Terminology used in this guide

This table contains definitions for the most common security terms. For background information about security, including architecture diagrams for Infor Landmark security, see the Landmark User Setup and Security guide.

Term Definition
actor A unique ID of anyone using any part of the system, including Landmark Technology. See user.
authentication Authentication occurs when actors present their sign in credentials to a system.
authorization The set of rules and roles that determines specific access for a system and associated data. These authorization rules and roles provide security access. For example, a user can have access to a solution to update their personal data, but cannot access other users' information.
context property and actor context record A context property is a key field that the actor context record is defined against.

A context record is a filter that determines the information that is displayed. A context record is assigned to an actor to form an actor context record.

When you add a new user you assign a context property value. Typically, the properties are created as part of initial system setup.

FSM This guide occasionally uses the acronym FSM to refer to the Financials & Supply Management product.
HCM HCM is the acronym for Human Capital Management, a product that some customers use in conjunction with Financials & Supply Management.
Note: You may see the acronym GHR in examples of naming conventions and URLs. GHR is an acronym for Global Human Resources, a component of HCM. Some instructions in this document are performed using the GHR application. In those situations, GHR is specified.
roles (security roles) A group of tasks, that is security classes, that determine what a user can do in the system. Typically, a role is determined by the roles' (security roles) specific tasks that a user performs to complete a specific job. For example, the PO_Signoff role includes all security classes that are required to sign-off on purchase orders. These roles are assigned to the user at your site who is responsible for that task.

You can use a set of templates that contain user roles and assigned security classes.

Note: In Analytics, security roles are also used. These roles are administered through the Infor EPM Platform Administration console. As a best practice, use the same roles on each system.
security classes The rules that determine user access. A rule is written against a specific object (business class) that a user requires to perform security classes for a specific job. Security classes are assigned to roles and roles are assigned to users.

To ensure that appropriate individuals have access in appropriate ways, classes are flexible. For example, one class can be used to give access to view a specific report. Another class can be used to give access to update data that is included in a report. The view report class is a read only class. Users who add and update data are assigned an all access class.

single sign on (SSO) An authentication scheme that allows users of multiple Infor systems to sign in once for access to all products.
user A user who has been assigned all required access rights and credentials to perform their tasks in an Infor solution. See actor.