What do the Lawson Base Mingle Roles Control?

  • Infor-SuiteUser” is the end-user role. This is the default role assigned to all the users. Users with this role have access to the portal only. The portal is one of the components of the Infor Ming.le application. The portal consists of a top level header, an app switcher panel, search, the user menu, share, bookmarks, and a right panel (context/utility applications panel). The users with this role only do not have access to the social space or ION-related features.

 

  • The “MingleEnterprise” role provides access to the social space component of the Infor Ming.le application. The social space component consists of activity feeds, connections, and groups.

 

Users who have this role can do these actions:

    • View the activity feed page
    • Post messages to colleagues and groups
    • Create new groups
    • Connect to users and groups

 

  • MingleAdministrator” is the role assigned to users to have access to administration pages in Infor Ming.le.

 

By design, the “MingleAdministrator” role is added to all applications in the tenant. The user with this role can view all application icons on the App Switcher panel. The user’s ability to open the application and access functionality, however, is controlled by the application security.

 

Users who have this role can see the Admin Settings menu item under the profile menu.

 

Users who have this role can do these actions:

    • Manage applications
    • Manage context/utility applications
    • Manage drillbacks
    • Manage general settings
    • The user with the “MingleAdministrator” role also needs the “MingleEnterprise” role in order to administer some of the users’ related features in social space.

These users can also do these actions:

    • Manage users’ feeds and groups’ feeds
    • Delete any Infor Ming.le group
    • Deactivate the users and groups and also reactivate them

 

  • MingleIONEnabled” is a role that allows users to access ION-related features within Infor Ming.le.

ION-related components consist of alerts, tasks, ION notifications, and workflows.

 

Users who have this role can do these actions:

    • View alerts and perform all the actions in the alerts
    • View tasks and ION notifications and perform all the actions in the tasks and ION notifications
    • Alerts and Tasks options are displayed in the user menu for the users who have this role.

Infor NexusTM, the single-instance intelligent supply chain network platform providing unparalleled visibility and collaboration, recently announced a new product to help companies map their multi-tier supply chains and provide evidence to support compliance with regulations such as the German Supply Chain Due Diligence Act and Uyghur Forced Labor Prevention Act (UFLPA) and the French AGEC Law and to document substantiation for product claims.  Per the press release, this new application called Map and Trace, was co-developed with industry leader Burton Snowboards to help companies “connect the dots” between suppliers, their suppliers, and the transactional records supporting the chain of custody. Further, the process of mapping the suppliers and collecting the documentation is highly manual and first requires participation from the tier 1 supplier. Moreover, Map and Trace is the first application that will help Infor Nexus customers achieve greater transparency and traceability across the product lifecycle. Up next, Infor Nexus is expecting to launch a broader traceability solution, providing a digital product identifier and helping comply with regulations such as the EU Digital Product Passport.

 

For Full Article, Click Here

When it comes to cloud computing Amazon Web Services (AWS) is relatively synonymous with everything cloud and cloud security. Tony Bradley, cybersecurity expert and Editor-in-Chief of TechSpective, shares an article on Forbes highlighting AWS’s chief information security officer (CISO) Chris Betz’s insights into AWS’s security strategies, emphasizing the integral role of threat intelligence and the company’s deep-rooted security culture.

AWS’s Approach to Security – “Betz shared that AWS’s security philosophy is centered on proactive and comprehensive protection, treating security not as an afterthought but as a fundamental component of its services. Betz noted that AWS’s infrastructure itself acts as a sensor, providing a broad and deep view of potential threats. This capability enables AWS to respond swiftly and effectively, protecting its customers and enhancing the overall security of the Internet.”

The Importance of Threat Intelligence – “Threat intelligence is a cornerstone of AWS’s security strategy. By tracking and analyzing malicious activities, AWS can preemptively address threats before they impact customers. Betz provided an example of this approach with the tool MadPot, a honeypot framework that has analyzed billions of interactions with malicious actors. This analysis helps AWS to push threat intelligence automatically into AWS services like GuardDuty, AWS WAF, and AWS Shield​.”

The Shared Responsibility Model – “A key aspect of cloud security is the shared responsibility model, which delineates the security obligations of AWS and its customers. Betz emphasized that while AWS is responsible for securing the cloud infrastructure, customers must secure their applications and data within the cloud. This model requires a collaborative approach to security, moving beyond mere compliance to a partnership aimed at collective success.”

Cultivating a Security-First Culture – “Beyond technological solutions, AWS places a strong emphasis on cultivating a security-first culture. Betz described how security is embedded in every aspect of AWS’s operations, from leadership down to individual developers. He shared that AWS’s CEO and leadership team dedicate an hour each week to discuss security with various engineering teams. This practice ensures that security remains a top priority and that lessons learned are continuously integrated into AWS’s processes.”

