Sunteți pe pagina 1din 279

JDE WorldSoft

Technical Training

Day 1
Topics

Software Version Repository(SVR)

Data Dictionary (DD)

User-defined code (UDC)


JDE Security/Profiles
Languages/Jargon

Software Vocabulary
Versions Data Overrides DREAM
Repository Dictionary Writer

User
Defined
Codes
Menus
Help

Utilities
JDE Technical Environment
Software Version Repository
(SVR)
Software Version Repository

What is SVR ?

SVR is a master directory of all files, programs, display forms,


reports, copy modules.

SVR stores member information and member locations of each


member.

SVR is a starting point for all programming and software inquiry


functions.
Software Version Repository

Type SVR on command


line to enter Software
Versions Repository
Software Version Repository

Member
Information

Member
location of
source and
object

Exit to Exit to
program file/report/
source code screen
editing design tools
Software Version Repository (F15 Cross Reference)

Program
P4211 is
called by all
these
programs
Software Version Repository Technical details

A Master Directory of all


MASTER programs, files, forms , reports
FILE
and copy modules
F9801

DETAIL Stores the member locations for


FILE each member master record
F9802
Software Version Repository
To summarize :

Why is SVR used?


SVR is a starting point for all programming and software inquiry
functions.

SVR indicates which libraries the source and object of a particular


member is located in.

SVR provides exits to all programming/design tools

SVR provides access to cross referencing of objects ( by function key


F15 on SVR screen)
Data Dictionary
(DD)
Data Dictionary

What is Data Dictionary?


Data Dictionary is the most powerful element in JDE

Data Dictionary contains:

Data item definitions


Error messages
Help text in Glossary
Alternate row and column descriptions.
Sales Order Screen
Data Items
Order no... __________
Order type _________ The definition of a field on
Order Qty...____________ a video. Data items are
Order Amount...____________ contained in the Data
Dictionary.

The Data Item name for Data Data


the Order no is DOCO. Dictionary Dictionary

This field appears on numerous


application screens and the DCTO DOCO
definition remains the same where-
ever it appears.
Data Dictionary
Data Dictionary (F10 Glossary)
Data Dictionary (F11 Descriptions)
Data Dictionary (F15 Cross Reference)

DD Item
DOCO is
used by all
these
programs
Data Dictionary Glossary Groups

U Work Fields
M Menu Messages
E Interactive Error Messages
J Batch Error Messages
P Program Purpose
H User-Defined Helps
C Data Item Categories
D or S Primary/Secondary Data Items
G General Narrative
L Report Messages
N Program Notes
R Report Data Elements
T Terms
Data Dictionary ( Glossary Group E )
Data Dictionary - Major Technical Files

Data Dictionary Files

Data Item Data Field Data Field Alpha Desc


Master Specs Display Text
F9203
F9200 F9201 F9202

Error Msg Glossary Glossary


Data Item
Program to Text Text Key
Aliases
Call
F9816 F98163
F9204 F9205
Data Dictionary ( Field Reference File)

What are Field Reference Files (FRF)?


The Field Reference Files contain the specifications of each data item
in the JDE Data Dictionary.

The Field Reference Files are useful during FILE DESIGN to reference
the newly defined fields to DD Items.

The Field Reference Files are grouped according to the first characters
of the DD Items.
e.g. All DD Items starting with letter A will be in grouped in file F98FRFA
All DD Items starting with letter D will be in grouped in file F98FRFD
And so on..
DD Item Rebuild Option Menu G9642 Option 1
DD Item Rebuild Option Menu G9642 Option 1
Data Dictionary

Why is Data Dictionary used?

Data Dictionary enforces uniformity, consistency and


accuracy across all JDE applications.
Data Dictionary stores all attributes of each data item
Data Dictionary stores all row/column information of each
data item
Data Dictionary can be used store help information on a
data item
Data Dictionary can store editing/validating information
User defined Codes
(UDC)
User defined Codes ( UDC)

What is UDC ?

UDCs are essentially control files.

UDCs allow you to define the list of allowable values for a data field.

Based on business needs, you can add/change/delete from the list of


allowable values.
User defined code Types (File - F0004)

Country Continent
(55/CN) (55/CI)
System
code Currency code
UDC code
(55/CR)

F0004 - Types
User defined codes ( Header Screen F0004)

System code

UDC Codes
User defined codes Values (File F0005)
F0004
Types Country (55/CN)
Continent (55/CI)
Currency codes (55/CR)

F0005 (55/CR)
(55/CN) (55/CI) Code Description
Code Descrip Code Descriptio USD US Dollar
tion n GBP Pound
CAN Canada EUR Europe SGD Singapore
BEL Belgium ASIA Asia Dollar
AED Arab Emirates
Values Dirham
User defined codes ( UDC Detail Screen F0005)

System code/
UDC Code

UDC Values

Description 1 Description 2
User defined Codes ( UDC)
To summarize:

Why are UDCs used?

