- Release notes
- Getting started
- Installation
- Hardware and software requirements
- Server installation
- Updating the license
- Deploy a release
- End user administration
- Cache generation
- Environments
- Deploying the UiPath Process Mining Profiler
- Deploying a Connector (.mvp)
- Updating UiPath Process Mining
- Updating a customized version of an App or Discovery Accelerator
- Installing a training environment
- Configuration
- Integrations
- Authentication
- Working with Apps and Discovery Accelerators
- AppOne menus and dashboards
- AppOne setup
- TemplateOne 1.0.0 menus and dashboards
- TemplateOne 1.0.0 setup
- TemplateOne menus and dashboards
- TemplateOne 2021.4.0 setup
- Purchase to Pay Discovery Accelerator menus and dashboards
- Purchase to Pay Discovery Accelerator Setup
- Order to Cash Discovery Accelerator menus and dashboards
- Order to Cash Discovery Accelerator Setup
- Basic Connector for AppOne
- SAP Connectors
- Introduction to SAP Connector
- SAP input
- Checking the data in the SAP Connector
- Adding process specific tags to the SAP Connector for AppOne
- Adding process specific Due dates to the SAP Connector for AppOne
- Adding automation estimates to the SAP Connector for AppOne
- Adding attributes to the SAP Connector for AppOne
- Adding activities to the SAP Connector for AppOne
- Adding entities to the SAP Connector for AppOne
- SAP Order to Cash Connector for AppOne
- SAP Purchase to Pay Connector for AppOne
- SAP Connector for Purchase to Pay Discovery Accelerator
- SAP Connector for Order-to-Cash Discovery Accelerator
- Superadmin
- Dashboards and charts
- Tables and table items
- Application integrity
- How to ....
- Working with SQL connectors
- Introduction to SQL connectors
- Setting up a SQL connector
- CData Sync extractions
- Running a SQL connector
- Editing transformations
- Releasing a SQL Connector
- Scheduling data extraction
- Structure of transformations
- Using SQL connectors for released apps
- Generating a cache with scripts
- Setting up a local test environment
- Separate development and production environments
- Useful resources
Process Mining
End user administration
If this is the first release that has been activated, the next step should be to create users and configure their access rights. Normally, this can be done by a user administrator, but, initially, this must be done by a Superadmin user, because the default end user account has no password set for security reasons.
A Superadmin user can configure end user access rights by impersonating an end user administrator.
Follow these steps to impersonate an administrator.
Step |
Action |
---|---|
1 |
Go to the Superadmin Releases tab. |
2 |
Click on the menu icon in the top-left and select Open end-user administration…. |
3 |
Click on OPEN. |
The Users tab is displayed. See illustration below.
The user administrator has the possibility of creating a new end user account. A login name, email address and name can be set.
Follow these steps to add a new end user.
1 |
Click on NEW USER. |
2 |
Enter a login user name in the Login Name field. |
3 |
Enter a new user name in the Email address field. |
4 |
Enter a new user name in the Name field. |
5 |
Click on NEW USER. |
The new user has now been added to the list of end users, and a random password will be generated. The password will be shown to the administrator in a popup. The administrator can send the password by e-mail to the user.
If there is an SMTP server configured in the Server settings, a Send invitation e-mail check box will be present in the New user dialog. If this check box is left checked, you can confirm to send an e-mail by clicking on INVITE USER. An email with the password will automatically be sent to the user’s email. See illustration below.
In UiPath Process Mining it is possible to use external authentication to enable end users to log in using their Microsoft AD credentials. See: Adding End-user AD Groups.
Existing end user accounts can be deleted. Deleted users will no longer be able to log in.
Follow these steps to remove a new end user.
Step |
Action |
---|---|
1 |
Click on the Delete button in the column of the user you want to delete. |
2 |
Click on YES. |
The deleted user is no longer in the list.
The password for an individual user can be changed.
A password must:
- Be at least 8 characters long.
- Contain both an uppercase and a lowercase letter and a number or special character.
Follow these steps to change a password.
Step |
Action |
---|---|
1 |
Click on the Change button in the column of the user you want to change the password of. |
2 |
Enter a new password in the New password field. |
3 |
Enter the same password in the Confirm password field. |
4 |
Click on CHANGE PASSWORD. |
The password of the end user is now changed to the new password. To improve security, when logging in using this password, the end user is forced to enter a new password.
If there is an SMTP server is configured in the Server settings, an end user's password can be reset automatically. When the user clicks on the Forgot your password? link in the Login dialog the user can enter an e-mail address to which an e-mail can be sent that contains a link to reset the password. See illustration below.
End user accounts can be enabled and disabled. When an end user is disabled, the user will no longer be able to login.
Follow this step to enable an account.
Step |
Action |
---|---|
1 |
Click on the check box in the Active column of the user. |
This is a toggle check box. This means the user can login if the check box is checked or is restricted from logging in if it is unchecked.
End user accounts can be assigned admin rights. Doing so gives them access to the user administration page.
Follow these steps to assign admin rights.
Step |
Action |
---|---|
1 |
Click on the check box in the Admin column of the user. |
This is a toggle check box. This means the user has admin rights if the check box is checked, or is no longer an admin, if it is unchecked.
End user accounts can be limited from accessing certain apps. Only the apps to which users have access can be viewed by users. It is possible to assign an end user rights to view a specific app.
Follow these steps to assign end user rights to a specific app.
Step |
Action |
---|---|
1 |
Go to the Applications tab in End-user administration. |
2 |
Click on the check box in the App name column of the user. |
This is a toggle check box. This means the user can view this specific app if the check box is checked, or that access is revoked if the check box is no longer checked.
See: Modules.