Showing ideas with status New.
Show all ideas
Have the ability to capture, track and transfer end user and/or terminal details for traceability • I.e... Requirement via Interact for example to capture; end user details (Human Agent Application User ID who triggered or submitted the process), IP address, date and time of submit requests, browser details etc etc and also have the ability to transfer these details or make these available within Blue Prism through the life of the automated process This is required for Audit & Internal Fraud purposes
... View more
Hi, I would like to see, that we can right-click on an object/a process in studio tab and get an export-Option instead of the export-function in the menu bar. That would save some clicks. Thanks Christian
... View more
While setting up password if someone is not following below criteria it should prompt message like “Password does not meet required complexity” and shouldn’t allow to set password till required criteria is met.
Criteria can be : Password should be between 8 and 12 Alphanumeric characters with at least one special character.
... View more
Hi Team, When Blue Prism releases major or minor we get email notification. Similarly, when new add-ons/extras or VBOs are added outside of the product. Can we get a notification? Just a example, we are using WorkQueue Report, JAB, MAPIE, whenever there's any new version of these comes available in the portal. Its good to get an alert for the customers to check for the new updates. Its very difficult for each developer or developer lead to check the portal daily to check for updates. Let me know if this makes sense.
... View more
Hey Blue Prism Team & Community, unfortunatly there is no way to authenticate at a Webservice with the currently logged in user using Blue Prisms WebAPI as the support told me. You have to store your credentials in the credentials section and select them directly from the WebAPI. There is no way to dynamically change the user to the currently logged in user. This could be easily enabled by adding a Checkbox or an option to the WebAPI common authentication types which sets "UseDefaultCredentials=true" at the outgoing request. For anyone else comming up with the same question my simply advice would be to not to use Blue Prisms WebAPI feature and better build up your own request using the HTTP Utility VBO.
... View more
Currently, you can store the encryption key as a file on the Application Server. When you have multiple Application Servers connecting to the same Blue Prism DB, each Application Server needs to share the same encryption key. The only feasible way to do this is sharing the server configuration lines in the Automate.config file. It would nice to have at least a feature in the Key Store tab of BPServer.exe to import the saved key files.
... View more
Ability to call Chorus Rest API to work select by process model. If a UserID has access to several deployed solutions, there is no way to limit work accept to 'change' work select privileges to queues. Having options on Rest API call to single out which process model to get work would eliminate the need for one user to have multiple signons per deployed solution.
... View more
Currently, the number of work selected items is a system level setting. We have more than one solution, where one solution requires only one item for work select, we have another that would benefit from more than one at a time.
... View more
When creating manage connections with JSON files for external connections, it is difficult to trouble shoot exactly why the manage connection does not work. Some sort of tools or utility to trouble shoot, see logs, or reference information to reduce support hours in making good Rest API 3.0 JSON files would be welcomed. Also, some base connections for Chorus integration; to ensure integration endpoints are configured correctly in Hosted SS&C Cloud.
... View more
Raising on behalf of one of our customers after a discussion this morning. The issue at hand was that it appears 2 users may have inadvertently updated an Environment Variable at, or around, the same time, resulting in the old variable remaining set. The idea is to have some form of lock, or cache/track of an Environment Variable being set to reduce or eliminate this possibility in the future.
... View more
I would suggest that Chorus have an email notification preference added that can be turned on or off depending on the individual preference. Basically, allowing users to turn on the ability to get an email notification every time there is a new item that gets assigned to them in their worklist. The email should have a link to the new item that will automatically open the work in the Chorus Portal client, i.e. similar to the email notifications from Workday or ServiceNow.
... View more
Currently, when editing a stage properties, or writing an expression, on the right hand-side of the window we have a data items filter: It would be really handy if this filter could have another group added - Exposure. This would help finding all environment variables, session variables, and statistic data items, and take away the need for data item naming conventions as a workaround to find them easily.
