Security Principles Rel 8.96

Total time

Security Principles Rel 8.96

Oracle University
Logo Oracle University

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.

Description

This three-day course provides a thorough understanding of JD Edwards EnterpriseOne features and functionality. Technical implementers, system administrators, and auditors will learn about system architecture, security strategies, best practices, security assessments, web and portal security issues, and the auditing and authorizing features of JD Edwards EnterpriseOne. Upon completion of this course, students will be able to explain and implement an effective JD Edwards EnterpriseOne security model.

Learn to:
  • Describe JD Edwards EnterpriseOne security architecture
  • Identify web security issues
  • Describe sign-on security
  • Identify security best practices
  • Set up security on JD Edwards Enterprise…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

This three-day course provides a thorough understanding of JD Edwards EnterpriseOne features and functionality. Technical implementers, system administrators, and auditors will learn about system architecture, security strategies, best practices, security assessments, web and portal security issues, and the auditing and authorizing features of JD Edwards EnterpriseOne. Upon completion of this course, students will be able to explain and implement an effective JD Edwards EnterpriseOne security model.

Learn to:
  • Describe JD Edwards EnterpriseOne security architecture
  • Identify web security issues
  • Describe sign-on security
  • Identify security best practices
  • Set up security on JD Edwards EnterpriseOne
  • Describe JD Edwards EnterpriseOne auditing and authorizing features

Audience
  • System Analysts
  • Technical Consultant

Course Topics Technology Overview
  • Describing JD Edwards EnterpriseOne Security Components
  • Describing JD Edwards EnterpriseOne Security Architecture
  • Describing LDAP and JD Edwards EnterpriseOne Server Relationships
Describing Sign-On Security
  • Describing Single Sign-On
  • Describing Lightweight Directory Access Protocol (LDAP)
Setting Up Security on JD Edwards EnterpriseOne
  • Identifying a Method to Create Security Components
  • Explaining How to Put the Components Together
  • Describing Security Workbench
Setting Up Additional Security
  • Describing Business Unit Security
  • Describing Address Book Data Security
  • Using Versions
  • Describing Batch Approval / Post Security
Identifying Web Security Issues
  • Describing Web-Based Access
  • Describing the Portal
  • Describing Portal Security
Identifying OMC and OMW Considerations and Best Practices
  • Describing Security Best Practices
  • Changing the JDE Password
Describing Auditing
  • Discussing Auditing and Authorizing
  • Describing Oracle Database Auditing

Course Objectives
  • Describe JD Edwards EnterpriseOne security principles
  • Implement standard security within JD Edwards EnterpriseOne
  • Describe the web and object management security issues of JD Edwards EnterpriseOne

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.