Admin's other articles

4349 The World without Bankruptcy Laws

Bankruptcy is one of the natural states which a company may find itself in. Entrepreneurship is primarily about taking risks. When companies take risks, some of them succeed, whereas others fail. Hence failure is a natural part of the business. However, many critics of bankruptcy laws believe that there isn’t a need for an elaborate […]

4348 The Wirecard and Infosys Scandals are a Lesson on How NOT to Treat Whistleblowers

What is the Wirecard Scandal all about and Why it is a Wakeup Call for Whistleblowers Anyone who has been following financial and business news over the last couple of years would have heard about Wirecard, the embattled German payments firm that had to file for bankruptcy after serious and humungous frauds were uncovered leading […]

4347 Why the Digital Age Demands Decision Makers to be Like Elite Marines and Zen Monks

How Modern Decision Makers Have to Confront Present Shock and Information Overload We live in times when Information Overload is getting the better of cognitive abilities to absorb and process the needed data and information to make informed decisions. In addition, the Digital Age has also engendered the Present Shock of Virality and Instant Gratification […]

4346 Why Indian Firms Must Strive for Strategic Autonomy in Their Geoeconomic Strategies

Geopolitics, Economics, and Geoeconomics In the evolving global trading and economic system, firms and corporates are impacted as much by the economic policies of nations as they are by the geopolitical and foreign policies. In other words, any global firm wishing to do business in the international sphere has to be cognizant of both the […]

4345 Why Government Should Not Invest Public Money in Sports Stadiums Used by Professional Franchises

In the previous article, we have already come across some of the reasons why the government should not encourage funding of stadiums that are to be used by private franchises. We have already seen that the entire mechanism of government funding ends up being a regressive tax on the citizens of a particular city who […]

See More Article from Admin

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout.

Visit Us

Our Partners

Search with tags

  • No tags available.

Users interface directly impact usability of an ERP system. A properly designed user interface provides proper accessibility to the intended functions of the system and enables execution of transactions. Earlier users accessed the system with dumb terminals (ASCII) which had lot of usability deficiencies and this led to subsequent adoption of Graphical Users Interface (often with look and feel of MS Windows) during 1990s. With the advent of internet technology, user interface further evolved to enterprise portal, which provides easy access between internet client and application server.

Internet based User Interface: This is the most popular type of users interface at present due to convenience in accessing the ERP applications even from a remote location. Maintenance by system administrator is also easier, as they need not go to individual desktop or use any additional software distribution software, for the purpose of maintenance. The Internet server application is used as a gateway between the Internet client (IC) and the application server in order to expose the ERP functionality to the Internet domain.

The internet user interface architecture is depicted in the following diagram:

Internet Access Architecture

The HTTP-server security mechanisms are used to offer secure access to the HTML-page that contains the Java applet.

User Management: User management functionality is used to create user, provide user login and password and to give authorizations to the users. The user’s authorizations are dependent on their role in a company. To be able to work with ERP applications, users must have some sort of session authorization, database authorization, and library authorization. During installation of ERP, some default roles are automatically created. The default roles make sure that users can use the menu browser and its associated functions and commands.

Users Type: There are various types of users for an ERP package which can be broadly classified as under:

  1. Normal users, who have restricted authorizations to start sessions, access table fields, work with data that pertains to specific company (database) numbers and so on.

  2. Super users, who have unrestricted authorizations. A system administrator is a good example of a super user.

Role dependent users’ authorization: From a user point of view, a role represents a function in an organization. In ERP, a role represents a set of authorizations for a function in a company (database). User authorizations that are defined per role instead of per user significantly reduce the redundant data. The authorizations for normal users are therefore defined in roles to which they can be linked. The role concept provides a user-friendly method to quickly add new users or to update user authorizations.

Because an employee can have more than one function in a company, more than one role may be assigned to the user. A role can also contain more than one sub-role, which can also have sub-roles. All these roles and sub-roles form a role tree, which can be viewed with a role browser. The role browser shows the role tree in a graphical user interface.

Role-dependent authorizations can be defined at the following component levels in an ERP system:

  1. Session authorizations - The session authorizations define which sessions the users can start and what they can do with these sessions.

  2. Database authorizations - The database authorizations define the actions the users can perform on specified database tables and the associated fields in the database table.

  3. Library authorizations - ERP system uses various type interfaces to integrate external programs which communicate with ERP environment through Dynamic-link libraries (DLLs). The Library authorizations define whether the users, who are linked to the role, can access the functions that are defined in DLLs.

The non-role-dependent authorizations: In addition to these role-dependent authorizations, some additional authorizations can be specified that are not defined by the employee’s role, for example, the development parameters, device preferences, and so on. These non-role-dependent authorizations are defined in templates to reduce redundant data, which then can be linked to the user profile.

These templates pertaining to non role dependent authorization can be divided into the following categories:

  1. Development-related templates.
  2. Text-related templates.
  3. Device-related templates.

Article Written by

Admin

Leave a reply

Your email address will not be published. Required fields are marked *

Related Posts

Why are Companies Constantly Upgrading their ERP Systems?

Admin

It’s Now or Never: Why Business Must Embrace Sustainability before it is Too Late

Admin

The Pharma Sector and Intellectual Property Rights: Pros and Cons

Admin