Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

Anthony Etzel
/ Categories: ERP News, IDF

The Security Model in IDF

By applying security to an object, you can control which users can view the object and which users can create, change, delete or copy the object.

Basic object security allows you to control who can display or maintain an object. Advanced object security allows you to control selectively who can create, change, delete, or copy an object.

In the basic model, all of the maintenance activities are permitted to those users who are authorized to maintain the object. Use the basic security model if you want a user who can change an object to also be able to create or delete the object. Use the advanced security model if you need to restrict some users to changing the object but not creating or deleting the object.

Previous Article Upgrading from BPCS 6.1 to LX 8.3
Next Article IBM to no longer support the AFP Print Utility on the IBM i after version 7.2
Print
27920 Rate this article:
5.0
Anthony Etzel

Anthony EtzelAnthony Etzel

Other posts by Anthony Etzel

Theme picker

Contact author

Please solve captcha
x

Tips:  LX | BPCS | M3

Finance: Cost Rollup by Effective Date
Allow the load standard cost from routing and cost rollup programs to process as of a specified effective date.  With the addition of an optional effective date parameter to prompt screens for cost rollup CST500 and load standards from routing CST600. If entered, only consider bill of material components and routing operations with effective and discontinue dates that make them effective as of the entered parameter effective date.


Operations: Outside Operation Purchase Order Include Vendor Item Number
Copy the vendor item number from the vendor quote to purchase orders created automatically from outside operations of shop orders. During the process of automatically creating purchase orders from outside operations of shop orders, copy the vendor item number from the vendor quote to the purchase order line. With this change, looking at a purchase order that was created automatically for an outside operation of a shop order, the vendor item number from the vendor quote will be visible on the purchase order line.


Technology: Group Security for ILM501 Inbound Delivery Maintenance
Add function key / action code security to control who is authorized to create/revise/delete functions in ILM501 Inbound Delivery Maintenance.  With added Group Security, managers can control which users are authorized to create, change and delete deliveries in ILM501 Inbound Delivery Maintenance.

First678911131415Last

Theme picker

Tips: LN | Baan

All actions required for converting, validating, matching, and posting electronically received bank statements can be performed within a single session:

  • Bank Statement Workbench (tfcmg5610m100)
  • Bank Statement (tfcmg5610m000)

Alternatively, you can use the sequence of electronic bank statement sessions outlined below.

Steps to Process Electronic Bank Statements:

123456789Last

Theme picker

Categories