The basics to get you started

Slides:



Advertisements
Similar presentations
EC Admin Functionality Enhancements December 2001 Release
Advertisements

BASIC SKILLS AND TOOLS USING ACCESS
Using EBSCOs Search Box Builder Tool Tutorial. Would you like to promote your EBSCOhost resources by adding an easy-to-use search box to your website?
Support.ebsco.com EBSCOadmin Reports & Statistics Tutorial.
Creating an EDS Search Box Using EBSCO’s Search Box Builder Tool
Microsoft® Access® 2010 Training
Efficient, Productive Solutions SECURITY SOLUTIONS for LAWSON SOFTWARE Part of our RISK MANAGEMENT SUITE FOR LAWSON S3 Thank you for taking the time to.
Contents This guide is designed to help you perform key functions in CAR by providing high level descriptions of how they were done in SAM followed.
Live Excel PRESENTER: Brad Leupen | CTO, Entrinsik |
Microsoft ® Office Access ® 2007 Training Easy Access with templates I: Create a database susanguggenheim-is.com presents:
The basics and troubleshooting tips
MS-Access XP Lesson 1. Introduction to MS-Access Database Management System Software (DBMS) Store data in databases Database is a collection of table.
Student Getting Started Guide *Updated December 2011 to include information on Integrated Digital Book/MindTap Reader.
Useful Tips  How to quickly verify if you are logged on or not  Get the full navigation menu window for e- application  What is a time-out and how to.
29 Tips for Implementing Lawson Security
ProcessFlow The basics to get you started. Have you used ProcessFlow before?
StaffOnline The New Look & Feel January StaffOnline Introduction In keeping up with new technology the StaffOnline has a new look and feel. This.
HOW TO USE THE SYSTEM Specialty Crop Block Grant Program Online System.
FASET Refresher Welcome to the FASET Refresher course. The following screenshots will take you through the basic FASET Demo. Because this is a slide show,
PeopleSoft: Campus Solutions Navigation and Configuration.
1 Introduction to OBIEE: Learning to Access, Navigate, and Find Data in the SWIFT Data Warehouse Lesson 5: Navigation in OBIEE – Touring the Catalog Page.
Microsoft Access 2007 Microsoft Access 2007 Introduction to Database Programs.
ARCHIBUS Log On Instructions. Log Into ARCHIBUS Web Central Log In Screen 1.Open your Internet browser. 2.Enter the URL to view the ARCHIBUS Login Page.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
TIMS LOGIN AND APPLICATION INFORMATION Spring
SMART Agency Tipsheet Staff List This document focuses on setting up and maintaining program staff. Total Pages: 14 Staff Profile Staff Address Staff Assignment.
Classroom User Training June 29, 2005 Presented by:
System for Administration, Training, and Educational Resources for NASA SATERN Overview for Learners May 2006.
AQS Web Quick Reference Guide Changing Raw Data Values Using Maintenance 1. From Main Menu, click Maintenance, Sample Values, Raw Data 2. Enter monitor.
Basic Administration.  Familiarize support staff with basic DSX administrative tasks  Provide expedited service to customers  Minimize the involvement.
Enforcement: Viewing/Editing Your User Profile FMCSA Portal Prioritization Phase I Release, December 2010 v1.4.
Quick Start Guide: Administrator Advanced Learn about: 1.Creating customized Roles in LOAMS 2.Searching and moving users in the hierarchy 3.Modifying accounts.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
Go to the Roseville City School District Website and pull down the Employees menu. Then click Online Services. Scroll down until you see Global Scholar-
Troubleshooting Lawson Security The hacks you need to know.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved Business Driven Information Systems 2e Plug-In T6: Basic Skills and Tools Using.
1 OrderPro Point of Sale (POS) Training Prepared by Christina Van Metre Independent Educational Consultant CTO, Business Development Team © Training Version.
1. Profile settings 2. Messaging system 3. Downloading files 4. Uploading files 5. Creating groups 6. Calendar events.
Chapter 17 Creating a Database.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Plug-In T6: Basic Skills and Tools Using Access 2010 Business Driven Technology.
System for Administration, Training, and Educational Resources for NASA SATERN Overview for Users December 2009.
IFORM ACCOUNT MAINTENANCE ICT4D SESSION 4. IFORMBUILDER WEBSITE REQUIREMENTS To access the iFormBuilder website, you need the following items: -Reliable.
10/28/2015 San Antonio Independent School District Data Warehouse Maps/Streets Membership Demographics Assessments My Child.
Website Editing From Gingerweb The Image Gallery.
1 Moodle Login Professional Development Training.
® Microsoft Access 2010 Tutorial 12 Managing and Securing a Database.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved TECHNOLOGY PLUG-IN T6 Basic Skills Using Access.
Academic 2016 Student Enrolment Day 1 Integrated National Education Information System (iNEIS TM )
Introduction to KE EMu
Gold – Crystal Reports Introductory Course Cortex User Group Meeting New Orleans – 2011.
Introduction to KE EMu Unit objectives: Introduction to Windows Use the keyboard and mouse Use the desktop Open, move and resize a.
Introduction to KE EMu Unit objectives: Introduction to Windows Use the keyboard and mouse Use the desktop Open, move and resize a.
Annual Performance Report ( APR ) Data Entry Workflow.
Microsoft Office 2013 Try It! Chapter 4 Storing Data in Access.
LOGIN PAGE Login Page Support CRM:
Access Module Implementing a Database with Microsoft Access A Great Module on Your CD.
Access Queries and Forms. Adding a New Field  To insert a field after you have saved your table, open Access, and open the table  It is easier to add.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
The Next Step Hudson Fare Files 102 – Import & upload Rev. 10/14.
Installing RMS 3.0 Contractor Mode
NetApp Online Ordering User Tutorial
Practical Office 2007 Chapter 10
LMEvents SharePoint Portal How-to Guide
MODULE 7 Microsoft Access 2010
Approving Time in Kronos Manager/Supervisor Reference Guide
Cases Admin Training.
Logging In Using CAT for the Participant Version 1.6
Tutorial 12 Managing and Securing a Database
New Features in Security Management
Presentation transcript:

The basics to get you started Lawson Security The basics to get you started

Are you on Lawson Security?

