WELCOME TO THE COMMUNITY
find what you are looking for or ask a new question

search results

for policy

As the producer of WEBCON BPS, we strive to provide our clients and partners with the best possible software. With each release, the platform is developed according to the highest industry standards and subjected to rigorous testing procedures to ensure stability, reliability and security. Each major release of the platform (e.g. WEBCON BPS 2025) is supported for 12 months for bu

(...) he JSON tab and fill in the data set that will be passed to the Web service.     The group name (“displayName” attribute) should be consistent with the organization policy . Depending on the settings, the group naming may require specific prefix or suffix. For more information see -> https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/grou (...)

(...) elements which are essential to the availability and reliability of a WEBCON BPS system: SQL data bases (solutions like: HA Cluster, Always On Availability Group, Log Shipping) – security policy and available budget are usually the deciding factors when choosing a solution. https://docs.microsoft.com/en-us/sql/database-engine/sql-server-business-continuity-dr?view=sql-server-ver15 SharePoi (...)

(...) type=code&state=security_token%3D138r5719ru3e1%26url%3Dhttps%3A%2F%2Foauth2.example.com%2Ftoken&redirect_uri=http://127.0.0.1:80&client_id={ClientID}    Due to security policy , a warning about the unverified application will be displayed on the screen. This verification is possible but requires contact with Google and it is not required at this moment. Just expand the &ldq (...)

(...) ace the URL address with a global or process constant – the configuration will be in one place in WEBCON BPS, which will facilitate the change in the future. Development of a redirection policy from the old address in SharePoint (domain/WEBCONBPS) to the address in the StandAlone installation. This also applies to WEBCON BPS integration with other systems. You can use the IIS server m (...)

(...) d IIS do not have any security headers defined, we will get the “F” grade.     To improve the level of security we will focus on four basic headers: Referrer-policy https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-policy Strict-Transport-Security https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Securit (...)

(...) xes and improvements and each major release of the platform is also supported for 24 months for high and critical security fixes. For more information, click here: WEBCON BPS development support policy .     BPS 2022 BPS 2023 BPS 2024 R1 BPS 2025 R1 BPS 2025 R2 BPS 2026 R1 (Future version) Standard SWE (...)

(...) elements which are essential to the availability and reliability of a WEBCON BPS system: SQL data bases (solutions like: HA Cluster, Always On Availability Group, Log Shipping) – security policy and available budget are usually the deciding factors when choosing a solution. https://docs.microsoft.com/en-us/sql/database-engine/sql-server-business-continuity-dr?view=sql-server-ver15 SharePoi (...)

(...) e central administration, in Manage Web Application section add new authentication provider which we have just created.     Next step is changing token authentication policy change in SharePoint from SAML 2.0 to SAML 1.1. If AzureAD application was created in Portal it uses token authentication policy in version SAML 2.0 by default. SharePoint server requires authe (...)

(...) of the Microsoft Azure Tenant application. Note that the Files.ReadWrite.All permission is broad (access to all OneDrive instances in the organization) and may violate the company’s security policy .   Permissions for selected site collection An alternative configuration of the Microsoft Azure Tenant application is to give it permissions only to selected OneDrive instances. (...)

(...) on to be possible, the user must have administrator privileges on the local machine. Alternatively, the add-in can be installed globally in an Active Directory environment with properly defined Group policy , in which case the local user does not need to have administrator privileges.   In the next step, the installer window will be displayed:       Click Instal (...)

(...) o avoid this and limit the permissions to specific mailboxes. To achieve this we create a security group of the Mail-enabled security type and then use it to configure an adequate ApplicationAccesspolicy . The full description of how to configure an ApplicationAccesspolicy can be found here: https://learn.microsoft.com/en-us/graph/auth-limit-mailbox-access   Note: Please keep in (...)

(...) here. Create a security group of the Mail-enabled type Add the mailbox addresses that will be used as the custom Sender to the group As per the above article, configure the ApplicationAccesspolicy for the security group (allow the application to send e-mails using mailboxes added to the group):   Distribution group settings Create a dedicated Distribution group In the Exch (...)

(...) “Field 1” form field (red frame) and the “Field 2” field (red frame) placed under a separate tab.   Example 2: business case: calculating the cost of insurance policy In this example, the application is used by an insurance company to calculate the cost of insuring a car belonging to a requesting person. A number of variables specified in individual form fields (...)

(...) s and Microsoft Outlook, add the following domains to the trusted domain list: https://*.office365.com https://*.office.com https://*.microsoft.com   Note: If Content-Security-policy headers are configured and added to the frame-ancestors section set, the list of trusted domains will be added to domains defined in this header. The exception is the “*” entry, which is (...)

(...) Standalone  [PL] SharePoint Server Full Trust Installation [Polish version of the above] Instrukcja Instalacji z SharePoint Server WEBCON BPS Development Support policy This short document describes the support policy for WEBCON BPS.

(...) account information. Fig. 9. The Sign in window After correct login, the control changes the displayed information. The mechanism supports MFA authentication if the tenant's security policy requires it. The SSO mechanism is also supported – the logged-in user will not be asked to provide data again. Fig. 10. Control confirming user login   It is possible to use t (...)

(...) Hi community I am currently implementing a process where the form is filled out by "visitors" of our company. (In short, it is a visitor registration at the reception). By law and for company policy reasons, we have to display a "Data Protection Notice" on the form before the visitor can complete the registration. By company policy , we are required to provide this notice in each country in _all_ po (...)

(...) Privacy policy WEBCON Effective Date: 27.08.2019 The Privacy policy determines the principles of gathering and collecting personal data and other anonymous data. The Privacy policy applies to mobile applications „WEBCON BPS 2019”, „WEBCON BPS”, applications: „WEBCON BPS Add-In for Outlook”  „WEBCON BPS Cloud Portal for Teams”, service „ (...)

Privacy overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognizing you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.


To see a full list of the cookies we use and learn more about their purposes, visit our Privacy Policy.