About this document
This document is intended to help you, as a customer who is new to Infor Lawson or new to Infor Lawson Security, understand some basics about the system. For brevity, this document typically uses "Lawson Security" to stand for "Infor Lawson Security" and "Lawson" to stand for "Infor Lawson."
The primary goal of the document is to help you familiarize yourself with Lawson Security terminology and procedures so that you can participate effectively in the security implementation process and understand the product when it is time for you to run it on your own.
The secondary goal is to help you learn about Lawson Security. This goal is secondary because there are other ways that customers can and should learn about Lawson Security, including by attending Lawson training courses and through working with their Lawson consultants.
This document is scenario-based. It describes fictitious installations and explains the roles and rules the "customers" chose to create and why. Scenarios are useful as a way to understand implementing Law Security, because there is no right or wrong way to implement. But there are approaches that make more sense in some situations than others.
The scenarios also assist you in learning about the product because they build upon each other. By learning about the simplest possible implementation first, even if it does not apply to you, you can gain some basic understanding of Lawson Security which will help you better understand the more complex scenarios that appear later. Lawson recommends that you read this guide chronologically at least one time.
In a few cases, details about user management described in this document reflect only a Infor Lawson System Foundation standalone configuration, not a federated installation (in which both LSF and Landmark applications are configured in a federation that shares information about users. However, the general principles are similar.
Brief descriptions of the scenarios contained in this document:
-
Scenario 1 describes a specialized implementation that would only be used by small customers. But, because it is so simple, it is a good place to start reading to get an understanding of the basics of Lawson Security.
-
Scenarios 2 and 3 describe a staged implementation of Lawson Security. The customer implemented in stages so that we could build upon your knowledge to describe additional Lawson Security features. These scenarios, in particular, discuss the basics of Lawson Security.
-
Scenario 4 describes another specialized implementation. In this case, a large company (restaurant chain) with facilities throughout the U.S. makes use of some special Lawson Security features.