How do I integrate J.D. Edwards security with eyko to control user and group access to specific data fields and entities?
Step-by-step guide to integrating J.D. Edwards security with eyko — including user setup, group permissions, field-level restrictions, and access verification.
It covers:
Establishing a system connection to the J.D. Edwards environment.
Setting up users in eyko and assigning their corresponding J.D. Edwards credentials.
Applying group-based security roles inherited from J.D. Edwards.
Viewing, editing, and verifying user-level access in both view and edit modes.
Adding conditional field-level restrictions (e.g., limiting a user’s access to a specific company).
Ensuring security icons and filters reflect access rules in related reports.
Extending or aligning these controls when connecting additional non-J.D. Edwards systems.
Key Steps
1. Establish System Connection 0:12
-
Navigate to any design with a J.D. Edwards System.
-
OR
-
-
Create or establish a system connection to your J.D. EdwardsERP environment.
2. Set Up Users in eyko 0:52
-
Ensure all users are set up in the eyko platform.
-
Assign J.D. Edwards security to users by selecting a user and using the drop-down called JD Edwards user.
3. Assign Security to User Groups 1:17
-
If applicable, assign J.D. Edwards group roles to specific teams (e.g., blue team).
-
Select the inherited security from J.D. Edwards for the group.
4. View Current User Access 2:08
-
Switch to view mode to check current access for users (e.g., Jon Lovar and Bilbo Baggins).
5. Edit User Access 2:30
-
Change to edit mode to modify access.
-
Select the company field from the account master.
6. Add Security Restrictions 2:43
-
Locate question number five: Do you want to add security?
-
Choose to assign security to an individual user (e.g., Bilbo Baggins).
-
Set the condition to allow access only to company 0001.
7. Save Changes 3:25
-
Click save and close to register the security settings.
8. Verify Security Application 3:44
-
Check the field for a unique shield icon indicating security is applied.
-
View the field as Bilbo to confirm access is restricted to company 0001.
9. Understand Report Filtering 4:00
-
Recognize that any report leveraging the account master will filter based on the security settings applied.
10. Consider Additional Systems 4:26
-
If integrating with non-J.D. Edwards systems, plan how security will apply to those systems as well.
Cautionary Notes
-
Ensure all users are correctly set up in eyko before assigning security.
-
Double-check the security settings to avoid unintentional access issues.
Tips for Efficiency
-
Regularly review user access to ensure it aligns with current roles and responsibilities.
-
Document any changes made to security settings for future reference.