If JavaScript is disabled, please continue to the
sitemap
.
Implementing Infor Lawson Security
Home
Home
Back
Back
Forward
Forward
Search
Help
Copy URL
PDF
Print this page
Help
Help
Copy URL
Copy URL
Topic URL copied to clipboard
PDF
PDF
Print
Hide the Table of Contents
Show the Table of Contents
Infor Lawson Security: Overview
About this document
Infor Security Basics
Infor Security
Infor Security Services (ISS)
Resource Management
Single Sign-on
Terminology
User
Security and User Maintenance Implementation Phases
Scenario 1: Small Company: EZShed.com
Who is EZShed.com?
EZShed's Infor Lawson Users
EZShed's Security Model
EZShed's Custom Classes, Rules, and Roles
Identify delivered roles
Create custom roles
Classes and rules for HR and PR power users
Classes and rules for administrative users
Link security classes to roles
Other Security Setup Tasks for EZShed
EZShed's User Worksheet
Another Approach EZShed Could Have Taken
EZShed Purchases New Lawson Products
Scenario 2: Mid-Sized Company: Road Rager, Inc.
Who Is Road Rager, Inc?
Biloxi operation
Brownsville operation
Road Rager's Lawson Users
Executive staff and Sales and Marketing Division personnel
Operations Division personnel
Road Rager Users' Access Needs
Security Roles Used by Road Rager
Securable Objects Used by Road Rager's AP Power Users
Determine Whether Programmatic Security is Used for Road Rager Securable Objects
Types of programmatic security
Determine if Company and Process Level security is in use for an application form
Determine if other programmatic security is used for a securable object
Determine File Access Needed for Selects and Drills (AP Power Users)
What Are Elements and Element Groups?
Road Rager AP Power User Security Rules: Examples
Security Policies for Other Road Rager Lawson Users
How Road Rager Added Users
Other Security Setup Tasks for Road Rager
Scenario 3: Road Rager Purchases Additional Lawson Products
Road Rager Users' Tasks and Access Needs
HR user tasks
HR custom roles
ESS and MSS user tasks
ESS and MSS access needs
Road Rager ESS and MSS Rules
Road Rager Adds and Updates User Data for New Products
New Lawson users
Adding new ESS and MSS users
Scenario 4: Large Company: Kelly's Chicken
Who is Kelly's Chicken?
The Kelly's Chicken Security Model: Location Structure
How Kelly's Chicken "Exposed" LDAP Data to Lawson
Example Rules
Changing All Records Except Current User's
Creating Security Sub-Administrators
Lawson Objects with Programmatic Security
Using Lawson Security with Existing Programmatic Security
Open link in new tab
Open link in new window
Copy link to clipboard