UDCs are used for validating entered data.

UDCs makes programs more efficient.

UDCs allow user to control the allowable values for a data field.

UDCs are used for storing the description of each allowable value.

UDCs are used for mapping/conversion programs.


Topics

Menus

Vocabulary Overrides(VO)
Menus
Menus

What are menus?

Menus are basically pathways to the programs in JDE.

Each menu can be created with maximum of 24 options.

A Menu option can link to a program or can link to another menu.

Security can be provided to allow/disallow users to access specific


menus or menu options.
How to access MENU DESIGN ? G92 option 3
MENU DESIGN
Menu Revision Screen G901 Option 1

Header Menu
masking values

Detail Menu
masking values
0-Interactive
Options with 1-Batch
Application
function key
override when
F18 on menu
calling program
option
Example 1 Program Call linked to menu

CL Program
RPG Program
name
name Dream Writer
Version name
Example 2 Menu Call linked to menu

Menu name of
called menu
Menu Selection History Log G901 Option 2
Copy menus between environments G901
option 3
Menu Structure Inquiry G901 option 6
Menus
To summarize:

Why are menus used?


To provide the user, pathways to run programs.

To provide specific access to specific user groups

e.g. Accounts Payable users can be given access only to A/P


programs.

Sales users can be given access only to Sales programs

and so on
Menu Security / Menu Masking
Example 1
Requirement:
It is required to NOT allow user to access menu option 7,8,9 on menu
G4111.
Example 1 : Solution
Solution:
Step 1 : Verify the masking flags for the user profile in G94 Option 2

e.gIn this case flag value = B

Step 2 : Make the masking value for the menu options to be restricted
greater than B ( A > B)

e.gIn this case make the masking values on menu G4111 for menu
options 7,8,9 as A

This will ensure that menu options 7,8,9 are restricted.


Solution : Step 1 : Verify User Profile

Note that Masking flag


is set to B
Solutio : Step : Cha ge e u optio ask to A

Note that Masking flag


is set to A
Solutio : Step : Cha ge e u optio ask to A

Note that Masking flag


is set to A
Solutio : Step : Cha ge e u optio ask to A

Note that Masking flag


is set to A
Menu G4111 : After Menu masking

See how the menu


options 7,8,9 are now
restricted
Menus Technical Files

Menu Revisions
P00MENU

F0082

F00821

F0083
Menu file Normalization

F0090 F0090H

F0082
F00821
F0083
F0082H
Vocabulary Overrides (VO)
Vocabulary Overrides

What are Vocabulary Overrides?


VO is a JDE tool that allows the user to change the column text / row
text on a Report /Screen.

VO is integrated with Report Design and Screen Design

When using VO, there is no need to compile program or change


report/screen design.

VO has 2 important keys Language & Application code

which means that for a single DSPF or PRTF, we have can multiple
VOs with different language / application code.
Example VO for screen V4101

Desc from
Data
dictionary
Override
flag = N
means no
overrides
Example Screen V4101 Item Master

Desc from Desc from


Data Data
dictionary dictionary
Example Changed VO for screen V4101

Changed
text

Override
flag = Y
Example Screen V4101 with Changed text

Desc from
Desc from VO
VO
Press Function key F16 on VO Function Key Definition
Function keys on Screen V4101
Vocabulary Overrides (VO) for
different Application overrides
Example VO for screen V4101 with App.Ovr = 41

App.Ovr =
41

Changed
text for
App.Ovr
41 Override
flag = Y
Example Screen V4101 - called from menu having App.Ovr 41

Desc from
Desc from VO fro
VO fro app ovr =
app ovr = 41
41
Example VO for screen V4101 with App.Ovr = 55

App.Ovr =
55

Changed
text for
App.Ovr
55 Override
flag = Y
Example Screen V4101 - called from menu having App.Ovr 55

Desc from
Desc from VO fro
VO fro app ovr =
app ovr = 55
55
Vocabulary Overrides (VO) for
different language
User profile setup for different language
Example VO for scree V4 with La guage = S

Language
=S

Changed
text for
language
=S
Example Screen V4101 - called by user having
la guage = S

Desc from
Desc from VO for
VO for language
language =S
=S
Menus
To summarize:

Why is VO used?
VO is used to change the column text / row text on a Report /Screen as
required by business users.

