(...) atabase creation” node and the window it opens After clicking the button, it is possible to define the database parameters, such as name and user (obtains owner privileges for the created database). Once you fill out all the required fields and click the “Create” button, the installer shows a summary of parameters defined for the database. Confirming them s (...)
(...) upper right corner of Portal and then Install MS Office add-ins and Outlook Classic. Note: for the installation to be possible, the user must have administrator privileges on the local machine. Alternatively, the add-in can be installed globally in an Active Directory environment with properly defined Group Policy, in which case the local user does not need to have adm (...)
(...) bscription models User licenses in the perpetual model: WEBCON BPS User CAL – the user may access all processes and applications built in WEBCON BPS (as long as they have the necessary privileges ). This access involves the ability to create new instances, edit and save them, move them to other steps via paths, and browse reports and applications. Through this license, a specific number of u (...)
(...) it is possible to define an account that will be used as the sender instead of the default sender address. This can be either an E-mail address or a Distribution group with “Send as” privileges . This feature called Allow "Send as" needs to be enabled in the System Settings, and once it is active it will be possible to substitute the sender address with a differen (...)
(...) Applies to version 2023.1.x and above, authors: Dawid Golonka, Krystyna Gawryał Introduction BPS groups is a solution that facilitates the assignment of tasks and the management of privileges granted to individual system users. This solution can be used in both standalone and cloud installations. The Export-Import mechanism makes it possible to transfer BPS groups with the application to an (...)
(...) ere is an attachment" action in WEBCON BPS Designer Studio according to the provided prototype documentation After performing all necessary tests, providing credentials, and granting privileges , the implementation team releases the application for use in the enterprise. Using the application and Edit mode While using the application, one of the employees carrying out tasks w (...)
(...) Indicators per process After selecting Overview, user will see Key application indicators, and more precisely, the Per process tab, whose content will vary depending on the applications used and privileges granted. The data of individual applications in the report are grouped and displayed according to the current state, in alphabetical order, just like in WEBCON BPS Designer Studio. When you click (...)
(...) onality in a selected process, check the Enable instance and task sharing button in the “Sharing” section. Once it is checked, other fields placed in the section become editable, i.e. privileges level and Default sharing expiration time (in days). The “privileges level” option contains a drop-down list that allows you to specify whether the instances are shared with edition (Edit (...)
(...) r panel → “Administration” → Change requests). (The configuration window is identical in both cases.) Please note that for change requests, an administrator is a person with privileges of either system administrator, application administrator, or supervisor. NOTE: the change request functionality is not supported when working on behalf of another user. A new opt (...)
(...) figure an authentication provider other than Admin accesses, such as Azure Active Directory. After synchronizing the user list, assign licenses to the appropriate users. Assign global privileges to users from your organization who will manage the installation configuration. After completing these steps and verifying that everything works correctly, you can disable the Admin ac (...)
(...) d, after the upgrade communication with the database will take place as before (without using the bps_user account). This article aims to take a closer look at the application of this account, its privileges and associated limitations. Scope of application The ability to add a dedicated account for reading data from the database already existed in earlier versions of the system, but now i (...)
(...) bsp; Pressing the button opens a window containing a QR code that you can send to other users, allowing them to quickly initiate a relevant workflow instance, provided that they have the necessary privileges . Keep in mind that you can open the QR code using either the system-based QR code scanner or the scanner built into the mobile application. In the first situation, after scanning the (...)
(...) sp;the following places: Person or group fields Item list columns that Use people field data source The Any person option in predefined task assignment Delegating tasks on Portal Adding privileges through admin action on Portal Business rule functions in the “Users” node, e.g. CURRENT USER IS ONE OF, USER IS ONE OF, etc. privileges at Global, Application, Process, and Workflow (...)
(...) io, specifically the Lite mode. What is the Lite mode in Designer Studio? The Lite mode is a functionality that allows users to work in Designer Studio with limited privileges . It enables users to access only the functionalities associated with the context of a particular application, preventing unauthorized access to the full configuration or specific areas of Designer St (...)
(...) ments). Now backtrack to the Service status node and activate the service. Any errors that occur will be saved in the Event viewer. The most common cause of issues is the lack of privileges for the service account to the recreated database. After the service has been activated, return to the License manager and activate the license service. Instructions on how to do so can (...)
(...) e Server 2019 and adhere to the procedure described below: download the ExchangeExtendedProtectionManagement script available here; launch the Exchange Management Shell console with elevated privileges ; retrieve all the IP addresses for which it is possible to restrict access to the virtual directory by entering the following command in the console: .ExchangeExtendedProtectionManagemen (...)
(...) ier, it is generally a good idea to divide business processes into a number of workflows that can (but don’t have to) be interconnected. Such smaller workflows are much easier to manage through privileges and task assignment. We can plan workflows around the data that will be used in it – if we have actors involved in process, and we would like them to have access to only a specific subset of (...)
(...) o define the scope of the export/import and monitor its progress. However, such an approach could be challenging, for instance, due to limited access to specific environments or a lack of appropriate privileges . With the 2024 R1 release, functionality was introduced that allows application import operations to be automated and executed using the public API in Portal. This article describes this functiona (...)
(...) ead of the Department should not be disclosed to their subordinates, a completely new dashboard will be created for them. This task is assigned to a member of an IT Department who holds the necessary privileges of Application administrator (this operation can be also executed by the System administrator) – we will take on their role in this article. Please note that given the limited dashboard con (...)
(...) e ability to easily manage design operations, even when they involve a larger number of individuals or extend over a period of time. How to access the list and use it? Every user with privileges to edit application in Designer Studio can access ToDo List and the whole functionality. To view the list, click the Actions tab available in the upper bar of the Designer Studio window and select th (...)