WELCOME TO THE COMMUNITY
find what you are looking for or ask a new question

search results

for privilege

(...) atabase creation” node and the window it opens       After clicking the button, it is possible to define the database parameters, such as name and user (obtains owner privilege s for the created database). Once you fill out all the required fields and click the “Create” button, the installer shows a summary of parameters defined for the database. Confirming them (...)

(...) upper right corner of Portal and then Install MS Office add-ins and Outlook Classic.       Note: for the installation to be possible, the user must have administrator privilege s on the local machine. Alternatively, the add-in can be installed globally in an Active Directory environment with properly defined Group Policy, in which case the local user does not need to have ad (...)

(...) bscription models User licenses in the perpetual model: WEBCON BPS User CAL – the user may access all processes and applications built in WEBCON BPS (as long as they have the necessary privilege s). This access involves the ability to create new instances, edit and save them, move them to other steps via paths, and browse reports and applications. Through this license, a specific number of (...)

(...) it is possible to define an account that will be used as the sender instead of the default sender address. This can be either an E-mail address or a Distribution group with “Send as” privilege s.   This feature called Allow "Send as" needs to be enabled in the System Settings, and once it is active it will be possible to substitute the sender address with a differe (...)

(...) Applies to version 2023.1.x and above, authors: Dawid Golonka, Krystyna Gawryał   Introduction BPS groups is a solution that facilitates the assignment of tasks and the management of privilege s granted to individual system users. This solution can be used in both standalone and cloud installations. The Export-Import mechanism makes it possible to transfer BPS groups with the application to a (...)

(...) ere is an attachment" action in WEBCON BPS Designer Studio according to the provided prototype documentation   After performing all necessary tests, providing credentials, and granting privilege s, the implementation team releases the application for use in the enterprise.   Using the application and Edit mode While using the application, one of the employees carrying out tasks (...)

(...) Indicators per process After selecting Overview, user will see Key application indicators, and more precisely, the Per process tab, whose content will vary depending on the applications used and privilege s granted. The data of individual applications in the report are grouped and displayed according to the current state, in alphabetical order, just like in WEBCON BPS Designer Studio. When you click (...)

(...) onality in a selected process, check the Enable instance and task sharing button in the “Sharing” section. Once it is checked, other fields placed in the section become editable, i.e. privilege s level and Default sharing expiration time (in days). The “privilege s level” option contains a drop-down list that allows you to specify whether the instances are shared with edition (Edi (...)

(...) r panel → “Administration” → Change requests). (The configuration window is identical in both cases.) Please note that for change requests, an administrator is a person with privilege s of either system administrator, application administrator, or supervisor.   NOTE: the change request functionality is not supported when working on behalf of another user. A new op (...)

(...) e RAM used. It is possible to configure additional variables, --mount source=solr-bps,target=/var/solr – mapping the created volume to the container directory where files with search indexes, privilege configuration, and log files will be stored, bash –c “/opt/bps-solr/scripts/run-precreate-cores.sh” – path to the script that initializes Solr index structures. This script (...)

(...) d, after the upgrade communication with the database will take place as before (without using the bps_user account). This article aims to take a closer look at the application of this account, its privilege s and associated limitations.   Scope of application The ability to add a dedicated account for reading data from the database already existed in earlier versions of the system, but now (...)

(...) bsp; Pressing the button opens a window containing a QR code that you can send to other users, allowing them to quickly initiate a relevant workflow instance, provided that they have the necessary privilege s.   Keep in mind that you can open the QR code using either the system-based QR code scanner or the scanner built into the mobile application. In the first situation, after scanning th (...)

(...) sp;the following places: Person or group fields Item list columns that Use people field data source The Any person option in predefined task assignment Delegating tasks on Portal Adding privilege s through admin action on Portal Business rule functions in the “Users” node, e.g. CURRENT USER IS ONE OF, USER IS ONE OF, etc. privilege s at Global, Application, Process, and Workflow (...)

(...) io, specifically the Lite mode.      What is the Lite mode in Designer Studio? The Lite mode is a functionality that allows users to work in Designer Studio with limited privilege s. It enables users to access only the functionalities associated with the context of a particular application, preventing unauthorized access to the full configuration or specific areas of Designer S (...)

(...) ments).   Now backtrack to the Service status node and activate the service. Any errors that occur will be saved in the Event viewer. The most common cause of issues is the lack of privilege s for the service account to the recreated database.   After the service has been activated, return to the License manager and activate the license service. Instructions on how to do so can (...)

(...) e Server 2019 and adhere to the procedure described below: download the ExchangeExtendedProtectionManagement script available here; launch the Exchange Management Shell console with elevated privilege s; retrieve all the IP addresses for which it is possible to restrict access to the virtual directory by entering the following command in the console:  .ExchangeExtendedProtectionManageme (...)

(...) t into the advanced editor. You need to create an APP with impersonation. For some reason the report was returned but without rows without impersonation. I even granted the APP business administrator privilege s without success. Using impersonation worked though. Regards, Daniel let api_url = "http://*.cosmoconsult.com", token_path = "/api/login", Content = "{'clientId':'4c01c4fb-9b82-4912-b410-5e54 (...)

(...) It happens that special privilege s have to be applied on workflow elements, dashboards or views. Unless we work on a system with different test users, it is quite difficult to check whether a certain user really has access to right artifacts or not. Sometimes i also get support tickets from customers telling they would see or not see artifacts. As an administrator oder system administrator it would be g (...)

(...) Version: 3 Duration: 729 ms But somehow my Calendar in Sharepoint does not get updated with the data I'm sending. This works fine for Sharepoint List and sending documents. My user has owner privilege s in Sharepoint to be able to write in the lists. Hope anyone can help me out!! Thank you!

(...) Hi all, I'm implementing an application for user management taking the guide done by Webcon: https://community.webcon.com/posts/post/checking-user-and-group-privilege s/258/3 So far, I'm able to check Applications and Processes privilege s but when it comes to the Business Rules, I get an error for the column they use as Users (users . BRD_Users) : select users . BRD_ID , isnull ( DEF_Name, '' ) (...)