the User Defined Object Management
(P98220U)application, the application for reviewing, approving, or rejecting UDOs submitted for sharing. This
enables you to allow the same user approving UDOs to set up view security for the objects. Oracle recommends
using this application to set up UDO view security for individual shared UDOs.
Updates to UDO view security in either form are reflected in both forms.
Note: If you add, modify, or delete view security, users must clear the cache in the browser for the changes to take
effect.
To set up UDO view security for all shared UDOs of a particular UDO type:
1. On Work With User/Role Security in the Security Workbench (P00950), select the Form menu, User Defined
Object, View.
Alternatively, on Work with User Defined Objects (P98220U), select the Form menu, and then select View
Security. (Release 9.2.3)
2. On Work With User Defined Object View Security (W00950UOG), click the Add button.
3. On User Defined Object View Security, click the search button in the Object Type field and select a UDO type.
For a complete list of User Defined Objects, see the JD Edwards EnterpriseOne Tools Using and Approving User
Defined Objects Guide.
Note: For IMAGE UDOs, view security is set up by default. Users can access all the shared images. (Release
9.2.0.2)
328
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
Alternatively, on Work with User Defined Objects (P98220U), select the Form menu, and then select View
Security. (Release 9.2.3)
2. On Work With User Defined Object View Security, click the Add button.
3. On User Defined Object View Security, click the search button in the Object Type field and select a UDO type.
For a complete list of User Defined Objects, see the JD Edwards EnterpriseOne Tools Using and Approving User
Defined Objects Guide.
Note: For IMAGE UDOs, view security is setup by default. Users can access all the shared images. (Release
9.2.0.2)
Tip: Use the Work with User Defined Objects application (P98220U) to generate a list of shared UDOs. In
the grid, you can export the shared UDO records to a spreadsheet so you can easily see detailed information
about the shared UDOs.
329
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
Alternatively, on Work with User Defined Objects (P98220U), select the Form menu, and then select View
Security. (Release 9.2.3)
2. On Work With User Defined Object View Security, click the Find button to load the UDO view security records in
the grid.
You can use the filter fields in the header row of the grid to refine your search.
3. In the View column, click the icon in the row to change the status to Active or Inactive.
A green circle indicates the security record is active. A red square indicates the security record is inactive. You
can hover over the icon to display the status in text.
Alternatively, on Work with User Defined Objects (P98220U), select the Form menu, and then select View
Security. (Release 9.2.3)
2. On Work With User Defined Object View Security, click the Find button to load the UDO view security records in
the grid.
3. Click the check box next to the records that you want to delete, and then click the Delete button.
Note: To disable UDO view security, you do not have to delete the security record. Instead, you can disable
the security record by making it inactive. This enables you to save the record in case you choose to make it
active again in the future.
Note: You must set up permissions to allow access to W00950UOK from P98220U. See Enable Access to UDO
Security and Administration Applications for more information.
In P98220U, you can select one or more UDOs that have been approved for sharing (UDO Status = Shared) and
then access W00950UOK to set up view security for the selected records. If multiple shared UDOs were selected in
P98220U, the first record is displayed in the header area on the View Security for User Defined Object tab. The following
illustration shows the first of three shared UDO records:
330
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
• Revise any existing view security records for the selected UDO. If view security was already applied to the UDO,
a list of the view security records for the UDO would appear in the grid. In the preceding example, there are no
view security records, so you would have to click the Revise View Security tab to set up view security.
• Select the Revise View Security tab to add view security records for the selected UDO.
• If multiple UDOs were selected in P98220U, you can click the right directional arrow to access and set up view
security for the other UDOs.
Note: If you add, modify, or delete view security, users must clear the cache in the browser for the changes to take
effect.
Navigation to P98220U: On the EnterpriseOne Welcome Page, select the Navigator menu, EnterpriseOne Menus,
EnterpriseOne Life Cycle Tools, System Administration Tools, User Defined Object Tools, User Defined Object
Administration.
Shared UDOs have been approved for sharing and have a status of "Shared" in the Status Description column.
331
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
2. You can use the User Defined Object Status and User Defined Object Type fields in the header area or the filter
fields in the header row in the grid to refine your search.
3. In the first column in the grid, click the check box of the shared UDO for which you want to set up view security.
You can select multiple rows to set up view security for multiple UDOs.
4. Select the Row menu, Advanced, Security.
EnterpriseOne displays the shared UDOs in the Work With User Defined Object View Security form. If you
selected multiple records, the first record is displayed in the header area. You can click the right arrow to access
each shared UDO record for which you want to set up view security.
5. On Work With User Defined Object View Security (W00950UOG), click the Revise View Security tab.
6. In the first row in the grid, complete the following columns:
A green circle indicates that the security record is active. A red square indicates that the security record is
inactive. You can hover over the icon to display the status in text.
332
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
By default, view security is inactive unless you make it active. You must make sure that view security is active
for users to use the shared UDO.
8. Click the Save button.
9. If you make a mistake and save a record that you do not want to keep, before exiting the form, select the record
in the grid and click the Delete button.
Shared UDOs are approved for sharing and have a status of "Shared" in the Status Description column.
2. In the first column in the grid, click the check box of the shared UDO for which you want to modify UDO view
security. You can select more than one record if you want to revise UDO view security for multiple records.
3. Select the Row menu, Advanced, Security.
EnterpriseOne displays the shared UDOs in the Work With User Defined Object View Security form. If you
selected multiple records, the first record is displayed in the header area. You can click the right arrow to access
the other selected shared UDOs.
4. On the View Security for User Defined Object tab, click the icon to activate or deactivate any of the view security
records in the grid.
The record is automatically updated in Security Workbench after changing the status.
333
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
Note: To disable UDO view security, you do not have to delete the security record. Instead, you can disable
the security record by making it inactive. This enables you to save the record in case you choose to make it
active again in the future.
To manage UDO view security records by a user or a role from P98220U (Release
9.2.3)
You can access the Work With User Defined Object View Security form (W00950UOG) from the Work with User Defined
Objects application (P98220U). This form gives you the option of providing the same user who is responsible for
reviewing and approving shared UDOs in P98220U, the ability to set up/revise view security for shared UDOs. In
addition, you can use this form to view the records to which a particular user/role has access to. All view security records
created in this application are reflected in the view security form in Security Workbench.
1. In Work with User Defined Objects application (P98220U), select the Form menu, and then select View Security.
2. On Work With User Defined Object View Security, click the Find button to load the UDO view security records in
the grid.
You can use the filter fields in the header row of the grid to refine your search.
To access Work With User Defined Object View Security (W00950UOG) from P98220U:
On the Work With User Defined Object View Security (W00950UOG) form, you can:
• Set up view security for individual UDOs or all shared UDOs of a particular UDO type.
• Revise any existing view security record for a selected UDO.
• Delete the view security for a shared UDO.
• Copy the security information for another user or role. When you copy security, you can either overwrite
the current security for the user or role, or you can add the new security information to the existing security
information. See, Copying All Security Records for a User or a Role
• Copy selected security records for a user or role. You can select and copy one security record at a time or all the
security records for a user or role. See, Copying a Single Security Record for a User or a Role
334
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
that have been personalized by using the Personal Form UDO. Configuring base form security ensures that users will
only be able to access the personalized forms and not the base form.
JD Edwards EnterpriseOne provides a special UDO value, *BASE, that system administrators can use to configure base
form security. When setting up base form security for an EnterpriseOne application, the system administrator must
enter the *BASE value manually in the User Defined Object Name field on the User Defined Object View Security form.