... View more
It would be preferable to have an additional setting with regards to logging and sensitive data. While logging can be disabled or set to not log the parameters, if such instance occurs where full logging has to be enabled at resource level to determine an issue - it would be ideal to have been able to set a level of logging that still would not be captured in the logs. We have many processes that deal with sensitive data and have to build numerous work arounds to get the data in a way that would not accidently be exposed in the logs. If there was a setting similar to not log parameters it would allow us to build "normally" knowing that if full logging needed to be enabled, this data would be safe from the logs.
... View more
With BluePrism Hub there is a need to store and distribute the API key. If this could be automated so users can request this and rabbitmq could distribute the key. It would probably need to have an approval or HITL stage gate. Moderator note: Changed the title of this idea to sentence case.
... View more
Raised on behalf of Antonio Mathias Kühle: We wish that it is possible to have a separate log that show all API request transactions, with all details, so you can track exactly what your request contains, and what the response was. This log could be a page visible in the BP interface, but the easy fix is just to create a DB table or log file for this. Important thing is that it is something you can toggle "on" "off" from API configuration settings, separately on each API. And also important for the DB table is that you can add "number of days" to keep the logs before they are automatically deleted.
... View more
When a user tries to open an email (.msg) file uploaded to Chorus, the Content Viewer (CV) window opens but the email file is not displayed in the CV window, rather the file is downloaded and then the user is prompted, by the browser, to open the file. This is OK unless the email file in question is large (e.g. contains a large attachment); when the user tries to open such a file, the CV window opens but in chromeless mode, meaning there is no visible cue that the download is running and there is a risk that after a period of time with no file opened and no cue that anything is happening the user will close the window and report that the file cannot be opened. Is it possible to show some sort of status bar in the CV window to indicate that the download is in progress? Either a custom bar or the built-in browser status bar (I believe this would require the CV window to be launched with a flag that forces download progress to be shown in the status bar).
... View more
The application passes sensitive parameters in the URL line of many of the requests. BUSINESS IMPACT: Sensitive data could be disclosed unintentionally through transmission in the URL. Description The application uses the URL to pass sensitive data from the client to the server. Data passed in the URL can be exposed because data passed in this manner ends up in unintended locations. These locations can include server logs, local browser history, and proxy logs. Reproduction Steps Using Burp Suite, navigate through the application. The application passes sensitive parameters in the URL line of many of the requests Affected Locations HUB v4.7 and Interact 4.7 Decipher v2.3 Recommendation When sensitive data is sent, it should be ensured that POST requests are used instead of GET requests. POST data is not treated the same way as URL data is when requests are sent through systems and do not typically get cached or logged. If there are technical constraints that require data to be sent in the URL then strong encryption should be used to encrypt values. It should be ensured that part of this encryption scheme contains protection against data replay so that captured cryptographic values cannot be replayed back to the server. References Information exposure through query strings in url | OWASP Foundation A02 Cryptographic Failures - OWASP Top 10:2021
... View more
Feedback from our processors: Request: Using the quick search lookup we are able to save lookups, however if one of the ‘Fields’ need updating, we cannot edit it, we have to delete the field from the query and re enter it. Are we able to make it editable instead. This will allow for day to day search to be made easier, particularly ones that the date needs to be altered every day for – streamlining our processing times.
... View more
Allow users to assign multiple categories to a single event in the timeline, enabling richer classification without the need to overwrite or remove existing tags. For example, categorize an event as both "FTE event" and "legacy tag applied." Without this feature: Users must repeatedly create or edit categories for different analyses, leading to inefficiencies, reduced flexibility, and potential loss of critical context for multi-faceted events. Goal: enhance event categorization flexibility, allowing users to perform diverse and overlapping analyses seamlessly while preserving existing tags for future use.
... View more
Enable the creation of metrics to count the number of times a specific pattern (e.g., X → Y → Z) occurs across all timelines, rather than limiting the count to the number of timelines where the pattern exists. Without this feature: Users cannot accurately quantify the frequency of specific patterns within timelines, leading to incomplete analysis and missed insights into recurring behaviour. Goal: provide detailed insights into pattern frequency across timelines, improving the depth and accuracy of process analysis in the Predecessor Analysis module.
... View more