WELCOME TO THE COMMUNITY
find what you are looking for or ask a new question

search results

for word

(...) een implemented for picker fields by creating indexed choice columns for each picker field type. Those are indexed, calculated columns for which an identifier (ID) is calculated. Please note here the word “calculated”, as the identifier (ID) is not physically saved in those columns, but rather calculated immediately in the transition between database operations. On the other hand, the choi (...)

(...) even if the user already has an active authorization session. The previous session is invalidated, and proceeding to the next step in the workflow requires re-entering the one-time authentication password . It is worth noting that in case of active Substitution, when a user replaces another employee, i.e. works on their behalf or the replaced person’s tasks are delegated to the user, and the s (...)

(...) ense management window. Follow these steps to prepare your environment for license activation: Log in to Designer Studio by selecting the authentication method and entering the login and password configured during program installation. Open the program’s main menu by clicking the icon in the upper left corner of the screen and select Licenses. The program will open th (...)

(...) signer Studio, by going to the Licenses menu and pressing Deactivate.   Deactivation can be done Online and Offline. The Online deactivation will require the client's Login and Password . If online is not possible, Offline can be used to generate a deactivation file. The deactivation can then be completed on https://activation.webcon.com by uploading the .REQ file.   Backu (...)

(...) External content by Markus Jenni; 17.04.2024   The "Generate/Update a word file" action allows the creation of documents quite easily. In the past, we stumbled upon some challenges: Internal names of Test and Production can be different It happened that a report had to be redesigned for production as the properties are named after the internal names No Rich text conte (...)

(...) is pretty easy too as you will see in my latest blog post. It requires: An internet connection on the server where the SSL certificate should be downloaded Installation of two tools. A password . A script with 7 lines of code. READ MORE: here.      

(...) security are of paramount importance. It leverages existing Windows user credentials, eliminating the need for users who are logged on to their computers in the domain to re-enter their logins or password s. The method is well-suited for automatic authentication in websites and web applications where users are usually already logged in to the Windows domain. However, due to the nature of its operati (...)

(...) note that, in addition to the Previous version () and Admin actions () buttons next to the Admin button, administrators have the ability to edit form fields that are configured as Read-only. In other word s, they can change the values of form fields in instances where they have no assigned tasks and that regular users cannot normally edit.   One form, two modes. On the left: form in stan (...)

(...) External content by Raluca-Mirabela Lupu; August 29, 2024;  You’ve likely used the actions to generate word /PDF attachments and add them to dynamic attachment categories. Did you know that from version 2023R1 up to version 2023.1.3.231, in order to save a dynamic attachment category to the database, it was necessary to define the attachment categories in advance? Otherwise, the attach (...)

(...) the license service, WEBCON BPS Portal works in read-only mode. If it is possible to enter the edit mode on the form, the license service responds correctly.   4.2 Loss of the solr user password The password of the solr administrative user cannot be changed. If the upgrade requires the password of this user (example in the screenshot in step "3.6 Component installation"), but it (...)

(...) lassic way of configuration, i.e. using WEBCON BPS Designer Studio. After installing and running WEBCON BPS Designer Studio, log in with the built-in admin@system.bps administration account whose password was configured during the system installation. Next, go to the System settings → Global parameters → Users and groups synchronization → Synchronization configuration tab. I (...)

(...) the PowerShell action is executed in the context of the user who is running the Workflow Service, even if it is triggered from the form (BPS Portal). To change the context, specify the login and password of a given user in the action configuration. This is important for privileges to network shares and databases (if integrated login is selected in the connection parameters).   Cyclical act (...)

(...) entVariables field. The following list contains the variables to add:   APP_ADMIN_LOGIN – login that allows you to log in to the Public Forms administration panel, APP_ADMIN_PASSword – password for the above account, APP_BASE_DOMAIN – domain address, e.g. publicforms.example.com, APP_BPS_PORTAL_URL – Portal URL, APP_BPS_PORTAL_CLIENT_ID – ID of the a (...)

(...) uration of the exported automation must be modified. If the automation definition contains references to Connections, any sensitive data present in their configuration, such as user logins and password s, client secrets, etc., will be removed during export.   Loading an automation definition from a file To import the "Automated company fleet management" automation into the TE (...)

(...) ate a summary of texts taken from form fields, attachments (using the GET ATTACHMENTS function), or entered manually as one of the function arguments. You can optionally specify the maximum number of word s in the summary, thus customizing its length.   Depending on the length of the source text, the execution time of the rule with the AI TEXT SUMMARY function may increase.   (...)

(...) nfigurator decides to use a User Defined API.   The process starts by creating a new endpoint in the API Definitions section. Enter the name of the new API definition, for example, "Neword erAPI", and select the Execute automation running mode, since the API call will initiate the registration of a new order in the system.   The next step is to define the Endpoint UR (...)

(...) Next, in the connection configuration, complete the following details, as shown in the screenshot: User – the email address associated with the Autenti account used for integration, Password – the password for the Autenti account, Client ID – the value provided by Autenti for integration purposes, Client Secret – the API secret key provided by Autenti, Authenticat (...)

(...) screenshot below:   In the Select operation section, it is possible to choose the operation mode, i.e., user edition, creation, or deletion. In the Create user mode, the User password section is used to set a new password which can be either entered manually or generated by the system and saved in the selected form field. The Account data section is used to provide information r (...)

(...) In new versions o WebCon BPS using word templates are now using GUID identifier witch enables using it's in all environments. But the functionality o word templates are very simple. It's now enough flexible for control conditions for hide, show etc. information's. For example: You can not show header of table, but empty row is always. In HTML you can control this. Adding using GUID in HTML templates (...)

(...) on.com/posts/post/creating-a-sharepoint-site-with-a-webcon-bps-action/203/3 Unfortunately probably because of MFA I am not able to establish connection with SPO (I get error "The sign-in name or password does not match one in the Microsoft account system"). I don't have SDK purchased, therefore I won't be able to create custom action to send these files. My attachments are also greater than 4MB, so (...)

Privacy overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognizing you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.


To see a full list of the cookies we use and learn more about their purposes, visit our Privacy Policy.