If base form security is configured, the system determines the form that will be displayed when a user accesses the
application based on the following order of precedence:
1. If a default personal form exists for the user, the system displays the default personal form.
2. If a default personal form does not exist for the user, the system displays the shared default form.
3. If a shared default form does not exist for the user, the system displays the last active form.
4. If the last active form does not exist for the user, the system displays the first personal form in the
Personalization drop-down menu.
If base form security is configured and a personal form does not exist for the user, the system displays the base form
but hides the Personal Form icon. This means that the user cannot personalize the form by using the Personal Form
UDO.
Alternatively, on Work with User Defined Objects (P98220U), select the Form menu, and then select View
Security.
2. On Work With User Defined Object View Security (W00950UOG), click Add.
3. On User Defined Object View Security, click the search button in the Object Type field and select PERSFORM
(personal forms) as the UDO type. For a complete list of user defined objects, see the JD Edwards EnterpriseOne
Tools Using and Approving User Defined Objects Guide.
4. In the first row in the grid, ensure that the View column displays a red square and then complete the following
columns:
Note: If you enter *ALL in this field and *BASE in the User Defined Object Name field, the system
displays an error message.
◦ Form Name. Enter the form ID of the form for which you want to configure base form security. Enter *ALL
for all forms.
◦ Version. Enter the version ID of the If you want to limit the base form security to a particular application
version, enter the version ID. Or you can enter *ALL for all versions.
◦ User Defined Object Name. Enter *BASE.
Note: *BASE is a special value and is not available as a UDC value. Therefore, you must manually enter
this value in the User Defined Object Name field.
◦ Product Code and Reporting Code. If you entered a specific application, form, or version, these fields
automatically change to *ALL (all product codes or all reporting codes) and you cannot modify them.
◦ Web Object Category. Enter PERSFORM.
5. Click OK.
335
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
Note: If you add, modify, or delete content security, users must clear the cache in their browser for the changes to
take effect.
• Composite Application Framework feature enablement, which activates the Composite Application Framework
feature globally in EnterpriseOne.
• UDO action security that allows users to create, share, or modify Composite Application Framework layouts.
• Content security that allows users to work with the following types of content in a Composite Application
Framework layout: embedded EnterpriseOne forms, content from external web sites, and OBIEE content.
336
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
Navigation to Security Workbench: On the EnterpriseOne Welcome page, select the Navigator menu, EnterpriseOne
Menus, EnterpriseOne Life Cycle Tools, System Administration Tools, Security Maintenance, Security Workbench.
337
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
A green circle indicates that the security record is active. A red square indicates that the security record is
inactive. You can hover over the icon to display the status in text.
338
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
Note: If you add, modify, or delete content security, users must clear the cache in their browser for the changes to
take effect.
The following security must be in place for users to view content in shared Composed Pages:
• Composite Page feature enablement, which activates the Composite Page feature globally in EnterpriseOne.
• UDO view security that allows users to view Composed Pages.
Note: You cannot use *ALL for the "User Defined Object Name". This restriction prevents users from being
able to access all Composed Pages from the EnterpriseOne Welcome screen.
• Content security that allows access to the following types of content that can be included in a Composed Page:
embedded EnterpriseOne forms, content from external web sites, and One View report, ADF application, Classic
EnterpriseOne page, and OBIEE content.
Refer to "Oracle BI Publisher and JD Edwards EnterpriseOne Security" in the JD Edwards EnterpriseOne Tools BI Publisher
for JD Edwards EnterpriseOne Guide for instructions on how to configure Oracle BI Publisher with EnterpriseOne.
Navigation to Security Workbench: On the EnterpriseOne Welcome page, select the Navigator menu, EnterpriseOne
Menus, EnterpriseOne Life Cycle Tools, System Administration Tools, Security Maintenance, and Security Workbench.
339
JD Edwards EnterpriseOne Tools Chapter 26
Security Administration Guide Managing Security for User Defined Objects
EnterpriseOne populates the grid with the following content types you can authorize access to in Composite
Page: ADF application, Embedded E1 Form, EnterpriseOne Pages, Generic URL, OBIEE - CafeOne Layout, and
One View Report.
4. In the User/Role field, enter a user, role, or *PUBLIC.
5. In the grid, click the icon in the Access column to authorize access to a content type.
A green circle indicates that the security record is active. A red square indicates that the security record is
inactive. You can hover over the icon to display the status in text.
6. Click Save.
You can use the filter fields in the header row in the grid to refine your search by User/Role or Content Link
(content type).
3. In the grid, click the icon in the Access column to activate or deactivate access to a content type.
A green circle indicates that the security record is active. A red square indicates that the security record is
inactive. You can hover over the icon to display the status in text.
You can use the filter fields in the header row in the grid to refine your search by User/Role or Content Link
(content type).
3. Click the check box next to the records you want to delete and then click the Delete button.
Note: To disable content security, you do not have to delete the security record. Instead, you can disable the
security record by making it inactive. This enables you to save the record in case you choose to make it active
again in the future.
Note: Click here to view a recording of Managing Content Security for User Defined Objects (UDO) .
340
JD Edwards EnterpriseOne Tools Chapter 27
Security Administration Guide Setting Up JD Edwards Solution Explorer Security
Change Gives the user full access to the feature with no restrictions on changing, adding, or deleting data.
In JD Edwards Solution Explorer, you can check the permissions for each feature for any user in the system. You view
the settings by signing onto JD Edwards EnterpriseOne as the user whose settings you want to view, and then clicking
the security button in the status bar of the JD Edwards Solution Explorer, which launches the Solution Explorer Security
form. You cannot change the security settings from this form.
Note: You can also view existing Solution Explorer security records in P00950.
Users who are logged into the Microsoft Windows client can quickly identify their Solution Explorer security by double-
clicking on the padlock on the status bar at the bottom of the window.
This table shows the features and provides a description of the settings for Solution Explorer Security:
Menu Design Typically, administrators use the Menu Design feature to set up menus, tasks, task views, and task view
roles. You use Solution Explorer to provide or limit access to the Menu Design feature for a specific user
or role by selecting one of these security options:
Secured - The feature is not available when the user or role signs on to the system.
341
JD Edwards EnterpriseOne Tools Chapter 27
Security Administration Guide Setting Up JD Edwards Solution Explorer Security
View - The user or role can see and use menus, tasks, task views, and task roles that you have set up.
Change - The user or role can create and modify menus, tasks, task views, and task roles. The Menu
Design button appears on the Microsoft Windows client when this feature is set to Change. Typically,
you select the Change setting for an administrator.
See "Using the Design Menu Mode" in the JD Edwards EnterpriseOne Tools Solution Explorer Guide .
Menu Filtering Typically, administrators use the Menu Filtering feature to selectively enable or disable tasks by role
in a task view. You use Solution Explorer to provide or limit access to the Menu Filtering feature for a
specific user or role by selecting one of these security options:
Secured - The Menu Filtering button is not available when the user or role signs on to the system.
Change - The user or role can hide or show tasks or task views and save changes to roles. Typically, you
select the Change setting for an administrator.
See "Using the Menu Filtering Mode" in the JD Edwards EnterpriseOne Tools Solution Explorer Guide .
Favorites This feature enables users to save links to their tasks and access tasks directly from their Favorites
task view. You use Solution Explorer to provide or limit access to the Favorites feature for a specific
user or role by selecting one of these security options:Secured-The Favorites task view is not available
when the user or role signs on to the system.View-Users or roles can see the Favorites task view and
access tasks (assuming they have security rights for the application, form, version, and so on) from the
Favorites task view; however, users or roles cannot add or remove tasks from the Favorites task view.
