If you receive a “socket” error when saving data in Infor Security Administrator, it is probable that your Federated Server Certificate is corrupt or out of sync and needs to be recreated.  Note that this is NOT the WS Federation Certificate.

To recreate the Federated Server Certificate, open a command line window on the LSF server and set the environment variables.  Log into ssoconfig -c.

First, get the Federated Server Certificate name.  “Manage Federation” > “Manage Federated Server Certificates” > “List Federated Server Certificates”.  Make note of the name.

Select “Manage Federation” > “Manage Federated Server Certificates” > “Delete Federated Server Certificate”.  Type in the name that you saved above.

After a successful confirmation, restart the servers and try again.  A new Federated Server Certificate will be generated upon recycle.

 

While remote work has been a recent trend as of late thanks to the COVID-19 pandemic, there is a specific type of worker group who hasn’t been given much attention, yet they should. Deskless workers, or those who are essentially always on-the-job lack many of the tools and resources an employee would otherwise have if working at a desk or home office. More than 2.7 billion workers worldwide are categorized as deskless employees. However, despite making up 80% of the global workforce, deskless workers lack the necessary technology needed for a more efficient work flow. Jacob Waern, founder & CEO at eduMe, shares a great read on Forbes explaining the importance of this niche in the workforce. This lack of tools should be available to deskless workers, and it should be available now. While you can name a laundry list of the basic essentials (i.e. a work laptop, mobile phone, etc), Waern does note that this immediate transition of technological availability for deskless workers is not a simple task. In his Forbes article, Waern shares three criteria which are nonnegotiable when it comes to empowering adoption and ongoing use of mobile technology among deskless demographics:

  1. Easily Accessible. “92% of users who forget their login information simply leave the site or app they’re trying to access. Ensure that access to learning content is as frictionless as possible. One way is to embed it into your native app.”
  2. Delivered At The User’s Point Of Need. “If training doesn’t fit into a deskless worker’s flow of work, it won’t be adopted long-term. Lean on triggered notifications and workforce communication tools to intelligently deliver relevant and timely content.”
  3. Short-Form Content. “The microlearning method isn’t just beneficial for user engagement and long-term knowledge retention, it also caters to deskless workers’ tight schedules. Break training content down into two-to-five-minute bursts to retain learners’ attention.”

Remote workers as well as deskless workers are fast becoming the majority of today’s workforce. Just like remote workers who had to immediate set up their machines and networks at home, these on-the-job deskless employees need the right resources to their job as well.

 

For Full Article, Click Here

 

ProMedica, a mission-based, not-for-profit health and well-being organization headquartered in Toledo, Ohio, has successfully implemented Infor CloudSuite Healthcare on Amazon Web Services (AWS). Needing to replace their legacy systems and consolidate common functional requirements after the acquisition of HCR ManorCare in 2018, it was an easy choice to use Infor and AWS cloud services. Per the press release, since the go-live ProMedica has improved data sharing and streamlined its processes. The organization has also significantly increased the number of financial reports for monthly distribution and reduced item master data from 60,000 items down to 13,000. Infor’s CloudSuite applications specialized for healthcare offers flexibility of the configuration and encompassed everything necessary from financial reporting to financial close, as well as being able to monitor the close. Further, with this successful go-live, the hunger for innovation continues with plans to further improve financial processing and other key areas of the business with Infor over the next two to three years.

 

For Full Article, Click Here

After making changes to Landmark application configuration or security configuration, it is not always necessary to restart Landmark.  You can force configuration changes via command line, or in Rich Client.

To force changes via command line, open a Landmark command with environment variables set.  Run the command clearconfigs -s <data area> to clear the security caches.  Other options are -a for authendat, or blank for all (clearconfigs gen).

