Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

In the interplay between business operations and IT, administrative tasks often necessitate orchestrating an array of actions and workflows. Traditional approaches often rely on coding expertise, which can introduce a barrier to rapid and secure workflow management. EmpowerID's No Code Flows , also known as Business Request Flows, offer a sophisticated toolset designed to efficiently manage business processes in response to various events. This comprehensive feature set equips administrators with the necessary tools to oversee and automate complex procedures without requiring code-writing expertise. This document provides an overview of the key elements within No Code Flows and their respective functionalities.

The primary goal of No Code Flows is to simplify the management of business processes resulting from specific events. By automating a series of actions, this feature allows administrators to quickly create and implement workflows that react to numerous scenarios without the need for coding.

Elements of No Code Flows

Flow Definitions

Think of a Flow Definition as a set of instructions. It's a container that houses one or more Flow Items, which are steps the system follows to react to a particular event. These definitions help administrators design and oversee their business operations by detailing what happens when specific events occur, such as when an employee leaves the company (a "Person Leaver" event).

...

Flow Items

Flow Items are the individual tasks that the system performs as part of a Flow Definition. In the example of a "Person Leaver" Flow Definition, these tasks could include actions like "Remove this person from all groups" and "Disable all accounts belonging to this person." Each Flow Item is added to the Flow Definition as a step, instructing the system what to do when a certain event takes place.

Flow Items contain several parameters that together form a directive for the system. These parameters define the specific action to be performed, the target, and the scope of resources it should affect.

Item Type Action

This specifies the exact task that the Flow Item performs. For instance, the action "Disable Person" would be linked to the Flow Item of the same name. When the system encounters this Flow Item, it will perform the action "Disable Person" on one or more individuals as a response to a specific event.

Item Type Scope

This sets the range for the Item Type Action. For example, "All Accounts for Person" means that the action will be applied to every account owned by a certain person.

Item Collection Query

In addition to Item Type Action and Item Scope Type, Flow Items also incorporate an Item Collection Query. This parameter is an SQL statement that the system executes against specific resource types to gather a set of resources related to the Flow Item in conjunction with the Item Scope Type. For example, within a Flow Item labeled "Disable All Person Accounts" with an Item Scope Type of "All Accounts for Person," the query retrieves all user accounts owned by the individual who is the subject of the Flow Item.

Flow Events

Flow Events are triggers that set off a series of actions, defined by the Flow Definitions and governed by Flow Policies. They represent situations or conditions that require a systematic response. Examples could include discovering a new mailbox, or an employee leaving the organization. Each event corresponds to a set of specific actions.

...

Macrosuite hidden content macro
data{"usersAndGroups":[{"value":"557058:b7e6171b-97ca-4b93-ac6f-9e29353b4c9a","label":{"key":null,"ref":null,"props":{"user":{"type":"known","accountId":"557058:b7e6171b-97ca-4b93-ac6f-9e29353b4c9a","accountType":"atlassian","email":"","publicName":"Phillip Hanegan","profilePicture":{"path":"/wiki/aa-avatar/557058:b7e6171b-97ca-4b93-ac6f-9e29353b4c9a","width":48,"height":48,"isDefault":false},"displayName":"Phillip Hanegan","isExternalCollaborator":false,"_expandable":{"operations":"","personalSpace":""},"_links":{"self":"https://dotnetworkflow.jira.com/wiki/rest/api/user?accountId=557058:b7e6171b-97ca-4b93-ac6f-9e29353b4c9a","base":"https://dotnetworkflow.jira.com/wiki","context":"/wiki"}}},"_owner":null},"type":"user"}]}
showSelectedtrue
editorValue{"editorValue":{"version":1,"type":"doc","content":[{"type":"paragraph","content":[{"type":"text","text":"Examples of Flow Events include \"Mailbox Discovered\" or \"Person Leaver.\" Each event represents a unique situation that necessitates specific actions."}]},{"type":"heading","attrs":{"level":4},"content":[{"type":"text","text":"Examples of Flow Events"}]},{"type":"heading","attrs":{"level":4},"content":[{"type":"text","text":"Mailbox Discovered","marks":[{"type":"em"}]}]},{"type":"paragraph","content":[{"type":"text","text":"In the realm of managing user identities and resources, detecting a new mailbox constitutes an event that may trigger a series of actions. For example, you might create a Flow Definition that includes actions such as verifying the new mailbox, adding it to certain distribution lists, or establishing appropriate security and access controls. The associated Flow Policy would subsequently dictate the timing and method of these actions."}]},{"type":"heading","attrs":{"level":4},"content":[{"type":"text","text":"Person Leaver","marks":[{"type":"em"}]}]},{"type":"paragraph","content":[{"type":"text","text":"The \"Person Leaver\" event is triggered when an individual, such as an employee or a contractor, leaves the organization. In response to this event, a No Code Flow might involve actions like disabling the person's account, removing them from groups, archiving their emails, or revoking access to company resources. Once again, a corresponding Flow Policy would prescribe the sequence and conditions under which these actions should be executed."}]}]}}

