roles, menus and security best practice: process based roles kristina o’leary brian connor jd ...

57
Roles, Menus and Security Best Practice: Process Based Roles Kristina O’Leary Brian Connor JD Edwards E1 Xe through to Version 9

Upload: kirk

Post on 25-Feb-2016

410 views

Category:

Documents


4 download

DESCRIPTION

Roles, Menus and Security Best Practice: Process Based Roles Kristina O’Leary Brian Connor JD Edwards E1 Xe through to Version 9. Product Awareness Sessions. ALL Out Webinar Program www.alloutsecurity.com Product Awareness Sessions (English, Spanish and French) - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Roles, Menus and SecurityBest Practice: Process Based Roles

Kristina O’LearyBrian Connor

JD Edwards E1 Xe through to Version 9

Page 2: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Product Awareness Sessions

ALL Out Webinar Programwww.alloutsecurity.com

Product Awareness Sessions (English, Spanish and French)ALL Out for EnterpriseOneALL Out for WorldALL Out for IBMi

Education SessionsReporting, Segregation of Duties and ComplianceMultiple Roles“Open to Closed without Pain” (E1 only)ALL Out Product AwarenessTask View Best Practice

Technical Webinars – E1 Cost justifying an upgradeChoosing the right platform

Page 3: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

ALL Out for E1 – Xe to Version 9Agenda

ALL Out the company

Product Strategy

Common Practice vs. Best PracticeMultiple Roles in Standard E1Best Practice for RolesBest Practice for Menus (Task Views)Best Practice for Security

StartOut Template from ALL OutStandard Process Based RolesStandard Task ViewRole Based SecurityE1 Pages

Demonstration

Page 4: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

ALL Out

Colorado Registered LLCOracle PartnerSoftware has been Validated by OracleJD Edwards World and EnterpriseOne solution providerEstablished in 2004 to address security and SOX issues faced by JDE clients

Product implements “Best Practice” E1 V9 (in all versions - even in Xe)Security Set-up and ManagementMenu Set-up and ManagementMultiple Roles ManagementReporting & SOD Rules and Reports

ALL Out is a Toolset to help manage standard JDE tables

Page 5: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

E1 Customers – 140+

Hickory Springs - NCKorbel Champaign - CASpirax Sarco - UKPowerStream - ONERCO - ONMenu Foods - ON National Oilwell - TXNektar - CAAEP – NJDean Foods - TXDiamond Foods - CAHarlan – INColbond – NLMeritage Homes – AZMultotec – South AfricaSantam – South AfricaJP Avax - Greece

Hard Rock Hotel - MSMizuno - GAChoctaw Nation - OKHenry Company - CAWBIP – NDBeverly Micro – MAHanson – UKValley Crest – CANorgine – UKBellco Health - NYKenwood Trucks - ANZOil Search – AustraliaMary Kay – TXWestfield – CAChristies Auctions – UKAl Baker – UAEHenry Company - CA

Page 6: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

USER

Role 90

Role 80

Role 70

Role ARole A

Role B Role B

Role DRole D

Role C Role C

E EF F

Tasks and 1 Task ViewRole Based Menu Filtering

SECURITY

Multiple RolesAs designed in E1

Sign on*ALL Roles

Reports & S of D?

Security file empty

Menu + Sec. out of Synch

Role Sequencer Conflicts

If set-up correctlyit virtually eliminates

security management.All you are doing is assigning

and de-assigning roles

Users Switching Roles

Page 7: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Best Practice for Roles

Achieve Best PracticeUse Role Based Menus and Security and E1 PagesSmall Process Based Roles – “Users change – Processes Don’t”Process based roles are necessary to achieve segregation of duties

Role AP Manager will likely contain SoD breachesSecurity needs to be “Deny ALL, Grant Back”Role based security should be “Yes” settings at role levelRole based menu filteringHave separate roles for functional security and data security

Application and action code security in functional roleData security (row and column security) in a separate roleAllows for more flexibility and reusability when assigning roles to users

Roles should not have Segregation of Duties conflicts within themResolve role sequencer conflicts to user or Super Role

Page 8: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

JDE *Groups (Xe) vs. Roles (9.0)

8.9 - 9.1 ERP 8.0 (Solution Explorer)

Xe (OneWorld Explorer)

Security: F00950 ROLES *GROUPS *GROUPS

Security: F0092

ROLES Note: role needs an F0093 environment

records.

*GROUPS Confusingly may also be referred to as SYSTEM

ROLES

*GROUPS

Security: F95921ROLES are assigned to users in F95921 – Note

include in *ALL flag

*GROUPS are assigned to USERS in F0092

*GROUPS are assigned to users in F0092

Roles: F9006 MENU FILTERING (F9006) for ROLES

FINE CUT (F9006) for ROLES

Initial Menu Defined in F0092

Menus MENU FILTERING (F9006) for ROLES

MENU ROLES are defined in the UDC

H95 RL‘G’ Menus

Role RelationshipsROLES are assigned to users in F95921 – Note

include in *ALL flag

MENU ROLES are assigned to USERS in

F95921 – Note ‘Default’ role flag

Assigned in F0092 for USERS and *GROUPS

Page 9: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Benefit of Multiple Role Setup (JDE 8.9++)

JD Edwards/Oracle has invested significant resources into developing multiplerole based menus and security in E1. The concept delivers tremendous benefits.