By designing different VOs for different languages, it is possible use to


use a Report/Screen in different countries with different language text.

By designing different VOs for different application codes ,it is possible


use to use a Report/Screen in different menus with different literal text.

VO gives the system flexibility to have soft coded text for reports and
screens.
JDE WorldSoft
Technical Training

Day 3
Topics

Job Stream Submissions ( %menus)

Dream Writer
Jobs Stream Submissions
(%menus)
Job Stream Submission

What is Job Stream Submission?


JDE has a special job J81900 which allows you to submit multiple
jobs to the job queue with a single menu selection.

The jobs will run in sequence and if one job fails the rest will
continue.

A special type of menu called the %menu is used to link together all
such jobs.

You can also run a mix of both interactive jobs and batch jobs.
Job Stream Submission

Why are job streams used?


Day-end or Month-end batch jobs
(Batch % menu)
e.gIf we need to run a sequence of batch jobs at day-end or month-
end, we can setup a % menu and list all jobs in sequence.
Run a Sequence of interactive jobs and batch jobs.
(Interactive % menu)
e.gIf we need to run a sequence of some interactive jobs & batch
jobs, we can setup a % menu and list all jobs in sequence.
Setup %menu in Sleeper jobs .
Setup %menu for batch jobs

Batch %menu

Batch jobs
Type SVR on command
line to enter Software
Batch jobs Versions Repository
Setup %menu for mix of interactive & batch jobs

Interactive
%menu

Interactive job
Setup %menu for mix of interactive & batch jobs

Interactive
%menu

Batch job
Type SVR on command
line to enter Software
Versions Repository
How to attach % menu (Batch) to normal menu

Std JDE Job Version


Type SVR on commandBatch %menu
J81900 should be
line to enter Software
Versions Repository ZJDE0001
for Batch
%menu
How to attach % menu (Interactive) to normal menu

Std JDE Job Interactive Version


Type SVR on command
J81900 %menu should be
line to enter Software
Versions Repository *INTERACT
for Interactive
%menu
How to attach % menu (Batch) to SLEEPER setup

Std JDE Job


J81900

Batch %menu
Dream Writer Processing
Dream Writer

What is Dream Writer?


Dream Writer stands for

DATA RECORD EXTRACTION AND MANAGEMENT

Dream Writer is a integral part of JDE.

The Dream Writer, RPG Program and CL Program are integrated to


build a Dream Writer Application Program.

Dream Writer provides flexibility to run programs.

Dream Writer can be used for generating reports, interactive screen


applications and batch jobs.
DREAM WRITER

Form
ID

Version 1 Version 3
Version 2

Region 1 Region 3
Region 2
5 components of a Dream Writer

Version Identification
Additional Parameters
Processing Options
Data Selection
Data Sequence
Major Technical Files

Dream Writer Files

Definition Values And Extended


Ranges Params/Title
F98301
F98311
F9831

Printer File Processing Values for


Overrides Opt Text Process Opt

F98312 F98302 F98303


Dream Writer Menu
Dream Writer Versions List

Form ID =
RPG Program

Versions
Dream Writer Components
Dream Writer VERSION IDENTIFICATION

Language key Title


Dream Writer ADDITIONAL PARAMETERS

Base file on
which
OPNQRYF
command runs

This flag decides


how version
executes at
runtime
Dream Writer Options at runtime execution
Processing Options
Dream Writer Processing Options Setup
Menu G81 Option 2

Date Flag
Processing
Option
sequence no
Data
Dictionary
item

Right
justified flag
Insert
Text Only /delete lines
flag
Display
Level Flag
Dream Writer PROCESSING OPTIONS -
Example
Dream Writer PROCESSING OPTIONS Multiple
Language setup
How to de-activate a Processing
Option
Processing Option 5 Active

Consider
Processing
option 5 Display
level =
Processing Option 5 Active

Processing
option 5 is
active
Verify Display level on User Profile

Display
level = 5
Processing Option 5 Change Display Level

Display
level = 6
Processing Option 5 De-activated

Processing
option 5 is
de-activated
Data Selection
Dream Writer DATA SELECTION
Dream Writer DATA SELECTION with F16
Dream Writer DATA SELECTION with F4 details

This flag is
used for hard *ALL can be
coding data allowed or
selection disallowed
Dream Writer DATA SELECTION with F16

Make Optional
flag = N to
hard code this
data selection
Dream Writer DATA SELECTION with F16

Data selection
is hard coded
to 580
Data Sequencing
Dream Writer DATA SEQUENCING
Dream Writer PRINTER OVERRIDES Option 6
Dream Writer OPNQRYF Statement Option 7
Dream Writer OPNQRYF Statement Option 7
Dream Writer OPNQRYF Statement Option 7
Dream Writer OPNQRYF Statement Option 7
JDE WorldSoft
Technical Training

Day 4
Topics

Libraries

Library Lists & Environments

G944 menu
JDE Installation
JDE Installation LODRUN process

What is LODRUN process ?


