Skip to main content

Wybierz swój język

CRIMS

Most IFS Cloud implementations fail because architects treat CRIMS as a shopping list rather than a risk registry. Ignoring the boundaries of Clean Core architecture turns your ERP into a static monument to legacy thinking. You build customizations that feel right today but break the first 25R1 or 25R2 update you try to apply.

CRIMS is the roadmap of everything you changed in the standard product. If you do not govern these five areas with absolute discipline, you are not implementing a cloud solution. You are just hosting a mess on someone else's server.

Configurations

Configuration is the only sanctioned way to alter IFS Cloud behavior without touching the underlying code. This includes Page Designer edits, Custom Attributes, and Event Actions. Use them. But stop pretending they are free of consequence. Every custom field added to a high-volume logical unit like InventoryPart adds overhead to the OData provider. Poorly written SQL expressions in Custom Attributes will tank your Aurena performance. Configuration is about restraint, not seeing how many fields you can cram into a single page.

Reports

Reporting in IFS Cloud is a graveyard of over-engineered layouts. Between Operational Reports (Report Designer), Business Reporter (Excel-based), and Lobby data sources, teams often choose the most complex tool for the simplest task. Stop trying to make IFS Cloud output pixel-perfect 1990s-style PDF forms for internal use. If a manager needs data, build a Lobby. If they need a document, use a standardized template. Every hour spent fighting with Report Designer on a document no one reads is a waste of your budget.

Integrations

Integrations are where "Clean Core" goes to die. The standard should be API-first using the IFS Projection layer and OData. Using direct database access or legacy middleware is a choice to fail. A proper integration in IFS Cloud is asynchronous and resilient. It uses the Integration Platform (IP) or external Boomi/Azure logic apps to decouple systems. If your integration breaks because an internal projection changed its name during an update, your architecture is brittle and amateur.

Modifications

Modifications are the nuclear option. This is the "M" in CRIMS that causes the most damage. Modifying the core code (Layered Architecture) means you now own that code. You are responsible for merging it during every Service Update. Most requirements that lead to modifications are actually just refusal to change broken internal processes. In IFS Cloud, a modification is a failure of imagination or a failure of standard process adoption. Keep them in a separate overlay and document every line, or prepare for a permanent stay on an outdated version.

Security and Scripts

Security is the most neglected part of the CRIMS acronym. It involves Permission Sets, Grant Structures, and the specialized Scripts needed for data migration or automated cleanup. Security in IFS Cloud is functional, not just navigational. If you grant Full Access because you are too lazy to map out granular Projections, you are creating a massive audit risk. Scripts must be idempotent. If a data migration script cannot be run twice without doubling your records, it is garbage code.

 

Build your CRIMS registry as if your job depends on the next update being a non-event. Because it does.