(...) The start step is completing a requisition form on which the user indicates who should be the approver, what item is requested, and what is its cost. In the second step, the requisition is aCC epted by the selected approver. There are two options for choosing the approver: a) the form is sent to the direct supervisor of the person who submits it, and b) the approver is selected based on (...)
(...) ed field. In the configuration, select which report and view it applies to, which value is to be aggregated and set the widget formatting. The available options for the layout scheme are: Top aCC ent Left aCC ent Info Basic After selecting the “Customize” option, you will see additional configuration to set the tile and value appearance and add a header and/or f (...)
(...) or changing the field value. Thanks to this, you do not have to manually place the cursor in the field. This article presents the operation of this function based on a business scenario – aCC ounting process. Below you can see the form at the cost invoice registration step. The edit cursor is automatically set in the “Invoice number” field. Fig. 1. The ACC ount (...)
(...) w source Then, create a new data row named “Edit tags” and set the newly created BPS source as the source. Next, you need to set the filter so that the system takes into aCC ount only the tags of the selected client. Fig.11 - Edit tags field configuration In the advanced configuration, in the Instance number row, check the options “Show colu (...)
(...) Fig.4. Loading the service configuration. Workflow configuration To present this functionality, we have created a sampleworkflow consisting of 5 steps. This workflow will be used to aCC ept requisitions submitted by employees. The approvers will be the superiors on two levels. In the “Request registration” step, the requisition will be registered. In the &ld (...)
(...) name” – the name that will be visible in the authentication provider selection panel. Host address - data provided by the authentication provider, in the case of Google https://aCC ounts.google.com/ Issuer - data provided by the authentication provider, in the case of Google https://aCC ounts.google.com/ Client ID - Application ID registered on the provider’s side. C (...)
(...) es, set goals for the next year, and analyze achievements and goals for the previous year. List of behaviors Let’s create an auxiliary workflow that will contain a list of criteria aCC ording to which employees in a given company will be assessed. Below there is a sample list of behaviors for an employee: Fig. 1 - Sample behaviors and attitudes To create such a list, you w (...)
(...) pproving license terms, select Tools for application management -> Users list. Select „Azure Active Directory” as the synchronization source in the configuration, and fill out aCC ess data as described in the WEBCON BPS integration with Azure Active Directory article. After saving the changes, restart the WEBCON BPS service. You can also do it from the installer l (...)
(...) s granted to their Substitute is limited to the required level, without violating e.g. company secrets. This article describes the rules for configuring Task delegation substitutions, taking into aCC ount user privileges in the context of multiple databases, as well as the roles of WEBCON BPS Workflow Service and global system settings. Basic information Task delegation subs (...)
(...) edure" action in the Actions tab in Designer Studio. For more information, see Introduction to actions in WEBCON BPS. The preparation of this action requires knowledge of SQL. The WEBCON BPS aCC ount must have the privileges to edit the database in which data is stored, as well as to the table into which the data will be inserted. Fig. 5. The service aCC ount identifier can (...)
(...) Applies to version: 2021.1.x and above; author: Marek Suchowiejko Introduction Most applications supporting business process automation are created in IT departments. The key to suCC ess is the effective communication of requirements and expectations – the quality of the completed system depends on how well its specifications were communicated between the intended audience and design (...)
(...) with empty values as a group by selecting “Show group for elements with no value.” Fig. 15 Grouping form data You can also hide or display the search panel and configure it aCC ordingly. The way the search engine works is set directly in the report configuration. However, here you can decide if it should be visible or hidden. Fig. 16 Search panel configuration (...)
(...) trive to march in lockstep alongside other platform products i.e. Windows Server, SQL, SharePoint, etc. We do our best to maintain backward compatibility with older versions of these platforms to aCC ommodate our diverse client base and their preferences. However, as the publishers end support for their aging products, so must we. It’s not all gloom and doom though – as we say goodb (...)
(...) ed from the AD or AAD with those from external authentication providers, into one universal cache of all users of the system. The BPS user list serves as the base for granting privileges to view and aCC ess the system, and also contains data of the company structure. Its status has to be constantly updated to provide users with uninterrupted aCC ess. This is why a correct configuration of this system (...)
(...) to, was, will, with Search revelance Query provided by the user searches for all instances which fit the specified words. During the search, following instance details are taken into aCC ount: Instance ID Instance number System elements names (process name, workflow name, step name, form name) Form fields names Form fields’ and items list values Text content of t (...)
(...) Additionally, in the process configuration in the ‘User privileges’ tab you need to select the checkbox: ‘Make subordinates’ tasks and workflow instances aCC essible’. After saving the configuration in the Designer Studio (and after the first cache refresh) we will have the new functionality available on our SWE. (...)
(...) your disk array (e.g. by using a larger number of more efficient disks). WARNING! Every upgrade should be preceded by comprehensive monitoring and analysis of system parameters, in order to aCC urately identify and eliminate bottlenecks. This will ensure that your system is scaled-up as efficiently as possible. Sample configuration of an environment intended for roughly 18 000 users (...)
(...) o export/import the contents of the dictionaries using an Excel file. Thanks to these solutions, there is no need to manually transfer data, which reduces the risk of errors and facilitates work. ACC ess to the “Dictionaries import report” in the import wizard allows you to check if the data transfer was suCC essful, and also to solve any problems – by providing files with error l (...)
(...) .x and above; author: Michał Bednarz This article describes the process of integration WEBCON BPS with Keycloak. Keycloak is an open source software that enables single sign-on using identity and aCC ess management in modern applications and services. Requirements WEBCON BPS StandAlone (version 2021) – the portal available with the use of SSL by the address in the FQDN format. Key (...)
(...) dquo; action. By using this action you can lower/remove the privileges indicated to the users (if they have them) to the defined level. Privilege reduction levels: No privileges – no aCC ess to the selected instance Read - only (can’t view attachment) – privileges to read without viewing attachments Read - only – privileges to read without editing the instance (...)