Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

George Moroses
/ Categories: Infor LX & BPCS Tips

Infor LX & BPCS Tip of the Week: Item Deletion Option in IDF Enterprise Items

Previously, users were unable to delete items in IDF Enterprise Items when they have inventory balances or the item is connected to ancillary records, such as sales history records. This feature added in LX 8.4 provides the ability to delete an item when sales history records are found but all sales history activity is zero.

When the user attempts to delete an item in IDF Enterprise Items that is tied to a sales history record, the panel displays a message that the item cannot be deleted. The user can then run the Delete Validation Report to determine which records are tied to this item that prevents the validation. If the item no longer has manufacturing activity but had old sales history, the item can be deleted.

Previous Article Infor LN & Baan Tip of the Week: In Transit Inventory Report – LN 10.7
Next Article Infor LN & Baan Product Lifecycle Policy Support Changes for 2021
Print
13184 Rate this article:
5.0
George Moroses

George MorosesGeorge Moroses

Other posts by George Moroses

Theme picker

Contact author

Please solve captcha
x

Tips:  LX | BPCS | M3

Role-Based Security introduces Role type profiles and allows combining the use of Role profiles with the traditional LX User type security profile functionality. The new Role type profile can be defined to allow or deny access to All Products, Attention Key, Products, Programs, and Transaction Effects. Facility, Warehouse, and Company securities are still defined solely by the User profile settings and are not affected by the assignment of a Role. Where applicable, the Role authority is displayed alongside the User authority on the security profile maintenance screens making it easy to see where there are differences in authority between the User and the assigned Roles. 

When Users are assigned to Roles, security access in LX becomes a combination of authorities granted or denied by the Role, plus any User Exceptions. User Exceptions override authorities set by the Roles. A User can also be assigned to more than one Role.

12345678910Last

Theme picker

Tips: LN | Baan

Happy New Year! January is always a great time to reflect on the prior year – what went well, and what didn’t. It is also the obvious time to plan for the coming year – what do I want to accomplish and how can I best achieve my goals?

As the saying goes, “you can’t improve what you can’t measure”, so if you haven’t already, it is time to start putting processes, procedures and programs in place within your company to measure how well each department is doing against their objectives. Start to analyze your numbers and publish them internally. Where are you at currently? Where do you want to be? Seeing both sets of numbers pushes employees to hit those targets. Do this now, and you’ll be seeing positive results before you know it!  

Optimize Your Manufacturing Today!

First104105106107109111112113Last

Theme picker

Categories