To perform this task in Rich Client, Go to “Start > Configure > Manage Cache”.  Then select “Actions > <the cache you wish to clear>”

 

Ostseehotel Dierhagen has recently decided to upgrade to the Infor Hospitality Management Solution (HMS). With this upgrade, Rostock, Germany-based hotel is taking a significant step towards digital transformation and equipping itself for the future. A long-time customer of Infor Starlight on-premise, moving to the cloud is an important step for the company towards the future for the hotel, and will help ensure its competitiveness for the long term. Per the press release, the Infor Sales & Catering module will help streamline processes in the banquet and conferencing area, through automated processes in resource and event management. Additionally, mobile functionalities such as check-in via smartphone and the option to manage housekeeping via mobile devices will significantly increase efficiency. With a cloud-based solution in place, Ostseehotel Dierhagen can now build upon a fully integrated, solution specifically designed to automate the entire event booking process. This in turn will help optimize internal processes and relieve employees from menial duties, allowing them to focus on providing guests with optimal service.

 

For Full Article, Click Here

The listprod -d command shows information about the product line’s status.  The -a option shows information about all product lines.

For Example:

D:\\>listprod -ad
prodline data area Status

gen gen active
prod prod active
test test active
dev dev active

 

Here are descriptions of the statuses:

Active

The data area has an active dictionary

Pending

The data area has a pending dictionary

Upgrading

The data area is being upgraded

Out-of-date

The framework version used to build the most recent dictionary for the data area does not match the framework version used to build the most recent “GEN” dictionary

Active-out-of-date

The framework version used to build the active dictionary for the data area does not match the framework version used to build the active “GEN” dictionary

Config-missing

There is no data area configuration file

Config-changed

The data area configuration file is newer than the newest dictionary for the data area

Source-missing

There is no source for the product line

Source-changed

The source for the product line has changed since the newest dictionary for the product line’s data area was built

 

 

 

 

 

One of the biggest security risks for any business is human error. This can expose your business to serious vulnerabilities. With the major shift to remote work/hybrid work spaces since the COVID-19 pandemic surfaced, an influx in cyberattacks have happened – targeting mostly to remote workers. While remote work isn’t new, it’s demand in the current times will continue to be a huge representation in today’s workforce. This doesn’t mean we need to worry greatly about cyber attacks – it means we should be more prepared. Vivian Lopez at Trello shares some great tips on how to tighten your company’s cybersecurity for remote and hybrid work spaces. Employees need a solid understanding of security risks for your business, Lopez says. Below are three factors to gretaly consider when setting up your employees to work remotely.

Make IT Security Education Part Of Onboarding. “Instill good IT security habits from the start. Work with human resources to ensure IT security training is part of onboarding. Let new team members start their job with a clear understanding of your enterprise’s IT policies and procedures, like maintaining password hygiene or discouraging shadow IT.”

Conduct Regular Cybersecurity Training. “Cybersecurity threats grow and evolve, and consistent cybersecurity training is a necessity. While many industry experts recommend quarterly training, we recommend a cadence that supports your company goals. And there’s plenty to cover. According to the (ISC)² 2021 Cloud Security Report, the top IT security training topics enterprises find valuable include cloud-enabled cybersecurity, incident response, risk-based frameworks, and application security.”

Build A Knowledge Hub Of Cybersecurity Assets. “There’s a lot for your remote workforce to absorb when it comes to cybersecurity—IT policy and procedure handbooks, training videos, and more. Your team needs a source of truth for reference materials: An accessible knowledge hub where all IT security resources live.”

One suggested offering for security would be Lopez’s Enterprise Security suite with Trello. “Trello Enterprise relies on enterprise-grade security to help build cybersecurity awareness and keep your business safe. Security features like single sign-on (SSO), user management capabilities, and mobile device management help teams collaborate and work remotely,” says Lopez.

 

Original Post by Vivian Lopez from Trello.