Empowering Customers – “AWS’s commitment to security extends to empowering its customers. Betz told me that by providing advanced security tools and clear guidance, AWS helps customers secure their environments and protect their data. He also emphasized the importance of customer control, particularly in the context of generative AI and other emerging technologies. AWS ensures that customers have the tools and knowledge to safeguard their data, enabling them to innovate with confidence.”

 

For Full Article, Click Here

When the ADFS Token-Signing certificate is updated on the ADFS server, it will have to be imported to Lawson and Infor OS.  The networking team should let the Lawson team know when the certificate is being updated in ADFS.

Someone with admin rights on the ADFS instance will need to export the certificate and provide you with the “.cer” file before these tasks can be completed.

Update the Certificate in Lawson

Log onto the Lawson Server

Start a ssoconfig -c session

Go to “Manage WS Federation Settings” > “Manage Certificates”

Select “Delete WS Federation Certificate”

Select “Create certificate for “WS Federation”

Select “Delete IdP certificate”

Enter the service name of your ADFS service (if you are unsure, export all the services and look for the one that redirects to  your ADFS server).

Select “Import IdP Certificate”

Enter the service name of your ADFS service

Provide the full path where you have the token-signing certificate saved

Reboot the server

Update the Certificate in Infor OS

Log into the Infor OS server as the LAWSON user

Log into the InforOSManager (should be an icon on the desktop)

Go to Identity providers on the left side

Double-click on your IdP

Select “From URL” to import the new certificate and metadata

Provide the URL: https://<your adfs server>/federationmetadata/2007-06/federationmetadata.xml

Click “Load”

Make sure the certificates load (there may only be one, but there should be at least one)

Reboot the server

 

 

As the today’s digital landscape continue to evolve, so do cyber threats and the ongoing challenges organizations must face. Emil Sayegh, CEO of Ntirety and cybersecurity expert, shares an article on Forbes about the evolving role of cybersecurity in an ever-changing world. From sophisticated cyberattacks to internal vulnerabilities, Sayegh notes that threat complexity is escalating and creating pervasive and multifaceted risks. This in turn requires innovative solutions, prompting a shift in traditional security paradigms towards a more integrated, data-driven approach.

Security Silos No More. – “The days of siloed security operations are behind us. Cybersecurity is now a critical conversation occurring at the highest levels of business and being intricately woven into every facet of operations.”

Navigating Internal and External Threats with Agility – “Organizations must contend with external hackers and internal employees who misuse resources (consciously or unconsciously) or engage in nefarious activities. The adoption of zero-trust models and emphasis on identity threat management in the face of these risks exemplifies a shift towards more sophisticated, data-driven security practices. These approaches not only defend against known threats, but also anticipate and mitigate potential vulnerabilities from within.”

Beyond Traditional Defenses: Embracing Comprehensive Security – “Modern security has evolved from a peripheral concern to a central element of strategic business planning. The harsh reality is that companies can now face closure due to a security breach, as demonstrated by numerous unfortunate instances. This shift signifies a transition from conventional security protocols to a comprehensive security model that integrates every facet of organizational operations. Through such integration, organizations enhance their ability to effectively anticipate, respond to, and recover from cyber threats.”

The Elusive Cybersecurity Nirvana – “Technological advancements, such as artificial intelligence (AI) and machine learning (ML), have revolutionized security monitoring. These technologies enable organizations to detect and respond to threats more efficiently by analyzing vast amounts of data to identify patterns and predict potential security incidents. Comprehensive security encompasses a multifaceted approach that extends beyond these technological defenses to include policy, governance, and human factors. It blends business acumen with security expertise, integrating solutions into an interconnected system that supports business continuity and creates value.”

Building a Resilient Future – “As organizations navigate the intricacies of the threat landscape, cybersecurity success will be defined by an emphasis on risk and resilience, alongside a proactive, data-driven approach. This integration of security monitoring services within a comprehensive security framework represents a pivotal shift in how organizations approach cyber defense. By seamlessly combining advanced monitoring capabilities, strategic planning, and a profound understanding of business operations, organizations can establish a resilient security posture.”

 

For Full Article, Click Here

To suppress Receiving Delivery and Putaway (PO134) delivery tickets when MSCM Delivery Documents are all that is needed is to disable the Back-Office PO Receiving (PO30) Receiving Delivery and Putaway (PO134) delivery ticket by removing the printer from PO Receiving (PO30) or create a dummy printer to stop the back-office delivery ticket from printing.

Removing the printer from PO Receiving (PO30) only works if the user does not have a default printer assigned to them. After being removed, the default printer will simply populate back in the field upon clicking change.

Additionally, an enhancement to PO Company Setup (PO01) was added which provides a flag called “Delivery and Putaway Ticket Print” which allows disabling the delivery ticket printing at the company level.

While artificial intelligence (AI) is a hot topic and an almost necessary feature to add to your business systems, professionals often find themselves unable to truly leverage it. Sometimes they don’t fully understand AI’s capabilities, and other times they don’t fully utilize all the tools AI has to offer. Bernard Marr, strategic business & technology advisor, shares an article on Forbes mapping a strategic blueprint on how businesses should and should not use AI effectively.

