Listen

Description

Hosts Chandra and Paul walk listeners through the Security Workbench, breaking down the differences between inclusive and exclusive security, emphasizing why organizations should plan security strategy thoughtfully for scalability, maintenance, and performance. They also share practical details about how some companies manage access at the application, action, row and column security. The episode provides hands-on guidance about application, action, row, and column security—explaining real-world scenarios on how to limit access to specific applications, buttons, data records, and sensitive information.  

06:00 Why Security Workbench Matters 

06:46 Inclusive vs. Exclusive Security   

09:05 Application Security Overview 

14:58 Action Security Overview 

17:42 Row Security Overview 

22:56 Column Security Overview 

26:53 Midwesternism of the Day 

Resources: 

Security Administration Guide: https://docs.oracle.com/en/applications/jd-edwards/administration/9.2.x/eotsc/toc.htm 

If you have concerns or feedback on this episode or ideas for future episodes, please contact us at thejdeconnection@questoraclecommunity.org