(...) Applies to version: 2023.1.3 and above Introduction The Security of a WEBCON BPS system is influenced by two things: the infrastructure of the installation, and the configuration options within the system itself. In this article, we will focus on the latter – options that can be found in Designer Studio that can be used to control the system’s accessibility. Securi (...)
Hi everyone, i installed WEBCON WITHOUT integrated authentication. Unfortunately, i skipped the step, where you have the option to setup a Windows User (see pic 1) - the manual said, it is not required (even though recommended). Now i cannot log into the Webcon BPS Designer Studio. Do you have an idea, how to setup the Windows authentication Connection to the Database afterwards - without inte
(...) t write to the log file. Roll back the transaction In the event viewer there's the following entry: The connection has been dropped because the principal that opened it subsequently assumed a new Security context, and then tried to reset the connection under its impersonated Security context. This scenario is not supported. See "Impersonation Overview" in Books Online. The data table uses "Current (...)
(...) rce was not found, but some or all of the event logs could not be found. To create a source, you need permission to read all event logs to ensure that the new source name is unique. Unavailable logs: Security ." Where to change it? Previously, when I did template doc with out depending forms ... I have got not problems, so I need add access but I don't know where to look ...
(...) Hi, at least for partners it would be great to have the Security bulletin not only as PDF but as csv or excel file so that the information can automatically be processes. Best regards, Daniel
(...) er menu click the icon in the upper right corner and then, select the “Install MS Office add-ins” -> “Word” option. A message informing about the Security certificate will appear on the screen. Click the “Install” button – a window informing about the correct installation of the add-in will appear on the scr (...)
(...) on – click the ABBYY FineReader 11.1 Engine Loader (Local Server) icon and select the “Properties” option. Next, in the properties window go to the “Security ” tab and check the “Customize” option in the “Launch and Activation Permissions” and “Access Permissions” options. Additionally, i (...)
(...) atabase server, in the appsettings.user.json file provide the full server name. A DNS entry is required. If we connect to the database using the integrated login, provide the phrase “Integrated Security =True” in the file. Remember that WEBCON BPS Designer Studio is always launched in the context of currently logged-in user. This can be troublesome when using multiple domains. In that case, use (...)
(...) n window right-click on FineReader 11 “ABBYY FineReader 11.1 Engine Loader(Local Server)” and choose Properties. Privileges In properties window go to “Security ” and choose “Customize” for “Launch and Activation Permissions” and for “Access Permissions”. Choose “Edit” for &ldquo (...)
(...) of vital elements which are essential to the availability and reliability of a WEBCON BPS system: SQL data bases (solutions like: HA Cluster, Always On Availability Group, Log Shipping) – Security policy and available budget are usually the deciding factors when choosing a solution. https://docs.microsoft.com/en-us/sql/database-engine/sql-server-business-continuity-dr?view=sql-server-ver15 S (...)
(...) w, so most WEBCON BPS functionalities is supported in the same way as in desktop browsers. The Webview is responsible for user authentication. Native part Profiles, logins and PIN Security support Main panel of the application with navigation buttons in Webview Recording a voice message – Cordova Log history Barcode/2D codes search (only for iOS) PUSH notifications (onl (...)
(...) e {ClientID} with the correct Client ID described in the previous chapter. https://accounts.google.com/o/oauth2/v2/auth?scope=https://www.googleapis.com/auth/drive&response_type=code&state=Security _token%3D138r5719ru3e1%26url%3Dhttps%3A%2F%2Foauth2.example.com%2Ftoken&redirect_uri=http://127.0.0.1:80&client_id={ClientID} Due to Security policy, a warning about the (...)
(...) roduction From version 2020.1.3.321 there is the ability of defining additional http headers returned in responses from the web server. This functionality can be used e.g. to increase the level of Security of WEBCON BPS Portal. This is especially important when BPS Portal is publicly available on the Internet. To define headers, go to WEBCON BPS Designer Studio -> System settings -> Global pa (...)
(...) the content of the WEBCON BPS platform on the generally accessible Internet, maintaining the physical separation of the server hosting the platform. The use of firewalls and Reverse Proxy provides a Security buffer in the case of e.g. DDoS attacks. Reverse Proxy acts as a physical buffer that filters external traffic, and takes on the possible effects of external attacks. Thanks to this solution, the ser (...)
(...) r documentation -> Ensemble configuration Solr is configured to pass the appropriate connection values to ZooKeeper -> Using the -z Parameter with bin/solr After starting Solr, change the Security settings -> Enable basic authentication, and change the password of the Solr administrative user -> Add a User or Edit a Password. WEBCON BPS invokes to four Solr collections: BP (...)
(...) embers The configuration of the action: Fig. 3. The configuration of the Create a group action In the Details tab, define the group privileges and Security levels: Who can view membership data? – all SharePoint users or only group members Who can edit membership data? – owner or group members The “Allow requests (...)
(...) bjectversion] objectversion [COS_AD_primarygroupid] primarygroupid [COS_AD_samaccounttype] samaccounttype X [COS_AD_Security identifier] Security identifier [COS_AD_useraccountcontrol] useraccountcontrol X [COS_AD_whenchanged] whenchanged [COS_AD_whenc (...)
(...) of vital elements which are essential to the availability and reliability of a WEBCON BPS system: SQL data bases (solutions like: HA Cluster, Always On Availability Group, Log Shipping) – Security policy and available budget are usually the deciding factors when choosing a solution. https://docs.microsoft.com/en-us/sql/database-engine/sql-server-business-continuity-dr?view=sql-server-ver15 S (...)
(...) server_name at14.webcon.pl www.at14.webcon.pl; ssl_certificate C:/nginx/cert/webcon.crt; ssl_certificate_key C:/nginx/cert/webcon.rsa; add_header Strict-Transport-Security max-age=2592000; location / { proxy_pass http://at14.webcon.pl:80; proxy_set_header Host $ host ; proxy_set_header X-Real-IP $ remote_addr ; (...)
(...) CSC_APPID , APP_Name , lvl. Name from WFConfigurationSecurities join WFApplications on APP_ID = CSC_APPID join DicConfigurationSecurity Levels as lvl on lvl . TypeID = CSC_LevelID where CSC_USERGUID = '{formFieldID}' order by 2 When checking user privileges, please note that this list will only show users’ privi (...)