Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info
iconfalse
titleWhat is it for?
Excerpt
Authorization algorithms are available within the process module to assure a task can only be performed by users with the right role.

An authorization algorithm is used to create dynamic authorization for tasks. The element offers three possibilities to create the algorithm, using an external source, selecting roles, or using the 2-man rule.

...

The most common scenario is that you store one or more ids of users that executed some earlier tasks in the profile of the process, and then provide these ids to the authorization algorithm for a specific task. This task is likely a review task.

...

Tip

See How to implement a 2-man-rule on how to use the 2-man-rule.