Más contenido relacionado
La actualidad más candente (9)
Similar a ASUG - Workflow Approval: Anytime, Anywhere (20)
ASUG - Workflow Approval: Anytime, Anywhere
- 3. Agenda
Workflow Approval – what a mess!
A different perspective
Let’s see it in action
How does it work?
What about security?
Questions
© Yelcho Systems Consulting 2014. All rights reserved. / Page 3
- 4. Workflow Approval – what a mess!
© Yelcho Systems Consulting 2014. All rights reserved. / Page 4
- 5. Out of the box
© Yelcho Systems Consulting 2014. All rights reserved. / Page 5
- 9. NW BPM Inbox
© Yelcho Systems Consulting 2014. All rights reserved. / Page 9
- 11. Fiori Wave 1
25 Apps
13 Workflow Apps
© Yelcho Systems Consulting 2014. All rights reserved. / Page 11
- 12. 2-Cliks – A Different Perspective
© Yelcho Systems Consulting 2014. All rights reserved. / Page 12
- 14. Let’s see it in action
© Yelcho Systems Consulting 2014. All rights reserved. / Page 14
- 18. Security
Uses same encrypted channel as SAP Support and
Consulting – SAPRouter
Dedicated “system” account RFC user
© Yelcho Systems Consulting 2014. All rights reserved. / Page 19
- 19. Security
Each work item & decision for each agent is assigned a unique key
Inbound email processing checks
Key is valid
© Yelcho Systems Consulting 2014. All rights reserved. / Page 20
Receiver address is correct
Sender address is correct
- 20. Security
Special function group that contains proxy
function modules for Workflow API’s
Can replace any proxy function with your own
for email customization and other
enhancements such as…
Opt-in/out
Non-decision tasks
Extend beyond enterprise
Support for Substitutes
© Yelcho Systems Consulting 2014. All rights reserved. / Page 21
- 21. Role of Proxy Function Modules
© Yelcho Systems Consulting 2014. All rights reserved. / Page 23
- 22. Role of Proxy Function Modules
© Yelcho Systems Consulting 2014. All rights reserved. / Page 24
- 24. “To the cloud…”
Rapid deployment
Transaction based pricing
No lock-in, no contracts, no minimums
Less than 20c per workflow decision
No additional infrastructure required
Emails completely tailored for each organisation
You can have total control of email contents
No corporate data stored except key attributes
© Yelcho Systems Consulting 2014. All rights reserved. / Page 26