WELCOME TO THE COMMUNITY
find what you are looking for or ask a new question

search results

for log

(...) is, regardless of what I do: { "description": "Invalid scopes", "guid": "48078ebb-424f-4a0f-9a27-7e67e408e148" } The guid cannot be found in designer studio, there is also no automation log . Remark: The endpoint with a datasource works fine. Did I miss something or this is a bug? Thanks a lot in advance, Nik

(...) d also to take effect in the dictionary. There is a specific field that will trigger this action. I already created a query that will map correct attributes with update command. I'm interested in the log ic that would need to take place in obtaining the current changes. thoughts: - after triggering specific field in the item list, trigger save path that will save the instance changes. add extra fi (...)

(...) abled in WEBCON BPS, and I configured a support subdomain to share it with our clients. I set up IIS, and the support domain is available in the system. The URL works and opens correctly, but I can't log in — after log ging in, I'm always redirected back to the log in page. Is anyone using Application Hub with Windows Authentication? Has anyone encountered an issue like this? Any ideas or sugg (...)

(...) Hi, we would like to pick a group in a form field and to use all members of this group as filter for another user picker field. Using the function GROUP MEMBERS [AD-Group log in and name] in a business rule works fine. Setting this one into an ALERT all members are returned as expected. Using 'testgroup' as string in the group picker of the function GROUP MEMBERS ['testgroup'] in a filter of a (...)

(...) Hi, I would like to propose to extend the workflow users report in desinger to include either the date of first log in or the date of license assignment. This would help in license management for administrators.

(...) Hello, I don't have much experience, so I apolog ize if my question seems dumb (: I added a menu button in the first step that fills a list. It's working fine, but it only becomes visible after I first save the document. How can I make it visible on the form from the very beginning? Thank you!

(...) ta using a REST API. Then, I wrote an SQL query that utilized this business rule to retrieve the data. However, when testing it, I keep encountering the following error: WebCon.WorkFlow.Businesslog ic.BusinessRules.Exceptions.BusinessRuleEvaluationException: Error occurred during rule SQL Fetch contractors with debt (Id: 5834) evaluation. ---> System.Exception: Error getting data for DataSourc (...)

(...) ht:205px}p{margin:11px 0 22px;overflow:hidden}ins{color:#777;text-decoration:none}a img{border:0}@media screen and (max-width:772px){body{background:none;margin-top:0;max-width:none;padding-right:0}}#log o{background:url(//www.google.com/images/branding/googlelog o/1x/googlelog o_color_150x54dp.png) no-repeat;margin-left:-5px}@media only screen and (min-resolution:192dpi){#log o{background:url(//www.goog (...)

(...) However, most of the people we invite are unfamiliar with WEBCON or WEBCON BPS and don’t immediately connect it to JR Rädlinger. In the invitation, we’ve already added “powered by WEBCON” so that the log o might at least be recognizable. My question is: Is there any way to customize the subsequent communication for “Public Access” as well (see PIC-2)? For example, by using a custom background image (...)

(...) on. A task should be assigned to two users, and the workflow must wait for both users to complete it before moving to the next step. In workflow, I have a task step that correctly implements this log ic. Task is assigned via business rule. Later in the same workflow, after a conditional gateway, there is another task step with an identical configuration. However, this task proceeds to the next st (...)

(...) ty. Despite the security measures applied by WEBCON, every user should follow the principles of security. In order to prevent the account from being used by unauthorized persons, any user should log out when he does not use the website and shouldkeep the log in and password confidential and do not disclose them to any third parties.   1.1.       Registrati (...)

(...) r short description (if the vulnerability occurred in a specific part of the system), severity rating, status indicator, and the version where the issue was resolved. Vulnerabilities are listed chronolog ically, with the newest at the top of the list. The 5 most recent vulnerabilities: CVE / CWE Detection date Severity Status Version containing fix C (...)