Flow Policies

Flow Policies outline which Flow Definitions should be initiated in response to specific Flow Events. They act as rule sets that link specific Flow Events to their corresponding automated actions via Flow Definitions. They can be customized with multiple rules for the same event, allowing tailored responses to various business scenarios, such as executing different procedures for internal versus external leavers.

...

Examples of No Code Flows in Action

Consider a scenario where a new employee joins the company and needs access to specific applications and resources. Using No Code Flows, administrators can create a workflow that automatically grants the necessary permissions upon detecting the creation of a new user account. The workflow could also send a welcome email with essential information and links to required training materials, ensuring a smooth onboarding experience.

Another example involves automating the process of revoking access for employees who leave the company. A No Code Flow can be set up to trigger upon the deactivation of a user account, subsequently removing the user from all associated groups and revoking their access to resources.

The Benefits of No Code Flows for Businesses

No Code Flows makes process management easier by allowing administrators to automate complex actions in response to specific events without writing a line of code. By offering a comprehensive set of tools and capabilities, administrators can efficiently handle various events and scenarios, ultimately enhancing their organization's overall productivity and effectiveness.serves as a secure solution to this constraint, affording administrators a framework to design, manage, and enhance intricate workflows without traditional coding.

Built on a component-based architecture, EmpowerID’s No Code Flows offers administrators a variety of predefined elements for workflow construction. This modular approach aids in seamlessly connecting disparate stages of a business process, from data acquisition to approval mechanisms and task delegation.

For administrators, comprehending the No Code Flows system is vital. This article provides an introductory look into its key components, features, and functionalities, equipping you with the knowledge needed to effectively utilize No Code Flow in your organization. It also serves as a gateway to specific how-to topics for further guidance.

Benefits of No Code Flows

Unlike traditional coded solutions that may require frequent security assessments for each line of custom code, No Code Flows are built on a secure, audited framework. This reduces the attack surface and enhances the system’s security posture. Its modular nature also means that each predefined component undergoes rigorous security testing, offering an added layer of trust and compliance.

The architecture facilitates real-time monitoring and auditing, delivering transparency into who has initiated or modified a process and at what time. This is critical for organizations where compliance with industry regulations is required. Tracking and auditing functionalities within No Code Flows instills confidence in the system and contributes to the organization’s overall security measures.

No Code Flows' inherent scalability and flexibility enable an agile response to evolving business requirements and security landscapes. Whether you are tasked with automating approvals, steering user onboarding, or coordinating complex workflows, EmpowerID’s No Code Flows delivers a secure, efficient, and adaptable tool for managing contemporary business processes.

Understanding the Core Components of No Code Flows

No Code Flows is a powerful and flexible platform specifically designed to simplify the automation of business processes. It consists of interconnected components, each playing a vital role in enhancing operational efficiency. Instead of relying on coding skills, No Code Flows adopts a set of easily configurable and well-defined building blocks, offering businesses the scalability and logical framework needed to create workflows that align with their unique requirements. These components seamlessly integrate to provide organizations with the agility and efficiency necessary to automate their operations effectively and at scale. In the following sections, we will examine each of these components to demonstrate how No Code Flows can enhance the operational landscape of businesses.

Flow Events

Flow Events are essentially the starting point of any workflow. They act as triggers that initiate a business process. For instance, a Flow Event could be a new employee joining the organization, which would then trigger a series of onboarding tasks.

