After making changes to Landmark application configuration or security configuration, it is not always necessary to restart Landmark.  You can force configuration changes via command line, or in Rich Client.

To force changes via command line, open a Landmark command with environment variables set.  Run the command clearconfigs -s <data area> to clear the security caches.  Other options are -a for authendat, or blank for all (clearconfigs gen).

To perform this task in Rich Client, Go to “Start > Configure > Manage Cache”.  Then select “Actions > <the cache you wish to clear>”

 

Ostseehotel Dierhagen has recently decided to upgrade to the Infor Hospitality Management Solution (HMS). With this upgrade, Rostock, Germany-based hotel is taking a significant step towards digital transformation and equipping itself for the future. A long-time customer of Infor Starlight on-premise, moving to the cloud is an important step for the company towards the future for the hotel, and will help ensure its competitiveness for the long term. Per the press release, the Infor Sales & Catering module will help streamline processes in the banquet and conferencing area, through automated processes in resource and event management. Additionally, mobile functionalities such as check-in via smartphone and the option to manage housekeeping via mobile devices will significantly increase efficiency. With a cloud-based solution in place, Ostseehotel Dierhagen can now build upon a fully integrated, solution specifically designed to automate the entire event booking process. This in turn will help optimize internal processes and relieve employees from menial duties, allowing them to focus on providing guests with optimal service.

 

For Full Article, Click Here

The listprod -d command shows information about the product line’s status.  The -a option shows information about all product lines.

For Example:

D:\\>listprod -ad
prodline data area Status

gen gen active
prod prod active
test test active
dev dev active

 

Here are descriptions of the statuses:

Active

The data area has an active dictionary

Pending

The data area has a pending dictionary

Upgrading

The data area is being upgraded

Out-of-date

The framework version used to build the most recent dictionary for the data area does not match the framework version used to build the most recent “GEN” dictionary

Active-out-of-date

The framework version used to build the active dictionary for the data area does not match the framework version used to build the active “GEN” dictionary

Config-missing

There is no data area configuration file

Config-changed

The data area configuration file is newer than the newest dictionary for the data area

Source-missing

There is no source for the product line

Source-changed

The source for the product line has changed since the newest dictionary for the product line’s data area was built

 

 

 

 

 

One of the biggest security risks for any business is human error. This can expose your business to serious vulnerabilities. With the major shift to remote work/hybrid work spaces since the COVID-19 pandemic surfaced, an influx in cyberattacks have happened – targeting mostly to remote workers. While remote work isn’t new, it’s demand in the current times will continue to be a huge representation in today’s workforce. This doesn’t mean we need to worry greatly about cyber attacks – it means we should be more prepared. Vivian Lopez at Trello shares some great tips on how to tighten your company’s cybersecurity for remote and hybrid work spaces. Employees need a solid understanding of security risks for your business, Lopez says. Below are three factors to gretaly consider when setting up your employees to work remotely.

Make IT Security Education Part Of Onboarding. “Instill good IT security habits from the start. Work with human resources to ensure IT security training is part of onboarding. Let new team members start their job with a clear understanding of your enterprise’s IT policies and procedures, like maintaining password hygiene or discouraging shadow IT.”

Conduct Regular Cybersecurity Training. “Cybersecurity threats grow and evolve, and consistent cybersecurity training is a necessity. While many industry experts recommend quarterly training, we recommend a cadence that supports your company goals. And there’s plenty to cover. According to the (ISC)² 2021 Cloud Security Report, the top IT security training topics enterprises find valuable include cloud-enabled cybersecurity, incident response, risk-based frameworks, and application security.”

Build A Knowledge Hub Of Cybersecurity Assets. “There’s a lot for your remote workforce to absorb when it comes to cybersecurity—IT policy and procedure handbooks, training videos, and more. Your team needs a source of truth for reference materials: An accessible knowledge hub where all IT security resources live.”

One suggested offering for security would be Lopez’s Enterprise Security suite with Trello. “Trello Enterprise relies on enterprise-grade security to help build cybersecurity awareness and keep your business safe. Security features like single sign-on (SSO), user management capabilities, and mobile device management help teams collaborate and work remotely,” says Lopez.

 

Original Post by Vivian Lopez from Trello.

For Full Article, Click Here

Menswear brand Serge Blanco (part of LBY from Toulouse family of brands) has chosen Infor CloudSuite Fashion, an ERP (enterprise resource planning) solution specifically designed for the fashion, textile and luxury industries, to partner the project to overhaul its information system and implement a true omnichannel customer journey. Per the press release. Serge Blanco’s other projects such as the overhaul of its e-commerce site, will be interconnected with the Infor solution for end-to-end orchestration of the supply chain. Infor CloudSuite Fashion was chosen for it’s modern, scalable ERP solution with a wealth of functions that did not require any specific development for a very good benefit/cost ratio. Further, Infor CloudSuite Fashion ERP will be connected to five other applications, including expense management, payroll management, the e-commerce site, the multi-brand B2B distance selling platform “The New Black” to which the brand belongs, the WSHOP unified digital commerce SaaS platform, and the cash register management software solution from Polaris.

