User security
User information is contained in Active Directory or Infor operating system (OS) and cannot be maintained in YMS. The YMS application includes an administration role for configuring the screens, fields, and access permissions for any of the roles that are created and maintained within YMS. When configuration updates are made, a security BOD with the role is published. Then, any system subscribed to the security role BOD with those security roles can be assigned to each YMS user. Launching YMS from any external system passes in the security token that includes the role assigned to the user. Therefore, the screens and access permission level that pertains to that user are available in YMS.