When an event is triggered, it is directed to the Flow Event Inbox. This inbox serves as a queue, holding the events until they are processed by the system. Other examples of Flow Events could include "Mailbox Discovered," "Account Takeover," or "Person Leaver." Each event represents a unique scenario that necessitates specific actions.

...

Here’s a closer look at each of the above-mentioned examples:

Mailbox Discovered

In the context of managing user identities and resources, discovering a new mailbox is an event that may trigger a series of actions. For instance, you might need to verify the new mailbox, add it to certain distribution lists, or set up appropriate security and access controls.

Account Takeover

The “Account Takeover” event would be a critical security-related trigger. This event could signify potential unauthorized access or control over an account. To detect this event, the No Code Flow may involve suspending the account, notifying security teams, initiating an investigation, or implementing additional security measures.

PersonLeaver

The “Person Leaver” event is triggered when an individual, such as an employee or a contractor, leaves the organization. In response to this event, a No Code Flow might involve disabling the person's account, removing them from groups, archiving their emails, or revoking access to company resources.

Flow Events Library

Easy html macro
theme{"label":"solarized_dark","value":"solarized_dark"}
contentByMode{"html":"<!doctype html>\r\n<link href=\"https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/bootstrap.min.css\" rel=\"stylesheet\" integrity=\"sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC\" crossorigin=\"anonymous\">\r\n<link href=\"https://docs.empowerid.com/new_docs.css\" rel=\"stylesheet\">\r\n\r\n<script src=\"https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/bootstrap.bundle.min.js\" integrity=\"sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM\" crossorigin=\"anonymous\"></script>\r\n <script src=\"https://kit.fontawesome.com/59759af5bf.js\" crossorigin=\"anonymous\"></script>\r\n\r\n <p>The following Flow Events are default shipping events. \r\n The library can be expanded as needed.\r\n <a href=\"#flowevents\"data-bs-toggle=\"collapse\">View Flow Events\r\n <i title=\"Read more\" class=\"fa-duotone fa-square-down-right\"></i>\r\n </a>\r\n </p>\r\n \r\n <div id=\"flowevents\" class=\"collapse\">\r\n <table>\r\n <tbody>\r\n <thead>\r\n <tr>\r\n <td>Flow Event</td>\r\n <td>Description</td></td>\r\n </tr>\r\n </thead>\r\n <tr>\r\n <td>Primary Business Role Location Changed Automatically</td>\r\n <td>Primary Business Role Location Changed based on Directory Data and RBAC Mappings, \r\n by the Role and Location Compiler/Processor Jobs</td>\r\n </tr>\r\n <tr>\r\n <td>Secondary Business Role Location Added Automatically</td>\r\n <td>Secondary Business Role Location Added based on Directory Data and RBAC Mappings, by the Role and Location Compiler/Processor Jobs</td>\r\n </tr>\r\n <tr>\r\n <td>Primary Business Role Location Reverted TO DEFAULT Automatically</td>\r\n <td>Primary Business Role Location Reverted TO DEFAULT due to lack of Directory Data or RBAC Mappings, by the Role and Location Compiler/Processor Jobs</td>\r\n </tr>\r\n <tr>\r\n <td>Person Leaver</td>\r\n <td>Person Termination or Planned Leaver</td>\r\n </tr>\r\n <tr>\r\n <td>Person Mover</td>\r\n <td>Person Mover Lifecycle Event</td>\r\n </tr>\r\n <tr>\r\n <td>Person Joiner</td>\r\n <td>Person Joiner/Onboard Lifecycle Event</td>\r\n </tr>\r\n <tr>\r\n <td>Possible Account Takeover</td>\r\n <td>Possible Account Takeover - possibly an account has been compromised</td>\r\n </tr>\r\n <tr>\r\n <td>Mailbox Discovered</td>\r\n <td>New mailbox detected event</td>\r\n </tr>\r\n <tr>\r\n <td>Account Inbox Person Provision</td>\r\n <td>Person provisioned from Account Inbox process</td>\r\n </tr>\r\n <tr>\r\n <td>Person Inbox Joiner</td>\r\n <td>Person Inbox Joiner</td>\r\n </tr>\r\n <tr>\r\n <td>Person Rehire</td>\r\n <td>Rehire Person</td>\r\n </tr>\r\n <tr>\r\n <td>Person Reactivation</td>\r\n <td>Cancellation of planned leaver event or Person reactivation after disablement</td>\r\n </tr>\r\n <tr>\r\n <td>Person Preleaver Notification</td>\r\n <td>Notification about upcoming leaver event</td>\r\n </tr>\r\n <tr>\r\n <td>Secondary Business Role Location Removed Automatically</td>\r\n <td>Secondary Business Role Location Removed based on Directory Data and RBAC Mappings, by the Role and Location Compiler/Processor Jobs</td>\r\n </tr>\r\n </tbody>\r\n </table>\r\n </div>\r\n \r\n ","javascript":"$(document).ready(function () {\r\n $('.glyphicon').click(function () {\r\n $(this).toggleClass(\"glyphicon-chevron-right\").toggleClass(\"glyphicon-chevron-up\");\r\n });\r\n});","css":"table {\r\n\tborder-collapse: collapse;\r\n font-family: Tahoma, Geneva, sans-serif;\r\n}\r\ncaption {\r\n font-weight: bold;\r\n font-size: 24px;\r\n text-align: left;\r\n color: #333;\r\n margin-bottom: 6px;\r\n margin-left: 60px;\r\n caption-side: top;\r\n}\r\ntable td {\r\n\tpadding: 15px;\r\n}\r\ntable thead td {\r\n\tbackground-color: #ffffff;\r\n\tcolor: #222;\r\n\tfont-weight: bold;\r\n\tfont-size: 18px;\r\n\tborder: 1px solid #dddfe1;\r\n}\r\ntable tbody td {\r\n\tcolor: #636363;\r\n\tborder: 1px solid #dddfe1;\r\n}\r\ntable tbody tr {\r\n\tbackground-color: #f9fafb;\r\n}\r\ntable tbody tr:nth-child(odd) {\r\n\tbackground-color: #ffffff;\r\n}\r\nh3{\r\n padding-top: 24px;\r\n}"}