Change-Users or roles can add and remove tasks from the Favorites task view.Typically, you select the
Change option in Solution Explorer so that your users can create and change their Favorites task view.
Fast Path The Fast Path feature is used by your users to navigate to menus, folders, applications, and reports
directly. Your users enter commands in the Fast Path to move quickly among menus and applications.
You use Solution Explorer to provide or limit access to the Fast Path feature for a specific user or role by
selecting one of these security options:
Secured - The Fast Path command line is not available when the user or role signs on to the system.
View - The user or role can enter tasks, fast path codes, or applications in the Fast Path command line.
Restricted View (menu navigation and mnemonics only) - The user or role can use the Fast Path
command line to call menus and applications that are defined in the Fast Path UDC table. This option
prevents the user or role from running tasks that call applications directly or from accessing specific
objects by entering an object name. For example, users with the Restricted View option receive an error
if they attempt to launch an application directly by typing in the object name (such as P01012) or if they
attempt to type in a task ID for a task that launches an interactive or batch application.
Documentation The Documentation feature enables users to access online Documentation for a task. You use
Solution Explorer to provide or limit access to the Documentation feature by selecting one of these
options:Secured - The documentation feature is not available to the user or role. View - The user or
role can view available online documentation for a task. Typically, you select this setting for users or
roles.Edit - The user or role can edit the online task documentation. Task documentation can be edited
only from a Windows client. Users or roles using a Web client cannot edit task documentation. Users
342
JD Edwards EnterpriseOne Tools Chapter 27
Security Administration Guide Setting Up JD Edwards Solution Explorer Security
access documentation by clicking the arrow to the right of the task, and then selecting Documentation.
A task may have multiple types of documentation, which appears as separate selections.
OMW Logging You use Solution Explorer to enable (on option) or disable (off option) the OMW Logging feature for
a specified user or role. When enabled, the OMW Logging feature captures information when a user
uses Object Management Workbench (OMW) to transfer Solution Explorer task information between
environments.
Note: When you use Solution Explorer security options for a user or role, be sure to select the appropriate option for
each feature on the form.
The restricted view also allows users to enter a mnemonic code, defined in the User Defined Code Values table (F0005),
to launch an application or access a menu.
You can add UDCs for mnemonic codes using the User Defined Codes application (P0004A). Use these parameters
when adding UDCs for mnemonic codes in P0004A:
Note: After you add UDCs for mnemonic codes, you must clear the cache in order for the UDCs to take affect in the
system. See Cached Security Information.
The following example shows some of the mnemonic codes already defined in JD Edwards EnterpriseOne.
343
JD Edwards EnterpriseOne Tools Chapter 27
Security Administration Guide Setting Up JD Edwards Solution Explorer Security
To set up UDCs for mnemonic codes, refer to the instructions on how to customize and add UDCs.
See "Working with User Defined Codes" in the JD Edwards EnterpriseOne Tools Runtime Administration Guide.
Novice users require the most restrictive security settings; expert users require the least restrictive settings. Although
you can fine-tune these default settings for a particular individual, using the default settings can free you from the task
of manually choosing security setting options for each individual in the system because you can apply the settings to
groups as well as to individual users.
344
JD Edwards EnterpriseOne Tools Chapter 27
Security Administration Guide Setting Up JD Edwards Solution Explorer Security
Prerequisite
Fast Path Restricted View security is a JD Edwards EnterpriseOne Tools feature that is applicable to the JD Edwards
EnterpriseOne Applications 8.12 and subsequent releases.
◦ Secured
◦ View
◦ Change
4. For Fast Path, select one of these options:
◦ Secured
◦ View
◦ Restricted View (menu navigation and mnemonics only)
5. Select one of these options to enable or disable OMW Logging:
◦ Off
◦ On
6. Alternatively, you can select any of these options from the Preset drop-down menu to specify default Solution
Explorer security settings:
◦ Preset One
◦ Preset Two
◦ Preset Three
345
JD Edwards EnterpriseOne Tools Chapter 27
Security Administration Guide Setting Up JD Edwards Solution Explorer Security
346
JD Edwards EnterpriseOne Tools Chapter 28
Security Administration Guide Setting Up Address Book Data Security
Note: In addition to these fields, the system enables you to designate up to eight other user-defined fields as
secured. Included in the eight fields are: five string, one math numeric, one character, and one date type. To secure
additional fields, you must modify the parameter list in the call to the business function B0100095. For example, if
you want to designate Industry Class as a secured field, you must modify the call to the B0100095 business function
to map Industry Class in the parameter list.
The Address Book data security feature provides an additional level of security by not allowing secured users to locate
valid personal information using the query based example (QBE) line. For example, if a user enters numbers in the Tax
ID field of the QBE line, the system does not display the matching record in the event that the user happens to enter a
valid tax ID number.
347
JD Edwards EnterpriseOne Tools Chapter 28
Security Administration Guide Setting Up Address Book Data Security
After you set up Address Book data security, users cannot view information in the fields that you specify as secured.
The secured fields appear as asterisks and the system disables these fields for updates. However, users can view their
own secured address book information. Also secured fields are not protected when adding new address book records.
In addition to storing Address Book privacy data in the Address Book Data Permission List Definition table (F01138), the
system stores privacy data in these tables:
• Address Book-Who's Who (F0111)
• Address Book-Phone Numbers (F0115)
• Address by Date (F0116)
During processing, when the system encounters a record that has privacy data, that record will not appear in reports,
Universal Batch Engine (UBE) results, the Data Browser, and the Universal Table Browser (UTB).
For example, if an administrator configures private data security to prevent users of a role from viewing the Tax ID
for search type E, and the Who's Who application is launched for an address book record with search type E, a user
assigned to this role cannot view records for this Address Book record in the Who's Who application.
Note: When Address Book data security is configured, you can either enable or disable the additional level of security
that prevents secured private data from appearing in other applications and output. See Enabling or Disabling Secured
Private Data from Displaying in Other Applications and Output for more information.
Prerequisites
Select the Activate Personal Data Security constant in the Address Book Constants.
See "Setting Up the JD Edwards EnterpriseOne Address Book System" in the JD Edwards EnterpriseOne Applications
Address Book Implementation Guide.
Set up users and roles in the User Profiles application (P0092) for each user that you want to secure from Address Book
information.
348
JD Edwards EnterpriseOne Tools Chapter 28
Security Administration Guide Setting Up Address Book Data Security
Work With Permission W01138A Enter P01138 in the Fast Review existing
List Definitions Path. permission list
definitions.
Add/Edit Permission W01138B Select Add from the Create new permission
List Definitions Work With Permission list definitions or revise
List Definitions form. existing definitions.
After entering the Permission List Name and the Search Type, select each field that you want to secure.
Permission List Name
Enter a name for the permission list. Enter up to 15 alphanumeric characters.
Search Type
Select the search type for which the permission list applies.
349
JD Edwards EnterpriseOne Tools Chapter 28
Security Administration Guide Setting Up Address Book Data Security
Work With Permission W95922A Enter P95922 in the Fast Search for a permission
List Relationships Path. list.
Maintain Permission List W95922D Click Select on the Work Set up permission list
Relationships With Permission List relationships.
Relationships form.
The settings for enabling and disabling this additional level of private data security are located in the JDBJ.INI file on the
HTML Server and the JDE.INI file on the Enterprise Server. Use Server Manager to modify these settings:
350
JD Edwards EnterpriseOne Tools Chapter 28
Security Administration Guide Setting Up Address Book Data Security
For more information about modifying INI file settings in Server Manager, see the JD Edwards EnterpriseOne Tools
Server Manager Guide .
