Page History
Info | ||||
---|---|---|---|---|
| ||||
|
An authorization algorithm is used to create dynamic authorization for tasks. The element offers three possibilities to create the algorithm, using an external source, selecting roles, or using the 2-man rule.
...
The most common scenario is that you store one or more ids of users that executed some earlier tasks in the profile of the process, and then provide these ids to the authorization algorithm for a specific task. This task is likely a review task.
...
Tip |
---|
See How to implement a 2-man-rule on how to use the 2-man-rule. |
Overview
Content Tools