Process Based Roles Vs. User Based Roles

ROLES = PROCESSES (voucher entry, payment approval, etc.)

ROLES = USERS (AP Clerk, AP Manager)

Processes are relatively static. Once they are defined in E1 they are unlikely to change.

Users come and go, get promoted, move departments – this process inherently implies change.

As a user’s responsibility changes so the role assignment changes, but the underlying menus and security do not.

This implies a lot of security and menu changes and the creation of new role(s) to adjust to the user’s job.

Page 10: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Best Practice for Task Views

Achieve Best Practice for Task ViewsSingle Task View

Shallow Menus – one folder deepClicks cost you money

Remove “Dead Ends” using Menu Filtering

Use local language to reduce staff training

Page 11: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

OneWorld Explorer Menus (Xe/ERP8)

• Users have one initial menu assigned in F0092 (‘G’ Menu)• Need to customize menus if you wish to restrict users to options without using

F00950 security.• Tables are F0082 (menus), F00821 (menu options) and F0083 (menu

descriptions)ALLOut allows you to automatically convert to Solution Explorer – and optionally creating

role Menu Filtering using users’ initial menus.

Page 12: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Solution Explorer Menus (ERP 8 – 9.1)

ApplicationsExternal Call

UBE’s

• JDE programs and folders are defined as ‘tasks’ (Tasks Table F9000) usually as folders (type ‘07’) or as application (‘01’) or UBEs (‘02’).

• ‘Alternative Language’ descriptions can be defined for tasks within table F9002 (Task Alternate Descriptions)

• Tasks are then assigned to one another within a parent/child relationship (Task Relationship F9001)

Solution Explorer permits multiple ‘task views’ to exist – However, ALLOut recommends the use of a single view for simpler maintenance

Task View

Page 13: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Role Based Menu Filtering (FineCut)

Menu Filtering (Fine Cut in ERP 8.0) gives you the ability to hide tasks by role Empty folders are hidden and user will have simpler menus.

Allows unauthorized versions to be hidden without requiring F00950 version level security.

In all versions of JDE, users can choose which role menu they see. We recommend you can force *ALL in 9.0.

The table that stores the fine cut records is F9006.

Page 14: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Security Best Practice

• You need Application and Action Code security• Operate in a ‘Closed’ or ‘Deny All’ security environment• Avoid using ‘N’ Settings, except at *PUBLIC

• Security is easier to understand when the only ‘N’ records in the F00950 table are at *PUBLIC and *ALL level. You should not need many additional ‘N’ settings at the user or role level.

• Use security sparingly at version level and form level• Use this only where specifically required.

• Avoid user level security, put all security in roles• Exception: Resolve role sequencer conflicts at user level• Use small, processed based security so that your work is reusable and clean

• Avoid putting ‘data’ security and ‘program’ security in the same roles• You will need little Solution Explorer Security

• When you have a ‘closed’ system, you do not need Hyper Exit Security! This type of security creates maintenance issues in exponential proportion to the number of records you create.

Page 15: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Why Segregation of Duties

Why Segregation of DutiesSegregation of duties is critical for achieving effective internal controlReduces risk of erroneous and inappropriate actionsCritical functions should be separated among employeesWhen functions cannot be separated, a manual review of activities is requiredSegregation of duties is a deterrent to fraud. One user does not have sufficient access to perform all steps of a process

Example: A user can create a fictitious vendor or make changes to a vendor master file, enter a purchase order for this vendor, and then issue payment to the vendor.

Segregation of Duties in JD Edwards E1There is typically more than one way to initiate a transactionSecuring access via a menu is not sufficient (too many row exits and forms exits that allow a user to access a program)Determining high risk conflicts and implementing effective SOD rules requires a partnership between IT, Finance and Internal (or External) auditorsAutomate user access reporting to determine what rules are being violated

Page 16: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Closed (Deny ALL) vs. Open Security Model

OPEN SYSTEM App + Action Code

CLOSED SYSTEM (“Deny ALL”)

App + Action Code *PUBLIC

*ALL “Y” settings *PUBLIC

*ALL “N” settings

*PUBLIC Some “N” settings

*PUBLIC Some “Y” settings

ROLES or *GROUP Lots of “N” settings

ROLES or *GROUP Lots of “Y” settings

USERS No security or “Y/N” settings

USERS No security or “Y” settings

Page 17: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

JD Edwards “Hierarchy” of effective security records (Xe/ERP8)