For Full Article, Click Here

Menswear brand Serge Blanco (part of LBY from Toulouse family of brands) has chosen Infor CloudSuite Fashion, an ERP (enterprise resource planning) solution specifically designed for the fashion, textile and luxury industries, to partner the project to overhaul its information system and implement a true omnichannel customer journey. Per the press release. Serge Blanco’s other projects such as the overhaul of its e-commerce site, will be interconnected with the Infor solution for end-to-end orchestration of the supply chain. Infor CloudSuite Fashion was chosen for it’s modern, scalable ERP solution with a wealth of functions that did not require any specific development for a very good benefit/cost ratio. Further, Infor CloudSuite Fashion ERP will be connected to five other applications, including expense management, payroll management, the e-commerce site, the multi-brand B2B distance selling platform “The New Black” to which the brand belongs, the WSHOP unified digital commerce SaaS platform, and the cash register management software solution from Polaris.

 

For Full Article, Click Here

After configuring ADFS, if you attempt to launch LBI and receive the message “(security:3042) Unable to authenticate user”, go to the SystemOut.log to gather more information.  If the error is displayed there with a reference to the username, this is a known issue with LBI and ADFS.  Navigate to the SystemOut.log on the LBI server to gather more information.

 

7/2/19 11:58:30:986 EDT] 00000069 webapp        E com.ibm.ws.webcontainer.webapp.WebApp logServletError SRVE0293E: [Servlet Error]-[GenericServletWrapper]: com.lawson.efs.security.GeneralAuthenticationException: (security:3042) Unable to authenticate user.

 

com.lawson.security.interfaces.GeneralLawsonSecurityException: Event request failed: Could not get identity for user – lawson

 

Stack Trace :

 

com.lawson.lawsec.authen.LSFSecurityAuthenException:Could not get identity for user – lawson

 

If your stack trace looks similar to the above, you will need to create a user in Lawson security where SSOP matches RMID.  This means, that you need a user whose RMID is formatted as their userPrincipalName.  To do this, you must have a service account that can be used for the purpose.  Also, you must load the user details with the loadusers command, as the characters “@” and “.” are not allowed when adding users in LSA.

 

First, have your networking team create a service account for this purpose.  Then, create a loadusers.xml file like this:

<?xml version=”1.0″ encoding=”ISO-8859-1″ ?>

<XML>

<ROLEDATA>

</ROLEDATA>

<USERDATA ProductLine=”LSAPPS”>

<USER ID=”[email protected]” RMID=”[email protected]” Name=”lbirmadmin” FirstName=”lbirmadmin” LastName=”lbirmadmin” Email=”[email protected]” CheckLS=”YES” Role=”SuperAdminRole”/>

</USERDATA>

</XML>

 

Next, on the Lawson server, run the command loadusers -f <full path to your loadusers file>.  In LSA, assign the LBI admins and LBI users groups that your organization uses to this account, and verify that the user has the SuperAdminRole.  In the Framework Services Configuration assistant in LBI, change the RM user to [email protected] and set the password.  This can also be done in the SYSCONFIG table of the EFS database.

 

Restart LBI WebSphere and try the connection again.

 

 

 

 

Britishvolt, the UK’s foremost investor in battery cell technologies and research and development, has selected Infor CloudSuite Automotive to manage business operations at its £3.8 billion, 38 gigawatt hours (GWh) gigaplant in Cambois, Northumberland, UK. Per the press release, Britishvolt is committed to ensuring maximum performance of all manufacturing and nonmanufacturing systems, undertaking a thorough assessment of the market and a competitive tender process before choosing Infor CloudSuite Automotive. Particularly, the company chose Infor CloudSuite Automotive for its out-of-the-box industry-specific capabilities, including the automotive and supplier exchange functionality, which streamlines and simplifies collaboration with all types of automotive customers and suppliers. Further, Infor’s strong automotive credentials and rapid implementation approach were instrumental in Britishvolt’s decision. They also liked the solution’s ability to rapidly scale geographically and the ability to increase manufacturing volumes.

 

For Full Article, Click Here