OUT — Details
The OUT — Details screen is the raw Object Usage Tracking record. One line per (Application, Component, User, Object, Version) quintuplet — every distinct call captured by the source system, with the timestamp of the most recent invocation.
This is the data set behind every aggregation Nomasx-1 produces — OUT — Components, OUT — Users / Roles, OUT — Objects, Last Usage in the user audit.
At a glance
Goal of the view
For each (user, object, version) tuple ever invoked on a connected application:
- The raw evidence. Every other OUT view is an aggregation of this dataset — when something looks off in the summary, this is the screen to drill into.
- Per-user per-object timeline. Filter on a user and read the full inventory of what they have ever invoked, sorted by date.
- Component traceability. The hidden Component column carries the licence bucket — used internally by drill-down navigation from OUT — Components.
This view is built on top of LICENSE_JDE_OUT — the JDE Object Usage Tracking table. The component dimension is derived from the System Code mapping. Other source systems can produce an equivalent dataset by exposing their own usage / audit log.
Columns
| Column | Source | What it tells you |
|---|---|---|
| Application ID | LOUT_APPS_ID — application identifier. Filterable. | The connected application. |
| User ID | LOUT_USER — user identifier. Filterable, scoped to the application. | Who invoked the object. |
| Object | LOUT_OBJECT — technical object. Filterable. | What was invoked. |
| Description | JDEO_DESCRIPTION — friendly object label. | Human-readable label of the object. |
| Version | LOUT_VERSION — processing version. | Which configuration variant was used. |
| Last usage | LAST_USAGE — date of the most recent invocation. | When the call happened. |
Hidden columns kept on the row: CPT_ID (used by the drill-down from OUT — Components).
Tips & best practices
- Filter on a User ID + sort by Last usage descending — the user's usage trail, ordered. Anything older than the access-review window is fair game for revocation.
- Filter on an Object to see every user that invoked a given program, plus the dates. A long-tail of dormant users on a sensitive object is the cleanest revocation argument.
- Compare with the Rights matrix — a user invoking an object without an obvious declared right means either an inherited rule (cross-check with
*ALLsign-on) or a security bypass. - A row with a recent Last usage on a sensitive object is one of the strongest evidence pieces for an audit — file the line under the relevant SoD finding.