351
JD Edwards EnterpriseOne Tools Chapter 28
Security Administration Guide Setting Up Address Book Data Security
352
JD Edwards EnterpriseOne Tools Chapter 29
Security Administration Guide Setting Up Business Unit Security
UDC Sharing
With UDC sharing, JD Edwards EnterpriseOne provides the ability to control, or regulate, how organizational data
among different business units is shared. UDC sharing enables you to define a subset of UDC values for a business unit.
You can share multiple UDC values among multiple business units.
For example, a company's customer service department may provide support for appliances, consumer electronics,
and sporting goods. Typically, a representative would choose from an extensive list of values to specify the repair code
for a particular type of product. However, with UDC sharing, the company can associate a subset of the repair code
UDC values, such as for appliances, to a business unit. As a result, the representatives associated with the business unit
would only have to choose from a list of repair codes relevant to appliances.
Note: UDC sharing can impact system performance because of the time it takes the system to determine the UDC
values that are associated with each business unit.
Transaction Security
Another feature of JD Edwards EnterpriseOne business unit security is transaction security. Transaction security enables
you to determine the transaction records a user can view. Transaction security ensures that users can only access and
modify transaction data for the business unit to which they are associated.
Note: "Setting Up Business Units" in the JD Edwards EnterpriseOne Applications Financial Management
Fundamentals Implementation Guide .
353
JD Edwards EnterpriseOne Tools Chapter 29
Security Administration Guide Setting Up Business Unit Security
• UDC group
A UDC group serves as a container for the UDC values that you want to share among different business units.
You create the UDC group by naming it and assigning the UDC types that contain UDC values. For example, if
you are sharing UDC values that represent various states and countries in geographic regions, you might name
the UDC group GEO, and then assign the UDC types that contain the appropriate UDC values for the states or
countries.
• Set-ID
A set-ID enables you to further categorize the UDC values within a UDC group. For example, you can further
categorize the UDC values in the GEO UDC group into subsets, such as Europe, Canada, Pacific Rim, and so
forth. Each subset, or set-ID, can contain values that are specific to that region.
Note: UDC sharing is available for JD Edwards EnterpriseOne Application Release 8.11 and later releases. You must
use a Microsoft Windows client to set up UDC sharing. However, the actual security applied to applications that are
run only on the web client.
A business unit type serves as a logical grouping of business units. To define it, you give it a name and then
specify the table (typically the F0006 table) and the data item within the table that contains the business unit
values.
• Associate a user ID or role to a business unit.
Note: You can associate users to business units when setting up UDC sharing or when setting up transaction
security.
354
JD Edwards EnterpriseOne Tools Chapter 29
Security Administration Guide Setting Up Business Unit Security
Note: You can access this form on the Microsoft Windows client and the web client.
3. Click Next.
4. On Set-ID Definition Revisions, complete these fields to create set-IDs for the UDC group:
◦ Set-ID
Enter a name for the set-ID.
◦ Description
5. Click Next.
On Maintain Set-ID, in the right pane, the system displays the UDC types that you assigned to the UDC group.
The left pane contains the set-IDs that you defined for the UDC group.
6. Assign UDC values to the Set-IDs.
a. Select a set-ID in the left pane.
b. Click a UDC type in the right pane, and then select from the list of UDC values.
c. Click the left arrow to assign the UDC value to the chosen Set-ID.
7. After you assign UDC values to the set-IDs, click Done.
355
JD Edwards EnterpriseOne Tools Chapter 29
Security Administration Guide Setting Up Business Unit Security
3. On User/Role to Business Unit Relationships, assign the users or roles in the right panel to the appropriate
business units in the left panel.
You can search for particular business unit values and users or roles by clicking the search button next to the
Business Unit Value and User/Role fields, respectively.
Note: You can click the Skip button if you choose not to perform this step at this time. You can also assign
users to business units when setting up transaction security.
4. After securing users to the appropriate business units, click Next to continue.
5. On Maintain Transaction Security Tables, click the Skip button.
This form is only used for transaction security.
6. On UDC Group/Set-ID/Business Unit Relationship, assign the set-IDs within the UDC groups to the appropriate
business units in the left panel.
You can search for particular business unit values and UDC groups by clicking the search button next to the
Business Unit Value and UDC Group fields, respectively.
Remember that you must first configure UDC sharing to be able to assign set-IDs to business units on this form.
7. Click Done.
You can access this form in the Microsoft Windows client and the web client.
1. Select the UDC group that you want to revise.
2. To add or delete a UDC type in a UDC group, from the Row menu, select Group Revisions.
3. To add or delete a set-ID, from the Row menu, select Set-ID Definition.
Note: You cannot delete a set-ID that is part of a business unit and UDC group relationship.
4. To revise the UDC values that are assigned to the set-IDs, from the Row menu, select Maintain Set-ID.
Note: You cannot delete a UDC group that is part of a business unit relationship.
356
JD Edwards EnterpriseOne Tools Chapter 29
Security Administration Guide Setting Up Business Unit Security
• Set processing options for Maintain Business Unit Transaction Security (R95301).
• Set processing options for Business Unit Security Maintenance application (P95300).
• Revise transaction security.
A business unit type serves as a logical grouping of business units. To define it, you name it and then specify
the table (typically the F0006 table) and the data item within the table that contains the business unit values.
Note: If you are setting up transaction security for an existing business unit type, use the Maintain Business
Unit Security menu to add transaction security.
The mode to revise transaction security provides access to the same forms that are used for the initial setup, but
without the wizard functionality. You can use these forms to add, update, or delete transaction security.
After you perform an initial setup, you must run the Maintain Business Unit Transaction Security batch application
(R95301) to generate the transaction security records. You can set processing options for this batch application that
enable you to review the records in a "proof" mode before the records are updated in the F00950 table.
See Setting Processing Options for Maintain Business Unit Transaction Security (R95301).
If you are revising transaction security, you can set processing options to control how the transaction security records
are updated in the F00950 table. You can set these processing options on the Maintain Business Unit Security menu,
which is the EnterpriseOne menu that launches the forms used for revising transaction security.
See Setting Processing Options for Business Unit Security Maintenance Application (P95300).
357
JD Edwards EnterpriseOne Tools Chapter 29
Security Administration Guide Setting Up Business Unit Security
When you change (add, update, delete) transaction security, you must run the Maintain Business Unit Transaction
Security Records (R95301) batch application for the changes to take effect.
Note: Because the data in the F00950 table is cached, you must clear the cache in order for the updated security
records to take affect. See Cached Security Information.
◦ Transaction table
Enter the table name that contains the data item that you want to secure.
◦ Data item
Enter the data item of the column that you want to secure.
You can use this form to secure multiple tables.
6. Click Next to continue.
7. On UDC Group/Set-ID/Business Unit Relationship, click Done.
8. Run the R95301 batch application.
9. Clear the workstation or web client cache
358
JD Edwards EnterpriseOne Tools Chapter 29
Security Administration Guide Setting Up Business Unit Security
Transaction Security
These processing options are used to specify how the system processes the transaction security records.
1. Add Transaction Security Records Specify whether to run the report in Final mode or Proof mode. Use the Proof mode to generate
a report of the transaction security records that will be updated in the Security Workbench table
(F00950). Use the Final mode to update the records.
2. Add Transaction Security Records Specify whether to add or to not add transaction security records. Values are:
1: Add
0: Do not add
3. Delete Transaction Security Records Specify whether to delete or to not delete transaction security records. Values are:
1: Delete
0: Do not delete
You can access these processing options from the EnterpriseOne Menus by right-clicking the Maintain Business Unit
Security menu, and then selecting Values.
