Application Instance for Infor
You can create an application instance for the Infor ERP application.
- Select Manage > Monitored applications > Application Instances on the navigation bar.
- Click New and select Infor to create a new application instance for Infor. The New Application Instance page is displayed.
Note: Alternately, you can click the arrow option corresponding to an existing application instance to modify.
- Specify this information:
- Tenant ID
- The ID of the tenant for which the Application instance is created.
- Application Logical ID
- The unique identifier for an Infor application.
- Application
- The type of the application instance.
- Application Instance Name
- The name for the application instance.
- Enable Large Bod Support
- Indicates whether extraction of Large BOD is supported. This option applies to LN Large BOD support.
- Enable Writeback
- Indicates whether provisions created in the GRC application must be written back to the Infor application.
- Query Based Extraction
-
The real time Authorizations Insight data extracted based on the views created in Data Fabric. This option must be enabled only when creating an application instance for extracting data.
When you enable this option these options are displayed. Data Fabric integrates data based on the selected views and the related data is extracted.
- Extract Security Objects
- The real time security related data that must be extracted from Data Fabric.
- Extract Users from Data Fabric
-
The real time user related data that must be extracted from Data Fabric.
Note: You must disable the Enable Writeback option to extract user related data from Data Fabric.
- Extract User Activity Control Objects
-
The real time audit and monitoring related data that must be extracted from Data Fabric.
Note: This option is specific to User Activity Insight.
- Add Secondary Logical IDs
-
The secondary logical IDs that must be added based on the logical ID selected in the Application Logical ID field. Select the check box to add secondary logical IDs.
Note: You can add a maximum of 10 secondary logical IDs.
- Click Save.
Note: Administrators and Business Process Owners must consider the data security and the privacy compliance requirements when assigning permissions to roles for accessing sensitive data. Access provided without detailed review can be misused. Limited and fine-grained access must be provided to users on the need to know and need to use basis. Faulty implementation may lead to risk.