Home / Educational Content / JD Edwards / JD Edwards Blogs / The JDE Connection: Episode 58 – JDE Security – Who Owns It?

The JDE Connection: Episode 58 – JDE Security – Who Owns It?

JDE Podcast cover image with pictures of host Chandra Wobschall and Paul Houtkooper, with white text that reads Episode 58 JDE Security Who Owns It?

Hosted by Chandra Wobschall and Paul Houtkooper

Hey JDE Connection listeners! We’re kicking off a special multi-part series diving deep into one of the most discussed—and debated—topics in the JD Edwards world: security. In this episode, we bring together a stellar panel of experts for a wide-ranging conversation on how different organizations manage JDE security, who owns it, and how practices are evolving. With us for this discussion are three seasoned JDE pros:

  • Andrew Ostdiek – Senior Business Analyst at J.F. Shea Co, Inc, with over 23 years in JDE roles
  • Matthias Freitag – Team Lead CNC at the H&R Group in Germany (our first European guest!)
  • Nimesh Patel – JD Edwards consultant-turned-employee at Hoffman Construction Company

Why This Conversation Matters

If you’ve ever wondered who really owns security in JD Edwards, the answer (according to Clayton Seeley in Episode 48) was simply: “Yes.” Meaning—it’s shared. And this episode confirms it. Everyone we spoke to echoed a blended, cross-functional approach involving CNC teams, business analysts, end users, and auditors.

We wanted to explore how that shared responsibility plays out in real organizations—and what best practices look like when the rubber meets the road.

Highlights from the Conversation

  1. Blended Ownership is the Norm
    Across the board, our guests described security ownership as a shared responsibility. Business analysts often define requirements, CNC teams handle setup and configuration, and service desks or centralized IT teams manage user provisioning. Final signoffs vary—but everyone agrees that it takes a village.
  2. Segregation of Duties (SoD) is Driving Maturity
    Several guests discussed implementing formal SoD frameworks in response to audits or data sensitivity. Matthias described a massive effort to redesign 200+ end-user roles, driven by internal audit requirements. For many, SoD is the trigger that forces more formal processes and consistent governance.
  3. Process-Based, Role-Driven Models Are Standard
    Most organizations are using process-based roles, sometimes layered with company, business unit, or region-specific data security. Everyone agreed that role-based access remains the best model for managing complexity and scale—but it has to evolve with your organization.
  4. The UDO Factor: A New Layer of Complexity
    User Defined Objects (UDOs) have created new security considerations. We talked about the fine line between empowering users and maintaining control. While tools like grid formats and saved queries are relatively safe, orchestrations, logic extensions, and form extensions require tighter oversight.

Andrew summed it up best: “As our UDO footprint grows, so do our responsibilities.”

Lessons Learned

  • Security is never “done.” It evolves with your organization and tools.
  • Collaborative governance is key. The best outcomes happen when IT, CNC, BAs, and business leaders work together.
  • Think ahead with UDOs. As adoption grows, so should your strategy for securing them.
  • Don’t overlook the simple stuff. Something as small as notification visibility or grid format access can impact user experience and data security.

Midwesternism of the Day

No episode of The JDE Connection would be complete without a Midwesternism, yeah, no, yeah?! Yeah, no, for sure!

Join the Conversation

Got your own thoughts on JDE security ownership or UDO security practices? We’d love to hear them. Drop us a line at thejdeconnection@questoraclecommunity.org.

Until next time, let’s keep learning, sharing, and most importantly, laughing together!

Toodles!

Missed an episode? Check out the full episode list! Also, be sure to subscribe on your favorite podcast provider, or select a provider below!

A square image float left with a green border, a grey callout box with "The JDE Connection" in white and grey above a white line and "Quest on Air" in white and grey with a broadcast emblem in green. On either side of the callout are photos of the podcast hosts, Chandra Wobschall and Paul Houtkooper. To the right is a title, "About the Hosts" with text below that reads: Chandra Wobschall is a Manager, IT Business Applications with BrightView Landscapes. She has over 15 years of JD Edwards experience in Financial, Manufacturing, Procurement, Sales Orders, Contracts and Job Costing modules. Paul Houtkooper is the Vice President of JD Edwards Product Development, leading the product development group for both EnterpriseOne and JD Edwards World. He has spent 26 years with JD Edwards, beginning his tenure in applications development helping to design solutions, such as Engineer To Order and Grower Contracts & Pricing.

Learn More

Quest Oracle Community is where you learn. Ask questions, find answers, swap stories and connect to other JD Edwards customers and product experts in the JD Edwards Community, where you can also check out what’s happening in the Business Analyst SIG.

 

The JDE Connection: Episode 58 – JDE Security – Who Owns It?