Flow Items

Flow Items are the specific tasks or actions to be performed in response to Flow Events. Each is designed to handle a particular facet of the event response. For example, if a Person Leaver event is detected, Flow Items could include actions like "Remove this person from all groups" and "Disable all accounts belonging to this person."

Flow Items contain several parameters that together form a directive for the system. These parameters define the specific action, the target, and the scope of resources it should affect.

Item Type Action

Each Flow Item has an Item Type Action associated with it, specifying the exact task to be executed. For instance, “Bulk Remove Person Group Membership” might be an Item Type Action assigned to a Flow Item. This action suggests that, as part of responding to a specific Flow Event, the system should remove a person from multiple group memberships.

Item Type Scope

Alongside the Item Type Action, each Flow Item also possesses an Item Scope Type. This parameter determines the range within which the Item Type Action will execute. For example, “Remove All Non-RBAC Group Accounts for Person” could be an Item Scope Type. This suggests that the “Bulk Remove Person Group Membership” action would apply to all group accounts associated with a person not managed by Role-Based Access Control (RBAC).

Item Collection Query

In addition to Item Type Action and Item Scope Type, Flow Items also incorporate an Item Collection Query. This parameter is an SQL statement that the system executes against specific resource types to gather resources related to the Flow Item and the Item Scope Type. For example, within a Flow Item labeled "Disable All Person Accounts" with an Item Scope Type of "All Accounts for Person," the query retrieves all user accounts owned by the individual who is the subject of the Flow Item.

In effect, the Flow Item, the Item Type Action, the Item Scope Type, and the Item Collection Query collectively form an instruction for the system. They define what action to take, where to apply it, and the scope of resources it should impact. Administrators can construct complex, automated workflows that respond effectively to various Flow Events by stringing together multiple Flow Items within a Flow Definition (discussed below).

