WELCOME TO THE COMMUNITY
find what you are looking for or ask a new question

search results

for User

(...) ive Directory’, ‘Synchronize organization hierarchy from Active Directory’ and periodic Cache refresh.   Additionally, in the process configuration in the ‘User privileges’ tab you need to select the checkbox: ‘Make subordinates’ tasks and workflow instances accessible’.     After saving the configuration (...)

(...) ; 1.2.1.Architecture There are 3 basic scenarios  for installing WEBCON BPS depending on the scale of your system: Minimal installation – for test, demo and small (up to 10 end User s) production environments Recommended installation – for production environments Adding extra servers, redundancy, etc.   1.2.2.Minimum requirements – “All-in-one i (...)

(...) he WEBCON BPS system is to work on three types of environments. Processes are configured on the development environment, tests of the created solution are carried out on the test environment, and end-User s of the system work on the production environment. Moving processes or changes in processes between environments is possible by using the built-in application import/export mechanism. Starting fro (...)

(...) roxy_http_version 1.1; } } }   Realm configuration and application registration in Keycloak Server Log in to the Keycloak administration console, create a new realm and User based on the product documentation -> https://www.keycloak.org/docs/latest/getting_started/index.html#creating-a-realm-and-a-User . Next, register the application client. Go to the Clients tab - (...)

(...) s for Standalone installation. For SharePoint intallation, no WebDav is used - only the SharePoint attachment library.  Installing an add-on from a file Consider a simple process where the User drops a file into the "Attachments" section and then wants to digitally sign it using the Adobe Acrobat Reader installed on their local computer. This program does not have to be set as a d (...)

(...) WEBCON BPS, see Introduction to actions in WEBCON BPS.   Fig. 1. The "Add/Remove privileges" action   Configuration of the "Add privileges" action The User may be granted one of four possible privileges levels: Administration - the highest privileges to read, edit and delete instances Modification (can’t delete) - standard privileges to re (...)

(...) signed to create new processes, the test environment (TEST) is used to perform functional tests before the final implementation of the solution on the production environment (PROD) on which they work User s. Creating processes in such a way that they are insensitive to the context of the environment in which they work requires adherence to a certain regime. However, it results naturally from the fun (...)

(...) ns option.   Fig. 3. Data source configuration – the first way   For the template to be validated correctly, this source must contain the following columns: PLN_User Id - <String> User ID PLN_From <Int32> - Date od (in YYYYMMDD format, e.g. 20200123) PLN_To <Int32> - Data do (in YYYYMMDD format, e.g. 20200125) PLN_WFDID <Int32> - Abse (...)

(...) to store any number of data rows organized into columns. In business practice, there is a need for the item list to be updated based on the values from other elements or updated automatically, and a User cannot edit it. For this purpose, you can use the “Change items list values” action which will be presented in this article based on the simple “Invoice approval” workflow. (...)

(...) you to manage business applications in multilingual environments. Particular parts of the form were designed in such a way, that you can provide translations to any language that is used by the User s while creating the workflow. From version 2019.1.2 on multilingual choice fields are complimentary to forms created with multilingual usage in mind. This functionality allows you to define choice di (...)

(...) s in “System settings” tab.   After creating new constant, provide its value. If only “Shared” value will be present, system will use it in each environment. If User will check “Break inheritance” box, system will use there a value which is assigned to it. It allows to assign different values to various environments.   Global constant (...)

(...) Applies to version: 2017.1.x and above; author: Mateusz Syrek Introduction SharePoint server allows authenticating User s based on Claims add-on. It also allows authenticating User s based on different authentication providers which you trust but are managed externally. This article describes external provider configuration which will be Azure Active Directory from SharePoint Server 2019 (it i (...)

(...) can be validation of provided bank account number. Whether the pattern fits the character string is mainly used during validation of so-called entry data. Regular expressions allow to check if the User data has correct format. Here is an example: d{4}-d{2}-d{2} Bank account number In order to add regular expression to the form field of text field type go to “Style and behavior&r (...)

(...) s” section choose one of the available options: Classic on SharePoint – used in previous versions WFDynamic.aspx form based on SharePoint. If it’s possible, the User will be redirected to the SharePoint platform. Classic on BPS portal – WFDynamic.aspx form based on SharePoint. The classic form will be embedded on the WEBCON BPS Portal platf (...)

(...) 019.1.x and above; author: Paweł Jawień Introduction One of the most important development changes in WEBCON BPS platform in version 2019 is the introduction of a new presentation layer for the User – WEBCON BPS Portal. To complement this functionality, in environments working on the MS SharePoint platform, you can display WEBCON BPS Portal presentation elements directly on SharePoint w (...)

(...) t). This will launch the import wizard. The first step displays information about the imported package.   Fig.7. Basic package info   Next, as in the export wizard, the User can choose elements which should be imported. Elements which are absent on the target environment will be created and those who are already there will be updated in a differential manner.   (...)

(...) lect people who will receive a notification about an instance to be approved.   Fig. 1. The SELECT VALUES function in the expression editor Business case As you can see below, User s copied to the “Approvers to notify” form field will receive an e-mail notification at the “Approve” step. A person who fills out the Analytical breakdown list can decide to w (...)

(...) of the action - the Attachment selection tab   Attachment section tab: Category – allows you to select an attachment based on the category. In the “Convert” file, a User indicates whether the newest or the oldest attachment should be used in the action. Regular expression – allows you to enter a regular expression in which you can define parameters that shoul (...)

(...) re as follows: • According to the application settings, • Permanently selected language from the list (e.g. de-DE, uk-UA etc.) If the project of the designed application allows the User to select the language version, the value "According to application settings" should be indicated in the action configuration. Then it’s required to check the current settings of the (...)

(...) nbsp; C) SQL query – the rule will return attachment’s IDs based on the defined SQL query. In the example, the rule will return the ID of attachments created by the currently logged in User .   Fig. 5. Sample configuration of the third attachment selection mode in the Get Attachments rule   ATTACHMENTS COUNT The Attachments count rule will return the number o (...)