(...) edure" action in the Actions tab in Designer Studio. For more information, see Introduction to actions in WEBCON BPS. The preparation of this action requires knowledge of SQL. The WEBCON BPS aCC ount must have the privileges to edit the database in which data is stored, as well as to the table into which the data will be inserted. Fig. 5. The service aCC ount identifier can (...)
(...) Applies to version: 2021.1.x and above; author: Marek Suchowiejko Introduction Most applications supporting business process automation are created in IT departments. The key to suCC ess is the effective communication of requirements and expectations – the quality of the completed system depends on how well its specifications were communicated between the intended audience and design (...)
(...) with empty values as a group by selecting “Show group for elements with no value.” Fig. 15 Grouping form data You can also hide or display the search panel and configure it aCC ordingly. The way the search engine works is set directly in the report configuration. However, here you can decide if it should be visible or hidden. Fig. 16 Search panel configuration (...)
(...) rive to march in lockstep alongside other platform products, i.e. Windows Server, SQL, SharePoint, etc. We do our best to maintain backward compatibility with older versions of these platforms to aCC ommodate our diverse client base and their preferences. However, as the publishers end support for their aging products, so must we. It’s not all doom and gloom, though—as we say goodby (...)
(...) ed from the AD or AAD with those from external authentication providers, into one universal cache of all users of the system. The BPS user list serves as the base for granting privileges to view and aCC ess the system, and also contains data of the company structure. Its status has to be constantly updated to provide users with uninterrupted aCC ess. This is why a correct configuration of this system (...)
(...) to, was, will, with Search revelance Query provided by the user searches for all instances which fit the specified words. During the search, following instance details are taken into aCC ount: Instance ID Instance number System elements names (process name, workflow name, step name, form name) Form fields names Form fields’ and items list values Text content of t (...)
(...) Additionally, in the process configuration in the ‘User privileges’ tab you need to select the checkbox: ‘Make subordinates’ tasks and workflow instances aCC essible’. After saving the configuration in the Designer Studio (and after the first cache refresh) we will have the new functionality available on our SWE. (...)
(...) your disk array (e.g. by using a larger number of more efficient disks). WARNING! Every upgrade should be preceded by comprehensive monitoring and analysis of system parameters, in order to aCC urately identify and eliminate bottlenecks. This will ensure that your system is scaled-up as efficiently as possible. Sample configuration of an environment intended for roughly 18 000 users (...)
(...) o export/import the contents of the dictionaries using an Excel file. Thanks to these solutions, there is no need to manually transfer data, which reduces the risk of errors and facilitates work. ACC ess to the “Dictionaries import report” in the import wizard allows you to check if the data transfer was suCC essful, and also to solve any problems – by providing files with error l (...)
(...) .x and above; author: Michał Bednarz This article describes the process of integration WEBCON BPS with Keycloak. Keycloak is an open source software that enables single sign-on using identity and aCC ess management in modern applications and services. Requirements WEBCON BPS StandAlone (version 2021) – the portal available with the use of SSL by the address in the FQDN format. Key (...)
(...) dquo; action. By using this action you can lower/remove the privileges indicated to the users (if they have them) to the defined level. Privilege reduction levels: No privileges – no aCC ess to the selected instance Read - only (can’t view attachment) – privileges to read without viewing attachments Read - only – privileges to read without editing the instance (...)
(...) T-PROD mode Data sources are another element that can naturally vary depending on the environment in which it is defined. This difference may be due to a different source address, user, or source aCC ess password. Connections to data sources defined in WEBCON BPS Studio allow you to specify various parameters depending on the environment on which they are to work. The use of this functionality (...)
(...) as a link starting new instance SQL query that returns all groups to which the selected user belongs: select gr . COS_BPSID , gr. COS_DisplayName , ( case gr. COS_ACC ountType when '4' then 'Active Directory' when '2' then 'BPS' end ) as Type from CacheOrganizationStructure as gr join CacheOrgan (...)
(...) een normal, bold, underlined, and italic text. Fig. 9. The rule coloring the background of the Status column For each row function was used again - to color the status aCC ording to its value. The SET CELL BACKGROUND function allows you to set the cell background - this time the color was given in hex values. Below are all functions of influencing the cell appearance (...)
(...) y of approval" item list A) Add new values mode The "Change items list values" action with the “Add new values” mode was placed on the Approval step at the ACC ept path (the action adds information about approving the analytical breakdown line), and at the Reject path (information about rejecting the analytical breakdown). Fig. 4. The Appro (...)
(...) DEFAULT_NAME Default name displayed on the form it is presented in a language which does not have translations defined in the source LANG_CODE Two-letter language code (aCC ording to ISO 639-1) for which a translation is defined in the next parameter (ex. PL, EN, DE, IT) LANG_NAME Value translation for a specific language It is possi (...)
(...) sually these are quotas which condition sending the task to a specific step. Another example is when – depending on the environment – system assigns task to a specific aCC eptor. Look at the example below. In this case where the aforementioned constant is provided in a technical field managed by the aCC eptor, the system – depending on the enviro (...)
(...) sp; After adding a new application go to Single sign-on configuration where following elements are configured: Application Identifier, address where we should be brought back after suCC essful authentication (Reply URL) and log-in address (Sign on URL). Users will be identified by user.userprincipalname Remember to change class.webconbps.com in URL (...)
(...) Łukasz Kraśniak Introduction Regular expressions – REGEX in short – allow to precisely describe complicated search patterns. One of many examples can be validation of provided bank aCC ount number. Whether the pattern fits the character string is mainly used during validation of so-called entry data. Regular expressions allow to check if the user data has correct format. Here is (...)
(...) ed to close the wizard, fix the problem, and start export wizard once again. Fig.3. An example of application export with incorrect process configuration After a suCC essful application verification, choose which application components should be included in the export package. Apart from components directly related to the process configuration, and processes relate (...)