Flow Items Library

Easy html macro
theme{"label":"solarized_dark","value":"solarized_dark"}
contentByMode{"html":"<!doctype html>\r\n<link href=\"https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/bootstrap.min.css\" rel=\"stylesheet\" integrity=\"sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC\" crossorigin=\"anonymous\">\r\n<link href=\"https://docs.empowerid.com/new_docs.css\" rel=\"stylesheet\">\r\n\r\n<script src=\"https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/bootstrap.bundle.min.js\" integrity=\"sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM\" crossorigin=\"anonymous\"></script>\r\n <script src=\"https://kit.fontawesome.com/59759af5bf.js\" crossorigin=\"anonymous\"></script>\r\n\r\n <p>The following Flow Items are default shipping items. \r\n The library can be expanded as needed.\r\n <a href=\"#flowitems\"data-bs-toggle=\"collapse\">View Flow Items\r\n <i title=\"Read more\" class=\"fa-duotone fa-square-down-right\"></i>\r\n </a>\r\n </p>\r\n \r\n <div id=\"flowitems\" class=\"collapse\">\r\n <table>\r\n <tbody>\r\n <thead>\r\n <tr>\r\n <td>Flow Item</td>\r\n <td>Description</td></td>\r\n </tr>\r\n </thead>\r\n <tr>\r\n <td>Remove Non-RBAC Assigned group memberships from person</td>\r\n <td>Remove Non-RBAC Assigned group memberships from the person who is a target of the item</td>\r\n </tr>\r\n <tr>\r\n <td>Disable Person</td>\r\n <td>Disable Person account for the person who is a target of the item</td>\r\n </tr>\r\n <tr>\r\n <td>Just in Time Person Access Summary Recertification</td>\r\n <td>Just in Time Person Access Summary Recertification for the person who is a target of the item</td>\r\n </tr>\r\n <tr>\r\n <td>Email a Person</td>\r\n <td>Emails the Person who is the target of the item</td>\r\n </tr>\r\n <tr>\r\n <td>Email a Person's Manager</td>\r\n <td>Emails the Person who is the target of the item</td>\r\n </tr>\r\n <tr>\r\n <td>Disable Mailbox</td>\r\n <td>Disable maibox</td>\r\n </tr>\r\n <tr>\r\n <td>Disable All Person Accounts</td>\r\n <td>Delete all accounts owned by the Person who is the target of the item</td>\r\n </tr>\r\n <tr>\r\n <td>Enable Person</td>\r\n <td>Enable the Person who is the target of the item</td>\r\n </tr>\r\n <tr>\r\n <td>Restore person</td>\r\n <td>Restore the Person account who is the target of the item</td>\r\n </tr>\r\n <tr>\r\n <td>EnableOutOfOffice</td>\r\n <td>Enables Out Of Office for the Person account who is the target of the item</td>\r\n </tr>\r\n <tr>\r\n <td>Remove Person Group Membership</td>\r\n <td>Removes Person from group membership</td>\r\n </tr>\r\n <tr>\r\n <td>DisableOutOfOffice</td>\r\n <td>Disables Out Of Office for the Person account who is the target of the item</td>\r\n </tr>\r\n <tr>\r\n <td>HideInGAL</td>\r\n <td>Hides mailbox in GAL</td>\r\n </tr>\r\n <tr>\r\n <td>ShowMailboxInGAL</td>\r\n <td>Shows mailbox in GAL</td>\r\n </tr>\r\n <tr>\r\n <td>EnableAllPersonAccounts</td>\r\n <td>Enables all Person accounts</td>\r\n </tr>\r\n <tr>\r\n <td>EditAccountAttribute</td>\r\n <td>Edit account attribute</td>\r\n </tr>\r\n </tbody>\r\n </table>\r\n </div>\r\n \r\n ","javascript":"$(document).ready(function () {\r\n $('.glyphicon').click(function () {\r\n $(this).toggleClass(\"glyphicon-chevron-right\").toggleClass(\"glyphicon-chevron-up\");\r\n });\r\n});","css":"table {\r\n\tborder-collapse: collapse;\r\n font-family: Tahoma, Geneva, sans-serif;\r\n}\r\ncaption {\r\n font-weight: bold;\r\n font-size: 24px;\r\n text-align: left;\r\n color: #333;\r\n margin-bottom: 6px;\r\n margin-left: 60px;\r\n caption-side: top;\r\n}\r\ntable td {\r\n\tpadding: 15px;\r\n}\r\ntable thead td {\r\n\tbackground-color: #ffffff;\r\n\tcolor: #222;\r\n\tfont-weight: bold;\r\n\tfont-size: 18px;\r\n\tborder: 1px solid #dddfe1;\r\n}\r\ntable tbody td {\r\n\tcolor: #636363;\r\n\tborder: 1px solid #dddfe1;\r\n}\r\ntable tbody tr {\r\n\tbackground-color: #f9fafb;\r\n}\r\ntable tbody tr:nth-child(odd) {\r\n\tbackground-color: #ffffff;\r\n}\r\nh3{\r\n padding-top: 24px;\r\n}"}

