Tag: Multi-Layered Security Planning

109680 Presented at COLLABORATE 19 Oracle Cloud HCM Security - From Moonless Night to Moonlit Night" is geared towards an audience interested in Human Capital Management (HCM) Security. I will review our journey starting with our Implementation and then transitioning to the maintenance of security. I will also discuss the improvements in Oracle Cloud Security…

Presented at COLLABORATE 19 Session ID: 106030 In 9.2, Oracle made a significant change in JDE security by introducing Data Source Security. Prior to 9.2, the CNC simply created a system user to match an identical user on the database. If you wanted to have more control over direct database access you had to implement Oracle…

Presented at COLLABORATE 19 Session ID: 106030 In 9.2, Oracle made a significant change in JDE security by introducing Data Source Security. Prior to 9.2, the CNC simply created a system user to match an identical user on the database. If you wanted to have more control over direct database access you had to implement Oracle…

Using EnterpriseOne has never been easier than now with the new tools available with User Defined Web Objects (UDOs) and even UX1.  UDOs are web objects that streamline your interface with E1 information and applications.  What do you need to know in working with them?  How do you go about granting permissions quickly and easily to put these tools in the hands of the right users?  Let us walk you through options of what you will need to know to implement them successfully.

Using EnterpriseOne has never been easier than now with the new tools available with User Defined Web Objects (UDOs) and even UX1.  UDOs are web objects that streamline your interface with E1 information and applications.  What do you need to know in working with them?  How do you go about granting permissions quickly and easily to put these tools in the hands of the right users?  Let us walk you through options of what you will need to know to implement them successfully.

Using EnterpriseOne has never been easier than now with the new tools available with User Defined Web Objects (UDOs) and even UX1.  UDOs are web objects that streamline your interface with E1 information and applications.  What do you need to know in working with them?  How do you go about granting permissions quickly and easily to put these tools in the hands of the right users?  Let us walk you through options of what you will need to know to implement them successfully.

109010 Presented at COLLABORATE 19 JD Edwards environments can be exposed to risk by using outdated security standards and configurations regarding SSL 3.0/TLS 1.0/TLS1.1. This leaves passwords without encryption which open the door for malicious software to steal a password. Learn how to enable highly secure protocols and disable legacy protocols for both PY and…

Securing who can do what in JDE is a critical component of a compliance initiative, but it is not the only security you need to be looking at.  Many enterprises have multiple operating companies and business units and for various reasons, need to keep the data for one company separated from the other companies.  How…

Presented at COLLABORATE 19 Session ID: 105400 At Adventist Health System we have implemented Single Sign-On(SSO) for PeopleSoft Interaction HUB and other SAML enabled ancillary applications using SecureAuth Idp. This presentation includes step by step deployment process, need for SSO solution, required customizations in PeopleSoft for better user experience and seamless authentication with other third-party SAML…

105050 Presented at COLLABORATE 19 Enterprise systems provide a single system of record with endless business capabilities, but exposing the whole monolithic system through a single interface to all users comes with substantial security risks. When designing for security, system architects should begin by identifying different user groups that will interact with the system, separating…