Mode
This processing option is used to specify the business unit security mode.
1. Business Unit Security Mode Specify whether to run the report in Director Mode (A) or Maintenance Mode (D).
Transaction Security
These processing options are used when working with business unit security in Maintenance mode only.
1. In Maintenance mode, automatically add Specify whether to automatically add transaction security records. Values are:
transaction security records.
1: Add
359
JD Edwards EnterpriseOne Tools Chapter 29
Security Administration Guide Setting Up Business Unit Security
0: Do not add
2. In Maintenance mode, automatically Specify whether to automatically delete transaction security records. Values are:
delete transaction security records.
1: Delete
0: Do not delete
1. On the Work With Business Unit Security form, select the business unit security type record that you want to
revise.
2. To revise the users or roles associated to a business unit, from the Row menu, select Associate User/Role.
3. To revise the UDC values that are assigned to business units, from the Row menu, select UDC Groups for BU.
4. To revise a transaction table record, from the Row menu, select Transaction Tables.
5. To delete transaction security for a business unit type, select the record and then click Delete.
6. Run the R95301 batch application.
7. Clear the workstation or web client cache.
360
JD Edwards EnterpriseOne Tools Chapter 30
Security Administration Guide Upload and Download Security
The following table lists the system-defined file types that users are allowed to upload in EnterpriseOne:
MailMerge rtf
361
JD Edwards EnterpriseOne Tools Chapter 30
Security Administration Guide Upload and Download Security
The user-defined inclusion list is made up of four settings in the [UPLOAD] section in the Runtime settings of the jas.ini
file. You can access and update these settings in the "Upload Inclusion List" section in Server Manager, as shown in the
example below:
Use the following settings to specify the file types users can upload in EnterpriseOne:
Use this setting to identify the files types users are allowed to upload in EnterpriseOne tools other than Media
Objects and EnterpriseOne Pages. The default values are csv, dip, doc, docx, dot, dotx, log, pdf, stg, txt, xls, xlsx,
and xlt.
• E1Page Content File-Extension List (E1PageContentExtensionList in jas.ini file)
Use this setting to identify the file types users are allowed to upload in EnterpriseOne pages. The default values
are asp, bmp, css, dat, dip, gif, htm, html, ico, img, jfif, jpe, jpeg, jpg, js, mf, pdf, png, svg, tif, tiff, and xml.
• Mail Merge Extension List
Use this setting to identify the file types users are allowed to upload in MailMerge Workbench. The default
values are doc, docx, dot, dotx, pdf, rtf, and xml.
• Media Object Extension List (AllowMOFileExt in jas.ini file)
Use this setting to identify the file types users are allowed to upload in Media Objects. The default values are
csv, dip, doc, docx, dot, dotx, log, pdf, stg, txt, xls, xlsx, and xlt.
See the JD Edwards EnterpriseOne Tools Server Manager Guide for more information about modifying .ini file settings.
362
JD Edwards EnterpriseOne Tools Chapter 30
Security Administration Guide Upload and Download Security
• When uploading zip files, EnterpriseOne scans the contents for proper file naming, allowed file types, and
image file signatures.
You can open these file attachments because the image queue is on a trusted server and an administrator
places the files in the image queue. This allows users to view these attachments (such as logs, PDFs, and so
forth) in the Media Object Viewer.
Supported browsers have a built-in feature for saving files. If an EnterpriseOne user opens any of the aforementioned
files in one of these browsers, the browser automatically saves the file to a "Download" folder. This enables users to
open the file from the Download folder on the client machine.
363
JD Edwards EnterpriseOne Tools Chapter 30
Security Administration Guide Upload and Download Security
364
JD Edwards EnterpriseOne Tools Chapter 31
Security Administration Guide Configuring OMW User Roles and Allowed Actions
Object Management Workbench (OMW) is the primary component of the change management system for
EnterpriseOne development. OMW automates many change management activities. OMW's automation relies on an
administrator who carefully configures OMW roles and allowed actions, which makes configuring these areas one of the
most important EnterpriseOne configuration tasks.
These sections show the allowed user actions that Oracle recommends for each user role and the responsibility of the
person in that user role, organized by the project status at which these actions should be authorized.
For status changes that initiate a transfer, the user role must be authorized to perform both the status change and
transfer actions.
Note: You might want to allow the Manager and Supervisor roles to perform the same actions as the Developer role,
in case the Developer cannot perform assigned duties or needs to have work verified.
For more information about OMW, see the JD Edwards EnterpriseOne Tools Object Management Workbench Guide
365
JD Edwards EnterpriseOne Tools Chapter 31
Security Administration Guide Configuring OMW User Roles and Allowed Actions
Programming (21)
This table shows user roles and allowed actions for projects with a status of 21 (programming):
QA Test/Review (26)
This table shows user roles and allowed actions for projects with a status of 26 (QA test/review):
366
JD Edwards EnterpriseOne Tools Chapter 31
Security Administration Guide Configuring OMW User Roles and Allowed Actions
In Production (38)
This table shows user roles and allowed actions for projects with a status of 38 (in production):
Complete (01)
This table shows user roles and allowed actions for projects with a status of 01 (complete):
367
JD Edwards EnterpriseOne Tools Chapter 31
Security Administration Guide Configuring OMW User Roles and Allowed Actions
Value Description
01 Transfer
02 Check In
03 Check Out
04 Delete
05 Add
06 Copy
08 Save
09 Restore
10 Design
11 Get
13 Update a Project
21 Switch Token
368
JD Edwards EnterpriseOne Tools Chapter 31
Security Administration Guide Configuring OMW User Roles and Allowed Actions
Value Description
02 Data items
03 Versions
04 UDCs
05 Menus
369
JD Edwards EnterpriseOne Tools Chapter 31
Security Administration Guide Configuring OMW User Roles and Allowed Actions
370
JD Edwards EnterpriseOne Tools Chapter 31
Security Administration Guide Configuring OMW User Roles and Allowed Actions
• 05 — Add
• 06 — Copy
• 07 — Install
• 08 — Save
• 09 — Restore
• 10 — Design
• 11 — Get
• 12 — Remove object from project
• 13 — Update the project
• 16 — Add an object to the project
• 21 — Switch tokens
• 23 — Release from token queue
• 30 — Erase check out
• 38 — Status change
For example, if you want the developer to be allowed to check in all object types when the project is at project status 21,
you would enter these values in the Allowed Actions Form:
Field Value
Note: Before setting up allowed actions, you must add the user role to the User Roles UDC by using the User Defined
Code form.
371
JD Edwards EnterpriseOne Tools Chapter 31
Security Administration Guide Configuring OMW User Roles and Allowed Actions
Object Management
Configuration (P98230)
Note: You can enter *ALL in any field except User Role. Typing *ALL in a field indicates that the user
role chosen can work with all object types, project statuses, or actions.
372
JD Edwards EnterpriseOne Tools Chapter 32
Security Administration Guide Configuring EnterpriseOne Security Auditing
The second report is the Security Analyzer by User or Group (R98OWSECB); it is organized by user or role. The Security
Analyzer by User or Role report is also based on data that it reads from the F98OWSEC table.
373
JD Edwards EnterpriseOne Tools Chapter 32
Security Administration Guide Configuring EnterpriseOne Security Auditing
• Data Source
The data source to which the user is secured. Blank indicates all data sources.
• User ID
• User / Role
The actual user that JD Edwards EnterpriseOne uses to connect to the DBMS that you specified as the data
source. This system user must match the user value that is defined in the DBMS.
• Change Frequency
The number of days before the system requires that a user change their password. This data can be set by
individual user ID or by role.
