When it comes to IPA security access, you can assign the following Lawson delivered roles to IPA users:

 

Delivered role Intended for use by Contains these security classes
InbasketUser_ST Normal end-users who receive work items in the Inbasket BasicProductLineAccess_ST

ProductLineAccess_ST

InbasketUser_ST

Lpa_ST

ProcessSchedulingAllAccess_ST

JobQueueServer_ST Users who must perform actions on the Landmark job queue. BasicProductLineAccess_ST

ProductLineAccess_ST

JobQueueAccess_ST

ProcessDesigner_ST Process developers BasicProductLineAccess_ST

ProductLineAccess_ST

Lpa_ST

ProcessDesigner_ST

ProcessSchedulingAllAccess_ST

ProcessServerAllAccess_ST IPA system administrators BasicProductLineAccess_ST

ProductLineAccess_ST

Lpa_ST

LpaAdmin_ST

ProcessServerAllAccess_ST

ProcessSchedulingAllAccess_ST

ScheduledActionsAccess_ST

ProcessServerReadAccess_ST IPA assistant administrators, power users, developers ProductLineAccess_ST

ProcessServerReadAccess_ST

 

These days, business processes get more and more complicated in both the hardware and software level. Simon Quicke, Microscope Editor – TechTarget, shares an article about the benefits that managed service providers (MSPs) are capitalizing on due to the increasing demand for security services among their customers. There has been a marked rise in interest in cybersecurity solutions, driven by growing threats and regulatory pressures. Customers are now seeking comprehensive security offerings, and MSPs are strategically positioning themselves to meet these needs. The shift towards hybrid work environments has also heightened awareness of security vulnerabilities, prompting organizations to reinforce their defenses. Quickes notes that MSPs are responding to this demand by expanding their security portfolios and enhancing their capabilities. This includes investing in advanced tools and technologies to better protect client data and systems. Many MSPs are forming partnerships with cybersecurity vendors to offer robust solutions. Education and awareness campaigns are becoming common as MSPs aim to guide clients through the complexities of cybersecurity. Customer trust is crucial and MSPs are striving to build long-lasting relationships by delivering reliable security services. Additionally, the integration of security into the overall managed service approach is becoming standard practice. The growth in cybersecurity demand is also reflected in the financial performance of many MSPs. However, the increasing complexity of security challenges requires MSPs to continually innovate and adapt. This often translates to scalability and flexibility in their service offerings. As security becomes a key differentiator in the market, MSPs that can effectively address these demands are likely to thrive. The article concludes by stressing the importance of certifications and ongoing training for MSP staff to stay updated on the latest threats and solutions. Overall, the current landscape presents significant opportunities for MSPs to enhance their services and grow their business in the security domain.

 

For Full Article, Click Here

Searching JXplorer can be cumbersome when you have thousands of Lawson users and possible issues with “rogue” or “orphaned” identities being stored when trying to update identity information.

Below we are going to show how you can easily search for this information vs manually scanning thousands of users.

 

First Select the part of the LDAP tree to search from:

CTRL + F

 

Notice the “Starting Searching From” field, this search will search all trees below this.

Now go into your Text Filter tab and type in parenthesis the field and value you want, click search

 

It will automatically switch to the Results field and show your results:

You can then do another search within these results or go back to Explorer tab and CTRL+F again and it will bring your previous search up.

You can also get creative and search multiple fields and values with an “OR” search:

(|(cn=*jon.doe*)(mail=*jon.doe*)(uid=*jon.doe*)(lwsnssoListOfIDs=*jon.doe*))

This is an AND search:

(&(cn=*jon.doe*)(mail=*jon.doe*)(uid=*jon.doe*)(lwsnssoListOfIDs=*jon.doe*))

 

The | means OR, & means AND. So each field cn, mail, uid etc. have to all bring back a result for it to work. It’s best to use an OR search on average.

Remember, you can also save your searches:

As mentioned above, this is especially useful when finding users in JXplorer to remove any duplicate or “orphaned” RMIDs and Identities not showing up in Lawson Security.

 

Good luck!

