Home / Educational Content / JD Edwards / JD Edwards Blogs / The JDE Connection: Episode 60 – Application, Action, Row, and Column Security

The JDE Connection: Episode 60 – Application, Action, Row, and Column Security

JDE Podcast cover image with pictures of host Chandra Wobschall and Paul Houtkooper, with white text that reads Episode 60 Application, Action, Row, and Column Security

Hosted by Chandra Wobschall and Paul Houtkooper

Hey there, JDE Connection listeners! We’re back with a brand-new episode and this week we’re focusing on Security Workbench and configuring application, action, row, and column security. We might not be your go-to experts on TLS or HTML server security, but if you’ve ever had to troubleshoot a missing button, locked-down field, or overly generous user role—this one’s for you.

Why Security Workbench Matters

Security configuration in JD Edwards can be intimidating. It’s not just about locking down access—it’s about making sure the right people have access to the right data, in the right environments, for the right reasons. And all of that starts in the Security Workbench (P00950).

Inclusive vs. Exclusive Security

We kicked off by breaking down the difference between inclusive and exclusive security models:

  • Exclusive: Deny by default. Grant access to specific functions.
  • Inclusive: Allow by default. Restrict access to specific functions.

Choosing the right approach depends on your org’s size, complexity, and maintenance capacity. Either way—don’t switch models without careful planning!

Application Security

This is your front line of defense. Application security lets you grant or restrict access to:

  • Applications
  • Versions
  • Forms
  • Batch Jobs (UBEs)

We talked about how most organizations use role-based access—and why it’s smart to limit direct assignments to individual users. Paul shared how setting access at the right level can reduce record volume, improve performance, and simplify maintenance.

Action Security

Even if someone can access an application, that doesn’t mean they can run wild inside it. That’s where action security comes in. It lets you control access to:

  • Add, Change, Delete Functions
  • Hyperitems like OK, Copy, or Select

We laughed about “disappearing buttons” and how it often comes down to a change in security settings. Tip: learn to describe actions in terms users understand (like “the green plus sign”)—not just CRUD functions.

Row Security

Row security controls what data records users can see or modify. We covered examples like:

  • MCU (cost center) restrictions
  • Home cost center rules for HR/payroll visibility

Inclusive/exclusive settings matter here more than anywhere else. And if you’re handling a large or complex org structure (like multiple branches, regions, or business units), row security can get big fast. Third-party tools or accumulators can help optimize and flatten those records for better performance.

Column Security

Lastly, we covered column-level security, which lets you:

  • Restrict visibility or edit access to specific fields
  • Enforce privacy for sensitive data (like salarySSNtax areas, etc.)

This feature is powerful when used thoughtfully—especially in HR and Finance contexts.

Lessons Learned

  • Plan for scale. Security models should grow with your business.
  • Keep it role-based. Minimize user-level customizations.
  • Audit early and often. Logs and security history are your friends.
  • Communication matters. Users describe problems differently—translate tech speak when needed.

Midwesternism of the Week: Pole Barn

Chris Laping mentioned it, and we couldn’t resist. This week’s Midwest term is a low-cost structure that originated in the 1930s that farmers repurposed telephone poles to build. Fun fact: they’re now used for everything from storing tractors to hosting weddings and dance parties!

Join the Conversation

Have your own security tip or trick? We’d love to hear it! Reach out at [email protected].

Until next time, let’s keep learning, sharing, and—most importantly—laughing together.

Toodles!

Missed an episode? Check out the full episode list! Also, be sure to subscribe on your favorite podcast provider, or select a provider below!

A square image float left with a green border, a grey callout box with "The JDE Connection" in white and grey above a white line and "Quest on Air" in white and grey with a broadcast emblem in green. On either side of the callout are photos of the podcast hosts, Chandra Wobschall and Paul Houtkooper. To the right is a title, "About the Hosts" with text below that reads: Chandra Wobschall is a Manager, IT Business Applications with BrightView Landscapes. She has over 15 years of JD Edwards experience in Financial, Manufacturing, Procurement, Sales Orders, Contracts and Job Costing modules. Paul Houtkooper is the Vice President of JD Edwards Product Development, leading the product development group for both EnterpriseOne and JD Edwards World. He has spent 26 years with JD Edwards, beginning his tenure in applications development helping to design solutions, such as Engineer To Order and Grower Contracts & Pricing.

Learn More

Quest Oracle Community is where you learn. Ask questions, find answers, swap stories and connect to other JD Edwards customers and product experts in the JD Edwards Community, where you can also check out what’s happening in the Business Analyst SIG.

 

The JDE Connection: Episode 60 – Application, Action, Row, and Column Security