WELCOME TO THE COMMUNITY
find what you are looking for or ask a new question

search results

for CC

(...) name” – the name that will be visible in the authentication provider selection panel.  Host address - data provided by the authentication provider, in the case of Google https://aCC ounts.google.com/ Issuer - data provided by the authentication provider, in the case of Google https://aCC ounts.google.com/ Client ID - Application ID registered on the provider’s side. C (...)

(...) es, set goals for the next year, and analyze achievements and goals for the previous year.  List of behaviors Let’s create an auxiliary workflow that will contain a list of criteria aCC ording to which employees in a given company will be assessed. Below there is a sample list of behaviors for an employee: Fig. 1 - Sample behaviors and attitudes To create such a list, you w (...)

(...) pproving license terms, select Tools for application management -> Users list. Select „Azure Active Directory” as the synchronization source in the configuration, and fill out aCC ess data as described in the  WEBCON BPS integration with Azure Active Directory article. After saving the changes, restart the WEBCON BPS service. You can also do it from the installer l (...)

(...) s granted to their Substitute is limited to the required level, without violating e.g. company secrets. This article describes the rules for configuring Task delegation substitutions, taking into aCC ount user privileges in the context of multiple databases, as well as the roles of WEBCON BPS Workflow Service and global system settings.    Basic information Task delegation subs (...)

(...) edure" action in the Actions tab in Designer Studio. For more information, see Introduction to actions in WEBCON BPS. The preparation of this action requires knowledge of SQL. The WEBCON BPS aCC ount must have the privileges to edit the database in which data is stored, as well as to the table into which the data will be inserted.   Fig. 5. The service aCC ount identifier can (...)

(...) Applies to version: 2021.1.x and above; author: Marek Suchowiejko Introduction Most applications supporting business process automation are created in IT departments. The key to suCC ess is the effective communication of requirements and expectations – the quality of the completed system depends on how well its specifications were communicated between the intended audience and design (...)

(...) with empty values as a group by selecting “Show group for elements with no value.” Fig. 15 Grouping form data You can also hide or display the search panel and configure it aCC ordingly. The way the search engine works is set directly in the report configuration. However, here you can decide if it should be visible or hidden. Fig. 16 Search panel configuration (...)

(...) trive to march in lockstep alongside other platform products i.e. Windows Server, SQL, SharePoint, etc. We do our best to maintain backward compatibility with older versions of these platforms to aCC ommodate our diverse client base and their preferences. However, as the publishers end support for their aging products, so must we. It’s not all gloom and doom though – as we say goodb (...)

(...) ed from the AD or AAD with those from external authentication providers, into one universal cache of all users of the system. The BPS user list serves as the base for granting privileges to view and aCC ess the system, and also contains data of the company structure. Its status has to be constantly updated to provide users with uninterrupted aCC ess. This is why a correct configuration of this system (...)

(...) to, was, will, with   Search revelance Query provided by the user searches for all instances which fit the specified words. During the search, following instance details are taken into aCC ount: Instance ID Instance number System elements names (process name, workflow name, step name, form name) Form fields names Form fields’ and items list values Text content of t (...)

(...)   Additionally, in the process configuration in the ‘User privileges’ tab you need to select the checkbox: ‘Make subordinates’ tasks and workflow instances aCC essible’.     After saving the configuration in the Designer Studio (and after the first cache refresh) we will have the new functionality available on our SWE. (...)

(...) your disk array (e.g. by using a larger number of more efficient disks). WARNING! Every upgrade should be preceded by comprehensive monitoring and analysis of system parameters, in order to aCC urately identify and eliminate bottlenecks. This will ensure that your system is scaled-up as efficiently as possible. Sample configuration of an environment intended for roughly 18 000 users (...)

(...) o export/import the contents of the dictionaries using an Excel file. Thanks to these solutions, there is no need to manually transfer data, which reduces the risk of errors and facilitates work. ACC ess to the “Dictionaries import report” in the import wizard allows you to check if the data transfer was suCC essful, and also to solve any problems – by providing files with error l (...)

(...) .x and above; author: Michał Bednarz This article describes the process of integration WEBCON BPS with Keycloak. Keycloak is an open source software that enables single sign-on using identity and aCC ess management in modern applications and services. Requirements WEBCON BPS StandAlone (version 2021) – the portal available with the use of SSL by the address in the FQDN format. Key (...)

(...) dquo; action. By using this action you can lower/remove the privileges indicated to the users (if they have them) to the defined level. Privilege reduction levels: No privileges – no aCC ess to the selected instance Read - only (can’t view attachment) – privileges to read without viewing attachments Read - only – privileges to read without editing the instance (...)

(...) T-PROD mode Data sources are another element that can naturally vary depending on the environment in which it is defined. This difference may be due to a different source address, user, or source aCC ess password. Connections to data sources defined in WEBCON BPS Studio allow you to specify various parameters depending on the environment on which they are to work. The use of this functionality (...)

(...) as a link starting new instance   SQL query that returns all groups to which the selected user belongs: select gr . COS_BPSID   , gr. COS_DisplayName   , ( case gr. COS_ACC ountType     when '4' then 'Active Directory'     when '2' then 'BPS' end ) as Type from CacheOrganizationStructure as gr   join CacheOrgan (...)

(...) een normal, bold, underlined, and italic text.   Fig. 9. The rule coloring the background of the Status column   For each row function was used again - to color the status aCC ording to its value. The SET CELL BACKGROUND function allows you to set the cell background - this time the color was given in hex values. Below are all functions of influencing the cell appearance (...)

(...) y of approval" item list   A) Add new values mode The "Change items list values" action with the “Add new values” mode was placed on the Approval step at the ACC ept path (the action adds information about approving the analytical breakdown line), and at the Reject path (information about rejecting the analytical breakdown).   Fig. 4. The Appro (...)

(...) DEFAULT_NAME Default name displayed on the form it is presented in a language which does not have translations defined in the source LANG_CODE Two-letter language code (aCC ording to ISO 639-1) for which a translation is defined in the next parameter (ex. PL, EN, DE, IT) LANG_NAME Value translation for a specific language   It is possi (...)