Flow Definitions

Think of a Flow Definition as a set of instructions. It's a container that holds one or more Flow Items, which are steps the system follows to react to a particular event. Flow Definitions serve as templates for business processes, outlining how Flow Items are orchestrated in response to a specific Flow Event. For example, a "Person Leaver" event could trigger actions like disabling accounts and removing the person from all groups.

...

Flow Definitions Library

Easy html macro
theme{"label":"solarized_dark","value":"solarized_dark"}
contentByMode{"html":"<!doctype html>\r\n<link href=\"https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/bootstrap.min.css\" rel=\"stylesheet\" integrity=\"sha384-EVSTQN3/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC\" crossorigin=\"anonymous\">\r\n<link href=\"https://docs.empowerid.com/new_docs.css\" rel=\"stylesheet\">\r\n\r\n<script src=\"https://cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/js/bootstrap.bundle.min.js\" integrity=\"sha384-MrcW6ZMFYlzcLA8Nl+NtUVF0sA7MsXsP1UyJoMp4YLEuNSfAP+JcXn/tWtIaxVXM\" crossorigin=\"anonymous\"></script>\r\n <script src=\"https://kit.fontawesome.com/59759af5bf.js\" crossorigin=\"anonymous\"></script>\r\n\r\n <p>EmpowerID includes several Flow Definitions for Person events. \r\n The library can be expanded as needed.\r\n <a href=\"#mfaPatch\"data-bs-toggle=\"collapse\">View Definitions\r\n <i title=\"Read more\" class=\"fa-duotone fa-square-down-right\"></i>\r\n </a>\r\n </p>\r\n \r\n <div id=\"mfaPatch\" class=\"collapse\">\r\n <table>\r\n <tbody>\r\n <thead>\r\n <tr>\r\n <td>Flow Definition</td>\r\n <td>Description</td></td>\r\n </tr>\r\n </thead>\r\n <tr>\r\n <td>Person Leaver</td>\r\n <td>Used to define the Flow Items to be executed when a Person Leaver event occurs.</td>\r\n </tr>\r\n <tr>\r\n <td>Person Mover</td>\r\n <td>Used to define the Flow Items to be executed when a Person Mover event occurs.</td>\r\n </tr>\r\n <tr>\r\n <td>Person Rehire</td>\r\n <td>Used to define the Flow Items to be executed when a Person Rehire event occurs.</td>\r\n </tr>\r\n </tbody>\r\n </table>\r\n </div>\r\n \r\n ","javascript":"$(document).ready(function () {\r\n $('.glyphicon').click(function () {\r\n $(this).toggleClass(\"glyphicon-chevron-right\").toggleClass(\"glyphicon-chevron-up\");\r\n });\r\n});","css":"table {\r\n\tborder-collapse: collapse;\r\n font-family: Tahoma, Geneva, sans-serif;\r\n}\r\ncaption {\r\n font-weight: bold;\r\n font-size: 24px;\r\n text-align: left;\r\n color: #333;\r\n margin-bottom: 6px;\r\n margin-left: 60px;\r\n caption-side: top;\r\n}\r\ntable td {\r\n\tpadding: 15px;\r\n}\r\ntable thead td {\r\n\tbackground-color: #ffffff;\r\n\tcolor: #222;\r\n\tfont-weight: bold;\r\n\tfont-size: 18px;\r\n\tborder: 1px solid #dddfe1;\r\n}\r\ntable tbody td {\r\n\tcolor: #636363;\r\n\tborder: 1px solid #dddfe1;\r\n}\r\ntable tbody tr {\r\n\tbackground-color: #f9fafb;\r\n}\r\ntable tbody tr:nth-child(odd) {\r\n\tbackground-color: #ffffff;\r\n}\r\nh3{\r\n padding-top: 24px;\r\n}"}

Flow Policies

The No Code Flows framework of EmpowerID operates through a central mechanism known as Flow Policies. These policies form a bridge between particular events and their corresponding automated responses, facilitated by Flow Definitions. As the core rule set for No Code Flows, Flow Policies specify which Flow Definitions to trigger in response to certain Flow Events.

