انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
Ep 58 – JDE Security – Who Owns It?
Manage episode 478407255 series 3549643
Hosts Chandra and Paul kick off a multi-part series focused on security within JD Edwards (JDE) environments. Joined by guests Andrew Osick, Matthias Freitag, and Nimesh Patel, the conversation dives into real-world approaches to security ownership, role structures, and the critical importance of segregation of duties (SOD) across different organizations. The panel discusses how security responsibilities are often shared among business analysts, CNC teams, IT, and business stakeholders, emphasizing that there’s no one-size-fits-all model and that company-specific needs and compliance requirements dictate unique setups. The discussion also highlights the challenges and evolving best practices related to user defined objects (UDOs), including how organizations balance flexibility for end users with maintaining control and compliance.
07:35 Security Panel Introductions
11:56 Security – Who Owns It
24:41 Security Models – Role Based/Process Driven or Otherwise
29:03 UDO Security – A Different Paradigm
40:14 Midwesternism of the Day
Resources:
Security Administration Guide: https://docs.oracle.com/en/applications/jd-edwards/administration/9.2.x/eotsc/toc.htm
If you have concerns or feedback on this episode or ideas for future episodes, please contact us at [email protected].
86 حلقات
Manage episode 478407255 series 3549643
Hosts Chandra and Paul kick off a multi-part series focused on security within JD Edwards (JDE) environments. Joined by guests Andrew Osick, Matthias Freitag, and Nimesh Patel, the conversation dives into real-world approaches to security ownership, role structures, and the critical importance of segregation of duties (SOD) across different organizations. The panel discusses how security responsibilities are often shared among business analysts, CNC teams, IT, and business stakeholders, emphasizing that there’s no one-size-fits-all model and that company-specific needs and compliance requirements dictate unique setups. The discussion also highlights the challenges and evolving best practices related to user defined objects (UDOs), including how organizations balance flexibility for end users with maintaining control and compliance.
07:35 Security Panel Introductions
11:56 Security – Who Owns It
24:41 Security Models – Role Based/Process Driven or Otherwise
29:03 UDO Security – A Different Paradigm
40:14 Midwesternism of the Day
Resources:
Security Administration Guide: https://docs.oracle.com/en/applications/jd-edwards/administration/9.2.x/eotsc/toc.htm
If you have concerns or feedback on this episode or ideas for future episodes, please contact us at [email protected].
86 حلقات
All episodes
×مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.