LODRUN is an IBM command that installs the libraries needed for the
installation process.

LODRUN process installs 2 new libraries

JDEINSTAL Installation programs

JDFINS upgrade planner

It also creates a user profile JDEINSTAL.


JDE Installation Create Install Plan

What is Install Plan?


An install plan needs to be created which will specify details of the
release level you are installing.

It will also specify details of all the systems sent on tape.


JDE Installation Main Software Install process

What happens in Install process?


This process restores the following libraries from the tape to your
machine

JDFDATA Pristine Data Library

JDFSRC Source Library

JDFOBJ Object Library

This process also creates 2 user profiles JDE & JDEPROD

Post install, it is required to build join logical files, FRF files , JDE
message files.
Install process

Load software

JDFSRC

JDFOBJ

JDFDATA

Create Production
Environment
Libraries
Setup
Libraries
JDFOBJ Std JDE Object Library

JDFOBJ

All JDE
executable

objects.
JDFDATA Std JDE Data Library

JDFDATA

JDE pristine

data files.
JDFSRC Std JDE Source Library

JDESRC

RPG Programs, printer files,


display files, CL programs,
DDS for physical and logical
files.

JDECPY

Common Subroutines

F98CRTCMD Pre-compiler
commands
Std JDE Common Library

Data Dictionary
Software Versions
Repository
Menus
Help
User Defined Codes
DREAM Writer
Next Numbers
Generic Text
Cross-Reference
Std JDE Security Library

User Profiles - F0092

User Display
Preferences - F00921

Users/Library Lists -
F0093

Library Lists - F0094

Pre-Open Files -

F0095
Library Lists
Environments
Library Lists & Environments

A Library List is a
collection of libraries.

A library list defined an


environment or
workspace.

An environment can be
composed of up to 25
libraries.
Example - Production Environment No custom
objects

QTEMP
COMMON
SECURITY
CLTDTA
JDFOBJ
JDFSRC
QGPL
Example - Production Environment With custom
objects

QTEMP
COMMON
SECURITY
CLTOBJ
CLTDTA
CLTSRC
JDFOBJ
JDFSRC
QGPL
Example - Development Environment With
development objects

QTEMP
COMMON
SECURITY
DEVOBJ
DEVDTA
DEVSRC
JDFOBJ
JDFSRC
QGPL
Example - Test Environment With development
objects

QTEMP
COMMON
SECURITY
TSTDTA
DEVOBJ
DEVSRC
JDFOBJ
JDFSRC
QGPL
J98INIT & J98INITA
J98INIT & J98INITA

What are J98INIT & J98INITA ?


These are initial driver programs which allow a user entry into JDE
environments. It is attached to user profile during
CRTUSRPRF/WRKUSERPRF commands.

J98INIT is a single environment driver program.


J98INITA is a multiple environment driver program.

J98INITA allows you to:


Establish library list once and attach multiple users to it.
Create multiple environments where one user has choice of multiple
environments.
Easily transfer between different environments.
Illustration of J98INITA

Library Lists -F0094


Users - F0092

Users Assigned to Library Lists - F0093


Pre-open files

Tied to User Type on User


Information screen.

Specifies which files to open when user


signs on.

JDE supplies several file lists.

Client can customize file lists.


Menu G944
G94 Option 16 Library List Control
G944 Library List Control Menu
G944 Option 2 Valid Library Lists
G944 Option 3 Library List users
G944 Option 4 User Information Revisions
G944 Option 5 Library List Revisions

All Custom
libraries should
be placed above
Sequencing the pristine JDE
of libraries in libraries.
library list

Std. JDE Object,


Source, Data
libraries should
always be at
bottom.
G944 Option 6 User Signon List Revisions

Specify the list of You can specify


environments the starting menu
(library lists) to be for each
attached to the environment the
user. user logs into
G944 Option 7 Library List Global Update
G944 Option 14 Pre-open files setup
G944 Option 15 User Display Preferences

Language preference for


user can be set here. It is
integrated with other JDE
tools like VO,PO,DWV etc

Data format can


be specified here.
JDE WorldSoft
Technical Training

Day 5
JDE WorldSoft (AS400) Basic Navigation

Topics
Login Screen
Navigation using Command line
Navigation using menu options
Navigation using Function keys
Reviewing submitted jobs
Other useful commands
Login Screen
JDE WorldSoft (AS400) Basic Navigation

User ID and Password should


be entered in the Welcome
Screen

4
JDE WorldSoft (AS400) Basic Navigation

Similar to JDE OneWorld, In WorldSoft also User has to


enter with User ID and Password to the system.