 

For Full Article, Click Here

After configuring ADFS, if you attempt to launch LBI and receive the message “(security:3042) Unable to authenticate user”, go to the SystemOut.log to gather more information.  If the error is displayed there with a reference to the username, this is a known issue with LBI and ADFS.  Navigate to the SystemOut.log on the LBI server to gather more information.

 

7/2/19 11:58:30:986 EDT] 00000069 webapp        E com.ibm.ws.webcontainer.webapp.WebApp logServletError SRVE0293E: [Servlet Error]-[GenericServletWrapper]: com.lawson.efs.security.GeneralAuthenticationException: (security:3042) Unable to authenticate user.

 

com.lawson.security.interfaces.GeneralLawsonSecurityException: Event request failed: Could not get identity for user – lawson

 

Stack Trace :

 

com.lawson.lawsec.authen.LSFSecurityAuthenException:Could not get identity for user – lawson

 

If your stack trace looks similar to the above, you will need to create a user in Lawson security where SSOP matches RMID.  This means, that you need a user whose RMID is formatted as their userPrincipalName.  To do this, you must have a service account that can be used for the purpose.  Also, you must load the user details with the loadusers command, as the characters “@” and “.” are not allowed when adding users in LSA.

 

First, have your networking team create a service account for this purpose.  Then, create a loadusers.xml file like this:

<?xml version=”1.0″ encoding=”ISO-8859-1″ ?>

<XML>

<ROLEDATA>

</ROLEDATA>

<USERDATA ProductLine=”LSAPPS”>

<USER ID=”[email protected]” RMID=”[email protected]” Name=”lbirmadmin” FirstName=”lbirmadmin” LastName=”lbirmadmin” Email=”[email protected]” CheckLS=”YES” Role=”SuperAdminRole”/>

</USERDATA>

</XML>

 

Next, on the Lawson server, run the command loadusers -f <full path to your loadusers file>.  In LSA, assign the LBI admins and LBI users groups that your organization uses to this account, and verify that the user has the SuperAdminRole.  In the Framework Services Configuration assistant in LBI, change the RM user to [email protected] and set the password.  This can also be done in the SYSCONFIG table of the EFS database.

 

Restart LBI WebSphere and try the connection again.

 

 

 

 

Britishvolt, the UK’s foremost investor in battery cell technologies and research and development, has selected Infor CloudSuite Automotive to manage business operations at its £3.8 billion, 38 gigawatt hours (GWh) gigaplant in Cambois, Northumberland, UK. Per the press release, Britishvolt is committed to ensuring maximum performance of all manufacturing and nonmanufacturing systems, undertaking a thorough assessment of the market and a competitive tender process before choosing Infor CloudSuite Automotive. Particularly, the company chose Infor CloudSuite Automotive for its out-of-the-box industry-specific capabilities, including the automotive and supplier exchange functionality, which streamlines and simplifies collaboration with all types of automotive customers and suppliers. Further, Infor’s strong automotive credentials and rapid implementation approach were instrumental in Britishvolt’s decision. They also liked the solution’s ability to rapidly scale geographically and the ability to increase manufacturing volumes.

 

For Full Article, Click Here

Introduction

Infor’s Configuration Console is a tool that can be used to configure Landmark applications.  It can be used to create new user interface components, or customize existing user interface components.  It is a very useful tool for customizing and enhancing the user experience in Landmark applications.  The tool uses a proprietary language called “Landmark Pattern Language” (LPL).

To get to the Configuration Console in Rich Client, go to Start > Configure > Application.  Or, you can ctrl+shift+click on a Landmark form and click the “Configure” link.

 

 

The “empty sheet” button is used throughout Landmark applications to create a new item.  Configuration Console is no exception.  Press this button to create a new configuration.  The save and delete buttons are also intuitive.  When you click the delete button, remember you are deleting the configuration only, not the Infor-delivered component!

In most cases, the “pencil” button indicates editing the configuration LPL directly, and the “Configure” button is for editing the component using a graphical interface.

Menus

Configuring menus is pretty straightforward.  Menu items can be deleted, and menus can be hidden from user view.  Note that if a menu is hidden in Configuration Console, this setting takes precedence.  So, if the menu is available via security, it still can’t be viewed.

Pages

There are a few options available in configuring pages.  Mostly you can add different fields, including computed fields.  This is one example where the pencil button does not indicate LPL configuration.  On the main configuration screen for a page, the pencil button takes you into the page editor.  At the bottom of that screen, you will have to option to edit the LPL code.

Web Applications

Web Applications have a few options for configuration.  One thing that can be customized is the home landing page for the web application.  Just make sure the page exists in the correct location on your server!

User Fields

User Fields are probably one of the most widely-used configurations available.  The value in a User Field will be saved in the database, so that it can be accessed later in Landmark queries or Spreadsheet Designer.  There are several types of fields available to allow you much flexibility in form customization.

A snapshot is sort of what it sounds like.  It is a copy or a “snapshot” of another field from a related business class.

