WELCOME TO THE COMMUNITY
find what you are looking for or ask a new question

search results

for update

(...) Hi, I’m looking for the best approach to handle long-running operations (potentially taking several minutes) in WEBCON BPS. Scenario: Suppose we need to perform time-consuming Active Directory update s based on a list of items within a WEBCON BPS workflow instance. Given the current execution time limit of 120 seconds, this may not be sufficient. Workaround Approach: My current solution is to us (...)

(...) considering changing the domain for users in AD in our company, which will consequently result in changing logins in BPS and losing permissions. Are there any scripts available that would allow us to update the tables so that we can preserve the existing permissions and access rights for users? What about licenses? Will they be revoked for the old logins and assigned to the new ones, or is there a spec (...)

(...) a technical subworkflow, which stores the data and get's deleted at some point. For deleting it I would need to use the API, as the archive action is not part of WEBCONAPPS. But I have no trigger, to update this workflow when a new attachment is added. A user could just add an attachment. It's not necessary to save the instance. Really complicated and error prone. - Create an SDK which returns the base (...)

(...) Hi, I really need your help. We update d Webcon from version 2022 to version 2025 R2 (version 2025.2.1.42). We started the update from DEV → TEST → PROD (the processes across environments were aligned). Some issues started appearing on the environments, and we had to introduce modifications. At this point, when trying to deploy the application from TEST to PROD, I’m getting the following error. I (...)

(...) 25 The security of our platform is of utmost importance. We monitor the net for news on emerging vulnerabilities, run security audits, and react to issues raised by our clients. We constantly update WEBCON BPS to remove any known security vulnerabilities. On this page, we will compile information regarding security vulnerabilities detected in the system. Each problem listed in this table will (...)