Enter Key is used for Saving or Proceeding for next


operation

User can place the cursor position with help of mouse


or Tab button will be used to move the cursor

5
Navigation using Command
line
JDE WorldSoft (AS400) Basic Navigation

Menu or application Number will be


displayed

Commands should be
entered here with numbers
like 1, 2 etc mentioned in
the screen or G41, G4241
etc

7
JDE WorldSoft (AS400) Basic Navigation
All the operations in JDE WorldSoft are performed by entering
some commands in the Command line.

Unlike OneWorld, user cannot get into an application with a direct


mouse click

Unlike the fast path in OneWorld, user cannot enter the application
name (Eg P4310, P4105 etc) and access the application.

User should enter the Menu to which the application is attached in


the Command line like G4241, G41 etc

An application can be accessed by entering the Number in which


the it is appearing on the screen.

8
JDE WorldSoft (AS400) Basic Navigation

Once get into the welcome screen, the Menu or application name
will be displayed in the top left corner of the screen.

Applications are assigned in the screen with corresponding


number.

To see the version attached to the application, type 25 in the


command line. Which will display the application and version name
attached in that menu.

Type the option number (where the application is in the screen like
1, 2 etc) and press Shift F6 which will display the Processing
option values of the application

9
JDE WorldSoft (AS400) Basic Navigation

If you want to find the menu to which an application is attached,


type the application number like P4310, P4210, P4105 and press
F8 which will show all the menus to which the application is
attached

An command can be remember by pressing F9, which will bring


the last command which is typed in the command line.

By pressing F3, user can terminate, cancel or close the


application.

By pressing F12, user can go to the previous screen.

10
Navigation using Function
keys
JDE WorldSoft (AS400) Basic Navigation

To define the operation ADD, Change or


Inquire

12
JDE WorldSoft (AS400) Basic Navigation

Any application will have an action code to find whether to ADD


(A) or Change (C) or Delete (D) or Inquire (I). This is same like
ADD, Cancel, Select buttons in One World

Any details regarding any field will be found by pressing F1


button, which will also act like an Visual Assist in One World to
show the List of values

Committing or Saving the details by pressing Enter button

F7 key is used to find the error details any error occurs

To see the details of a record in the screen, F4 button will help to


fold and unfold the details

13
JDE WorldSoft (AS400) Basic Navigation

Concept of Row Exit and Form Exit are not in WorldSoft, where all
the application links are given in Function buttons.

Any function key which is more than F12 will be entered by Shift
key + Function Key (e.g F13 = Shift F1, F14 = Shift F2, F24 = Shift
F12)

F24 will show the details of the applications which can be


accessed and the function keys which will direct to the application.

All the application records will have an Option field which can be
performed in the line record. (like Save, Delete)

14
JDE WorldSoft (AS400) Basic Navigation

Unlike in One World for BV and IV, both interactive and Batch
versions are accessed by VL Version List.

By entering the VL command, all the versions of any application


can be viewed.

Menu design, User defined codes, Data dictionary and Distribution


AAI can be accessed by the following commands M, UDC, DD and
DMAAI respectively.

Any report or Job can be submitted normally by running the


application, but the result of the application can be viewed by
submitted jobs.

15
Reviewing Submitted jobs
JDE WorldSoft (AS400) Basic Navigation

By entering 33 in the command line, submitted jobs can be


viewed.

Using various options in that application, user can view the details
of the report output in the screen or can save the details into a file.

While viewing the output in the screen user can move the details to
left by pressing Shift + F7 and to right by pressing Shift + F8

Like employee work center in One World, report error and log
details can be seen in the Work with Spooled file application

17
JDE WorldSoft (AS400) Basic Navigation

Various operations can be


performed with respect to
each job by taking various
options

18
JDE WorldSoft (AS400) Basic Navigation

Option 5 is to display in the


screen, 2 is to change the
printer details

19
JDE WorldSoft (AS400) Basic Navigation

Here is the details of the


report output. Details can be
moved right or left. Error
details are also available here

20
JDE WorldSoft (AS400) Basic Navigation

Printer name can be changed


to print the details

21
Viewing data using
QUERY/400
JDE WorldSoft (AS400) Basic Navigation
To view the details of the table, UTB command in OneWorld,
WorldSoft has two commands, RUNQRY and WRKQRY

Both commands are working as same.

