The BATCH privileged user will only be used for standard Lawson batch programs. If the LSF environment is configured to use the BATCH privileged user and a batch job executes a user token with a script goes into “Needs recovery” status with the error: “execjob(laStartProcess): Unable to log in DOMAIN\USERNAME StartStep failed: Overlapped I/O operation is in progress”, then its possible that the users password has been changed or expired on the network.
The user’s password for their environment identity found in Lawson Security under User Management MUST match the user’s domain/network/AD password. This is required by user tokens. To resolve this issue so user tokens run to completion, the Lawson Security Administrator will need to update the environment identity password for the user running the job so it matches their OS/AD password, OR the system would need to be configured so the user could enter their own password so it matches their OS/AD password.
Back in 2003, Salling Group implemented Quest PLM (product lifecycle management) and started digitalizing all design and development lifecycle processes, from sketch to store. Since then, Quest PLM has been acquired by Infor, and in 2016 Salling Group transitioned to the on-premises solution Infor Fashion PLM. In January 2023, the company decided to upgrade to the multi-tenant cloud version of PLM, which was successfully finalized nine months later. Per the press release, Salling Group needed a more flexible and high-performing PLM solution that was future-ready to address the fashion industry’s increasing demands for reporting and sustainability. Infor’s Cloud-Based PLM suite was just the solution. Additionally, Ptex Solutions, based in India, helped Salling Group implement the cloud-based Infor PLM for Fashion. The company is responsible for 90 percent of Infor’s PLM implementations worldwide. Previously, Ptex had also implemented on-premises PLM at Salling Group, so the team was familiar with their requirements. Moreover, according to Karen Tretow-Loof, users are extremely surprised by the short implementation phase and the intuitive, personalized user interface. “Usually, when you go live, a lot of bugs pop up that need to be fixed. But this time, there were very few bugs. It has to do with us being good at testing, but even more so with Ptex Solutions being so good at implementing PLM. Their customer-focused approach to implementation has contributed to success throughout the entire organization, which is why we have credited the overall project a score of 10/10,” she says.
There may be an instance when you are getting an error in Lawson Security Administrator (LSA) stating that the “Data area has been suspended”. This happens when you are adding a rule to a security class. This error usually occurs after running dbreorg without stopping your LSF WebSphere Application Server prior to the execution of dbreorg.
To resolve this issue, follow the steps below:
- Stop LSF WebSphere Application Server
- Stop LSF WebSphere Node Agent
- Stop LSF WebSphere Deployment Manager
- Make sure that there are no java processes
- Stop your LSF environment
- Start LSF WebSphere Deployment Manager
- Start LSF WebSphere Node Agent
- Start LSF WebSphere Application Server
- Start your LSF environment
When we integrate security and IT operations, cybersecurity becomes increasingly important and should be at the top of your list to maintain and set in place. There are Recently CrowdStrike announced new offerings that may change how cybersecurity and IT operations unify to harness the power of generative AI (artificial intelligence) to protect against breaches more effectively. Tony Bradley, tech expert and Editor-in-Chief of TechSpective, shares an article on Forbes on how systems like CrowdStrike harnesses the power of AI for your cybersecurity. Bradley notes that at the heart of CrowdStrike’s new suite is Charlotte AI, a conversational AI that promises to transform how security teams interact with their cybersecurity tools. By leveraging foundational AI models, Charlotte AI enables security analysts at all levels to ask complex queries in plain language and receive actionable insights in real time. In addition, with the increasing popularity of AI comes an increased (if not more) risk of data sensitivity and data exposure. How so do we manage this? Bradley states that “CrowdStrike is striving to address this risk with enhancements to Falcon Data Protection, which has been updated to prevent data leakage to web-based, commercial generative AI tools. By providing comprehensive policies that track content movement and prevent unauthorized sharing or uploading, Falcon Data Protection aims to address a gap in traditional Data Loss Prevention (DLP) solutions.” Lastly, with AI in cybersecurity, there can be a unified front against cyber threats. “CrowdStrike’s latest offerings represent a strategic move towards a more integrated, AI-powered approach to cybersecurity and IT operations,” notes Bradley. “Unifying these traditionally separate domains under a single platform and leveraging the power of generative AI can enhance the efficiency and effectiveness of security and IT teams.”
