Skip to main content

Requests app

The Requests app allows users to view or manage requests based on their role and access controls.

The Requests app is accessible via the Requests link to:

  • Users with accounts when they have the ”Requests” user access rule (all self-service users by default)

  • Product administrators who have the ”Manage reports” user access rule. Users with this right can view requests they have submitted via reports.

  • Help desk users with the ”View workflow requests” user access rule. These users can view other users’ authorization requests.

  • Workflow managers with the ”Manage workflow requests” rule. These users can manage other users’ authorization requests.

  • Delegation managers with the ”Delegate workflow requests” user access rule. These users can delegate other users’ authorization requests.

To configure options that apply to the Requests app:

  1. Click Manage the system > Modules > Requests.

  2. Configure the options in Table 1, “Modules > Requests options as required.

  3. If required, configure event options, listed in Table 2, “Requests app events that launch interface programs.

  4. Click Update to submit the changes.

The options marked with Star in Table 1, “Modules > Requests options are also configurable from the Workflow > Options > General page. Changes you make here will also update that page. All other settings apply only to the Requests app.

Table 1. Modules > Requests options

Option

Description

Star IDP APPROVE SINGLE RESOURCE

If enabled, authorizers can approve or deny requested resources individually.

When enabled, an approved operation is immediately actioned, without waiting for the entire request to be approved; for example, where a request is submitted to add a user to three groups, as soon as group owner one approves his part, the user gets added to group one and that state is reflected on the authorization status page.

Note: This setting is temporarily disabled if the request is for a group set or account set access. This is to prevent users from gaining access to deny requests of this type if a single resource is approved.

IDP DISABLE ABSTAIN

Set to "Disabled" to remove the option for users to abstain from a request.

When authorizers use the UI, the Abstain button is now longer available. When using the API, attempting to call the idapi function WFAbstain results in the following error:

Failed: 2: 'Users can not abstain from the request.'

IDP DISABLE USER SEARCH

Remove advanced search and listing capabilities for existing users who are authorizers. When this option is enabled Bravura Security Fabric will only return an exact match.

Star IDP REQUIRES REASON APPROVAL

Authorizers must enter a reason for approving a request.

Star IDP REQUIRES REASON REJECTION

Authorizers must enter a reason for denying a request.

IDP REQUIRES SIGNATURE

Authorizers are required to enter their password for use as their electronic signature when either approving or denying a request.

IDP UPDATE ATTRIBUTES ENABLED

Allow or disallow requesters, recipients and authorizers to edit requests after submission.

IDS DISABLE USER SEARCH

Remove advanced search and listing capabilities for existing users who are requesters or recipients. When this option is enabled Bravura Security Fabric will only return an exact match.

IDV DISABLE USER SEARCH

Remove advanced search and listing capabilities for existing users who are implementers. When this option is enabled Bravura Security Fabric will only return an exact match.

IDV REQUIRES REASON COMPLETED

Implementers must enter a reason for marking a task as completed.

IDV REQUIRES REASON COULD NOT COMPLETE

Implementers must enter a reason for being unable to complete a task.

IDV REQUIRES REASON DECLINE

Implementers must enter a reason for declining a task.