WELCOME TO THE COMMUNITY
find what you are looking for or ask a new question

search results

for CC

(...) your disk array (e.g. by using a larger number of more efficient disks). WARNING! Every upgrade should be preceded by comprehensive monitoring and analysis of system parameters, in order to aCC urately identify and eliminate bottlenecks. This will ensure that your system is scaled-up as efficiently as possible. Sample configuration of an environment intended for roughly 18 000 users (...)

(...) o export/import the contents of the dictionaries using an Excel file. Thanks to these solutions, there is no need to manually transfer data, which reduces the risk of errors and facilitates work. ACC ess to the “Dictionaries import report” in the import wizard allows you to check if the data transfer was suCC essful, and also to solve any problems – by providing files with error l (...)

(...) .x and above; author: Michał Bednarz This article describes the process of integration WEBCON BPS with Keycloak. Keycloak is an open source software that enables single sign-on using identity and aCC ess management in modern applications and services. Requirements WEBCON BPS StandAlone (version 2021) – the portal available with the use of SSL by the address in the FQDN format. Key (...)

(...) dquo; action. By using this action you can lower/remove the privileges indicated to the users (if they have them) to the defined level. Privilege reduction levels: No privileges – no aCC ess to the selected instance Read - only (can’t view attachment) – privileges to read without viewing attachments Read - only – privileges to read without editing the instance (...)

(...) T-PROD mode Data sources are another element that can naturally vary depending on the environment in which it is defined. This difference may be due to a different source address, user, or source aCC ess password. Connections to data sources defined in WEBCON BPS Studio allow you to specify various parameters depending on the environment on which they are to work. The use of this functionality (...)

(...) as a link starting new instance   SQL query that returns all groups to which the selected user belongs: select gr . COS_BPSID   , gr. COS_DisplayName   , ( case gr. COS_ACC ountType     when '4' then 'Active Directory'     when '2' then 'BPS' end ) as Type from CacheOrganizationStructure as gr   join CacheOrgan (...)

(...) een normal, bold, underlined, and italic text.   Fig. 9. The rule coloring the background of the Status column   For each row function was used again - to color the status aCC ording to its value. The SET CELL BACKGROUND function allows you to set the cell background - this time the color was given in hex values. Below are all functions of influencing the cell appearance (...)

(...) y of approval" item list   A) Add new values mode The "Change items list values" action with the “Add new values” mode was placed on the Approval step at the ACC ept path (the action adds information about approving the analytical breakdown line), and at the Reject path (information about rejecting the analytical breakdown).   Fig. 4. The Appro (...)

(...) DEFAULT_NAME Default name displayed on the form it is presented in a language which does not have translations defined in the source LANG_CODE Two-letter language code (aCC ording to ISO 639-1) for which a translation is defined in the next parameter (ex. PL, EN, DE, IT) LANG_NAME Value translation for a specific language   It is possi (...)

(...) sually these are quotas which condition sending the task to a specific step.   Another example is when – depending on the environment – system assigns task to a specific aCC eptor. Look at the example below.   In this case where the aforementioned constant is provided in a technical field managed by the aCC eptor, the system – depending on the enviro (...)

(...) sp;   After adding a new application go to Single sign-on configuration where following elements are configured: Application Identifier, address where we should be brought back after suCC essful authentication (Reply URL) and log-in address (Sign on URL).     Users will be identified by user.userprincipalname Remember to change class.webconbps.com in URL (...)

(...) Łukasz Kraśniak Introduction Regular expressions – REGEX in short – allow to precisely describe complicated search patterns. One of many examples can be validation of provided bank aCC ount number. Whether the pattern fits the character string is mainly used during validation of so-called entry data. Regular expressions allow to check if the user data has correct format. Here is (...)

(...) ed to close the wizard, fix the problem, and start export wizard once again.   Fig.3.  An example of application export with incorrect process configuration   After a suCC essful application verification, choose which application components should be included in the export package. Apart from components directly related to the process configuration, and processes relate (...)

(...) hoice field - “Approvers to notify”. Values from the “Approver” column are copied to the “Approvers to notify” field. The second rule sets the value of the “ACC ount numbers” field based on the “ACC ount number” item list column.   Fig. 5. Configuration of rules using the SELECT VALUES functions   SELECT VALUES [Ite (...)

(...) ta visible in the report to an excel file (the xlsx format). 4. Reset all counters Sets attempt number counter to 0 for every element in the queue. You can use this option if for example, 5 unsuCC essful indexing attempts were made due to Solr unavailable. After resetting the counters, they will be reprocessed.  5. Delete Delete error elements - Deleting elements from the que (...)

(...) s you to import data from an Excel file to the form. You can use this action in the following scenarios: Part of the information entered into WEBCON BPS is filled out by people who do not have aCC ess to the company’s internal network (temporarily or permanently). You can prepare an Excel file and indicate data to be filled out.   Importing the document templates with duplicate val (...)

(...) , its description, category and language of the document.   Fig.2 . Generating action configuration.   The document language selection options are as follows: • ACC ording to the application settings, • Permanently selected language from the list (e.g. de-DE, uk-UA etc.) If the project of the designed application allows the user to select the language (...)

Applies to version: 2021.1.x and above; author: Konrad Wojtycza Introduction Form rules for attachments in WEBCON BPS allow you to receive information about attachments added to the workflow instances, without the need to know the WFDataAttachments table structure and to use SQL queries.   GET ATTACHMENTS - returns identifiers of attachments related to the current instance, it c

(...) indows authentication is used). WEBCON BPS installation 1. License update Make sure the licenses for the new application server are available. If no licenses are available, application aCC ess errors will appear after expanding the installation.     2. Installation of WEBCON BPS components on a new server Important: The operation must be performed using the ins (...)

(...) his code, the paper version of the document is paired with the electronic version. See - Barcode printer installation. HotFolder – a place where scanned documents are automatically sent. The aCC ount on which the BPS service works must have aCC ess to the created network share. See -  HotFolders. Scanner – the device should be able to scan a document to the selected network share. (...)