A condition field is a way to test a condition without having to rewrite code over & over.  A condition field should always return true or false.

A compute fields allows you to do mathematical and date computations on one or more fields in the business class.

Derived fields are the most flexible option, and can be used in place of all of the above field types.  They can be used to convert data types, take substrings, or write more complex bits of code to return the desired information.

Forms

Forms are another highly configurable component.  User Fields can be added to forms.  Fields can be hidden, actions can be disabled, and basic checks can be done to customize the flow of a form.  Here are some examples for setting default values on a Form.

Relations

Relations are another very useful tool in the Configuration Console arsenal.  They can really open up your forms and other components to allow you to get data from other areas in the application that isn’t readily available.  Relations are a way of relating two business classes on key fields.  A one-to-one relationship requires all of the key fields to be populated.  A one-to-many relationship does not, but be aware that this could return a list of values instead of one value!

These are examples of relating the Candidate business class to the Employee an WorkAssignment business classes.

Actions

Actions can be configured with Entrance Rules (things that happen when the action loads), Exit Rules (things that happen when the action is released), and User Parameters.  The User Parameters would follow the action into the next step, such as an IPA approval flow.  Some of the fields on an action can be configured to be required, or not required.

History

All configuration changes are version and stored each time the configuration is saved.  This means that you can compare current state to any of the previous states to the beginning of the configuration, as well as the base LPL.  This is highly useful, and a great feature!  To get to the history, on the main page of any component, select “Vew History”.  On the left side is the historical configuration.  On the right side is present-day.  You can click the dropdown to select the configuration you want to compare.  If you are ready to go back to that configuration, click the “revert” button.  If you are satisfied, don’t forget to save your changes!

Helpful Links

Infor’s documentation site is a great jumping-off point for learning about Configuration Console and LPL.

 

Also, check out the webinar that our very own Sr Technical Consultant Desi hosted on this topic!

 

Enterprise resource planning (ERP) software is a valuable workhorse for any business striving to improve its operations and every aspect of their business. With an ERP solution, you can improve collaboration, productivity, customer service, and data security, as well as have a macro view of business operations. Don Hall has been employed as an IT Manager and ERP expert Don Hall shares a very informative article on CIO Insight of many best practices to consider when implementing an ERP.

 

Define and revise goals and objectives
In order to maximize your ERP’s capabilities, you must start with correctly implementing the solution. There are two goals that can be viewed in the macro and micro level, according to Hall. The “The macro goal is to implement an ERP solution successfully, whereas the micro goals are all the checkpoints and critical path tasks to help a business reach the macro goal. These micro goals, or objectives, must be assigned specific tasks with realistic timelines.” A guideline Hall recommends is as follows: Planning, Data Analysis and Migration, Design, Development, Testing, Deployment, Support and Updates.

 

Work with third-party ERP implementation experts
Hall points out that most businesses wanting to implement an ERP solution do not have an ERP implementer on staff since it’s a unique skill set. Though not necessary, working with an ERP expert can vastly speed up and improve the implementation process. Even if you are an IT-based company, Hall recommends that it’s wise to consult an ERP implementer to seek advice on avoiding common configuration errors.

 

Standardize vs. customize
Customization is a project within itself when setting up your ERP and/or when new versions of your software is released. Sometimes your customized features may even need to be rewritten. Halls suggests to CIOs and CTOs to minimize customization by purchasing an industry-specific ERP solution.

 

Focus on business-critical requirements
Businesses should continue to meet their primary goals and objectives for critical processes during ERP implementation. These processes, Hall notes, need to be given proper attention during the planning, design, and development phases. “Secondary processes that feed these primary processes, including any internal or external data, must be considered. Scope creep can quickly get out of hand, so careful consideration is paramount in identifying secondary processes.”

 

Validate the implementation plan before execution
Hall notes, “once an ERP implementation plan is formed, CTOs and CIOs can validate the plan to ensure nothing is overlooked. Quality assurance documents, test protocols, and a validation report are part of a comprehensive validation kit to help avoid the common pitfalls of implementing an ERP solution. Moreover, a validation toolkit can help verify that an ERP implementation plan has addressed every concern thoroughly.”

 

For Full Article, Click Here

Geminite Cement Industries LLC (part of Gemini Group), one of the Middle East’s leading building materials production and distribution players, has selected Infor CloudSuite Industrial Enterprise ERP (enterprise resource planning) solution to optimize delivery against a surging demand for cement boards across the region. Per the press release, Geminite is aiming to automate and integrate its production control systems and plant maintenance solutions, removing the need for manual data entry. The Infor CloudSuite Industrial Enterprise ERP solution will help Geminite boost its efficiency, increase visibility across the business, and provide the agility to expand capacity as needed to cater to the region’s fast-growing demand for gypsum boards. Deployment of this project will start in April 2022 and is expected to go live within five months. ITWare LLC in Dubai, one of Infor’s long-standing ERP channel partners in the region, will be leading the implementation.

 

For Full Article, Click Here