(...) Hello, our information security office has detected a log4j vulnerability. We currently have the log4j-1.2.17.jar version for WebCon BPS 2023 R2 Is it possible to upload version 2.21.1 according to the article https://kb.webcon.pl/security -podatnosc-cve-2021-44228-w-apache-log4j2/? https://logging.apache.org/log4j/2.x/download.html Will the new version of BPS include this type of fix?
(...) tions - but it was not the case in 2022 ver. Do you have any idea how to change it? Thanks. msg: An unhandled exception has occurred while executing the request. | ex: System.ServiceModel.security .security AccessDeniedException: Użytkownik nie ma prawa edytowania elementu WorkFlow at WebCon.WorkFlow.BusinessLogic.BusinessLogic.ElementManagement.WorkFlowObject.WorkFlowObjectForElementFormCre (...)
(...) Hi, We tried introducing a method that will force an inactive user to log out of the portal after 10 minutes. We found the security configuration and changed the cookie expiration time (set it to 10 minutes). Successful logout occurred after 10 minutes. After logging out, a login window appears. In some cases, the user had to enter the correct login and password several times before being able to e (...)
(...) Hi community! I have to remove all privileges (except the author of the element) on current workflow element for security reasons. I tried putting the action 'On exit' of the current step, before executing all other actions (assigning tasks, adding certain privileges, ...) on path to next step. According to an old documentation 'On exit' actions should be executed first and should not be depen (...)
(...) o move and lock Active Directory users. This involves moving the user to a different OU, but I can't seem to find this option in Webcon (other than executing Powershell which I'm trying to avoid for security reasons). Does anyone have experience in this? Greetings from Switzerland Raymond
(...) emObject,localeid,mail,manager,memberOf,mobile,name,objectCategory,objectVersion,ou,pager,physicalDeliveryOfficeName,postalcode,postofficebox,primarygroupid,proxyaddress,sAMAccountName,sAMAccountType,security identifier,showInAddressBook,sn,st,streetAddress,telephoneNumber,thumbnailPhoto,title,userAccountControl,userParameters,userPrincipalName,whenChanged,whenCreated,wwwhomepage?sub?(|(objectClass=user)(o (...)
(...) I would be nice, if this mechanism described in https://webcon.com/wp-content/uploads/2024/11/WEBCON_BPS_2025_Release_Notes_EN-1.pdf dedicated to increase security will be also available for attachments. Usually sensitive data included on the form is also in attachments. Apart from this functionality, it would be useful to be able to define permissions for individual attachments separate from document (...)
(...) and other key app behaviors. 4. Bulk Device Support – Apply consistent configurations across numerous mobile devices with minimal effort. This functionality would significantly improve efficiency, security , and user experience by reducing the risk of misconfiguration. We believe that many Webcon customers who manage enterprise environments would greatly benefit from such an enhancement. For referenc (...)
(...) lity to assign permissions, it will be possible to create dedicated analytical groups with access only to selected elements of the archive, without the need to grant access to all users. Increased security and access control - Currently, the inability to grant permissions to archived items forces organizations to use workarounds, such as keeping items in the production database longer than necessary. (...)
(...) bsites are used via a safe encrypted connection (SSL); data are stored at a properly secured servers in the EU; access to personal data is determined by appropriate internal procedures on company security . Despite the security measures applied by WEBCON, every user should follow the principles of security . In order to prevent the account from being used by unauthorized persons, any user should lo (...)
(...) Up to date as of September 1, 2025 The security of our platform is of utmost importance. We monitor the net for news on emerging vulnerabilities, run security audits, and react to issues raised by our clients. We constantly update WEBCON BPS to remove any known security vulnerabilities. On this page, we will compile information regarding security vulnerabilities detected in the system. Each pro (...)