(...) of new features. Additionally, updated builds are released at least once a month, they aim to resolve any existing issues and implement small changes. These small changes can be tracked via our changelog (available at the bottom of this page), which compiles a list of all modifications made to a ‘big’ version over its lifecycle. Our latest ‘big’ version is 2020.1& (...)
(...) Below you can find the latest version of WEBCON BPS 2021 and the full changelog for it. Please note that this version is no longer supported. We apolog ize for any inconvenience caused. Important: Before upgrading from one complete version to another (eg from 2019 to 2021 or from 2017 to 2021) check if you have the appropriate license for the WEBCON BPS version. W (...)
(...) ion mode. Below there are also reports on copying/transferringprivileges – basic and advanced. Fig. 2. Privileges migration Parameters: Source user – a log in or name of a user whose privilege you want to change or copy Target user – a log in or name of a user who will be granted privileges There are two operation modes: Copy (...)
(...) , the main step forms inherit field order and a few other settings from the workflow's global form template. The compact global form template inherits settings from the main global form template. log ically, a compact step form inherits from its main form version. If we break inheritance for a compact workflow form, it will become independent of the workflow's main form. This way (...)
(...) Applies to version 2020.1.3; author: Mateusz Syrek ADFS is one of the authentication providers that can be used with WEBCON BPS Portal. This article explains how you can customize your log in page when you use ADFS. Before you can customize your log in page, you need to have your WEBCON PORTAL registered in ADFS. For instructions on how to do it, please refer to this article Integration of WE (...)
(...) properly understand the operation of the user’s administration panel, two concepts should be introduced: Authentication – the process of verifying a user’s identity through a log in and password, one-time password tokens, etc. Authorization – the process following user authentication, that checks if a user has access to a given resource, etc. Adding a us (...)
(...) sp;identifier, or time interval. You can also sort the columns by a user identifier, date, or session identifier by left-clicking on them. Fig. 6 Searching for a session log in details Below is a simple example of how you can use the diagnostics to understand what happened on the form. Fig. 7 Sample workflow Fig. 8 A sample form (...)
(...) ; "E-mail" field. If you do so, the user BPS ID will conform to the UPN format. Job title, Phone, Supervisor identifier (BPS ID) - in the example, we have used the person's log in indicated on the form as the superior. User picture - you can create a photo based on the attachment from the form. In our example, we have configured the action to place the user picture in a ca (...)
(...) onfiguration used in our example. Fig. 7 Configuration of the action "Choose an approver" In the “Select user” field, we have chosen the “Purchaser log in” form field because we want to send the form to the supervisor of the person who completes a requisition form. In the “Target field,” we should choose where we want to store the i (...)
(...) ed in this way looks like this: Fig. 24. The final result of the configured dashboard on SharePoint Summary The first dashboard contains the image with the WEBCON BPS log o, start button, task counter, report containing the active user’s settlements, report tile containing the sum of the user’s active settlements, text, and embedded element – the numb (...)
(...) Then, complete the configuration fields: Active in Designer Studio” and “Active in BPS Portal” - decides to which instances of the system it will be possible to log in using the authentication provider we have configured. “Scheme” – this is the provider’s internal name; must be unique and different from “AAD” and “Goog (...)
(...) g the changes, restart the WEBCON BPS service. You can also do it from the installer level – select the “Service status” option, stop the service and restart it. After log ging into WEBCON BPS Designer Studio, go to the “BPS users list synchronization configuration” and in the “Credentials” tab, check if the source was correctly set to Azure Acti (...)
(...) restrictions are saved as business rules related to specific form fields. The “Documentation” field will contain a description from Designer Desk. The definition of the rule is always the log ical 'POSITIVE' value - it should be changed to the target value under the provided requirements. Default values Default values are saved as business rules related to specific form fiel (...)
(...) rt of the synchronization. Options “Incremental synchronization – Debug” and “Full synchronization – Debug” allow starting synchronization with an expanded data log ging. DEBUG mode allows for an accurate analysis of all synchronization steps and should only be used for diagnostic reasons. Monitoring the synchronization To ensure uninterrupted work for WEBC (...)
(...) earching for instances in the database. Search is based on SOLR engine which allows for a quick search even in very large data collections. Creating search phrases By using SOLR technolog y, user can influence on how the engine searches indexed data and as a result – what the results are. Using appropriate parameters in the query allows for more precise results. (...)
(...) x IBM x3850, 4 x CPU X7560 2,26 GHz 256 GB - Storage for system files: 140GB - Fast SSD for TEMPDB database: 100GB - Fast HDD x 3 for transaction log s and database files SharePoint Foundation 2013 or SharePoint Server 2013/2016/2019 Application servers (dedicated) (virtual) 3 production servers (front-ends (...)
(...) ; Fig.5 . Warning After importing, the “Dictionaries import report” was displayed with information about the changes made and any errors. A user can download the error log file to analyze the failure cases. Fig.6 . The dictionary import report As you can see in the report below, deleted users are listed in the “Personal Data” (...)
(...) $ scheme ; proxy_set_header Host $ host ; proxy_http_version 1.1; } } } Realm configuration and application registration in Keycloak Server log in to the Keycloak administration console, create a new realm and user based on the product documentation -> https://www.keycloak.org/docs/latest/getting_started/index.html#creating-a-realm-and-a- (...)
(...) – by indicating a form field that stores the appropriate users/groups (If it is a form field other than the “Person or group” type, you must designate a column that contains a user log in or group ID). Fig. 4. The "Dynamic" option SQL query – by entering the appropriate SQL query that will return user log ins or group IDs (the log in (...)
(...) guration. Basic editing mode SharePoint group as a global constant Another, more complex example, is the use of the SQL function that checks whether a user with a given log in belongs to a given SharePoint group. This condition can be used to define the visibility of the form field (Invalid). Fig.16. SharePoint group ID assigned manually. Incorrect co (...)