Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

As a project, you need to be aware of security when using this componentcommunication is involved. The data is submitted to the other application is placed on the request scope of the request. This data could be inspected and changed before arriving at the other application. You need to take steps in the called application to ensure that the user has sufficient rights to perform that flow with that datacommunication between the starting and started application is done server internally in code. This means that it is perfectly secure as no data can be intercepted or changed.

Example


The above container uses an attribute with a value list of possibly case types. Depending on the type of subsidy, a different application is opened that is responsible for handling that type of subsidy cases. The application is opened in the widget and important information is passed to the other application using the Data parameter. This information is the subsidy ID and a string to indicate what dashboard page to open. The flow in the other application has a split node in the flow, which uses this string to determine to what page to flow. If a user wants to open another subsidy case from within another widget on the dashboard, the portal message is passed to this widget which can refresh its content with the new ID, which is passed as data in the portal message.

...