WELCOME TO THE COMMUNITY
find what you are looking for or ask a new question

search results

for log

(...) the column rules in the item list (the “Dynamically” option). In this case, the “Approver” column stores the approvers’ data, so the picker value should be set to ‘log in’. It is also possible to return approver log ins using the SQL/CAML query (log ins). When you select the “Data source” option, you can define a data source that contains approver&rs (...)

(...) ded even several years before the implementation of WEBCON BPS, and the contract date should be visible in the instance number. There is also the ability of numbering within business entities and log ins. If WEBCON BPS supporting many business entities, you can number instances separately for each of them. It allows you to avoid a situation where people having access to all instances of the compan (...)

(...) rce document. It is important that it is below the Word generation action - the actions are always performed in the order from top to bottom.     The action of converting is analog ous to the generation one - you can again select the method of selecting an attachment and its name in the Results tab.   Creating a template The template added to the dictionary process (...)

(...) 019.1; author: Tomasz Pytlak   Introduction Working with attachments is one of the basic functionalities in WEBCON BPS. Some processes, such as document repository, are only used to catalog and make files available to selected users. In others, the attachments may be of secondary importance. For example, when you want to work on a file together with your client, a good solution may (...)

(...) Introduction Apart from standard options for adding users to the system, such as synchronization with AD or/and AAD, WEBCON BPS allows you to manually add a user. All users added in this way can log in to the system via BPS Auth., be granted privileges, and can be assigned tasks in the system. To save time, you can use the ability of adding more users from an Excel file.   Adding (...)

(...) guring the application and enabling the WEBCON BPS Modern form display mode: Change JavaScript to the form rules or JavaScript consisting of the available editor functions while maintaining the log ic of the Modern form Switch data sources and SharePoint libraries to dictionary processes or SQL tables Change SOAP WebService to REST WebService. It also applies to integration with WEBCON BPS (...)

(...) ver that ensures the authentication with the external providers (Azure AD, Google) Assumptions WEBCON BPS is installed in the internal network WEBCON BPS Portal uses one of the available log in mechanisms e.g. Azure AD, Google – BPS Auth Preparation As an example, a configuration with Azure AD authentication was presented. The configuration for other providers is available i (...)

(...) owing free commercial use.   Examples of templates All presented templates were attached to the article in HTML format -> you can download them.    a) Template with a log o on the right (Template 1) This template is built based on the tables. Deciding which of the table boundaries will be visible allows you to create visible lines on the template. Invisible table bo (...)

(...) Application – ID or Name Process – ID or Name Workflow – ID or Name Form type – ID or Name Current step – ID or Name Business entity – ID or Name log ged on user – ID or Name Document – instance number Document – Parent instance number Is admin mode active? – True or False Do I have permission to edit? – True o (...)

(...) tering person. All people are returned from the Approval path list, because the “Return values from all rows” option was selected in the SQL query configuration. The SQL query returns the log ins of people indicated on the “Approval path” item list.   Fig. 3. The SQL query used in the “Business rule” option   As you can see, the task was a (...)

(...) n the “Authentication” tab   Fig. 5. The “Authentication” tab   Setting the URL to the resource of the employee selected on the form – the log in should be set in the UPN format   Fig. 6. The “Request data” tab and URL to OneDrive resource of the selected employee   Setting the resource ID (drive) t (...)

(...) of new features. Additionally, updated builds are released at least once a month, they aim to resolve any existing issues and implement small changes. These small changes can be tracked via our changelog (available at the bottom of this page), which compiles a list of all modifications made to a ‘big’ version over its lifecycle. Our latest ‘big’ version is 2020.1& (...)

(...) of new features. Additionally, updated builds are released at least once a month, they aim to resolve any existing issues and implement small changes. These small changes can be tracked via our changelog (available at the bottom of this page), which compiles a list of all modifications made to a ‘big’ version over its lifecycle. Our latest ‘big’ version is 2020.1& (...)

(...) ion mode. Below there are also reports on copying/transferringprivileges – basic and advanced.   Fig. 2. Privileges migration   Parameters: Source user – a log in or name of a user whose privilege you want to change or copy Target user – a log in or name of a user who will be granted privileges   There are two operation modes: Copy (...)

(...) , the main step forms inherit field order and a few other settings from the workflow's global form template. The compact global form template inherits settings from the main global form template. log ically, a compact step form inherits from its main form version.   If we break inheritance for a compact workflow form, it will become independent of the workflow's main form. This way (...)

(...) Applies to version 2020.1.3; author: Mateusz Syrek ADFS is one of the authentication providers that can be used with WEBCON BPS Portal. This article explains how you can customize your log in page when you use ADFS.  Before you can customize your log in page, you need to have your WEBCON PORTAL registered in ADFS. For instructions on how to do it, please refer to this article Integration of WE (...)

(...) properly understand the operation of the user’s administration panel, two concepts should be introduced: Authentication – the process of verifying a user’s identity through a log in and password, one-time password tokens, etc. Authorization – the process following user authentication, that checks if a user has access to a given resource, etc.   Adding a us (...)

(...) sp;identifier, or time interval. You can also sort the columns by a user identifier, date, or session identifier by left-clicking on them.  Fig. 6 Searching for a session   log in details  Below is a simple example of how you can use the diagnostics to understand what happened on the form.  Fig. 7 Sample workflow   Fig. 8 A sample form (...)

(...) ;  "E-mail" field. If you do so, the user BPS ID will conform to the UPN format. Job title, Phone, Supervisor identifier (BPS ID) - in the example, we have used the person's log in indicated on the form as the superior. User picture - you can create a photo based on the attachment from the form. In our example, we have configured the action to place the user picture in a ca (...)

(...) onfiguration used in our example. Fig. 7 Configuration of the action "Choose an approver"   In the “Select user” field, we have chosen the “Purchaser log in” form field because we want to send the form to the supervisor of the person who completes a requisition form. In the “Target field,” we should choose where we want to store the i (...)