Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

George Moroses

Infor LX/BPCS Tips & Tricks for TECHNOLOGY: Update User Security in IDF

Automatically synchronize security changes from LX to IDF, replacing CPYSECIDF. This new process synchronizes users in IDF with those in core LX security whenever a user’s security settings are changed. When a user is deleted from an LX environment, they can also be automatically removed from the IDF environment. Changes to a user’s access to programs in LX are mirrored in IDF. Access to Companies, Facilities, and Warehouses are also synchronized. Additionally, when Business Roles or Business Units access is changed, all users assigned to those roles or units are updated in IDF security.

Previous Article Infor LX/BPCS Tips & Tricks for OPERATIONS: Copy Shop Order
Next Article Infor LX/BPCS Tips & Tricks for FINANCE: Prevent Voiding of Selected Invoices
Print
14590 Rate this article:
5.0
George Moroses

George MorosesGeorge Moroses

Other posts by George Moroses

Contact author

Please solve captcha
x

Tips:  LX | BPCS | M3

You can create new macros in the Infor LX Configurable Enterprise Financials CEA107. 

On the Macro Definition window, you define the source file and the field in which you perform an arithmetic or special operation. For example, you can create a macro to accrue sales commission based on revenue. Your source file and field are the Invoice Line History (SIL) file and the G/L revenue (ILREV) field. 

Select Functions to access the Macro Functions window, on which you define the arithmetic, character, or special operation to process against the defined source field. In the previous example of accrued sales commission, you enter an arithmetic operation of multiply (*) and an operand value for the percentage, such as 0.05 for five percent. 

Note:  Previously created user defined macros will have to be updated to include any expanded field sizes in V84. 

To utilize the Security Rules Optimization feature, a system administrator can assign security codes to 100 pre-defined user groups. User groups are created in the Group Security Maintenance (SYS603) program. All users assigned to this group possess the same level of security.   

A system administrator can assign security codes for up to 100 of the user groups. All user groups over 100 are still administered by all security reject/allow rules assigned to them but are not able to utilize the optimized process. 

Each of the security codes and access levels are assigned to user groups and are mapped to the account strings and stored in the Account Cross Reference (CEA106D1) file.   

Once security codes have been assigned, the system administrator must: 

  • Determine which level each group is allowed access.

  • Determine which segment values/account strings are assigned to which user groups.

  • Create security rules for specific segment values/account strings and assign these groups to the created rules.

  • Select the rules to be processed.  Processing can be done in either batch mode or interactively.

  • The Security Rules flag must be on in the CEA Control Parameters program before any rules are effective. 

FirstLast

Tips: LN | Baan

To create a purchase order (with subcontracting) third party outsourcing from purchase order, execute these steps:

  1. Create a purchase order using the same data set defined in the Subcontracting Models (tisub1100m000) session.
  2. In the Purchase Order Intake Workbench (tdpur4601m200) session, click New. The Purchase Order (tdpur4100m900) session is displayed.
  3. ...

Categories