Security report descriptions

The following subsections provide high-level descriptions of each report. Additional details about the content of each report and instructions for selecting parameters are included in this document. (Perform a search to locate the instructions for defining the type of report you want to create.)

Audit report

The Audit report lists:

  • Changes that have been through Lawson Security to the security setup of selected users (CONFIG option).

  • Instances where users have attempted access that has been denied (ACCESS option).

Object Security report

The Object Security report shows, for a specific profile and for each selected object name within a profile, the security policies and the users who have been assigned to security classes that make use of a particular object or objects.

Profile report

The Profile report lists all profiles and their definitions, including data sources, security classes and rules. This report displays all profiles in your security environment.

Profile Rules report

The Profiles Rules report will output all the security classes and rules that belong to the selected profiles.

RM User Attrib report

The RM User Attrib report will output all the security classes and rules associated with the selected profiles. Aside from the HTML and PDF format, the option to view the report in CSV format is also included.

RM User report

The RM User report displays, for every selected user, general information about users, including identity and role assignments.

Role-User Assignment report

The Role-User Assignment report lists, for each selected role (or all roles if you do not select any), the users assigned to it.

Role-Security Class report

The Role-Security Class report lists security classes that are assigned to roles.

Security Class report

The Security Class report lists the security classes for selected profiles or for all profiles.

Segregation of Duties report

The Segregation of Duties report lets you perform a query about specific security policies that shows which users have (or do not have) access to a specific object.

This highly detailed report can be used for internal and external auditing. You can use it to verify that a user's security policies, including all rules and rule containment) are configured correctly. You could also use it to prove, for example, to persons conducting Sarbanes-Oxley type audits, that only people with need-to-know have access to confidential data. More details about the contents of this report are in the Segregation of Duties report definition section.

Service report

The Service Report lists all services and agents and their definitions.

User Security report

The User Security report lists, for each user selected, the user's security policy.