(...) ments). Now backtrack to the Service status node and activate the service. Any errors that occur will be saved in the Event viewer. The most common cause of issues is the lack of privilege s for the service account to the recreated database. After the service has been activated, return to the License manager and activate the license service. Instructions on how to do so can (...)
(...) e Server 2019 and adhere to the procedure described below: download the ExchangeExtendedProtectionManagement script available here; launch the Exchange Management Shell console with elevated privilege s; retrieve all the IP addresses for which it is possible to restrict access to the virtual directory by entering the following command in the console: .ExchangeExtendedProtectionManageme (...)
(...) ter but also protects sensitive data. Compartmentalization of workflows The most fundamental way to control what our users will see and have access to is through the various levels of privilege settings. To make this easier, it is generally a good idea to divide business processes into a number of workflows that can (but don’t have to) be interconnected. Such smaller workflows are muc (...)
(...) o define the scope of the export/import and monitor its progress. However, such an approach could be challenging, for instance, due to limited access to specific environments or a lack of appropriate privilege s. With the 2024 R1 release, functionality was introduced that allows application import operations to be automated and executed using the public API in Portal. This article describes this function (...)
(...) ead of the Department should not be disclosed to their subordinates, a completely new dashboard will be created for them. This task is assigned to a member of an IT Department who holds the necessary privilege s of Application administrator (this operation can be also executed by the System administrator) – we will take on their role in this article. Please note that given the limited dashboard co (...)
(...) e ability to easily manage design operations, even when they involve a larger number of individuals or extend over a period of time. How to access the list and use it? Every user with privilege s to edit application in Designer Studio can access ToDo List and the whole functionality. To view the list, click the Actions tab available in the upper bar of the Designer Studio window and select t (...)
(...) ase, only the Global logout button is available in the user menu; when selected, the user is logged out of all sessions on all devices. Note: Making security changes requires system administrator privilege s and restarting Portal and Designer Studio each time. Additional configuration The Windows Authentication method in Internet Information Services (IIS) is the primary method for verif (...)
(...) 2021 R1 and above; author: Konrad Wojtycza, Łukasz Maciaszkiewicz Introduction This article examines the admin mode in Portal and the capabilities of users with Business administrator privilege s. In addition to detailing the specifics of the aforementioned mode, the article addresses the process of granting Business Administrator privilege s and configuring rules that include the Is admin mo (...)
(...) Click "Next". 3.3 System verification A list of requirements that must be met in order to upgrade the environment is displayed. The list may include system components and privilege s that the user running the installer must have. Applies to WEBCON BPS 2024 and higher: One of the required components is Java version 11 or higher (in earlier versions of WEBCON BPS, Java was alwa (...)
(...) in the generated prototype documentation. The Process design section in Portal displays the settings of phases and actors entered in WEBCON BPS Designer Studio, and users with relevant privilege s can change their metadata (names, descriptions, documentation and translations). Summary In addition to the obvious functions of organizing and presenting data, workflow phases and (...)
Applies to version: 2021 R1 and above; author: Łukasz Chechelski Introduction The OAuth2 authentication standard is becoming increasingly popular, as it enables integration between different systems. In many cases, the connection takes place in the API → Application model, which makes authentication much easier. In this case, a predefined set of data is used – Client ID
(...) cript and optionally overriding the credentials of the user in whose context the script will run (by default, this is the account on which the Workflow Service runs). The latter will be important for privilege s, both to the network share and to the databases (if integrated login is used in the SQL connection parameters). The PowerShell action can only be executed in the context of a workflow instance, s (...)
(...) in the generated prototype documentation. The Process design section in Portal displays the settings of phases and actors entered in WEBCON BPS Designer Studio, and users with relevant privilege s can change their metadata (names, descriptions, documentation and translations). Functionality enhancement in version 2025 R2 Reports In version 2025 R2, a new column, (...)
(...) e results by passing parameters when invoking the endpoint. Importantly, when we use a BPS internal view data source, the system automatically limits the available data to that for which the user has privilege s. On the other hand, if we want to provide the data of a specific workflow instance, we configure the mapping of the relevant form fields or item lists. The endpoint then requires the instance ID (...)
(...) t into the advanced editor. You need to create an APP with impersonation. For some reason the report was returned but without rows without impersonation. I even granted the APP business administrator privilege s without success. Using impersonation worked though. Regards, Daniel let api_url = "http://*.cosmoconsult.com", token_path = "/api/login", Content = "{'clientId':'4c01c4fb-9b82-4912-b410-5e54 (...)
(...) It happens that special privilege s have to be applied on workflow elements, dashboards or views. Unless we work on a system with different test users, it is quite difficult to check whether a certain user really has access to right artifacts or not. Sometimes i also get support tickets from customers telling they would see or not see artifacts. As an administrator oder system administrator it would be g (...)
(...) Version: 3 Duration: 729 ms But somehow my Calendar in Sharepoint does not get updated with the data I'm sending. This works fine for Sharepoint List and sending documents. My user has owner privilege s in Sharepoint to be able to write in the lists. Hope anyone can help me out!! Thank you!
(...) Hi all, I'm implementing an application for user management taking the guide done by Webcon: https://community.webcon.com/posts/post/checking-user-and-group-privilege s/258/3 So far, I'm able to check Applications and Processes privilege s but when it comes to the Business Rules, I get an error for the column they use as Users (users . BRD_Users) : select users . BRD_ID , isnull ( DEF_Name, '' ) (...)
(...) Does anyone know how to configure a query which will return where a specific user was set in any action? I'm using this article https://community.webcon.com/posts/post/checking-user-and-group-privilege s/258/3 but I want to also check where for example the user is hard coded for the Task Assignment for example. Hope you got ideas! Thank you
(...) side because the manufacturer forbids it :/ My idea is to create a new process and use it to update permissions on other processes/tasks, but I don't know if it is possible. Can I use action Add privilege s (screen) to touch another process, for example, I indicates custom task ID and person/ad group to whom the permissions are to be added? ID not related to the current process. I am looking for a sol (...)