(...) I have timeout that is no longer needed. I want to delete it. But aplication runs constant ly and in step with timeout there always will be elements. How to get rid of this timeout. I've tried setting is to always false, but it's still trigered and goes to list. I have few of them on diffrent steps and they total 10k elements in timeout list.
(...) I would like to propose a change to the Process Import/Configuration grid. It would be great if the names: Data sources, Fields, constant etc. were in a separate column (if it were possible to sort/filter by this column it would be great :-) ). With many data sources, finding the one I don't want to import is not easy.
(...) Hi guys, in some use cases we need to have some formatted text based on an textconstant on a pdf dokument. Therefor we have some logic in the application which places the text in a given multilinefield if a date is changed in a special way. The texttemplate ist displayed correctly in the application and in the word, if the user did not make any changes on the text. But the user has to make changes (...)
(...) Hello, we have a huge AdminServiceLog table in the BPS_Config db that is constant ly growing. Is it possible to archive or delete these records without causing side effects? Are there further optimization possibilities to avoid large data records in advance or to adjust them afterwards?
(...) Hi, it would be nice if one could also create new groups for global fields and automations in system settings like it is for global constant s, form rules and business rules. Kind Regards Sébastien
(...) Hi, After upgrading from the 2022 version to the latest 2025 version, I am experiencing an issue with the URL for REST services. The address and API endpoint are stored as global constant s. For example, the URL: https://mock.webcon.bps:3317 For example, the endpoint: /domains/customercommunication/internal/v1/message Webcon returns an error during the sending action due to an incorrect URL (...)
(...) aracter -- '' , didn't change the description -- SQL command returning null, didn't change the description -- NULL as a string, obviously set the description to NULL as a string - Assign an empty constant to the field, didn't change the description - Use a business rule which returned NULL, didn't change the description I'm using 2025.2.1.179 Best regards, Daniel
(...) Hi, right now configurations are process specific and contain amongst others business rules, form rules, constant s, automations. If multiple processes of the same app or even other apps need one of those there is the possibility to create a global equivalent in system settings. Unfortunatelly global objects have no app binding functionality as data sources have. Some global constant s, business or fo (...)
(...) ment of header entries instead of having to change e.g. an expired x-api-key or authorization value at all of its occurrences. Moreover this would be a better way than storing such a key in a global constant . Kind regards Sébastien
(...) data source for each connection that gets process information, mainly the process GUID and then a business rule managing where this process GUID can be found across all environments. We have a global constant environment ID with breaked inheritance return 3 for dev, 2 for test and 1 for prod. I'm looking forward to your (better) suggestions. Kind regards Sébastien
(...) Hi, when using global constant s in the global email template the reference is done with the IDs instead of the GUID. By this it‘s not possible to just copy & paste the HTML code to other environments without having to replace all occurrences of those references. Therefore I suggest to use GUIDs instead of IDs. Having global business rules for the email template would be great too. Kind regards (...)
(...) May 14, 2026 The security of our platform is of utmost importance. We monitor the net for news on emerging vulnerabilities, run security audits, and react to issues raised by our clients. We constant ly update WEBCON BPS to remove any known security vulnerabilities. On this page, we will compile information regarding security vulnerabilities detected in the system. Each problem listed in this t (...)