Moreover, these policies offer the ability to create numerous rules for a single event, allowing for adaptability and quick response to changing organizational requirements. For example, a company might have distinct procedures for when an internal employee exits versus when an external consultant's contract concludes. The organization can establish a unique Flow Policy for each circumstance in such cases. An "internal departures" policy might entail disabling access to select internal systems, whereas a policy for "external departures" could involve revoking temporary access permissions.


...


Customizable to Your Organization's Needs

One of the key strengths of Flow Policies lies in their adaptability to an organization's specific requirements and policies. A company can define a wide range of Flow Policies to respond to numerous different Flow Events, each with its unique sequence of Flow Items defined by the respective Flow Definition. This ensures the appropriate automated response is carried out swiftly and efficiently, aligning with organizational practices and requirements.

Flow Policies and Flow Definitions: A Unified System

Flow Policies and Flow Definitions operate in unison to effectively manage business process orchestration. The Policies determine 'what' should happen in response to a specific event, while the Flow Definitions elaborate on 'how' it should happen. Together, they provide a comprehensive yet simplified, no-code framework for automated task execution.

The concept of Flow Policies, therefore, not only simplifies process management but also ensures that an organization’s response to events is consistent, reliable, and in line with its broader operational policies. As a component of EmpowerID's No Code Flows, Flow Policies represent a step forward in the intersection of process automation and identity management.

Additional Concepts

Business Requests

A Business Request is generated when an event triggers a Flow Definition. It represents a formal request to execute the actions defined in the definition.

Business Request Items

These are the individual tasks or actions that need to be executed as part of a Business Request. They are generated based on the Flow Definition, and each holds data related to the request, such as request data, assignee ID, and resource ID. Each item is processed independently in the order and time defined in the flow. Items at the beginning of the flow are executed first. If an item depends on the completion of another item, it will not be executed until the dependent item is completed.

Approval Flow Policies

Approval Flow Policies are used to direct Business Requests to the appropriate people for approval. For example, if a person changes their location within the organization, that change could be routed to the person’s manager for approval before certain resources are allocated to that person. If the Business Request is linked to an Approval Flow policy, the request could route for approval based on the assigned policies or be overridden and executed without requiring approval, as might be the case in person-leaver events.

Fulfillment Workflows

These workflows outline the procedure to be followed when a request item is approved, auto-approved by the system, or rejected, detailing the execution process for each scenario. Fulfillment Workflows are triggered once the Approval Flow policy has been completed and a decision has been made. Based on the outcome of the Approval Flow policy, different fulfillment workflow branches may be triggered to execute specific tasks or activities in response to an approved or rejected request. This could include updating information in systems of record, sending notifications to stakeholders, or performing post-decision activities.

Flow Execution Process

The Flow execution process in a No Code Flow involves the following steps. A graphical representation of the process follows the steps.

  1. The flow initiates with an event, such as “Person Mover.”

  2. The event is added to the Event Inbox.

  3. The applicable policies determine the flows that need to be run. These flows are then added to the Flow Inbox.

  4. Once in the Flow Inbox, each flow awaits processing.

  5. Upon processing, each flow creates a Business Request. This Request consists of multiple Business Request Items, which are individual tasks to be performed.

  6. Each Business Request Item represents an action to be performed. This could range from adding the resource to a group to disabling the resource.

  7. The sequence and timing of the Business Request Items are managed through the Flow Definition.

  8. Items requiring human approval are sent for approval.

  9. Upon human or system automated approval, each Business Request Item is sent to the Business Request Fulfillment engine, which executes the tasks, fulfilling the requests.

Insert excerpt
IL:External Stylesheet
IL:External Stylesheet
nopaneltrue

...

Insert excerpt
IL:External Stylesheet
IL:External Stylesheet
nopaneltrue

...