Workflow

Approving a Workflow Programmatically. The IDM engine includes tokens for a great many functions, including a number of common workflow operations. These tokens are the bridge from the metadirectory side of IDM to the workflow side. While many important API calls are represented, there are dozens and dozens that are not. Recently, I had occasion to wish to have a workflow react to actions taken by the IDM engine…

By: rrawson
Jul 24, 2018
9:02 am
Reads:
692
Score:
5

Recently, one of my clients asked me to create a custom administration capability to replace portlets which they had created in IDM User Application version 3.7 and had been working in 4.0.2. Under 4.6, these portlets no longer functioned. I created a PRD which consolidated seven of their portlets into a single management application which…

+ read more

By: rrawson
Oct 24, 2017
2:17 pm
Reads:
1,701
Score:
5

Have you ever wanted a workflow form to be able to query for something in one of your drivers? Maybe you want to pre-fill form data, or maybe you want to validate data entered without storing it within the identity vault. The IDVault object in IDM is used to query the IDVault only, but recently…

+ read more

By: rrawson
Aug 4, 2017
2:35 pm
Reads:
1,715
Score:
5
This entry is part 3 of 3 in the series Workflow Primer

This entry is part 3 of 3 in the series Workflow PrimerIn part 2 of this series, we reviewed some of my best practices for the forms engine of the workflow – the part that runs in the browser. The back-end portion of the solution is the Workflow engine, which runs in an ecmascript processor…

+ read more

By: rrawson
Jul 26, 2017
4:11 pm
Reads:
2,115
Score:
5
This entry is part 2 of 3 in the series Workflow Primer

In part 1 of this series, I discussed the basic technologies which underlie the IDM Workflow engine. This article will focus on the forms engine. Generally, this is the more fun part for me to work on because I see my feedback immediately…

By: rrawson
Jul 17, 2017
11:21 am
Reads:
1,898
Score:
5
This entry is part 1 of 3 in the series Workflow Primer

This entry is part 1 of 3 in the series Workflow PrimerOne of the challenges in Identity Manager is that there are so many ways that things can be accomplished, it’s not always clear what the developers intend. In fact, my understanding of how best to use this technology evolved over many years and many…

+ read more

By: rrawson
Jul 10, 2017
12:01 pm
Reads:
1,987
Score:
5

From time to time, I have wanted to use workflows where the submit button does not go back to the User Application. For example, if you are using the workflow as the starting point of user self-provisioning, you might want to deep-link it off a portal, and then send the user to a custom landing…

+ read more

By: rrawson
Jun 16, 2017
2:05 pm
Reads:
1,864
Score:
5
This entry is part 4 of 8 in the series Aegis Workflow 101

This entry is part 4 of 8 in the series Aegis Workflow 101Welcome to Part 4 of Aegis Workflow 101.  This time we look at Triggers which define the conditions when workitems should start as well as well as other behavior which we will learn about below. In the last topic we learned about events.  When…

+ read more

Martin Cotter
Apr 20, 2016
10:43 am
Reads:
2,147
Score:
Unrated
This entry is part 2 of 8 in the series Aegis Workflow 101

This entry is part 2 of 8 in the series Aegis Workflow 101Welcome to Part 2 of Aegis Workflow 101.  This time we look at Input Builder which is a basic but very powerful component of Aegis workflow design. Looking back at Part 1, we build a ‘Hello World’ workflow which used the echo activity…

+ read more

Martin Cotter
Apr 8, 2016
2:11 pm
Reads:
2,313
Score:
Unrated
This entry is part 1 of 8 in the series Aegis Workflow 101

With the newly available Sentinel Adapter for Aegis, a new audience is exposed to the wonderful world of ITPA. To help them on their way this is a new series of posts on getting started with everyone’s favorite automation platform – Aegis!

Martin Cotter
Apr 5, 2016
8:56 am
Reads:
2,739
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow