Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

George Moroses

Infor LX/BPCS Tips & Tricks for TECHNOLOGY: Update User Security in IDF

Automatically synchronize security changes from LX to IDF, replacing CPYSECIDF. This new process synchronizes users in IDF with those in core LX security whenever a user’s security settings are changed. When a user is deleted from an LX environment, they can also be automatically removed from the IDF environment. Changes to a user’s access to programs in LX are mirrored in IDF. Access to Companies, Facilities, and Warehouses are also synchronized. Additionally, when Business Roles or Business Units access is changed, all users assigned to those roles or units are updated in IDF security.

Previous Article Infor LX/BPCS Tips & Tricks for OPERATIONS: Copy Shop Order
Next Article Infor LX/BPCS Tips & Tricks for FINANCE: Prevent Voiding of Selected Invoices
Print
4512 Rate this article:
5.0
George Moroses

George MorosesGeorge Moroses

Other posts by George Moroses

Theme picker

Contact author

Please solve captcha
x

Tips:  LX | BPCS | M3

Role-Based Security introduces Role type profiles and allows combining the use of Role profiles with the traditional LX User type security profile functionality. The new Role type profile can be defined to allow or deny access to All Products, Attention Key, Products, Programs, and Transaction Effects. Facility, Warehouse, and Company securities are still defined solely by the User profile settings and are not affected by the assignment of a Role. Where applicable, the Role authority is displayed alongside the User authority on the security profile maintenance screens making it easy to see where there are differences in authority between the User and the assigned Roles. 

When Users are assigned to Roles, security access in LX becomes a combination of authorities granted or denied by the Role, plus any User Exceptions. User Exceptions override authorities set by the Roles. A User can also be assigned to more than one Role.

12345678910Last

Theme picker

Tips: LN | Baan

A new standard Inventory Aging report can be printed in the Perform Inventory Aging Analysis (whina1440m000) session. This report is mainly based on the physical incoming and outgoing inventory movements and transactions. The date of inventory consumption or issue is compared to the date of receipt. If inventory is not yet issued, a reference date is used for aging calculation.

The report includes this information:

• Which inventory items are not frequently used or are obsolete.

• How long items have been stored in a warehouse.

• Inventory and transaction values. This facilitates the financial auditing process.

To use this new feature, an inventory aging analysis definition must be available in the Inventory Aging Analysis Definition (whina1140m000) session.

A new In Transit Inventory report can be printed in the Print In Transit Inventory (whinr1410m300) session. The report provides an overview of company inventory that is on the move and not stored in a warehouse. This concerns only inventory that is transferred from one warehouse to another. Items that are shipped to, for example, customers or projects, or items that are issued to production lines or service departments are excluded.

The report shows item inventory quantities and values on warehouse transfer orders which are issued at the origin warehouse, but are not yet received in the destination warehouse. These open inter-warehouse transfer orders represent inventory that is loaded on trucks or other means of transport, or located at intermediate pooling points such as harbors and train stations.

The quantities and values are retrieved from the Item-Warehouse-Inventory Transactions and the Inventory Integration Transactions sessions.


First5960616264666768Last

Theme picker

Categories