After entering RUNQRY, F4 button should be pressed to enter the


File details

After entering WRKQRY, user can move ahead to the next


operation where he can enter the Library details and user can give
the option to find the details, what are all the columns, What fields
to be displayed and what order.

Also in the query specific records can be filtered by entering the


matching criteria

23
JDE WorldSoft (AS400) Basic Navigation

Required file name should be


entered

24
JDE WorldSoft (AS400) Basic Navigation

Here user should enter


which value to be
Next screen for record selection: compared with the required
Select Records one

25
JDE WorldSoft (AS400) Basic Navigation

26
JDE WorldSoft (AS400) Basic Navigation

User can select what option


he wants

27
JDE WorldSoft (AS400) Basic Navigation

User can select what


requirement in the output

28
JDE WorldSoft (AS400) Basic Navigation

Name of the File should be


mentioned here

29
JDE WorldSoft (AS400) Basic Navigation

File content will be displayed


as like as in the picture and to
move the screen right side
press Shift+F8 and to move
left side press Shift+F7

30
Other useful commands
JDE WorldSoft (AS400) Basic Navigation

Command 40 is used to find


the field details of a file

32
JDE WorldSoft (AS400) Basic Navigation

F8 is helpful in finding where (menu) the application is attached.


This will be helpful when user tries to access one particular
application which is not available in the displayed menu.

33
JDE WorldSoft (AS400) Basic Navigation

HS- Hidden Selection will be helpful for finding various options


available for the user based on his security

34
JDE WorldSoft (AS400) Basic Navigation

Various Environments can be viewed and selected by


going to option 30

Security Setup option is available in G94 menu.

CPYSPLF command is used for exporting the data


into some other file like Excel format

STRPDM will show all the files and libraries.

35
JDE WorldSoft
Technical Training

Day 6
Topics

Technical Security

User Security

Action Code Security

Business Unit Security


Technical Security
G94 menu Technical Security
G94 menu Option 14 JDE System values
G94 menu Option 14 JDE System values
WRKUSRPRF User profile
G94 menu Option 15
G94 menu Option 16 Library List Control
G94 menu Option 17 License manager
G94 menu Option 18 Object list overrides
G94 menu Option 19 Audit Manager
G94 menu Option 21 Auditing & Reporting
G94 menu Option 21 Auditing & Reporting
User Security
Why is User Security needed ?
It is needed for setting up the following :

Initial Menu to Execute: This specific menu will appear as a default


when the user logs in.

Initial Program to execute: This specific program will be executed


as a default when user logs in.

Command Entry Flag: This flag can be set as Y/N to allow/disallow


command line access for the user.

Menu Travel Flag: This flag can be set as Y/N to allow/disallow


menu travelling access for the user.

Fast Path Flag: This flag can be set as Y/N to allow/disallow Fast
Path access for the user. (contd)
Why is User Security needed ?
Library List: This is the default library list that will appear as a
default when the user logs in.

User Class/Group: The user can be attached to a specific user


class/group which is defined here.

Batch Job Queue: The default batch job queue can be defined here.
All batch jobs will submitted to this job queue by default.

Output Queue: The default output queue can be defined here.

Address number: The address book number corresponding to the


user can be entered here.
How to access USER Security screen

Access the User Information screen


( Menu G94 Option 2)
The following can be setup:

User Menu Locks

Initial menu to execute

Allow menu traveling

Allow command entry

Allow fast path

User class/group
User Information on G94 Option 2
WRKJOBD Work with job description
Scenarios & Examples

How to restrict command entry for a user:


Allow Command Entry set to N

Limit capabilities *YES in IBM user profile

How to allow menu traveling & fast path for a user:


Allow Menu Travelling Entry set to Y

Allow Fast Path set to Y

How to setup default batch job queue for a user:


Enter the desired job queue in the Batch Job Queue field.
Action code Security
Why is Action Code Security needed ?

In many scenarios, it becomes important to restrict certain actions


in certain applications for certain users.

Action code Security allows to secure any program that uses the
field Action Code.

Restrict users from Adding, Changing and/or deleting on a Program


ID basis. If the security is not setup, users have access to all action
codes.
How to setup Action code Security

From Security Officer Menu G94 choose option 4 for Action Code

Enter a User ID or Program ID.

In the Action Codes fields, enter Y to allow access, or an N to


restrict access.

To allow a profile to perform all actions to all programs, use *ALL in


the program ID for that profile.

Only RPG programs can be secured.

The Action Code Security file is F0003.


Scenarios & Examples

1. It is required to restrict user from Add/Change/Delete on program


P4101.

2. It is required to allow user to only Change/Inquire records from


programs P4071,P4072,P4073.

