Process Mining
2021.10
false
Banner background image
Process Mining
Last updated Apr 2, 2024

FAQs

General

Application Code

Q: Where can I find the Application code?

A: You can find the Application code (sometimes also called Module code), in a released app or your development environment.

  1. Follow these steps to find the Application code in a released app.

    Step

    Action

    1

    Open the released app in the web browser.

    2

    Locate the URL in the address bar.

    The Application code is the part of the after the module=option. See illustration below for an example.


    In the above example, the Application code is ProcessMining, while the module name is Process Mining. The module name is not visible in the link, however you can find this in the Superadmin The Released Data Tab.
  2. Follow these steps to find the Application code in your development environment.

    In the Modules dialog, you can add new modules. You can also change the name and description of existing modules.

    Follow these steps to display the Modules dialog.

    Step

    Action

    1

    Click on the Home icon in your app development environment.

    2

    Select Modules....

The Modules dialog is displayed. See illustration below.



Application File Types

Q: What is the difference between .mvp and .mvtag files?

A: Below is a description of the different file types.

File type

Description

.mvp

Editable file format for connectors, apps and discovery accelerators.

.mvp files can be edited in a Process Mining development environment to create new (customized) versions of the connector, app, or discovery accelerator.

.mvtag

File format used for a released version of a connector, app, or discovery accelerator. .mvtag files are created when releasing a new version of the connector, app, or discovery accelerator and cannot be edited.

Data Load

Live Data

Q: Does the platform support live data?

A: UiPath Process Mining can read in data at the moment the application is opened by an end-user via live tables. Also, data can be read in when an action is triggered. However, there are several points to consider:

  • With real-time data loading, there are many dependencies which may impact the performance for the end user (opening of the dashboards, but also the calculation for dashboards) since the data is not pre-cached.
  • There will be a load on the production system each time the user opens the application.
  • End users may see different results dependent on what time they ran the report.

To avoid these issues, it is possible to take a near-time approach, which could mean an interval of once per hour. However, we see that customer primarily choose for a daily interval.

We only recommend using live data when this is absolutely necessary.

Any live data table disables the platform to use caching in this table and in any table that is dependent on this one. This will significantly impact the performance of the application.

Also, live data queries will be run on the database when an end user logs in to the application. Depending on the query and the number of end users, this might put a severe load on the database.

Incremental Data Loading

Q: Does the platform support incremental data loading?

A: No, UiPath Process Mining does not support incremental data load. See Data Loading: Incremental load

Data Refresh Interval

Q: How often does UiPath Process Mining refresh the data?

A: This depends on the business needs and how often new data becomes available in the source system. The trade-off is between the desired insights and the load on the production system.

For some use cases data is refreshed during the night, to minimize the impact on the production system and to ensure all users see the same results during the day. However, some organizations opt for a longer time frame, because they want the data to remain constant for a month to do a thorough analysis.

File Size Limits

Q: Is there a size limit for datasource files?

A: The maximum size of a file in a workspace is 10MB. Larger file sizes are only supported outside the scope of the workspace, and thus not committed to Git. In the Advanced -> Table Options, the Table Scope is set to Server. You can use the ServerScopePath setting in the Server Settings to specify the relative path to the datasource file.

Data Archiving

Q: Does UiPath Process Mining support data archiving?

A: With our release management system, we can always roll back to previous versions. The number of older versions to retain can be configured by your organization. This may be needed if any data issues occur. However, UiPath Process Mining should not be the primary data storage, used for data archiving. For long-term retention of data you should use other systems.

Input File Types

Q: What types of input files are supported?

A: The UiPath Process Mining platform supports text files such as .txt, .csv, .tsv files for which the delimiter and quotes can be selected. ASCII text files are supported in Latin-1 (ISO-8859-1) encoding, and UTF-8 files are supported with and without BOM.

