Anda di halaman 1dari 24

USER DEFINED OBJECTS - UDOS

GENERAL SECURITY RECOMMENDATIONS

We make JD Edwards work better for people and harder for business
TABLE OF
Contents

Section 01
03 INTRODUCTION

Section 02
04 UDO SECURITY PLANNING

Section 03
05 ASSIGN UDOS OWNER(S)

Section 04
05 UNDERSTAND UDOS CREATION AND
APPROVAL PROCESS

Section 05
06 DEFINE UDOS ACTIONS, VIEWS AND CONTENT

Section 06
06 DEFINE ROLE REQUIREMENTS FOR UDOS

Section 07
07 MANAGE UDOS THROUGH OMW WEB

Section 08
08 TEST UDOS

Section 09
08 UDOS SECURITY SET UP
01
Introduction
Since the introduction of User Defined Objects (UDOs) with release 9.1,
UDOs have evolved and multiplied in the JD Edwards’ objects landscape:
• Interest in UDOs has grown quite significantly in the JD Edwards End
Users’ community.
• Additional security layers have been added to manage UDOs specifically.

Most Companies face the challenge of managing many E1 security types with
various levels of complexity. Unlike any other security types, UDOs have their own
action security and approval processes which require a certain level of attention
in the way they are implemented in Production.

This document outlines some key information and general recommendations on


UDO security which might assist you in securing your own UDOs effectively.

Is your organization Do you have a plan


ready to embrace UDOs? in-place to secure them?

General Security Recommendations 3


02
UDO Security Planning
There are currently 18 types of UDOs in E1 that can be
secured.
Without a well-defined security
CORE UDOs: framework in-place, UDOs could
become challenging to manage
E1 Pages Task Search over time. E1 System Performance
could potentially be impacted in a
Production Environment.
CafeOne Images
START DEFINING UDO
SECURITY WITH THE
Queries OneView Reports FOLLOWING APPROACH:
• Identify and assign UDOs’
Composed Pages Grid Formats Owners
• Define key players in the
Personal Forms Watch Lists creation and approval process
• Define roles and UDOs Actions
E1 Search
• Define all roles requirements for
UDOs

ORCHESTRATION STUDIO UDOs: • Test and Manage UDOs through


OMW Web

Orchestrator

Service Requests Notifications

Rules Scheduler

White Lists

4 General Security Recommendations


03
Assign UDOs Owner(s)

Assign UDOs owner(s) within each department or across


departments. His/her role is to control, assess and
approve UDOs created by users to be shared with others,
either publicly or specifically at a role or user level.

Delegate UDOs administration to UDO owners


(typically super user or managers who are best
equipped to manage UDOs efficiently).
Grant UDOs Owners access and permissions to the
UDO application administration management P98220U.

04
Understand UDOs Creation and Approval Process
• Understand the steps to approve and share UDOs in P98220U
• Identify the players and define the roles involved in the creation and approval process

WORKFLOW ACTIONS (STATUS)

CREATE / EDITS REQUEST TO SHARE APPROVED


() (pending approval) (share)

REFUSED RE-EDIT Already Shared


(rework) (reserved)

• Access P98220U for:


• Approving/Rejecting UDOs for sharing and promotion
• Accessing UDO Content in Composite Application Framework or Composed Pages

General Security Recommendations 5


05
Define UDOs Actions, Views and Content
UDOs are personalized objects that users can create for their own use, and share with
others, depending on the permissions they and others have been granted.

• Grant the appropriate UDO security permissions to the role(s) by defining


who can:
• Create UDOs for personal use
• Create and Publish UDOs for sharing with other users
• Modify Shared UDOs create by other users
• View UDOs
• Access Content in an E1 Composite Application Frame
• Access P00950UO (UDO Security) through P00950/ Form / UDOs: Chose
Action, View or Content
• Enable UDOs Features through P00950/ Form / UDOs: Features

06
Define Role requirements for UDOs

• Understand clearly what your role requirements are and define a list of specific
“Must Haves” UDOs to include in each role. Define also a list of common UDOs to
be shared at a global level (*Public)
• Be selective in what needs to be shared Publicly or at a role level. A common
mistake is to grant too many UDOs to a Role or even *Public which can be
overwhelming to End Users and somewhat counter-productive
• Stick to the “20/80” Rule. Fewer UDOs assigned to roles is better than too
many. Focus on what really matters to users for performing their jobs
• Share /grant UDOs permissions at a Role Level rather than at a user level.
• Manage user exceptions tightly.

6 General Security Recommendations


07
Manage UDOs through OMW Web
It is somewhat easy to fall into the trap of creating, approving and publishing most UDOs in
Production and ignoring the basic rules and purpose of an “Object Management Cycle”

• Leverage Object Management Workbench for Web (P98220W) and keep your
UDOs consistent across all your environments
• UDOs can be packaged and promoted between path codes through
OMW Web
• Follow a certain discipline in testing UDOs in lower environments before
deploying them to Production. The process takes longer but the results are
worth it, and safer.