3. It is required to allow all action codes for group profile *ITSUPPORT.


Example 1 & 2

Scenario 1

Scenario 2
Example - 3

Scenario 3
Business unit Security
Why Business Unit Security is needed ?

In many scenarios, it becomes important to restrict


users to access records from certain business units in
certain applications.

Business Unit security secures records in application


files by Business Unit.

Users are restricted from viewing or entering


information on Business Units they are not authorized
to.
How to setup Business Unit Security

From Security Officer Menu G94 choose option 5 for Business Unit
Security.

On the Business Unit From Thru fields, a range of *Blanks to


*Blanks can be used.

Alphabetic and Numeric ranges cannot be mixed.

The level of security in all cases checks the user first, then group
and finally , *PUBLIC. If none of these are specified, then the user
has global authority to all files that contain Business Units.

The Business Unit security file is F0001.


Scenarios & Examples

1. It is required to allow user-1 access for only business


unit 100 for all applications using business unit.

2. It is required to allow user-2 access for only business


units 100 to 800 for all applications using business unit.

3. It is required to allow all business unit access for group


profile *ITSUPPORT.
Example - 1

Scenario 1
Example - 2

Scenario 2
Example - 3

Scenario 3
END
JDE WorldSoft
Technical Training

Day 7
Topics

Function Key Security

UDC Security

Group Security

Security Hierarchy
Function key Security
Why Function key security is needed ?

In many scenarios, it becomes important to restrict


users to access certain function keys in certain
applications.

Function Key Security allows to set up security on


Function Keys and/or options by form or user.

Function key security becomes important when we


need to allow access to a user/group for a particular
program but restrict the user/group from using specific
function keys.
How Function key security is setup?

From Security Officer Menu G94 choose option 10 for Function Key
Security.

Function Key Security allows to set up security on Function Keys


and/or options by form or user.

Use *Public and *Group for blanket authorities.

Use *All for global authorities.

Secured function keys/options do not display in available


Functions/Options form F24 or F1.

Secured function keys still display on Line 24. Use vocabulary


overrides to remove them.
Scenarios and examples

1. It is required to restrict user-1 access for function keys F3 and F5


for application screen V4211. Access to all other function keys
should be allowed.

2. It is required to restrict user-2 access for function key F7

for application screen V4211. Access to all other function

keys should be allowed.

3. It is required to restrict Group profile *APUSER from

accessing function key F9. Access to all other function

keys should be allowed.


Function Key Security example 1 BEFORE SECURITY

F13 & F16


Scenario 1
are available

Scenario 2

Scenario 3
Function Key Security example

Scenario 1

Scenario 2

Scenario 3
Function Key Security example 1 AFTER SECURITY

F13 & F16


Scenario 1
are restricted

Scenario 2

Scenario 3
UDC Security
Why UDC Security is needed ?

In many scenarios, it becomes important to restrict users to


add/change UDC codes.

Sometimes it is required to provide security at system code level.

Sometimes it is required to provide security at UDC level.

Sometimes it is required to provide security for group profiles.


How UDC Security is setup

From Security Officer Menu G94 choose option 11 for User


Defined Codes Security.

Enter a user ID in the User ID field.

Enter N under the Allow Update field to secure a user from a code
type.

The User Defined Codes security file is F0042.


Scenarios and examples

1. It is required to restrict user update access for system code


00 for all UDCs. Only Inquiry access should be allowed.

2. It is required to allow user update access for system code

41 for all UDCs.

3. It is required to restrict user update access for system code

40 for UDCs AC,AL,AM. Only Inquiry access should be allowed.

4. It is required to allow user update access for system code

40 for UDCs AA,AB.

.
Examples 1-4
Group Security
What is Group profile?

Group profile is a user profile defined for a specific set of user profiles
to be attached.

Examples:

*ITSUPPORT Group profile for IT Department

*APUSER - Group profile for Account Payable users

*APMGR - Group profile for Account Payable Managers

*ARUSER - Group profile for Account Receivable users

*ARMGR - Group profile for Account Receivable Managers


How is Group profile security useful ?

To define consistent security for users within specific areas of activity.

Example:

For Account Payable users,

*APUSER group profile can be created.

All Account Payable users can be attached to *APUSER

Security can be setup for *APUSER.

Benefits:

Security will be consistent for all users within a particular group.