• Source Password Changed
The number of invalid sign-in attempts by a user. If the retry count value exceeds the number of allowed
attempts, the user profile is disabled.
• Allowed Attempts
The number of sign-in attempts that a user can make before that user profile is disabled.
374
JD Edwards EnterpriseOne Tools Chapter 32
Security Administration Guide Configuring EnterpriseOne Security Auditing
• User Status
A value that indicates whether the user can sign in to JD Edwards EnterpriseOne. Values are 01 (enabled) and
02 (disabled).
• Status
The default version is XJDE0001. It creates a report for all user IDs for all data sources.
2. On the Version Prompting form, click Submit.
3. On the Report Output Destination form, select any of these options:
◦ On Screen
◦ To Printer
◦ Export to CSV
4. If desired, select the OSA Interface Name option and enter a name in the box that appears.
• User ID
• Role
• Password Change Frequency
The number of days before a user must change their password. This data can be set by individual user ID or by
group.
• Data Source
The data source to which the user is secured. A blank indicates all data sources.
• System User
The actual user that the software uses to connect to the DBMS that you specified as the data source. The
system user that is defined here must match the user value that is defined in the DBMS.
375
JD Edwards EnterpriseOne Tools Chapter 32
Security Administration Guide Configuring EnterpriseOne Security Auditing
Access the Work With Batch Versions - Available Versions form to run the Security Analyzer by User or Group Report
(R98OWSECB).
1. Select a version and click Select.
The default version is XJDE0001. It creates a report for all user IDs for all data sources.
By default, the XJDE0001 version has the processing option for this report set to 1. This option generates a
report by user ID.
To generate a report by role, you can prompt for processing options and then, on the User Setup tab, change
the value to 2.
2. On the Version Prompting form, click Submit.
3. Complete the processing options as necessary, and then click OK.
4. On Report Output Destination, select any of these options:
◦ On Screen
◦ To Printer
◦ Export to CSV
5. If desired, select the OSE Interface Name option and type a name in the field that appears.
Each report contains processing options that you can use to define the output of the report. Along with the processing
options, you can use the Data Selection form in the Batch Version application (P98305W) to further refine the data that
the report produces.
376
JD Edwards EnterpriseOne Tools Chapter 32
Security Administration Guide Configuring EnterpriseOne Security Auditing
Each security record in the report indicates the level of security, or type of security, that is applied to the object. For
application security, each record indicates if a user or role has permission to install, run, or both install and run the
application. For row security, each record indicates if view, add, change, or delete security have been applied. For
column security, each record indicates if view, add, or change security have been applied. For published business
service security, each record indicates whether a user or role has access to the published business service object.
How you set up your report determines how readily you can find gaps in your security plan. For example, if you have a
highly sensitive application and you want to ensure that only the appropriate users have access to it, you can refine the
R009501 report (Security Audit Report by Object) to list only the security records for that particular application.
377
JD Edwards EnterpriseOne Tools Chapter 32
Security Administration Guide Configuring EnterpriseOne Security Auditing
378
JD Edwards EnterpriseOne Tools Chapter 32
Security Administration Guide Configuring EnterpriseOne Security Auditing
1. In the Batch Application field, enter R009501 and click the Find button.
2. Select the Security Audit Report by Object version.
379
JD Edwards EnterpriseOne Tools Chapter 32
Security Administration Guide Configuring EnterpriseOne Security Auditing
3. To define processing options for the report, select Processing Options from the Row menu, and then complete
the processing options as appropriate:
Enter a user ID or role to refine the report to generate only records based on that particular user ID or
role.
◦ Report on Application Security
Leave blank if you want the report to include application security records. Enter 1 to exclude application
security records.
◦ Report on Row Security
Leave blank if you want the report to include row security records. Enter 1 to exclude row security records.
◦ Report on Column Security
Leave blank if you want the report to list application security records. Enter 1 to exclude application
security records.
◦ Report on Published BSSV Security
Leave blank if you want the report to list published business service security records. Enter 1 to exclude
published business service security records.
Note: In addition, to generate a report that displays published business service security records, you
need to add an additional condition in the Data Selection form, as discussed below.
4. On the Work With Batch Versions - Available Versions form, click Select.
5. On the Versions Detail form, select the Data Selection check box and click the Submit button.
6. On the Data Selection form, you can add a condition to filter on a particular object, object type, or product code.
If the processing option is set to list published business service security records, you must add the following
condition after the default Where condition:
And BC Source Language (F9860) (SRCLNG) [BC] is equal to "SBF"
7. Click the OK button.
8. On the Printer Selection form, define the location for the output of the report and then click OK to submit it.
◦ Role (optional)
To refine the report to generate only records based on a particular role of the user, enter a role.
◦ Report on Application Security
380
JD Edwards EnterpriseOne Tools Chapter 32
Security Administration Guide Configuring EnterpriseOne Security Auditing
Leave blank if you want the report to include application security records. Enter 1 to exclude application
security records.
◦ Report on Row Security
Leave blank if you want the report to include row security records. Enter 1 to exclude row security records.
◦ Report on Column Security
Leave blank if you want the report to list column security records. Enter 1 to exclude column security
records.
◦ Report on Published BSSV Security
Leave blank if you want the report to list published business service security records. Enter 1 to exclude
published business service security records.
4. On the Work With Batch Versions - Available Versions form, click Select.
5. On the Versions Detail form, select the Data Selection check box and click the Submit button.
6. On the Data Selection form, use the User ID left operand to define the user ID that you want the report to list
security records for.
7. Click OK.
8. On the Printer Selection form, define the location for the output of the report and then click OK to submit it.
381
JD Edwards EnterpriseOne Tools Chapter 32
Security Administration Guide Configuring EnterpriseOne Security Auditing
6. On the Data Selection form, use the User ID left operand to define the role that you want the report to list
security records for.
7. Click OK on the Data Selection form.
8. On the Printer Selection form, define the location for the output of the report and then click OK to submit it.
Access the Work With Batch Versions - Available Versions form. To do so, enter P98305W in the Fast Path.
1. In the Batch Application field, enter either R009501or R009502 and click the Find button.
2. Select the version of the report that you want to run.
3. On the Work With Batch Versions - Available Versions form, click Select.
4. On the Versions Detail form, select the Data Selection check box and click the Submit button.
5. On the Data Selection form, enter these conditions and then click OK:
382
JD Edwards EnterpriseOne Tools Chapter 33
Security Administration Guide Appendix A - DB Password Encryption
DB Password Encryption
Note: This appendix has been updated in its entirety for JD Edwards EnterpriseOne Tools Release 9.1 Update 3. THIS
APPENDIX IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EXPRESSED OR IMPLIED, INCLUDING, BUT
NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE,
OR NON-INFRINGEMENT. This publication could include technical inaccuracies or typographical errors. This
publication does not make recommendations, implied or actual. It provides guidelines; however, due the wide variety
of networking, hardware and software configurations found in JD Edwards EnterpriseOne installations, no guarantees
can be made that specific results are achievable in any particular installation. Changes are periodically added to
the information herein. These changes will be incorporated in new editions of the publication. Oracle may make
improvements and changes at any time to the products and programs described in this publication.
This appendix is intended for an administrator who is going to apply the EnterpriseOne Tools Release at the customer
site. It is assumed that the reader has knowledge of JD Edwards EnterpriseOne and CNC technology.
