Skip to content
  • There are no suggestions because the search field is empty.

How do I integrate J.D. Edwards security with eyko to control user and group access to specific data fields and entities?

Step-by-step guide to integrating J.D. Edwards security with eyko — including user setup, group permissions, field-level restrictions, and access verification.

It covers:

  • Establishing a system connection to the J.D. Edwards environment.

  • Setting up users in eyko and assigning their corresponding J.D. Edwards credentials.

  • Applying group-based security roles inherited from J.D. Edwards.

  • Viewing, editing, and verifying user-level access in both view and edit modes.

  • Adding conditional field-level restrictions (e.g., limiting a user’s access to a specific company).

  • Ensuring security icons and filters reflect access rules in related reports.

  • Extending or aligning these controls when connecting additional non-J.D. Edwards systems.

Key Steps

1. Establish System Connection 0:12

generated-image-at-00:00:12

  • Navigate to any design with a J.D. Edwards System.

    • OR

  • Create or establish a system connection to your J.D. EdwardsERP environment.

2. Set Up Users in eyko 0:52

generated-image-at-00:00:52

  • Ensure all users are set up in the eyko platform.

  • Assign J.D. Edwards security to users by selecting a user and using the drop-down called JD Edwards user.

3. Assign Security to User Groups 1:17

generated-image-at-00:01:17

  • If applicable, assign J.D. Edwards group roles to specific teams (e.g., blue team).

  • Select the inherited security from J.D. Edwards for the group.

4. View Current User Access 2:08

generated-image-at-00:02:08

  • Switch to view mode to check current access for users (e.g., Jon Lovar and Bilbo Baggins).

5. Edit User Access 2:30

generated-image-at-00:02:30

  • Change to edit mode to modify access.

  • Select the company field from the account master.

6. Add Security Restrictions 2:43

generated-image-at-00:02:43

  • Locate question number five: Do you want to add security?

  • Choose to assign security to an individual user (e.g., Bilbo Baggins).

  • Set the condition to allow access only to company 0001.

7. Save Changes 3:25

generated-image-at-00:03:25

  • Click save and close to register the security settings.

8. Verify Security Application 3:44

generated-image-at-00:03:44

  • Check the field for a unique shield icon indicating security is applied.

  • View the field as Bilbo to confirm access is restricted to company 0001.

9. Understand Report Filtering 4:00

generated-image-at-00:04:00

  • Recognize that any report leveraging the account master will filter based on the security settings applied.

10. Consider Additional Systems 4:26

generated-image-at-00:04:26

  • If integrating with non-J.D. Edwards systems, plan how security will apply to those systems as well.

Cautionary Notes

  • Ensure all users are correctly set up in eyko before assigning security.

  • Double-check the security settings to avoid unintentional access issues.

Tips for Efficiency

  • Regularly review user access to ensure it aligns with current roles and responsibilities.

  • Document any changes made to security settings for future reference.

Link to Loom

https://loom.com/share/4cf6708385924fc09a76b9303a685041

Cookie Policy Privacy Policy