The increasing importance of security measures in the digital age highlight the financial implications of cyber threats. Chief Information Security Officers (CISOs) are encouraged to view cybersecurity as a strategic investment rather than a cost center. Tech and business expert Karthik Swarnam, shares an article on MSN and TechRadar on how to maximize cybersecurity return on investment (ROI). The article discusses suggests assessing risk management frameworks to identify critical areas for investment. Establishing clear metrics for evaluating cybersecurity performance is essential. The article recommends leveraging data analytics to measure the effectiveness of security initiatives. Collaboration across departments is crucial for creating a unified approach to security. Engaging with stakeholders can ensure alignment with business objectives and demonstrate the value of cybersecurity investments. The article promotes the idea of continuous education and training for staff to enhance overall security posture. It suggests prioritizing initiatives based on potential ROI and aligning investments with business risks. Furthermore, benchmarking against industry standards can provide insights into effective practices. The use of automated tools is recommended to streamline processes and improve efficiency. Additionally, building a robust incident response plan can minimize losses when breaches occur. The article underscores the need for CISOs to communicate successes to executive leadership, showcasing the value added through security programs. Establishing a strong partnership with IT and incorporating security into the software development lifecycle are also key recommendations. Lastly, adopting a proactive rather than reactive approach can lead to better cybersecurity outcomes and maximize investment efficiency. By focusing on these best practices, CISOs can significantly enhance their organization’s cybersecurity ROI.

 

For Full Article, Click Here

Kris Blackmon, partner marketing director at AvePoint, shares an article on ChannelFutures.com highlighting the critical role of managed service providers (MSPs) and how they help strengthen your organization’s data governance. The article discusses the importance of data governance for Managed Service Providers (MSPs) as data management becomes increasingly critical in today’s digital landscape. It emphasizes three key services that MSPs should provide to enhance their data governance offerings. Firstly, the article introduces data classification, which involves identifying and categorizing data based on its sensitivity and importance. This helps organizations understand their data landscape and manage risks effectively. Secondly, it highlights data lifecycle management, which ensures data is appropriately handled throughout its life—from creation to disposal. Proper lifecycle management helps maintain compliance and reduces the risk of data breaches. Thirdly, the article addresses data protection, emphasizing the need for robust cybersecurity measures to safeguard sensitive information. MSPs must offer solutions that include encryption, backup, and disaster recovery systems. Additionally, the article underscores the role of compliance in data governance. MSPs must keep abreast of the regulatory landscape and help clients navigate complex compliance requirements. By providing these services, MSPs can enhance their value proposition and build stronger client relationships. Furthermore, the article suggests that a proactive approach to data governance can help organizations avoid costly penalties associated with non-compliance. The need for transparency and accountability in data handling is also discussed. Effective data governance frameworks contribute to organizational trust and can enhance reputation. The article concludes by urging MSPs to invest in these key data governance services to stay competitive in a rapidly evolving market. Overall, the focus is on how empowering MSPs with the right tools and strategies can lead to better data governance and improved business outcomes for their clients.

 

For Full Article, Click Here

To do a full manual recompile of a Lawson Program, follow these simple steps:

  1. Open a LID session
  2. Navigate to <LAWDIR>/<prodline>/map/default
  3. Run the command scrgen <prodline> <system code> <program code>
    1. for example: scrgen prod PO PO54
  4. Run the command xscrgen <productline> <program code>
    1. For example: xscrgen prod PO PO54
  5. Run the command lstinvk -q <prodline> <program code>
    1. For example: lstinvk -q prod PO54
  6. Run the command qcompile <prodline> <system code> <program code>
    1. For example: qcompile prod PO PO54
  7. Use the command qstatus to check the status of the compile

 

Once the compile is complete, check your program again. That’s all there is to it!

 

In the prime time of artificial intelligence (AI), consumer trust is more valuable than ever. Greg Brunk Forbes Council Member and Co-founder of MetaRouter, shares an article that highlights how crucial consumer trust is for businesses, particularly as AI technologies become more integrated into everyday life. Transparency is emphasized as a key component in building and retaining consumer confidence. Companies are encouraged to clearly communicate how AI systems work and how consumer data is utilized. Ethical AI practices are also addressed, with the call for fairness and accountability in AI algorithms to prevent discrimination and bias. Brunk suggests that brands should actively engage in discussions about AI-related concerns with their customers. Regular audits of AI systems can help ensure compliance with ethical standards and boost consumer trust. Organizations are advised to prioritize data privacy and security measures to safeguard consumer information. By adopting a consumer-centric approach, businesses can create more reliable AI solutions. Collaboration with stakeholders, including regulators and consumer groups, is recommended to establish trusted AI guidelines. The role of user feedback in improving AI systems is acknowledged as essential for maintaining trust. Companies are advised to be honest about the limitations of AI technology, avoiding overpromising results. The article concludes that by prioritizing transparency, ethics, and engagement, businesses can foster a trustful relationship with consumers in the AI era. Emphasizing the need for a robust ethical framework, the piece argues that these practices can lead to sustained growth and customer loyalty. Ultimately, building consumer trust in AI is both a challenge and an opportunity for businesses looking to innovate responsibly.

