Workflow

Have you ever wanted a workflow form to be able to query for something in one of your drivers? Maybe you want to pre-fill form data, or maybe you want to validate data entered without storing it within the identity vault. The IDVault object in IDM is used to query the IDVault only, but recently…

+ read more

By: rrawson
Aug 4, 2017
2:35 pm
Reads:
393
Score:
5
This entry is part 3 of 3 in the series Workflow Primer

This entry is part 3 of 3 in the series Workflow PrimerIn part 2 of this series, we reviewed some of my best practices for the forms engine of the workflow – the part that runs in the browser. The back-end portion of the solution is the Workflow engine, which runs in an ecmascript processor…

+ read more

By: rrawson
Jul 26, 2017
4:11 pm
Reads:
421
Score:
Unrated
This entry is part 2 of 3 in the series Workflow Primer

In part 1 of this series, I discussed the basic technologies which underlie the IDM Workflow engine. This article will focus on the forms engine. Generally, this is the more fun part for me to work on because I see my feedback immediately…

By: rrawson
Jul 17, 2017
11:21 am
Reads:
421
Score:
5
This entry is part 1 of 3 in the series Workflow Primer

This entry is part 1 of 3 in the series Workflow PrimerOne of the challenges in Identity Manager is that there are so many ways that things can be accomplished, it’s not always clear what the developers intend. In fact, my understanding of how best to use this technology evolved over many years and many…

+ read more

By: rrawson
Jul 10, 2017
12:01 pm
Reads:
523
Score:
5

From time to time, I have wanted to use workflows where the submit button does not go back to the User Application. For example, if you are using the workflow as the starting point of user self-provisioning, you might want to deep-link it off a portal, and then send the user to a custom landing…

+ read more

By: rrawson
Jun 16, 2017
2:05 pm
Reads:
472
Score:
Unrated
This entry is part 4 of 8 in the series Aegis Workflow 101

This entry is part 4 of 8 in the series Aegis Workflow 101Welcome to Part 4 of Aegis Workflow 101.  This time we look at Triggers which define the conditions when workitems should start as well as well as other behavior which we will learn about below. In the last topic we learned about events.  When…

+ read more

Martin Cotter
Apr 20, 2016
10:43 am
Reads:
1,338
Score:
Unrated
This entry is part 2 of 8 in the series Aegis Workflow 101

This entry is part 2 of 8 in the series Aegis Workflow 101Welcome to Part 2 of Aegis Workflow 101.  This time we look at Input Builder which is a basic but very powerful component of Aegis workflow design. Looking back at Part 1, we build a ‘Hello World’ workflow which used the echo activity…

+ read more

Martin Cotter
Apr 8, 2016
2:11 pm
Reads:
1,457
Score:
Unrated
This entry is part 1 of 8 in the series Aegis Workflow 101

With the newly available Sentinel Adapter for Aegis, a new audience is exposed to the wonderful world of ITPA. To help them on their way this is a new series of posts on getting started with everyone’s favorite automation platform – Aegis!

Martin Cotter
Apr 5, 2016
8:56 am
Reads:
1,769
Score:
Unrated

In previous posts I have shown how to integrate Aegis and Sentinel – but why? I often get asked what does Aegis actually do, its not an easy question to answer without example. The short answer is – it can do almost anything – the long answer is explaining what that means! Aegis…

Martin Cotter
Dec 22, 2015
10:14 am
Reads:
2,715
Score:
Unrated

I had a requirement to give some people the possibility to change passwords for lower grade students and it was ok to give this right out per school and they had ~15 schools. The first thing I did was to create one group for each school and the groups have the right to see the…

+ read more

Aug 19, 2015
11:20 am
Reads:
1,784
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow