Please Wait a Moment
X

Infor LX Tips, Infor LN Tips, BPCS Tips, Baan Tips, Infor M3 Tips & Infor ERP News

Crossroads Connections

Infor ERP Tips & News from the Experts

Infor LX | Infor LN | BPCS | Baan | Infor M3

Baan & LN Tip of the Week: Get Real!

Kathy Barthelt 0 42552 Article rating: No rating

You’ve got an ERP system, so everything should be real-time and everyone should have access to information in real-time, right? RIGHT?!

Why not? Why are there spreadsheets, and separate Access databases off to the side?

Data loses value over time, so why not give everyone up to date, accurate information all the time? Take a look at those silos of information and see how you can eliminate them. Your business will benefit greatly as a result.

Optimize Your Manufacturing Today!

BPCS & LX Tip of the Week: Get Real!

Anthony Etzel 0 29797 Article rating: No rating

You’ve got an ERP system, so everything should be real-time and everyone should have access to information in real-time, right? RIGHT?!

Why not? Why are there spreadsheets, and separate Access databases off to the side?

Data loses value over time, so why not give everyone up to date, accurate information all the time? Take a look at those silos of information and see how you can eliminate them. Your business will benefit greatly as a result.

Optimize Your Manufacturing Today!

RSS
First6364656668707172Last

Theme picker

Tips:  LX | BPCS | M3

Role-Based Security introduces Role type profiles and allows combining the use of Role profiles with the traditional LX User type security profile functionality. The new Role type profile can be defined to allow or deny access to All Products, Attention Key, Products, Programs, and Transaction Effects. Facility, Warehouse, and Company securities are still defined solely by the User profile settings and are not affected by the assignment of a Role. Where applicable, the Role authority is displayed alongside the User authority on the security profile maintenance screens making it easy to see where there are differences in authority between the User and the assigned Roles. 

When Users are assigned to Roles, security access in LX becomes a combination of authorities granted or denied by the Role, plus any User Exceptions. User Exceptions override authorities set by the Roles. A User can also be assigned to more than one Role.

12345678910Last

Theme picker

Tips: LN | Baan

Theme picker

Categories