STANDARDIZED PROCESS USING WEB BASED TOOLS

Create, Share and


Approve UDOs
Modify UDOs

Share UDOs across


Secure UDOs
Path Codes

OMW Web UDO Project Promotion

DV PY PD

Import/Export

General Security Recommendations 7


08
Test UDOs
Certain types of UDOs could have a negative performance impact on an E1 System if they are not defined and
tested properly.

• Focus especially on Queries, Watch Lists, E1Searches and One View Reports.
These UDOs can be very process-intensive on the E1 servers. Test and validate
%
their performance on a non-production E1 system.
• Set up threshold parameters in the JAS.INI of the E1 Web Server to limit the
amount of data returned to the end users through the Web.
• Use an alternative business data source for processing certain UDOs such as
OneView Reports if real-time data access is not a mandatory requirement. This
will avoid any performance issues caused by the intense data retrieval process
generated by ie OneView Reports in Production
• Test UDOs before sharing them. Understand the Object Life cycle management
for UDOs to safely test them and deploy them in Production.

09
UDOs Security Set up
9.1. High-Level Process
UDOS VERIFICATION:

Verify UDOs In Verify UDOs In Verify UDOs In


P9000 UDCs P9800022 Web Objects P98230 OMW Config

UDO SECURITY SET-UP IN P00950/FORM/UDOS:

Activate UDO Grant UDO


Features Action to Roles/Users

Grant UDO Grant UDO Content ***


View to Roles/Users to Roles/Users

*** Content is Only Valid for E1Composite Application frames with the following content: OBIEEs, URLs, Embedded E1 Forms, OVR

8 General Security Recommendations


9.2. Detailed Level Process

General Security Recommendations


9
• Verify UDOs in UDC – P9000
• From the home menu, Go to Fast Path and UDC
• Check all UDCs for UDOs exists under Product Code “95” and UDC “UF”

10 General Security Recommendations


• Verify UDOs in Web Object Application – P9800022
• Ensure that UDOs are listed in P0900022

General Security Recommendations 11


• Verify UDOs in OMW Configuration – P98230
• Go to Fast Path – P98230
• Select Allowed Actions
• Verify that “Delete” Action is granted to all appropriate roles and all UDOs

12 General Security Recommendations


• Activate UDOs Features
• Activate UDO Feature in your environment
• From the home menu, Go to Fast Path and enter P00950
• In P00950, Select Feature

General Security Recommendations 13


• Click on the Access Radio Button to Activate or Deactivate UDOS

• Grant the appropriate UDO Action(s) to Roles or Users

14 General Security Recommendations


• For any existing Action entries in the Grid, modify a UDO action for Role(s) by Clicking on one of the Radio
Buttons “Create”, “Publish” or “Modify” and activate or de-activate the desired UDO(s)

General Security Recommendations 15


• For Adding a new UDO Action, Click on the Add Button

16 General Security Recommendations


• For Adding a new UDO Action, Click on the Add Button
• Select the appropriate Object Type, Application and Users shown below

• Grant the appropriate Access Level to the Role and validate the permissions

General Security Recommendations 17


• Grant View Access to Roles or Users

• For any existing View entries in the Grid, activate or de-activate a UDO for a Role by Clicking on one of
the “View” radio button of the role to be modified

18 General Security Recommendations


• For adding a new “View” Entry, Click on ADD

• Type or Select the Appropriate UDO, Application and Role(s)

General Security Recommendations 19


• Activate “View” Access by clicking on the “View” Radio Button

• Grant the appropriate UDO Content(s) to Roles or Users

20 General Security Recommendations


• For any existing “Content” entries in the Grid, activate or de-activate a UDO for a Role by
Clicking on one of the “Access ” radio buttons of the role to be modified

• For Adding a new UDO “Content” Access Permission, Click on the Add Button

General Security Recommendations 21


• Click on the ‘Access” Radio button to Active or De-Activate a content for a specific role

22 General Security Recommendations


9.1. UDO Tables
• UDO Tables by UDO Type:
TABLE Description

F952400 User Generated Contents Detail


F952410 Composite Page
952415 Image
F952420 OneCenter Watchlists Detail
F952425 Notification
F952430 Advance Query
F952435 Dynamic Form Personalization
F952440 Grid Formats Detail
F952445 EnterpriseOne Search
F952450 CafeOne Layout Table
F952455 Scheduler
F952460 Default UDO Detail
F952471 Modified Web Object Metadata
F9524810 Orchestrations
F9524820 Cross Reference
F9524830 Rule
F9524840 Service Requests
F9524850 Whitelist

• UDO Object Librarian tables:

TABLE Description

F9860W Web Object Master Table


F986OWD Web Object Language Descriptions Table

• UDO Repository Tables:

TABLE Description

F98700D Object Dependencies


F98700H Object Acrhive History
F98700R Object Archive Repository

General Security Recommendations 23


ONE COMPANY.
ONE SOLUTION.
ERP-ONE.

Anda mungkin juga menyukai