WELCOME TO THE COMMUNITY
find what you are looking for or ask a new question

search results

for privilege

(...) ter but also protects sensitive data.   Compartmentalization of workflows The most fundamental way to control what our users will see and have access to is through the various levels of privilege settings. To make this easier, it is generally a good idea to divide business processes into a number of workflows that can (but don’t have to) be interconnected. Such smaller workflows are muc (...)

(...) o define the scope of the export/import and monitor its progress. However, such an approach could be challenging, for instance, due to limited access to specific environments or a lack of appropriate privilege s. With the 2024 R1 release, functionality was introduced that allows application import operations to be automated and executed using the public API in Portal. This article describes this function (...)

(...) ead of the Department should not be disclosed to their subordinates, a completely new dashboard will be created for them. This task is assigned to a member of an IT Department who holds the necessary privilege s of Application administrator (this operation can be also executed by the System administrator) – we will take on their role in this article. Please note that given the limited dashboard co (...)

(...) e ability to easily manage design operations, even when they involve a larger number of individuals or extend over a period of time.   How to access the list and use it? Every user with privilege s to edit application in Designer Studio can access ToDo List and the whole functionality. To view the list, click the Actions tab available in the upper bar of the Designer Studio window and select t (...)

(...) ase, only the Global logout button is available in the user menu; when selected, the user is logged out of all sessions on all devices. Note: Making security changes requires system administrator privilege s and restarting Portal and Designer Studio each time.   Additional configuration The Windows Authentication method in Internet Information Services (IIS) is the primary method for verif (...)

(...) e RAM used. It is possible to configure additional variables, --mount source=solr-bps,target=/var/solr – mapping the created volume to the container directory where files with search indexes, privilege configuration, and log files will be stored, bash –c “/opt/bps-solr/scripts/run-precreate-cores.sh” – path to the script that initializes Solr index structures. This script (...)

(...) 2021 R1 and above; author: Konrad Wojtycza, Łukasz Maciaszkiewicz   Introduction This article examines the admin mode in Portal and the capabilities of users with Business administrator privilege s. In addition to detailing the specifics of the aforementioned mode, the article addresses the process of granting Business Administrator privilege s and configuring rules that include the Is admin mo (...)

(...) Click "Next".   3.3 System verification A list of requirements that must be met in order to upgrade the environment is displayed. The list may include system components and privilege s that the user running the installer must have. Applies to WEBCON BPS 2024 and higher: One of the required components is Java version 11 or higher (in earlier versions of WEBCON BPS, Java was alwa (...)

(...) in the generated prototype documentation.   The Process design section in Portal displays the settings of phases and actors entered in WEBCON BPS Designer Studio, and users with relevant privilege s can change their metadata (names, descriptions, documentation and translations).   Summary In addition to the obvious functions of organizing and presenting data, workflow phases and (...)

Applies to version: 2021 R1 and above; author: Łukasz Chechelski   Introduction The OAuth2 authentication standard is becoming increasingly popular, as it enables integration between different systems. In many cases, the connection takes place in the API → Application model, which makes authentication much easier. In this case, a predefined set of data is used – Client ID

(...) t into the advanced editor. You need to create an APP with impersonation. For some reason the report was returned but without rows without impersonation. I even granted the APP business administrator privilege s without success. Using impersonation worked though. Regards, Daniel let api_url = "http://*.cosmoconsult.com", token_path = "/api/login", Content = "{'clientId':'4c01c4fb-9b82-4912-b410-5e54 (...)

(...) It happens that special privilege s have to be applied on workflow elements, dashboards or views. Unless we work on a system with different test users, it is quite difficult to check whether a certain user really has access to right artifacts or not. Sometimes i also get support tickets from customers telling they would see or not see artifacts. As an administrator oder system administrator it would be g (...)

(...) Version: 3 Duration: 729 ms But somehow my Calendar in Sharepoint does not get updated with the data I'm sending. This works fine for Sharepoint List and sending documents. My user has owner privilege s in Sharepoint to be able to write in the lists. Hope anyone can help me out!! Thank you!

(...) Hi all, I'm implementing an application for user management taking the guide done by Webcon: https://community.webcon.com/posts/post/checking-user-and-group-privilege s/258/3 So far, I'm able to check Applications and Processes privilege s but when it comes to the Business Rules, I get an error for the column they use as Users (users . BRD_Users) : select users . BRD_ID , isnull ( DEF_Name, '' ) (...)

(...) Does anyone know how to configure a query which will return where a specific user was set in any action? I'm using this article https://community.webcon.com/posts/post/checking-user-and-group-privilege s/258/3 but I want to also check where for example the user is hard coded for the Task Assignment for example. Hope you got ideas! Thank you

(...) side because the manufacturer forbids it :/ My idea is to create a new process and use it to update permissions on other processes/tasks, but I don't know if it is possible. Can I use action Add privilege s (screen) to touch another process, for example, I indicates custom task ID and person/ad group to whom the permissions are to be added? ID not related to the current process. I am looking for a sol (...)

(...) 2. Pick list of IDs from PROD (global admin or app admin). 3. Tool is reading all attributes and follow on production processes to recreate all steps as user did (including changing user and their privilege s). Starting all parent and child workflows as it was on production. 4. Reporting differences if it gets any errors during process or system couldn't pass test. 5. If pass clear then change privileg (...)

(...) s displayed: "403 - Forbidden: Access is denied.\r\n You do not have permission to view this directory or page using the credentials that you supplied." I checked the security settings for SQLLowprivilege User. Has anyone encountered this error in a newly configured webcon environment? 04.07.2023 Closing. The error was caused by an IIS setting. IP Address and Domain Restrictions/Edit Dynam (...)

(...) can check actions, business rules, etc. We can try to do it better via SQL or/and WebCon BPS Application. It is well described here: https://community.webcon.com/posts/post/checking-user-and-group-privilege s/258/3 Sometimes we need to use groups which are cross Applications, cross company alike Board Members, HR Department. Sometimes we need to use Active Directory groups (not WebCon BPS ones) to giv (...)

(...) Hi all! I want to remove all element privilege s on workflow element level (= all users assigned with Add privilege s action) from certain workflow elements. Is there an easy (and maybe built-in way) to remove all these permissions without knowing the BPSId of these users? I know there is a table WFSecurities, which can be selected and filtered by WFD_ID, but maybe there is an easier way to do this. (...)