If JavaScript is disabled, please continue to the
sitemap
.
Resources and Security Administration Guide for CloudSuite
Home
Home
Back
Back
Forward
Forward
Search
Help
Copy URL
PDF
Print this page
Help
Help
Copy URL
Copy URL
Topic URL copied to clipboard
PDF
PDF
Print
Hide the Table of Contents
Show the Table of Contents
Before you begin
Overview
Infor Security overview
Infor Security
Infor Security Services (ISS)
Resource Management
Single sign on
Terminology
User
Product Tour
Infor Security Services (ISS)
The Lawson Security Administrator
The Resource Management Administrator
Lawson Security and Resource Management Components
Resources
Attributes
Groups
What Is a Profile?
Functional Profiles
Administrative Profiles
Securable Objects
Types of securable objects
Selecting objects: selector form and icons
Roles
Rules
Security Classes
Setup Overview
User / Actor Setup: Overview
Creating Roles
Creating groups
Adding users and their identities to the Lawson system
Assigning roles to users
Populating optional user attributes
Federated systems: Update users through the LSS tool whenever possible
Lawson Security Setup Overview
Securing Security
Defining Functional Profiles
Creating Security Classes
Creating Rules
Assigning Security Classes to Roles
Assigning a Profile to a Data Source
Working with Resources
Locating Resources through Queries and Views
What Are Views?
Locating Users (Resources), Groups, or Roles
Creating queries
Working with your results list
Updating the entry
People and Thing Resources
Adding People Resources to Resource Management
Adding a Thing Resource
Groups
What Are Groups?
Creating, Updating, or Deleting a Group
Adding a group
Changing a group
Deleting a group
Structures
Structures Overview
Structure Requirements
Structure Rules
Using Unique Node IDs with Structures
Creating a Simple Structure
Creating a Structure
Populating a Structure with Users
Initial System Setup
Application Profile
Create an application profile
Securing Security
Do You Need to Secure Security?
Administrator Securable Types and Securable Objects
Administrative Profile Securable Objects
Selecting objects for administrative profiles
Creating Security Classes for the Administrative Profiles
Writing Rules to Secure the Administrator
To write a rule for securable types
To write a rule for an individual securable object
Writing Rules for Resource Management Administrators
Adding and Updating Users and Identities
General User Requirements
Lawson Portal Users Access Requirements
Online Only Users
Batch Job Users
HR Data Item Security Users
Lawson Self-Service Application Users
ProcessFlow Users
Services Automation (PSA) Users
Privileged Users and Other Default User Requirements
Privileged Identities
Infor Lawson System Foundation Default Environment / OS Identity: Overview
Setting Up the Default Environment / OS Identity
Post-Setup Behavior of the Default User
The OS User and the ONLINE Privileged Identity: Additional Details
Privileged Identity for Batch Jobs (Windows only)
Application-Specific User Requirements
OLE DB Object Services User Requirements
Lawson Design Studio User Requirements
Fax Integrator User Requirements
Infor Lawson Add-ins for Microsoft Office Additional Requirements and Options
Infor Lawson Add-ins for Microsoft Office User Requirements
***
Configuring Infor Lawson Add-ins for Microsoft Office
***
***
Adding (or Updating) an Individual User in an LSF Standalone System
User Setup in Lawson Security: Overview
Checklist: Adding a User to Infor Lawson System Foundation
Create at least one group for batch users
Adding a New Lawson User to Resource Management
Adding an Environment / Operating System Identity on UNIX or IBM i
Adding an Environment / Operating System Identity on Windows
Adding an SSOP Identity for a User
Add Environment Information (Basic) for the New User
Running as another user for configuration and testing
Test a New Lawson User
Updating User Information
Locating the user
Performing an advanced query
Other view options
Disabling a User
Deleting a User
Working with Identities
Adding an SSO Identity to an Existing User
Linking multiple RMIds (Users) to Identities (Manage Identities)
Mass Assigning Attributes to Users: Overview
Mass Assigning Attributes to Users
Example Identity Files
Populating an Identity File: General Steps
Populating SSO Identity Files for the SSOP Service
Populating SSO Identity Files for the Environment/OS Service
Populating SSO Identity Files for Self-Service Applications
Populating SSO Identity Files for the Database Service
Creating Rules and Assigning them to Users
Defining Functional Profiles
Defining a Profile
Assigning a Profile to a Data Source
Creating Security Classes
Creating Security Classes
Securing IOS Web Services
Form Personalization tokens
List Personalization tokens
LSR File Manager tokens
File Manager tokens
Other tokens
Writing Simple Rules
Rule Writing Basics
Basic steps for writing a rule
Unconditional versus conditional rules
General guidelines for writing rules
Writing Rules for All Action Types (ALL_ADD, ALL_CHANGE, ALL_DELETE, ALL_FUNCTIONS, ALL_INQUIRES)
Writing Rules for Various Object Types
Securing Jobs, Job Queues, and Print Files: Overview
How Lawson Security applies security to jobs and reports
Lawson-delivered role for batch users (BatchRole)
Normal user jobs security access needs
System administrator jobs security access needs
Lawson Environment Group utilities
Securing Attachments with Lawson Security
What Are Attachments?
Security Rules for Attachments
Securing Design Studio in Lawson Security
Create the executable dstudio to Secure Design Studio Access
Securing dstudio executable with Lawson Security
Creating an executable for FileMgr to secure Design Studio
Securing FileMgr executables with Lawson Security
Securing Lawson Smart Office Form Personalizations in Lawson Security
Conditional "By Type" Rules
Writing Rules that Validate Values in Actions
Writing More Complex Rules Using Expression Builder and Dates / Times
Expression Builder Overview
Writing Conditional Rules with Expression Builder
Securing batch jobs and reports by user name
User Attributes for Date and Time Rules
Date and time rule attributes
Conditions for updating date / time attributes
Writing Conditional Date and Time Rules
Using the WildCharMatch() and match() Functions
WildCharMatch()
match()
Defining Element Groups
Writing Rules for Element Groups
To write a rule using element groups for specific application forms
To write a rule using groups for the global default level
To write rules that use element group access to control other data access
Writing a Rule to Check Objects within a Range
areElementsInRange syntax
areElementsInRange parameters
Example rules using areElementsInRange
Creating and Assigning Roles
Delivered Security Roles
Administrative roles
Creating, Updating, or Deleting a Role in Resource Management
Adding a new role in Resource Management
Updating a role in Resource Management
Deleting a role in Resource Management
Assigning Roles to Users
Assigning an ActorRole to a Landmark User
What Are Role Overrides?
Assigning Security Classes to Roles
Overriding Security Rules for a Role
Security Reports
Defining and Running Security Reports
Lawson Security Reports
Security report descriptions
Accessing security reports
Report Maintenance Console
Issues with reports
Running Security Reports
Working with Security Reports in CSV Format
Defining the Object Security Report
Defining the Profile Report
Defining the Profile Rules Report
Defining the RM User Attributes Report
Defining the RM User Report
Defining the Role-Security Class Report
Defining the Role-User Assignment Report
Defining the Security Class Report
Defining the Segregation of Duties Report
Defining the Service Report
Defining the User Security Report
Defining the Audit Report
System Configuration and Maintenance Tools
Troubleshooting
Troubleshooting User Access Issues with Lawson Security: Overview
Reference Information
Resource Management Attributes
Resource Management Attributes
Configuring session validation
Open link in new tab
Open link in new window
Copy link to clipboard