Converting Security
This EnterpriseOne Tools 9.1.3 enhancement improves the security of passwords stored in the database by replacing
existing password encryption with one-way hash encryption. This conversion from the old encryption to the one-way
hash encryption occurs in these instances:
• When a user login occurs AND the following setting is in the Enterprise Server jde.ini file:
[SECURITY]
ONTHEFLYMIGRATION=1
During the user login, the security kernel checks whether the user record in the security table is stored using
the old encryption. If it is stored using the old encryption, the kernel updates all user records in security tables
to one-way hash encryption. Since this happens only once, the impact to the login process is minimal.
Note: This setting is not available in Server Manager. An administrator must add this setting to the
Enterprise Server jde.ini setting to enable one-way hash encryption for existing user passwords.
383
JD Edwards EnterpriseOne Tools Chapter 33
Security Administration Guide Appendix A - DB Password Encryption
When the administrator adds a user record, a message is sent to the security kernel for processing. The security
kernel encrypts the password using one-way hash encryption and inserts the user records in the security tables.
In summary, starting with EnterpriseOne Tools 9.1.3, new users added to EnterpriseOne will have their passwords
encrypted with one-way hash. For existing users, EnterpriseOne will use one-way hash for password encryption only if
you add the ONTHEFLYMIGRATION=1 setting to the Enterprise Server jde.ini file.
The EnterpriseOne Tools Release 9.1.3 must be deployed on all Enterprise Servers sharing the same F98OWSEC table.
If you do not want to update all EnterpriseOne Enterprise Servers to EnterpriseOne Tools 9.1 Update 3, then you need
to create two Security Server data sources: one for Enterprise Servers on Tools 9.1 Update 3 and one for EnterpriseOne
servers on a release below Tools 9.1 Update 3. In this scenario, only the Enterprise Servers on Tools 9.1 Update 3 will
support one-way hash encryption.
384
JD Edwards EnterpriseOne Tools Chapter 33
Security Administration Guide Appendix A - DB Password Encryption
Note: If you are not using multiple Enterprise Servers (including multiple foundation) that share the same F98OWSEC
table on different EnterpriseOne Tools releases, your existing data source is sufficient.
Configuring these data sources helps avoid data conflicts due to overlap between new and old Enterprise Servers.
The following task describes how to copy security tables to a new data source. These tables are used as a secondary
location to support the one-way hash encryption.
Complete the following steps BEFORE installing the EnterpriseOne Tools Release.
CAUTION: Do not create any OCM mappings (client or server) that point to the newly created data source. Doing so
will result in system errors.
For each EnterpriseOne Enterprise Server on Tools release 9.1.3.0 or above, set the DataSource setting in the SECURITY
settings to the new client and server data source.
For each EnterpriseOne Enterprise Server on Tools release prior to 9.1.3.0, set the DataSource setting in the SECURITY
settings to "System - 910" or "System - 900".
Note: "Copying Tables" in the JD Edwards EnterpriseOne Tools Table Design Guide for more information about using
the Object Management Workbench and Table Design Aid to copy tables.
Note: For information about installing the EnterpriseOne Tools Release on the Deployment Server, see the JD
Edwards EnterpriseOne Deployment Server Reference Guide for your platform located at: http://docs.oracle.com/cd/
E61420_01/index.htm
385
JD Edwards EnterpriseOne Tools Chapter 33
Security Administration Guide Appendix A - DB Password Encryption
The EnterpriseOne Tools Release must be deployed on all Enterprise Servers sharing the same F98OWSEC table as well
as all clients that communicate with these servers.
1. Deployment Server
Follow the instructions in the "Installing a Tools Release on the Deployment Server" section of the JD Edwards
EnterpriseOne Deployment Server Reference Guide for your platform located at:
http://docs.oracle.com/cd/E61420_01/index.htm
2. Enterprise Server
a. Follow the instructions in section "Change a Managed EnterpriseOne Software Component" in the JD
Edwards EnterpriseOne Tools Server Manager Guide to install the EnterpriseOne Tools Release to the
appropriate host installation.
b. If you copied the tables in the Security data source to a new data source during the pre-installation
process, update the jde.ini file on the Enterprise Server with the following changes before starting the
network services:
[SECURITY]
DataSource=<new data source name>
This is the new data source defined in the pre-installation process.
c. Verify that you can run PORTTEST successfully.
3. To install the HTML Server changes, follow the instructions in the JD Edwards EnterpriseOne HTML Server
Reference Guide for your platform located here:
http://docs.oracle.com/cd/E61420_01/index.htm
4. Deploy a client package for the EnterpriseOne Tools Release:
a. Modify the Deployment Server update package created by the ESU process (see the Deployment Server
section above). Create the foundation to include the EnterpriseOne Tools Release 9.1.3 or above.
b. Make sure this package is defined for clients.
c. Build and deploy the package to all workstations.
5. Run the web client and Microsoft Windows client to make sure users can log in.
6. Run the security administration application to make sure a new user can be added and passwords for existing
users can be modified.
386
JD Edwards EnterpriseOne Tools Chapter 33
Security Administration Guide Appendix A - DB Password Encryption
◦ If an EnterpriseOne user signs into an Enterprise Server running EnterpriseOne Tools Release 9.1.3 or
above, and the user's password is encrypted using the old encryption, the Enterprise Server updates
the user's records in the Security tables to the one-way hash encryption. This only occurs if the setting
ONTHEFLYMIGRATION=1 is in the Enterprise Server jde.ini.
◦ If a new EnterpriseOne user is added using EnterpriseOne Tools Release 9.1.3 or above, the new user
password is stored using one-way hash encryption. Consequently, this user will NOT be able to sign in to
older EnterpriseOne Tools Releases that share the same F98OWSEC table.
◦ If a new EnterpriseOne user is added using an EnterpriseOne Tools Release prior to 9.1.3, the new user
password is stored using the old encryption. Therefore, this user can sign in to any EnterpriseOne Tools
Release sharing the same F98OWSEC table, as long as the Enterprise Server jde.ini files do NOT include
the setting ONTHEFLYMIGRATION=1.
4. If the customer has multiple Enterprise Servers at different EnterpriseOne Tools Release levels, a dual
maintenance procedure for users and passwords is required. Once all the foundations are running an
EnterpriseOne Tools Release 9.1.3 or above:
a. The jde.ini setting for SECURITY Data Source can be changed to point to the same data source for all
servers running EnterpriseOne Tools Release 9.1.3 or above.
b. Save the backup copy of the F98OWSEC table in case you need to roll back the EnterpriseOne Tools
Release as described in Rolling Back the Software..
Copyright
/* ====================================================================
* Copyright (c) 1998-2011 The OpenSSL Project. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
387
JD Edwards EnterpriseOne Tools Chapter 33
Security Administration Guide Appendix A - DB Password Encryption
388
JD Edwards EnterpriseOne Tools Chapter 33
Security Administration Guide Appendix A - DB Password Encryption
389
JD Edwards EnterpriseOne Tools Chapter 33
Security Administration Guide Appendix A - DB Password Encryption
390
JD Edwards EnterpriseOne Tools Chapter 34
Security Administration Guide Appendix B - Creating a JD Edwards EnterpriseOne LDAP
Configuration for OID
OID is an LDAP compliant directory service. You can configure JD Edwards EnterpriseOne to use OID as the LDAP server.
This enables administrators to use the directory service to manage user information such as user IDs, passwords, and
user-role relationships.
Note: This section does not contain all of the steps for creating an LDAP configuration, only specific values that are
required for setting up an LDAP configuration for OID.
When you configure OID as the LDAP server, the settings that you configure depend on how you plan to use OID, which
can include these scenarios:
• Managing only user IDs and passwords.
• Managing user-role relationships in addition to user IDs and passwords.
• Using Secure Socket Layer (SSL).
• Using the User Profile Self-Service application (P0092SS).