It becomes easy to maintain the security setups for entire set of


users.
How to setup Group profile security

Create a group user profile

Define security for the group user profile

Attach the group profile to User IDs in user security


(User Class/Group)
Establish Group Profile User security
Types of security where Group profile can be set
Types:

Cost Center security

Action Code security

Menu Masking

Function Key security

User Defined Codes security


Security Hierarchy
Security Hierarchy check

The system checks for User Security for each user in the following
order:

1. System checks for User ID in the security files.

2. If User ID is not present, the system checks for the Group Profile.

3. If group profile is not defined for user or does not exist in security
file, *PUBLIC is used.
(*PUBLIC is considered a group profile. *PUBLIC is not delivered
with the System. Add *PUBLIC to activate it . Once added all users
automatically are included.)

4. If none of the above criteria are met, the user has total authority.
Example of Business unit security File level
JDE WorldSoft
Technical Training

Day 8
Topics

Batch Post Security

Dream Writer Security

Menu Security

Best Practices
Batch Approval Security
Batch Approval/Post Security

Set up users/supervisor approval names

Activate Batch Approval/Post Security

Set Management Approval Flag for AP, AR and GA


Batch Approval/Post Security

Batch approval or post security restricts the approval and posting of


batches to certain users.

From Security Officer Menu G94 choose option 7 for


Batch/Approval post.

Press F5 to set up Secured User/Supervisor approval names.

1. Approved by user has authority to post or approve batches.

2. Secured user does not have authority to post or approve batches.


Batch Approval/Post Security
Batch Approval/Post Security

Enter the user IDs in the User fields whose batches the
Approved by user can approve the post.

*ALL valid if Approved By User has authority to all


batches.

Group profile or *PUBLIC is not valid.

Press F3 to return to initial Batch Approval/Post form.

Enter a Y or N for each of the types of batch security


approval/post programs.
Batch Approval/Post Security
How to setup Batch Post Security

Set Management Approval to Y in the Constants for


each system. This parameter is in the following Setup
menus:

1. Menu G0941 option 2 (General Accounting Constants)

2. Menu G0341 option 2 (Accounts Receivable


Constants)

3. Menu G0441 option 2 (Accounts Payable Constants)


Batch Approval/Post Security
Approval Security in GA Constants
Approval Security in A/R Constants
Approval Security in A/P Constants
Dream Writer Security
Report Version Security

Reassign security for DREAM Writer


reports.

Restrict other users from executing,


changing, copying, or deleting versions.
Report Version Security

Report version security reassigns security for DREAM Writer


versions. Restrict other users from executing, deleting and copying
versions.

Initially, place security on DREAM writer when user creates the


version. Use Report version utility to apply or remove DREAM
writer security.

From Security Officer Menu G94 choose option 8 for report


Version.

1. Enter User ID and Form ID that has to be changed.

2. Enter a security code in the security code field.


Report Version Security G94 option 8
DW Version Security User Exclusive field
DW Version Security User Exclusive field
Menu Security
Menu Security

Menu security is determined by the combination of user


keys and menu locks.

Menu masking can be done at the menu level or the


selection level.
Menu Masking

There are five fields in User Information and Menu Locks, as:

1. A (Authority)

2. J (Job)

3. K (Knowledge)

4. DP (Department)

5. F (Future Use)

The lock fields secure the entire menu.

The Sel Lock fields secure a specific menu selection


Menu Setup screen
Menu Masking Comparison

Two types of comparison in Menu Masking:

1. Direct comparison, which requires an exact match between the J,


DP or F fields both on the menu and in the user profile.

2. Hierarchical comparison , on the A and K fields Blank, A-Z, 0-9,


which the system evaluates as Blank is greater than A is greater
than Z is greater than 0 is greater than 9, which has the least
authority.

The system checks each lock/key field beginning with A, then J, K,


DP and F; must pass all five to have access
Menu Lock Illustration

Fields A and K are hierarchical.

Blank = no security Blank


A
9 = lowest security Z
0
9

Fields J, DP and F are direct comparison.


A A
Menu Masking Example
Authoriz Job Knowledge Departme Future Authority
ation Mask Mask nt Mask Use to User
Mask Mask
USER B AP
Menu Sel 1 B AP Allowed

Menu Sel 2 B A Allowed

Menu Sel 3 C C Allowed

Menu Sel 4 A Disallow

Menu Sel 5 B AN Disallow

Menu Sel 6 D AN Disallow


Best Practices
Review User Security

Displays overall view of security.

Set security for all your users from


this screen.
Best Practices in Security

Create a plan, considering control files, videos, other sensitive


information and hidden selections.

Segregate users into groups. Create group profiles.

Create Special group profiles for super users.

Use Action code security and business security as per business


requirements.

Use Function Key security to lock up sensitive videos, such as payroll


or master screens that are accessible from transaction screens.

Use menu masking to secure important selections which is to be


restricted for general users.

S-ar putea să vă placă și