Setting Up Security

  • You must ensure that the appropriate security setup is in place. The security setup determines who can see plan details.
  • You must define the budget manager role. This role is specific to Labor Budgeting. Users assigned to this role can edit plans at their level in the hierarchy and below.

Each user’s security information, including login details, the teams to which the user belongs, and the user’s role within each team is defined on the User Role Details page in the Security module.

The Security hierarchy determines which users are authorized to view which teams of employees in the system.

To view user role information:

  1. Select Maintenance > Security > Team Security > User Roles.
    The User Role Details page is displayed.
  2. Choose one of these options to view user role details:
    Teams

    Teams organize users into specific, logical groupings and define which authorized users can view information about other users within these groups. Select a team using the Team lookup to view all the users assigned to that team and their roles. Optionally, select the Sub Teams check box to view all teams below the current user’s team in the hierarchy.

    Users
    A user. Select a user using the User lookup to view the teams to which that user belongs and his or her roles in each of those teams.
    Roles
    Roles define an employee’s function within the organization and defines the relationship of the user to other employees. Common roles include Supervisor and Manager. Select a role using the Role lookup to view all users assigned to that role and the teams to which they belong.
  3. Click Go.

    The application displays the user role information.

    For example, the user generates a list of all budget managers in the system by selecting Budget Manager from the Roles drop-down list of the User Role Details page. The application displays all the users assigned to the budget manager role, the teams to which they belong, and all other users on each team. These users are all the users who are authorized to edit the plan.

    For example, BDG3520_USER is the budget manager for team BDG3520. The user BDG3520_USER is the only user on Team BDG3520 who can edit the team’s plan and any other plans below that location.

Suppose that an organization consists of the following five hierarchical levels:

  • Corporate
  • Division
  • Region
  • District
  • Store

From the top of the hierarchy, a corporate user can:

  1. drill down to view the plan for all divisions within the organization
  2. drill down further within a division to view the plan for each region
  3. drill down even further within a specific region to view the plan for each district in the region
  4. drill down within a specific district to view the plan for an individual store within that district

In this hierarchical configuration, the user (parent) can drill down the hierarchy to view the plan details of the locations below them (children). However, the user of a child location cannot view the plan of the parent location above it. These restrictions are set up as part of the team security structure.

Note: 

The system administrator typically defines users, security teams, security hierarchy, and roles in the Security module. See the Infor WFM Time and Attendance Implementation and Administration Guide.