WELCOME TO THE COMMUNITY
find what you are looking for or ask a new question

search results

for API

(...) ID, Application ID, Application Secret) are part of the connection configuration.     All WEBCON BPS file sharing operations in OneDrive are performed using the Microsoft Graph API in the context of the application. This means that the user who performs the actions of starting, finishing or cancelling file editing does not need to additionally log in to OneDrive. Therefore, a M (...)

(...) Data from WEBCON BPS can now be loaded in OData format and used in Power BI Desktop and Online. This greatly simplifies WEBCON integration with Power BI, instead of manually constructing REST API queries and dealing with token-based authentication, we are able to use one of two custom connectors to easily load data from WEBCON BPS into Power BI. Handling this data is also less cumbersome, (...)

(...) nal user is linked to an instance in the task list view, they will be redirected to the main form view instead. Single-Use Access License can be managed with the Manage BPS user licenses action. API 5.0 and Beta endpoints can handle Single-Use Access License. (Version 2024 R1 and up) Used for tasks and instances shared via Public link.        Example (...)

(...) he configuration will be the same for each of the four features.     All operations related to sending and receiving e-mails from Exchange Online are handled with Microsoft Graph API in the context of the application. Therefore, the Microsoft Azure application should be assigned the correct Application Permissions. These permissions will be different depending on which feat (...)

(...) Applies to version: 2021.1.x and above; author: Agnieszka Burda   Introduction With WEBCON BPS you can use API interface. The article available here: https://community.webcon.com/posts/post/the-invoke-rest-web-service-action/170/ describes the “Invoke REST Web Service” action provided in Designer Studio that allows users to use external services sharing their own API . This (...)

(...) independent analysis and evaluation of key information in the field of implemented business processes. However, the user can additionally see how the figures for working with workflow instances are shAPI ng up over the periods defined by them. For the purpose of such analysis, the Key application indicators page has a dedicated tab, In time. It is a report that provides a visual representation of i (...)

(...) ; After saving the new service, the Secrets section will appear in its configuration window. Click the button Generate a new client secret  available in this section. This will display the API secret window where you should click the button as above. Following that, the corresponding secret will be automatically generated in the API secret field. According to the message in the sc (...)

(...) n 5) narrow bar width 6) wide bar width 7) barcode height 8) print human readable code 9) data field   Examples of standard fonts and font sizes (Zebra 5 font supports only cAPI tal letters):   The sample printout contains three lines of text:   The font is Zebra 1, but horizontal and vertical multipliers are used here, as set by the parameters 5 (...)

(...) instances were found, one matching both keywords and one matching one   As you can see on the screenshot above, all results matching at least one of the keywords “star mike” (cAPI talization doesn’t matter) were aggregated on the item list (“Select person”). In case of finding more than one match, more records will be presented and will be added to the table. (...)

(...) rs, containers, and distributed applications. Its operation is based on the instrumentation principle, i.e. adding code to an application to collect telemetric data. OpenTelemetry provides uniform API and libraries for a number of programming languages, which allows developers to use a uniform set of tools for monitoring applications in various environments. OpenTelemetry in WEBCON BPS (...)

(...) Assuming the first edition of the Process Hackathon at Poznan University of Technology was successful, the second edition was a success with a cAPI tal S! 😉 On January 19, 2024, we had the pleasure of being guests at the Faculty of Engineering Management of Poznan University of Technology for the annual WIZ-BIZ-LOG DAY event. Approximately 100 students participated in this y (...)

(...) ter valid credentials. Once this information is entered, the user returns to WEBCON BPS Portal, providing generated access token to the mobile application. The access token is utilized in all REST API invocation methods. After moving to the WEBCON BPS main page (the token is added to the request header): the access token remains valid for 1 day. Upon expiry, it is refreshed with a refresh to (...)

(...) sable auto-scale in iOS 10 Mail entirely --> <title></title> <!-- The title tag shows in email notifications, like Android 4.4. --> <link href="https://fonts.googleAPI s.com/css?family=Lato:300,400,700" rel="stylesheet"> <!-- CSS Reset : BEGIN --> <style> /* What it does: Remove spaces around the email design added by some email c (...)

(...) Export On the topic of avoiding human error, it is a good practice to modify the Production environment exclusively via the Export-Import mechanism. It is currently also possible to import with API . With these packages, we also have a convenient “backup” of the previous versions of our applications, should we need to return to them.   E-mail contents We can strictly (...)

(...) hecklist using the configuration database table. In the end I considered the following artifacts: BPS Groups: Need to be transferred. User profile and favorites: Can be ignored. Registered API applications: Need to be transferred. Devices: Can be ignored Licenses assignments: Need to be transferred since subscription licensing is used. Substitutions: Can be ignored Themes: Need to (...)

(...) wledge to migrate further processes. In this series I'm creating an example application into which I'm importing data using built in cyclic actions, and external powershell script using REST API . Creating example application. Importing data using cyclic actions. Importing data using external powershell script.

Have you ever faced the challenge of managing documents where multiple signatories need to sign on different pages or in specific positions, and didn’t know how to handle it?  We’ve developed an intuitive interface using HTML and JavaScript within WEBCON that allows each signatory to select the exact position of their signature on each document. This innovative functionality u

(...)   Introduction The OAuth2 authentication standard is becoming increasingly popular, as it enables integration between different systems. In many cases, the connection takes place in the API → Application model, which makes authentication much easier. In this case, a predefined set of data is used – Client ID, Client Secret, and our subsequent actions are authorized by the tok (...)

(...) p;    "Endpoint": "[metricsAddress]",               "Headers": "Authorization=[API key]"             },             "AzureMonitor": {   (...)

(...) s time to configure the permissions. To be able to download the list of users and groups, the application must have User.Read.All and Group.Read.All permissions. Permissions should be added in the API permissions tab. By selecting Add a permission, then the Microsoft API s tab, click Microsoft Graph. In the next window, indicate the Application permissions, locate and select the U (...)