Skip to main content

Requests app

The Requests app allows users to view or manage requests based on their role and access controls.

The Requests app is accessible via the Requests link to:

  • Users with accounts when they have the ”Requests” user access rule (all self-service users by default)

  • Product administrators who have the ”Manage reports” user access rule. Users with this right can view requests they have submitted via reports.

  • Help desk users with the ”View workflow requests” user access rule. These users can view other users’ authorization requests.

  • Workflow managers with the ”Manage workflow requests” rule. These users can manage other users’ authorization requests.

  • Delegation managers with the ”Delegate workflow requests” user access rule. These users can delegate other users’ authorization requests.

To configure options that apply to the Requests app:

  1. Click Manage the system > Modules > Requests.

  2. Configure the options in Table 1, “Modules > Requests options as required.

  3. If required, configure event options, listed in Table 2, “Requests app events that launch interface programs.

  4. Click Update to submit the changes.

The options marked with Star in Table 1, “Modules > Requests options are also configurable from the Workflow > Options > General page. Changes you make here will also update that page. All other settings apply only to the Requests app.

Table 1. Modules > Requests options

Option

Description

Star IDP APPROVE SINGLE RESOURCE

If enabled, authorizers can approve or deny requested resources individually.

When enabled, an approved operation is immediately actioned, without waiting for the entire request to be approved; for example, where a request is submitted to add a user to three groups, as soon as group owner one approves his part, the user gets added to group one and that state is reflected on the authorization status page.

Note: This setting is temporarily disabled if the request is for a group set or account set access. This is to prevent users from gaining access to deny requests of this type if a single resource is approved.

IDP DISABLE ABSTAIN

Set to "Disabled" to remove the option for users to abstain from a request.

When authorizers use the UI, the Abstain button is now longer available. When using the API, attempting to call the idapi function WFAbstain results in the following error:

Failed: 2: 'Users can not abstain from the request.'

IDP DISABLE USER SEARCH

Remove advanced search and listing capabilities for existing users who are authorizers. When this option is enabled Bravura Security Fabric will only return an exact match.

Star IDP REQUIRES REASON APPROVAL

Authorizers must enter a reason for approving a request.

Star IDP REQUIRES REASON REJECTION

Authorizers must enter a reason for denying a request.

IDP REQUIRES SIGNATURE

Authorizers are required to enter their password for use as their electronic signature when either approving or denying a request.

IDP UPDATE ATTRIBUTES ENABLED

Allow or disallow requesters, recipients and authorizers to edit requests after submission.

IDS DISABLE USER SEARCH

Remove advanced search and listing capabilities for existing users who are requesters or recipients. When this option is enabled Bravura Security Fabric will only return an exact match.

IDV DISABLE USER SEARCH

Remove advanced search and listing capabilities for existing users who are implementers. When this option is enabled Bravura Security Fabric will only return an exact match.

IDV REQUIRES REASON COMPLETED

Implementers must enter a reason for marking a task as completed.

IDV REQUIRES REASON COULD NOT COMPLETE

Implementers must enter a reason for being unable to complete a task.

IDV REQUIRES REASON DECLINE

Implementers must enter a reason for declining a task.



Disabling advanced search capabilities

Regular users can normally use advanced search capabilities to find existing users on request pages.

By default, if Bravura Security Fabric finds more than one match for the search terms, it displays a list and allows the requester to make a selection.

You can disable this behavior if you want to prevent Bravura Security Fabric from displaying a list of users or accounts, and if you want Bravura Security Fabric to only match on exact search terms.

To disable advanced search capabilities in the Requests app, set the following variables to “Enabled”:

  • IDP DISABLE USER SEARCH for searches on authorizers

  • IDS DISABLE USER SEARCH for searches on requesters or recipients

  • IDV DISABLE USER SEARCH for searches on implementers

See also

Authorization workflow provides more information about configuring the workflow process.