1. Form Version2. Form3. Program Version 4. Program5. *ALL Programs

1. Form Version2. Form3. Program Version4. Program5. *ALL Programs

1. Form Version2. Form3. Program Version4. Program5. *ALL Programs

User

*Group/Role

*Public

Stro

nges

t

Wea

kest

Page 18: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

JD Edwards “Hierarchy” of effective security records (8.9++)

1. Form Version2. Form3. Program Version 4. Program5. *ALL Programs

1. Form Version2. Form3. Program Version4. Program5. *ALL Programs

1. Form Version2. Form3. Program Version4. Program5. *ALL Programs

1. Form Version2. Form3. Program Version4. Program5. *ALL Programs

User

Role #20

Role #10

*Public

Stro

nges

t

Wea

kest

Page 19: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

JDE Role Sequencer (8.9++)

Example with Action code Security For access to program P04010

Example with Row Security For access to company field ‘CO’

Actual record for Role 1 (sequence #60) NNNYNY Actual records for Role 1

(sequence #60)

Value Range: 1 thru 1 YYYY

Actual record for Role 2 (sequence #50)

YYYYYYY

Actual records for Role 2 (sequence #50)

Value Range: 3 thru 3 YYYY

What is effective for User

(Winning record is determined by the role sequencer)

NNNYNY

What is effective for User

(Winning records are determined by the role sequencer)

Value Range: 1 thru 1 only

Row security in E1 – Only the role with the highest role sequence is used .

• A role is defined in F0092 but its description and sequencer number is defined in F00926!

• (Note F00926 does not exist in Xe or ERP8)

Page 20: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Best Practice for Process Based Roles

Standard RolesTask ViewSecurity

E1 Page Generator

Page 21: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Standard Process Based RolesComprehensive Role Template

Role Task View Security

Page 22: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Tasks & Task View

Standard Roles

Role Based Security

Process Based Implementation

E1 Pages

Standard Process Based Menus & Roles

YourMenus & Roles

Page 23: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Modify spreadsheet to suit your business.Generate Roles

Page 24: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Select Destination for Roles Worksheet

Page 25: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Copy Roles from Spreadsheet into ALL Out User/Role Maintenance Form

Create F0092 Records for Roles

Page 26: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Next Step: Extract Security

Page 27: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Specify Destination Spreadsheet for Security Worksheet

Page 28: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Copy Security from Spreadsheet intoALL Out Security Upload Form

Page 29: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Paste into ALL Out Security Upload FormCreate F00950 Security Records

Application and Action Code Security for ‘DENY ALL’

Page 30: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Extract Menu and Create Task View

Page 31: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Specify Destination Spreadsheet for Menu Worksheet

Page 32: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Copy from Spreadsheet into ALL Out Menu Management Grid

Page 33: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Create New Task ViewALL Out Menu Maintenance: Form Exit/Task Views

Page 34: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Create a New Task View

Page 35: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Paste into ALL Out Menu Management Gridand click Update to Database

Create F9000 and F9001 Task and Task Relationship Records

Page 36: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Admire Your New Task View(you may need to log out and back in)

Page 37: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Generate E1 Tab Pages from Spreadsheet

Page 38: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Specify Output Location:dat_file is in folder where E1 Generator resides

See Oracle Support Document 1401833.1 (E1: E1Page: Overview, Download, and Quick Start Guide for the E1 Page Generator)

For Tools release 9.1.2 or higher

For Tools release 9.1

Page 39: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Preview dat_files

Page 40: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Run generatPages.bat

Page 41: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Review Output in output_pages

Page 42: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Open folder, and preview html file

Page 43: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Add Page to E1 Environment: P982400Click Add

Page 44: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Enter Object Name, Product code and Page Title.Click Upload Content

Page 45: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Browse and Select the Output Page to UploadUpload the zip file from with output_pages folder

Page 46: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Upload Content and Click ‘View Page’

Page 47: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

View Page in E1!

Page 48: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Define Activity Statuses in UDC 95/US

Page 49: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Define Activity Status Flows: P982405

Simple Status Flow: Editing to Approve. Status flows can be as restrictive or lenient as you need them to be.

Page 50: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Click on Status to Update.In this example, updating from Editing to Approve

Page 51: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

After page is ‘Approved’ Form Exit: Admin/Publish

Page 52: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

From Published User Generated Contents: Click Add and Assign Users and/or Roles to Page

Page Name

User/Role

Page 53: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Publishing Page to Role Creates ‘H’ TypeSecurity Record in F00950 Table

Page 54: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Last Step: Activate PageP982400: Form Exit/Activate

Page 55: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Log Out and Log Back to View Page

Page 56: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

Demonstration

Page 57: Roles, Menus and Security Best Practice:  Process Based Roles Kristina  O’Leary Brian Connor JD  Edwards E1  Xe  through to Version 9

ALL Out Contacts

Sales SupportHazel @ alloutsecurity.com

Consulting

Brian ConnorBrian.Connor@ alloutsecurity.com

Kristina O’[email protected]