Users grid
Grid columns
These columns are displayed in the grid:
- User Selection: Selects users for bulk actions.
- User Details: Opens detailed user information.
- Definition Complete: Indicates if all required user properties are set.
- Full Name: Displays the user's full name.
- User Name: Shows the unique user name.
- Email Address: Displays the user's email.
- Federated ID: Shows the federated identity if applicable.
- Last Login: Displays the date and time of the user's last login.
- Status: Indicates the current status of the user account.
- Email Verified: Indicates if the user's email is verified.
- Password Expired: Indicates if the user's password has expired (Infor Cloud Identities only).
- Account Locked: Indicates if the user's account is locked.
When MFA is enabled, three additional columns are displayed:
- Last MFA Login: Shows the timestamp of the user's last login through MFA (date and time). If the user has never authenticated, the column displays Never Authenticated.
- No. of MFA Registered: Number of MFA devices registered by the user (maximum three devices).
- MFA Status: If any devices are registered by the user, the displayed status is Active, unless the status is Enabled.
Status indicators
There are two types of Definition Complete status indicators:
- Green icon: All required user properties are set.
- Red icon: One or more required properties are missing.
To achieve a green Definition Complete status, you must populate these fields:
- First Name.
- Last Name.
- Email Address or User Name.
- Any required application-specific GUIDs (can be found in the user details).
Check box indicators
There are three types of check box indicators:
- Email Verified: Selected when the user's email is verified.
- Password Expired: Selected when the user's password has expired (Infor Cloud Identities only).
- Account Locked: Selected when the user's account is locked.
Available actions on the Users page
You can apply various actions to users using the Action list, supporting user lifecycle, account recovery, and access control.
These actions are available within the list:
- Activate Draft User: Activates user accounts in the draft status.
- Activate: Activates users who are currently disabled.
- Disable: Disables one or more active users.
- Copy: Copies selected user's permissions to a new user.
- Delete: Deletes one or more users in any status according to deletion type described in: Deleting and disabling users.
- Reset Password (by User): Sends a password reset email to selected users.
- Send Invitation: Sends or re-sends an invitation to users with unverified emails.
- Unlock Account: Unlocks accounts that are locked.
- Reset MFA: Resets MFA and device options for selected users. It is only available when MFA is enabled for the tenant, see: MFA Configuration.
- Set/Reset Password (by Admin): Admins can reset and assign passwords.
Product user reports
You can generate multiple report types to export user and license consumption data. Each report serves a distinct governance and license-management purpose.
To generate reports, select and select Generate Product User Report from the list.
Types of reports that you can generate from the Users page:
-
Summary: Provides a distinct count of active IFS users included in the customer’s entitlement. The calculation includes only enabled user accounts, and excludes internal Infor accounts (identified by an @infor domain in the username or email address). Each user must have at least one security role mapped to an accountable product. To be displayed in the report, a user must log in to the tenant at least one time.
The purpose of this report is to deliver a high-level view of current user-based license consumption across selected products.
Review this report on a regular basis to monitor licensed user consumption and identify potential overuse or growth trends.
-
Product: Lists users by product, with one record per user/product combination. The report identifies which users are counted toward entitlement consumption for each trackable application.
The purpose of this report is to enable organizations to clearly identify which individuals are consuming licenses for each product, supporting effective license optimization and access governance.
Use this report to validate user-to-product assignments, reconcile access against business requirements, and identify users who may no longer require specific product access.
-
User Security Role: Provides a detailed mapping of security roles to products, including the users assigned to those roles. Each user/role relationship that impacts entitlement calculations is explicitly listed to explain why a user is counted for a given product.
The purpose of this report is to highlight the specific security roles that drive product entitlement consumption, enabling precise role management and reduction of unintended license usage.
Use this report during access reviews and role clean-up activities to identify roles that unintentionally grant entitlement, reassign users to appropriate roles, and prioritize removals based on role assignment and activity indicators. After making changes, you should re-export the report to confirm the impact on entitlement counts.