Note: Enabling LDAP Support in JD Edwards EnterpriseOne. Oracle Internet Directory Administrator's Guide located
at: http://docs.oracle.com/cd/E12839_01/admin.1111/e10029/toc.htm
Access the Work With User Defined Codes form. In JD Edwards Solution Explorer, enter UDC in the Fast Path.
1. Complete these fields and click Find:
Field Value
Product Code 95
391
JD Edwards EnterpriseOne Tools Chapter 34
Security Administration Guide Appendix B - Creating a JD Edwards EnterpriseOne LDAP
Configuration for OID
Field Value
2. Click Add.
3. On the User Defined Codes form, scroll to the last empty row of the detail area.
Note: Be sure to add the new code on the last detail row so that you do not inadvertently overwrite a blank
code, which might appear in the first detail row. A blank code might have only a period in the Description
field.
Field Value
Codes OID
When you create an LDAP configuration for OID, on the LDAP Server Information form, you must select OID in the LDAP
Server Type field.
The values in the tables are variables and will differ depending upon your configuration.
Attribute Value
USRSRCHBAS cn=Users,dc=jdedwards,dc=com
392
JD Edwards EnterpriseOne Tools Chapter 34
Security Administration Guide Appendix B - Creating a JD Edwards EnterpriseOne LDAP
Configuration for OID
Attribute Value
USRSRCHFLT objectclass=inetOrgPerson
USRSRCHSCP subtree
Attribute Value
ROLSRCHBAS cn=Groups,dc=jdedwards,dc=com
ROLSRCHFLT objectclass=groupofUniqueNames
ROLSRCHSCP subtree
If you are using SSL with LDAP server, configure these attributes as well:
Attribute Value
SSLPORT 636
If you are using the user profile self-service application for the Manufacturing Sourcing module, configure these
settings:
Attribute Value
USRCLSHRCY top,person,organizationalperson,inetOrgPerson,orcluser,orcluserv2
ROLADDLOC cn=Groups,dc=jdedwards,dc=com
393
JD Edwards EnterpriseOne Tools Chapter 34
Security Administration Guide Appendix B - Creating a JD Edwards EnterpriseOne LDAP
Configuration for OID
The values in the tables are variables and will differ depending upon your configuration.
Attribute Value
E1USRIDATR uid
USRSRCHATR uid
EUSRIDATR uid
Attribute Value
ROLNAMEATR cn
ROLSRCHATR uniquemember
If you are using the user profile self-service application for the Manufacturing Sourcing module, configure these
settings:
Attribute Value
CMNNAME cn
SURNAME sn
PASSWORD userPassword
OBJCLASS objectClass
394
JD Edwards EnterpriseOne Tools Chapter 35
Security Administration Guide Appendix C - JD Edwards EnterpriseOne Cookies
com_jdedwards_ This cookie stores the Portal The life span of the You cannot turn off this
LastLayout Workspace (WORKSPACEID) cookie is one year. cookie.
that was last accessed by a
user (USERID).
com_jdedwards_CSN This cookie stores the 10000 milliseconds. You cannot turn off this
information to implement cookie.
critical state functionality for
the HTML Client Component
running inside the Portal.
jdeLoginCookie This cookie stores the The life span of the This cookie is
username, password, role, cookie depends not created if the
language code and rtlLayout on the value of UseLogonCookie
information about a user's CookieLifeTime property defined in the
login in an encrypted property defined [SECURITY] section
format. in the [SECURITY] of the JAS.INI is set to
section of the JAS.INI false. The system does
file. If this property is not create this cookie
not defined, then by by default.
default, this cookie's
life span is set to
seven days.
AutoPopulate This cookie stores a user's The life span of the You cannot turn off this
preference of whether to cookie one year. cookie.
auto populate the grid on
a form. A user can turn
395
JD Edwards EnterpriseOne Tools Chapter 35
Security Administration Guide Appendix C - JD Edwards EnterpriseOne Cookies
maxLogLength This cookie determines This cookie never You cannot turn off this
the maximum number of expires. cookie.
javascript debug statements
that can be logged using
JSMonitor.log() API. The
default value for this cookie
is 15. A developer can turn
on the logging by clicking
the Enable JSMonitor button
after pressing Ctrl+D.
396
JD Edwards EnterpriseOne Tools Chapter 36
Security Administration Guide Appendix D - Default Database User Accounts
• APPLEAD
• TESTCTL
• JDEDBA
• DV900
• PD900
• PRODUSER
• CRPCTL
• PRODCTL
• PRODDTA
• TESTDTA
• JDE
• DEVUSER
• CRPDTA
• PS900
• PY900
• DD900
• SVM900
• SY900
• OL900
• PD900DTA
• PS900CTL
397
JD Edwards EnterpriseOne Tools Chapter 36
Security Administration Guide Appendix D - Default Database User Accounts
398
JD Edwards EnterpriseOne Tools Chapter 37
Security Administration Guide Glossary
37 Glossary
access provisioning
The process of setting up user and role profiles in EnterpriseOne for sign-in security (authentication) and authorization
security.
add mode
A condition of a form that enables users to input data.
authentication
The process of verifying that users signing into EnterpriseOne are valid EnterpriseOne users.
authorization
The process of granting or denying users access to EnterpriseOne applications, features, data, and data sources. In
EnterpriseOne, most authorization security is applied at the object level through the Security Workbench.
data encryption
The process of transforming information into code so that it cannot be read by a third party system. EnterpriseOne
encrypts user passwords stored in the database.
data masking
Customizing a field so that specified characters are embedded in place of sensitive data that appears in applications.
This prevents sensitive data from being displayed to unauthorized users.
399
JD Edwards EnterpriseOne Tools Chapter 37
Security Administration Guide Glossary
data privacy
In EnterpriseOne, Address Book data security enables you to restrict users from viewing Address Book information that
is determined as private, personal data.
developer security
Security that determines the actions that developers can perform when customizing or developing EnterpriseOne
applications in Object Management Workbench (OMW). Actions can include checking out and checking in objects,
promoting objects, transferring objects, removing objects, and so forth.
object-level security
A type of authorization security that enables you to secure specific objects within JD Edwards EnterpriseOne such as
applications, forms, and various other EnterpriseOne features. Object-level security provides flexibility with applying
security and a higher level of security integrity.
power form
Web-only application forms that enable users to view multiple, interrelated views of data, grids, and tab pages on one
form and to pass logic between them.
*PUBLIC
A special ID within EnterpriseOne that automatically includes all users within it. This option controls security for all users
who are designated by ID type *PUBLIC in the User or Role field.
400
JD Edwards EnterpriseOne Tools Chapter 37
Security Administration Guide Glossary
secure by default
A security model that assumes that a user does not have permission to execute an object unless there is a specific
record indicating such permissions.
security overrides
Security records that operate as exceptions to existing security records. Security overrides specify that users are
unsecured from an EnterpriseOne object. In other words, security overrides allow users access to a particular object,
even if another security record in the system specifies that access is not allowed.
security workbench
An application that enables you to secure JD Edwards EnterpriseOne objects, such as applications, forms, rows, tabs,
and so on. It stores all objects security records in the F00950 table.
serialize
The process of converting an object or data into a format for storage or transmission across a network connection link
with the ability to reconstruct the original data or objects when needed.
subform
A subform is a control designed for use on a power form or another subform. Power forms can contain several
subforms, so a single power form with multiple subforms enables users to see multiple data views.
401
JD Edwards EnterpriseOne Tools Chapter 37
Security Administration Guide Glossary
terminal server
A server that enables terminals, microcomputers, and other devices to connect to a network or host computer or to
devices attached to that particular computer.
402