Artificial Intelligence (AI) is a technology that helps organizations save time, reduce costs and improve operational efficiency. With this transformative technology available, tech leaders might wonder how it can help with optimizing cloud storage. Julia Borgini, freelance technical copywriter and content marketing strategist, shares an article on TechTarget showing how AI is capable of expanind how cloud storage providers handle storage, maintenance and forecasting. Borgini explains, “AI most easily integrates into cloud storage for monitoring, diagnostics and predictive analysis in storage infrastructure and applications. AI can help with automated management and configuration, fault prevention, predictive resource and capacity planning, intelligent data management, and enhanced data security.” Additionally, she points out how many cloud storage vendors use AI in their platforms so customers could understand how it is used before signing up. Other best practices include seeing if the AI tools need access to user data on the hardware and software level in order for it to work properly. Lastly, Borgini suggests exploring dynamic and flexible pricing options that support customer business requirements without surprises. For many it means a pay-for-use subscription model that includes service-level agreements and guarantees that meet customer expectations.
There may be a time when you want to remove a URL from the cached URLs list in Lawson Security Administrator (LSA). This could help clear storage space and run your programs faster and would not hurt to clear your cache regularly.
If you want to clear your LSA cached URLs, on your desktop where you use the program, you will need navigate to %programdata%/LawsonHttpClient. Next, edit the list as needed and save it. The changes will be immediate after you click save. Your LSA URLs have now been cached! You can refer to the screenshots below for a visual guide.
Infor recently announced that Nova Scotia Health and IWK Health have selected the Infor Healthcare Revenue Cycle Management application to help their organizations meet the goals of its digital transformation program, One Person One Record (OPOR). Per the press release, this major program will replace health information systems used throughout the province of Nova Scotia with a new clinical information system. Key Infor applications will be used to modernize and unify disparate patient accounting and billing systems. Scott McKenna, chief information officer, Nova Scotia Health and IWK Health, adds, “During our selection process, Infor demonstrated its understanding of the vision and strategic direction of One Person One Record, and how billing systems are part of the overall transformation. This technology will consolidate and streamline client and patient billing, payments, and follow-up for cases such as out-of-country patients or uninsured patients.”
Is your Lawson job stuck in a submitting status after clicking submit multiple times as shown below?
This commonly happens when a user returns to an organization and their access is restored or another users lawson jobs are copied over to this user. These jobs have been updated from CTPs or patches and may have old or corrupt parameters.
Resolution 1:
Try and simply create a new job in Lawson (deleting the old) and try submitting again. This is assuming the user’s security and identity are already setup correctly.
Resolution 2:
If the above doesn’t resolve the issue, the cause of the issue can occur when the users DOMAIN Identity is corrupt or out of sync in LDAP. This is the domain identity that controls the print directory found in “Managed Identities” when viewing a user in Lawson Security.
First backup the users print directory and do a jobdump command in LID to copy their jobs. The delete and re-add this DOMAIN identity to see if it resolves the issue.
If it doesn’t, you’ll need to delete the user completely and re-add them into Lawson. This can be done with the Lawson Security Admin tool. You can also download Jxplorer and see if LDAP is holding onto the identity (backup LDAP before editing/deleting any identities in Jxplorer).
Good luck!
Trend 2: Cybersecurity Outcome-Driven Metrics: Bridging Boardroom Communication Gap. “According to Gartner, ODMs are central to creating a defensible cybersecurity investment strategy, reflecting agreed protection levels with powerful properties, and in simple language that is explainable to non-IT executives. This provides a credible and defensible expression of risk appetite that supports direct investment to change protection levels.”
Trend 3: Security Behavior and Culture Programs Gain Increasing Traction to Reduce Human Risks. “Security leaders recognize that shifting focus from increasing awareness to fostering behavioral change will help reduce cybersecurity risks. By 2027, 50% of large enterprise CISOs will have adopted human-centric security design practices to minimize cybersecurity-induced friction and maximize control adoption. Security behavior and culture programs (SBCPs) encapsulate an enterprisewide approach to minimizing cybersecurity incidents associated with employee behavior.”
Trend 4: Resilience-Driven, Resource-Efficient Third-Party Cybersecurity Risk Management. “Gartner recommends security leaders enhance risk management of third-party services and establish mutually beneficial relationships with important external partners, to ensure their most valuable assets are continuously safeguarded.”
Trend 5: Continuous Threat Exposure Management Programs Gain Momentum. “By 2026, Gartner predicts that organizations prioritizing their security investments based on a CTEM program will realize a two-thirds reduction in breaches. Security leaders must continuously monitor hybrid digital environments to enable early identification and optimal prioritization of vulnerabilities to help maintain a hardened organizational attack surface.”
Trend 6: Extending the Role of Identity & Access Management (IAM) to Improve Cybersecurity Outcomes. “Gartner recommends security leaders focus on strengthening and leveraging their identity fabric and leverage identity threat detection and response to ensure IAM capabilities are best positioned to support the breadth of the overall security program.”