 

For Full Article, Click Here

IPA Service definitions can be used to cause or trigger a process to run.

If your site has an event for which work units are delayed or not running for any reason, you can trigger a process to run using the Service Definition in Process Server Administrator.

A process, which is created using Infor Process Designer, routes and tracks the sign-offs that need to occur. In this case, a service, which is delivered with Lawson applications, triggers the launching of the process. It is also possible to create your own service.

  1. Access the Process Server Administrator and select Scheduling > By Service Definition.
  2. From the displayed list of services, double-click the name of the service that you want to trigger the process.
  3. Specify this information:

Work Title

Specify a name for the work item.

Filter Key

If filters have been enabled for users and tasks associated with this service, select an option.

Filter Value

If you are using a filter key, specify a filter value.

For example, if you selected City for a Filter Key, then Chicago might be a valid value.

Apps Key

Specify an application key.

Apps Value

Specify a value for the selected apps key.

  1. Optionally, on the Criteria tab, specify up to three levels of criteria.
  2. If variables are enabled for the service, the Variables tab is active.
  3. If links to documents or other information is available for use with this service, the Related Links tab is active.
  4. When you are finished defining the circumstances, click Actions > Save.

Jody Brazil, tech expert and CEO/Cofounder of FireMon, shares an article on Forbes that discusses the multifaceted nature of network security and the challenges that come with safeguarding digital environments in today’s technologically advanced landscape. It highlights that network security is not just about deploying the latest technologies but also involves understanding the complexities of human behavior and organizational processes. As cyber threats continue to evolve, companies must remain vigilant and adaptable. The article emphasizes that a robust security posture requires a comprehensive strategy that includes risk assessment, incident response, and continuous monitoring. It points out that lack of awareness among employees can often lead to vulnerabilities, making training and education essential components of any security program. Additionally, the increasing sophistication of cyberattacks necessitates a proactive approach to identify potential threats before they materialize. The significance of collaboration between various departments within an organization is also discussed, as security should not solely fall under the IT department’s purview. Organizations are encouraged to foster a culture of security awareness among all employees to mitigate risks effectively. Furthermore, the article notes that compliance with regulations is important, yet it should not serve as the only benchmark for security standards. External partnerships and information sharing are identified as crucial for enhancing security measures, allowing companies to stay informed about emerging threats. The need for investment in advanced security technologies, such as artificial intelligence and machine learning, is highlighted to better analyze and respond to incidents.

 

For Full Article, Click Here

Oleksandr Sheremeta, Forbes council member and Managing Partner and Co-Founder at Dataforest, shares an article discussing the concerns enterprises have regarding artificial intelligence (AI) in 2024. Many businesses are increasingly leveraging AI for efficiency and innovation, but they are equally apprehensive about its potential downsides. One of the primary fears is the risk of data breaches and privacy violations, as AI systems often require large amounts of sensitive information to function effectively. Additionally, there are worries about the ethical use of AI, particularly in decision-making processes that could perpetuate biases. The reliability of AI technologies is another significant concern, as businesses fear errors in AI predictions could lead to substantial financial losses or reputational damage. Companies are also facing challenges in compliance with rapidly evolving regulations surrounding AI technologies, adding to their operational burdens. The complexity of managing AI systems is highlighted, as businesses often struggle with integrating AI into existing workflows and technologies. Job displacement due to automation is a lingering fear, with concerns about the impact on employment rates and worker morale. There is also anxiety regarding the control over AI systems, especially if they begin to operate independently or develop unexpected behaviors. The potential for AI to be misused for malicious purposes, such as cyberattacks or misinformation campaigns, poses significant security threats. Furthermore, enterprises worry about the long-term sustainability of AI technologies, considering the environmental impact of massive data centers. The article emphasizes the need for transparency in AI algorithms to build trust among users and stakeholders. Continuous education and training are necessary to bridge the skills gap and prepare the workforce for an AI-driven future. Companies are encouraged to adopt a cautious approach towards AI implementation, balancing innovation with risk management. It is essential for organizations to establish ethical guidelines and robust frameworks to govern AI use. Collaboration between industry leaders, policymakers, and technologists is vital to address these fears and promote responsible AI practices. Overall, while AI holds immense potential, the challenges and fears associated with its adoption remain pressing concerns for enterprises in 2024.

 

For Full Article, Click Here