What is covered Overview of security past and present Introduction to components and terminology Introduction to the tools and menus A few simple tasks that you’re likely to perform Implementation methodology Troubleshooting

LAUA Security User Security Class Secured Objects HRGENCLASS HR00 PR12 PA52 PA100

LSF Security User Security Roles Security Classes HRSETUPCLASS PRACCESSCLASS PR12 PR13 PR51 PR52 PR67 PR68 HRGENROLE HREMPCLASS HR10 HR09 HR11 HR12 …. PRADROLE PAACTCLASS DATAACCESS PA52 PA100

The Hierarchy (in one profile) User has many Roles have many Security Classes have many Rules

What can you secure? Online: Online Screens (e.g. HR11, PR13, GL00, PO20…) Batch: Batch programs (e.g. PA100, HR211, PR198, GL190…) Files: Database Tables Elements … Not in this presentation Element Groups… Not in this presentation Data Source: The Productline Securable Type Form Program Table

Rule? Grant All Access Deny Any Access Unconditional Access to Action Conditional Rule Access

The Tools Security Administrator RM Administrator Manage Security Profiles Add/Edit Security classes Add/Edit Security rules Assign classes to roles Manage user profiles Run security reports Manage security settings RM Administrator Add/Edit Groups Add/Edit Roles

How to log in For either the Security Administrator or RM Administrator Server: Same sever as your Portal URL (you don’t need to type in the “Http://” User: Has to be a security administrator (there are other user types but for now …) Password: Same password as used on Portal

Menus Add/Edit Users Add users to groups Add Roles to users Manage identities Add/Edit security Classes Assign a Class to A Role Create an run reports

Simple Task 1: Add a role to a user Log into the Security Administrator Select “User Management” section on left side bar Click on “User Maintenance”. Opens new window. Search for the user name by last name. HINT: You can use wildcards. e.g. Rez* will bring back Rezaei Right-click the row and select “Edit RM Information” With the “Role” row highlighted, click on the button to the right “Skip to End”; “Back”; Check “Description”; Next Select Desired role and click the > button Click Finish Close the “Change RM Object” window Acknowledge saving the record Viola

User Search/Edit Right Click

RM Record Should be set to Yes

Assigning Roles

Assigning Roles

Assigning Roles

Simple Task 2: Grant Access to online Screen Log into the Security Administrator Double Click the Profile ID your classes reside in (PRD) Double Click the Security Class to add access to Click the “Add Rule” button Select the securable type. Example: “Online” Expand the system code your securable object is under. Example “IF” Check the object you want to grant access to. Example: CU01 Select “Grant All Access” on the right and click Apply Expand the screen name and select the token you want to grant access to. Example CU01.1 Select “Grant All Access” on the right and click “Apply” Viola: As long as you have access to the system code (Example “IF”) and the DataSource (Example “PROD”).

Granting Access to CU01.1

Did you catch that? To grant access to a securable object like a screen, a batch job, or a database table, you need to grant access to the productline and the system code it resides in. In order to grant access to a specific screen token (like HR11.1). You also need to grant access to the screen (HR11). The fields and tabs in the token are automatically granted unless you deny them specifically.

Simple Task 3: Grant Access Prod Log into the Security Administrator Double Click the Profile ID your classes reside in (PRD) Click “Add” (to add a new Security Class) Name your security class (e.g. “ProdAccess”), add a description and click ADD Click “Refresh” scroll double click your new class. Add Rule Select “Data Sources” from securable type Select “Prod”; on the right select “Grant All Access” Click Apply Viola Skip this

Drop downs and Drills Must grant access to the tables the select or drill draws data from. Table information can be found in the <system code>.or and <System Code>.sr files in $LAWDIR/Productline/??src

Couple of other things LSF Security is grant based. If in any of assigned classes access is granted then the user has access. EVEN IF it’s explicitly denied in another one of the user’s classes. You can write conditional rules based on lots of things. Here are some examples: Data Elements: Company, Process_level, Department, Job_Code Screen Fields User Profile information Date/Time Structures Elements / Element Groups Identities

Implementation 50% Planning 30% Development 20% Testing

Methodology Come up with a good naming convention for roles and classes before you do anything else. These should make sense at a glance and be easy to classify and sorting them should also group them. Start with Roles in the company Determine Tasks each role needs to perform (These will be your security classes) Determine what each task is composed of (These will be your rules) Assign classes to roles Assign roles to users Do one user group at a time, not all at once

Troubleshooting If all else fails in your troubleshooting make sure to: Perform an IOSCacheRefresh Clear all your browsing history and restart the browser Remove all other roles but the one you’re testing from the user Run a security report Check security log files in $LAWDIR/system/ Clear Security Cache under the Server Management section of the security administrator Reduce the “CACHING_INTERVAL” under the server settings in the Server Management section of the security administrator Try it in LID Take a break

July 25 Next Webinar Microsoft Add-ins www.nogalis.com/education.html Simple queries and data loads. July 25 www.nogalis.com/education.html

Q/A @nogalisinc