Start With Strategy, Not Technology – “Before diving in, companies need to identify clear use cases where AI can have a meaningful impact that is aligned with business objectives. Whether it’s improving supply chain efficiencies, personalizing marketing efforts, or enhancing customer service, the key is to ensure that AI solutions address specific pain points and add tangible value.”

Ethical Considerations And Bias Mitigation – “As businesses explore AI, it’s crucial to address the ethical implications and work actively to mitigate biases in AI models. By maintaining transparency in data and algorithmic processes, companies can prevent the detrimental effects of biased AI, thereby upholding both ethical standards and customer trust.”

Regulatory Compliance And Legal Issues – “Regulatory compliance, including adherence to data protection laws like GDPR in Europe and CCPA in California, must be a priority. A case in point is the healthcare sector, where companies have leveraged AI while rigorously adhering to HIPAA regulations, showcasing how compliance can be seamlessly integrated into innovative AI solutions.”

Technology Infrastructure Requirements – “Modern cloud AI solutions provide an illustrative example of integrating AI into existing IT ecosystems, offering advanced data storage and computing capabilities tailored to support intensive AI operations. Businesses must consider these infrastructure needs early in the planning process to ensure seamless AI integration and scalability.”

The Pilot Paradox – “A common pitfall for many companies is the enthusiasm to create AI pilots without a roadmap for scaling them. These pilots often generate buzz but fizzle out without leaving a substantial impact on the business. Scaling AI requires not just technological readiness but also alignment with business operations and strategic vision. A successful transition from pilot to scale involves meticulous planning, cross-functional collaboration, and, sometimes, a dose of courage to push through organizational inertia.”

Cultivating The Right Culture – “Technology may be at the heart of AI, but people are the soul. For AI to thrive, creating the right organizational culture is paramount. This means cultivating an environment where innovation is encouraged and failures are seen as stepping stones to success.”

Taking People On The AI Journey – “Businesses need to ensure that they take their people along on the AI journey. This involves engaging with employees across all levels—talking, listening, and most importantly, addressing their concerns and aspirations regarding AI.”

Learning And Sharing Best Practices – “Sharing best practices and learnings not only within the organization but also with peers and industry cohorts can provide fresh insights and prevent common pitfalls. This collaborative approach can lead to a more robust AI strategy that benefits from collective experiences and innovations.”

 

For Full Article, Click Here

In Lawson you may run into the following error when a user is trying to change or run a job:

“Cannot run AP520, entire Company run is in progress”

The error can be found at the bottom of your screen (see below screenshot in red box)

 

To resolve this, open and then log in to Lawson Interface Desktop (LID):

Type the following: lapm <enter_your_productline> qmon and press enter

 

Next. find the AP record and delete it. The error should be fixed and disappear. See if the user can now change/run the job. Refer to the screenshots below for a visual guide.

 

The ever-growing presence of cyber attacks and ransomware threats calls for an increased need in cybersecurity efforts for your business. One way to evolve your security operations is with artificial intelligence (AI). With cybersecurity threats evolving rapidly, the combination of AI in your security operations is almost essential. Tony Bradley, cybersecurity expert and Editor-in-Chief of TechSpective, shares an article on Forbes on how to evolve your security operations with AI by finding ways to leverage its strengths to improve security while accounting for its weaknesses and avoiding unnecessary pitfalls. “Automation through AI allows for quicker responses and more effective threat management,” Bradley states, “while AI-driven analytics provide deeper insights into security data, enhancing visibility across diverse and complex environments.”  Matt McKeever, CTO of Cloud Engineering at LexisNexis, adds, “AI can take over the grunt work of filtering through logs and writing detection rules, effectively promoting entry-level analysts to more advanced roles where they can focus on critical decision-making.” Automation with AI has been a game-changer in many aspects of your business systems, and cybersecurity is no different. Bradley notes that AI-driven automation not only speeds up these processes but also introduces accuracy and consistency, allowing humans to focus on more strategic security decisions. Moreover, he stresses that AI is going to continue to play a crucial role in evolving security operations. “By enhancing visibility, automating processes, and leveraging collaborative innovation, AI is setting new standards in the cybersecurity field, promising a more secure and efficient approach to tackling digital threats.”

 

For Full Article, Click Here

Have you ever wondered how to request a new Lawson software license key?

You will need to request a new software license key from your Infor Representative. Here are the steps to do so:

  1. Log into Infor Concierge
  2. In the Application Switcher select the Infor Support Portal application.
  3. At the top click on the Resources menu
  4. Select Request a Software Key > Key Request
  5. Click the Browse button to search for and locate your company name
  6. Fill/Select required fields
  7. Select Next button
  8. Select the product you need a license key for. If what you need is not on the list, then note it in the ‘Notes’ section at the bottom of the page.
  9. Click the Submit button.

 

That’s all you need to do!