WELCOME TO THE COMMUNITY
find what you are looking for or ask a new question

search results

for Security

(...) es the implementation of the accounting system. Step 8 (final, negative): Rejection Description: The Manager rejected the system due to unsatisfactory test results, existing errors, detected data Security threats, etc. They may also roll back the workflow to the "Initial review" step to select another accounting system that meets the defined functional requirements. The diagram of the wor (...)

(...) ead of planning and developing lengthy integration projects, we can react immediately to business needs and provide data or operations on demand. The User Defined API also provides a high level of Security . With strict access control, two authentication modes, and the ability to define our own restrictive rules, we have complete control over who can use the API and under what conditions. The flexibi (...)

(...) t; one can use this to call PowerShell scripts. The free version of PSU is all one needs to implement everything that is described in this article. Because there is no support for Security and authentication configuration it is necessary to buy a PSU server license for productional use. A nice tutorial playlist can be found on YouTube here. The first four videos describe all st (...)

(...) nt. All operational data—including AI Agent definitions, queue states, and execution history—remains stored within WEBCON’s internal database.    Data Extraction and Security   Data is retrieved via User Defined APIs, which are custom API endpoints configured within the platform. These endpoints execute predefined SQL queries and expose selected internal system tab (...)

(...) ation data from IT systems. In practical terms, this involves monitoring and collecting data from various components of an IT system in order to obtain information about their operation, performance, Security , and many other important parameters. Telemetry offers a number of advantages, such as monitoring and diagnosing problems in real time, performance optimization based on data analysis and bottlene (...)

(...) ports connecting and configuring custom AI models hosted on Google Vertex, OpenAI, or Azure AI Foundry, providing full control over both infrastructure and processed data and making it easier to meet Security , privacy, and regulatory requirements. AI Proxy Self-hosted is available under the Enterprise subscription license and the perpetual WEBCON Agentic AI Framework license. Documentation: AI Proxy (...)

(...) default. If the reverse proxy runs on a different server, its IP address or IP range must be added to the list of trusted proxies. To support this, the application provides configuration under the Security :ForwardedHeaders node, which can be set in the standard configuration files or by using environment variables. Available options: ForwardedHeaders – the list of headers to be processed (...)

(...) r SharePoint Online connections, OAuth 2.0 integrated with Microsoft Entra ID has been introduced in WEBCON as the authentication mechanism for this connection. This approach provides a high level of Security by eliminating the risks associated with traditional username and password-based authentication. Access to SharePoint resources is based on the app-only model, meaning the application has its own ide (...)

(...) ---------------------------- CallStack ------------------------------------------------------- at System.Reflection.RuntimeAssembly._nLoad(AssemblyName fileName, String codeBase, Evidence assemblySecurity , RuntimeAssembly locationHint, StackCrawlMark& stackMark, IntPtr pPrivHostBinder, Boolean throwOnFileNotFound, Boolean forIntrospection, Boolean suppressSecurity Checks) at System.Reflection.Runti (...)

(...) I tried to import some templates from DEV environment to TEST environment and when I uploaded the .zip archive the following error occured on the .xlsx report: "Value cannot be null. Parameter name: Security Provider" Does anyone know why do we get this error? Thanks!

(...) everyone, because the first installation attempt did not work out (login problems webcon designer studio), i uninstalled webcon and sharepoint. I installed Sharepoint 2016 again and also the latest Security update. Now the installer does not recognize the sharepoint web parts (see picture below). Did anybody have this issue yet? Do you have any idea how to fix this? Is it ok, to skip this? Kind rega (...)

(...) ute as the server principal because the principal "BPS_readonly" does not exist, this type of principal cannot be impersonated, or you do not have permission. the BPS_readonly account exists in DB\Security \Logins and has access to the Content database. How to fix it?

(...) Hi everyone, if you have applied a log4j version below 2.17 or before 2021-12-17 you need to repeat the steps: https://community.webcon.com/articles/Security -apache-solr-affected-by-apache-log4j-cve-2021-44228/39 The version 2.17.1 contains a fix for a theoretical problem. If this could be misused, you already have a bigger problem. Source https://blog.sonatype.com/log4j-another-code-execution-bug-sh (...)

(...) We have a visibility restriction (hidden for few Security groups lev1-lev4) on a form field and visible for few other groups. I have created a new report and added the form field which has visibility restriction to the report but it is not displaying any data due to the visibility restriction. As an admin also I cannot see data. How can I fix this issue?

(...) rate into an O365 GCC High setup? We will be migrated all office products including SP to this and I'm curious if anyone has done it before. For clarification GCC is MS Gov Cloud setup with higher Security .

(...) rver to deny the request because the query string is too long. Things you can try: Verify the configuration/system.webServer/Security /requestFiltering/requestLimits@maxQueryString setting in the applicationhost.config or web.config file. Detailed Error Informat (...)

(...) I try to use the following functionality: "Security based on organization structure. This functionality allows you to view and edit your subordinates’ instances and tasks (in the same manner that those subordinates would be able to), and also lets you delegate subordinates' tasks to yourself (or another person), in order to take over and complete them. " I can view and edit my subordinates' doc (...)

(...) Hi, I am having a problem when sychronizing Azure AD users to BPS, is there any possible way to not synchronize all users from the directory but instead just users assigned to an OU or Security Group. The reason i am trying to do this is because of data privacy concerns of a customer who has users of multiple subsidiaries split into different OU's and to declutter my people fields. I know i could jus (...)

(...) d? Error message: Nazwa: WEBCON BPS for Microsoft Outlook AddIn Od: http://webcon.artlocum.pl/addins/outlook/WebCon.WorkFlow.Outlook.vsto ************** Tekst wyjątku ************** System.Security .Security Exception: Dostosowane funkcje zawarte w tej aplikacji nie będą działać, ponieważ certyfikat użyty do podpisania manifestu wdrożenia dostosowania WEBCON BPS for Microsoft Outlook AddIn lub je (...)

(...) ent can't be saved. Generic Failure" ("Das Dokument kann nicht gespeichert werden. Allgemeiner Fehler"). What am I doing wrong? Has it to do with using Edge instead of Chrome? Has it to do with Security settings? (I learned that signing with a certificate is not modifying the document but overwriting it) It would be a big step if I could sign pdf documents within a workflow instance. Kind reag (...)