Overview of Setup Tasks for Internet-Facing Application Setup on Landmark

Preparing users to access applications involves the general procedures shown in the following table.

For CloudSuite customers, some of these steps are performed by your CloudOps or ICS teams.

Task For instructions
Recommendation: Gather (and print) all documents that you need before you begin performing the procedures described here. Not all documentation you might need is in this document. This table contains information about documentation can be found.
Install all required for patches for Landmark.

If you run in the Cloud, it is likely that your CloudOps or ICS team has performed this step for you.

The download page for the product.

Create a new web server on the external machine. Install the application to the web server and then point to the internal application server.

You must perform some of the same configuration for the external web server that you performed for your original (internal) server, including manually propagating and generating plugins between the new web server and the internal application server.

If you run in the Cloud, it is likely that your CloudOps or ICS team has performed this step for you.

Infor Landmark Technology Installation Guide
Create a new domain and configure endpoints for the web server that you will create for this purpose. This includes assigning the endpoints to an SSO service.

If you run in the Cloud, it is possible that your CloudOps or ICS team has performed this step for you.

If you use AD FS for authentication, you or your system administrator must configure a relying party trust for each endpoint. For more information, see the Infor Lawson Authentication Configuration Guide.

Locate the rule file for your system.

The rule file is an XML file that was delivered by your application that enables you to give access to any securable objects (forms, reports and so on) that you want to make available from the Internet.

Your application documentation may also provide some details about updates that you can make to the delivered rule file.

In addition, this document provides examples that you can follow to make or update your rule file if necessary.

Activate the rule file.

  • Copy the rule file to the appropriate location.

  • Activate the rule file.

A later section of this document for on-premises installations..

If you run in the Cloud, your CloudOps or ICS team has performed this step for you.

Infor strongly recommends that you configure vulnerability mitigation. Infor Security provides tools for such things as session validation and cross-site scripting prevention.

If you run in the Cloud, your CloudOps or ICS team has performed this step for you.

A later section of this document for on-premises installations..

If you run in the Cloud, your CloudOps or ICS team has performed this step for you.