(...) quot;Internal audit" process intended to register information for internal audit – it was used to grant privileges. The "Internal audit" process is part of the "Audits & control s" application. Fig. 2. Privileges granted to the "Management Board" group in the "Internal audit" process In order for the BPS group to (...)
(...) ed end users with sufficient knowledge to make their own modifications through a console. Thus, the primary distinction between the first and second approach revolves around the issue of increased control and safety. When dealing with sensitive data, it is advisable to utilize business rules for enhanced data security. Conversely, for situations where data safety is not the top priority and the focus (...)
(...) cooperation agreement with the Krakow University of Economics. The purpose of the agreement, signed by Marcin Jędrzejczyk, the Director of the Institute of Information Technology, Accounting, and control ling of the Krakow University of Economics, on behalf of the University, and Łukasz Malina, Vice President of WEBCON, is among other things to utilize the scientific and educational output, as well as (...)
(...) leting instances, or starting new ones. The form view that is displayed to the temporary user is determined by the configuration entered in the “Field Matrix” and the defined rules. To control the visibility of defined elements for the temporary user, it is possible to use the “Is share mode active?” option. The “Share” button icon is replaced with the Active sh (...)
(...) s treated as the final value of the indicator. For this setting, it is not possible to estimate the current value of the indicator before its calculation is finished. This means that in graphical control s on the form and Dashboards that present performance indicators will not display this value until it finishes calculating. There are additional variables in the editor to aid in this rule calcul (...)
(...) provided: 4 SDK actions are used for operating on data sets 1 action – anonymization/data removal 3 custom data sources are used for providing data to Data Table (SQL Grid) reporting control s Action searching through process-type personal databases (based on BPS process) WebCon.WorkFlow.Extensions.GDPR.Actions.FillPersonalDataItemList Action searching through ex (...)
(...) d the goal of completing the course was to create an application that supported one of the document flows used at the university. During two meetings with students of the "Accounting and control ling" major, we talked about process automation, implementation design, change management, and the changing model of a manager and an employee in business (Citizen Assisted Development). The (...)
(...) tasks had been completed. The Solution It is quite possible to get the desired voting-style behavior from WEBCON BPS using one or two SQL queries together with a Workflow control step. Moreover, the SQL queries can be encapsulated onto global business rules that can be reused repeatedly. At a high level, it looks like this: Part One: Business Rules with SQ (...)
(...) mpting to enter a link to an instance into the Choice field using a QR code would result in the insertion of an identifier for that instance. The SCAN QR, SHOW QR and HIDE QR rules You can control the input of values into form fields or columns through QR codes using form rules. The SCAN QR rule enables you to specify a relevant form field or column for which the QR code scanner will be (...)
(...) ITCH operator is a business rule, whose result will point to the case that will be used. The case can be designated in two ways: Variable referencing the case As with the Workflow control step, the result of the rule can be a variable that references one of the available cases. If the rule does not identify any case, the ELSE case will be used. SWITCH Operator Value a (...)
(...) this mode provides tools that enable effective creation of business applications. Furthermore, it facilitates progress supervision and allows for the designation of specific areas, thereby increasing control over developed solutions.
(...) cessary to activate or deactivate license services offline. LAS enables users to download license files, such as when purchasing additional solutions or upgrading WEBCON BPS to newer versions, and to control license expiration dates, particularly when using the subscription model. This article describes the key features and capabilities of LAS. Logging in and home page The LAS website is (...)
(...) w must be opened manually. You can do that in two ways: by typing in the “dcmcnfg” command in the Run dialogue window in the Windows system (Windows key + R); by navigating in the control panel window through the path System and Security → Windows Tools → Component Services → Computers → My Computer → DCOM Config. After opening the Component Services wind (...)
(...) tings of the compact form are by default inherited from the configuration of the main form. However, it is possible to break the inheritance and configure the compact form independently. - You can control the behavior of the compact form through form rules. By default, the configuration of such rules is inherited from the settings of the main form, but, similar to the first case, it is also possible t (...)
(...) allenges and considerations when designing for both modes: Understanding User Preferences: The primary challenge in adapting email templates for dark and light modes is recognizing that you cannot control the user’s display settings. Most modern operating systems and email clients allow users to choose their preferred theme. Therefore, your email design must automatically adjust to these setting (...)
(...) this type. If SOLR and/or SQL components are to be implemented in the same cluster, the cluster must support loads based on both Linux and Windows containers. The application requires the ingress control ler to support ARR with Cookie Affinity enabled. Only the subscription licensing model is supported. Perpetual licenses cannot currently be used. Containerization is supported from version 2023 on (...)
(...) ture of the installation, and the configuration options within the system itself. In this article, we will focus on the latter – options that can be found in Designer Studio that can be used to control the system’s accessibility. Security bulletin – vulnerabilities The development of WEBCON BPS involves a multitude of external components, libraries, and frameworks that u (...)
(...) reality in order to meet the growing accessibility needs of users as technology evolves. As announced and drafted, the standard will introduce new, more detailed accessibility evaluation criteria and control tools for auditors. Digital accessibility of Portal The objective of enhancing the digital accessibility of Portal was met by implementing a series of changes and modifications to ens (...)
(...) logout button. Accordingly, supplementary configuration steps must be undertaken and the Windows Authentication method deactivated. To do so: Launch IIS Manager on your computer by selecting control Panel → System and Security → Administrative Tools → Internet Information Services (IIS) Manager. In the left panel of the navigation tree, select the se (...)
(...) ve?” variable inserted into a field that restricts the visibility of a path on the form. Summary With Business administrator privileges and admin mode enabled, a user gains full control over editing and managing Portal instances. With that in mind, it is important to grant such privileges only to individuals with an in-depth understanding of the system, as well as process and workfl (...)