The UiPath Process Mining platform also supports Excel files, both .XLSX and .XLS files can be imported. The sheet or range within the file can be specified. For sheets, an autodetect is performed for the actual data range, of the auto-detect fails the range needs to be specified in Excel and then used. Unicode within Excel is fully supported.

XES Input Files

Q: Does the platform support XES input files?

A: Yes, UiPath Process Mining is an officially certified XES supporting platform. If XES is required, a data script that can be used to read XES files is available.

Security

Protect Imported Data

Q: How can we ensure that the imported data is protected against unauthorized manipulation?

A: The UiPath Process Mining platform is tested on security regularly (with tools like Owasp Zap, OpenVAS, etc). To increase security, we always recommend using VPN-tunnels to limit access to the platform. Risk analyses are performed regularly to ensure security is always up-to-date, we use the OWASP Testing Guide 4. Outside of the UiPath Process Mining platform, security also depends on how secure the server itself is. Security of the server itself is the responsibility of the hosting party.

Data Protection

Q: When UiPath Process Mining processes the data, is the data stored in a secured storage or encrypted to protect it against unauthorized knowledge?

A: After data is processed by UiPath Process Mining, the data is stored in a proprietary file format. These files are encrypted and can only be read by UiPath Process Mining software. In the platform itself, access to certain data can be restricted on a per user basis, i.e. only let users see data they are allowed to see.

Note: This only applies to end-users. Developers have unrestricted access to the data.

Log File Protection

Q: How are the log files protected against unauthorized modification or deletion?

(Is a sufficiently large buffer provided for the log data and is it possible to configure a warning message if the storage capacity is running low / out?)

A: UiPath Process Mining offers no protection against modifying files on disk. If someone has access to the server itself, they can modify the log files on disk. Monitoring of the server is the responsibility of the hosting party.

Encryption Algorithm

Q: Which specific encryption algorithm(s) and strength is leveraged to encrypt data at rest?

A: The UiPath Process Mining platform does not encrypt data out of the box. Encryption of the data disk is the responsibility of the hosting party. It is recommended to use BitLocker.

Password Storage

Q: How are user passwords stored?

A: The password field is encrypted using a hash function. PBKDF2 with HMAC-SHA512 as pseudorandom function and 10000 iterations, together with a salt is used.

A salt is used to extend the input of the hash function. The salt consists of a fixed part (application-specific) and a 128bit randomly generated salt which is stored in the database. The random seed is generated on initializing the application in a session.

Since a cryptographic hash function is used, an encryption key is not required. No initialization vector is used in the hash function.

Verifying a Signed Build

Q: How can I verify that the build file is signed by UiPath?

A: SignTool can be used to verify that the build file is signed by UiPath.

Follow these steps to verify the downloaded <build>.exe file, for example UiPathProcessMining-21.4.exe using SignTool.

Step

Action

1

Download and install SignTool.

2

Open a Command Prompt.

3

Run the following command:

SignTool verify /pa /v <path to build>.

4

Check the output. Make sure that:

  • there are no errors,
  • the signing certificate chain contains UiPath.

See the illustration below for an example output.



For more information refer to the Microsoft documentation on SignTool.

User Access

Named User Accounts

Q: Is it possible to combine AD users with named user accounts?

A: It is possible to add named user accounts next to using LDAP. These user accounts can also be restricted to certain IP addresses. It is also possible to enable Two-Factor Authentication (TOTP) for these accounts.

LDAP Port Number

Q: Is it possible to define a different port number for LDAP?

A: By default, the platform uses the default LDAP port number. It is possible to use a different port number. You can specify the port number, for example port 123, in the URL as follows:

ldap": {
    "url":             "ldap://PROCESSMININGTEST.pmtest.local:123",
    "base":            "DC=pmtest,DC=local",
    "bindDN":          "PMTEST\\testuser",
    "bindCredentials": "Passw0rd!",
}ldap": {
    "url":             "ldap://PROCESSMININGTEST.pmtest.local:123",
    "base":            "DC=pmtest,DC=local",
    "bindDN":          "PMTEST\\testuser",
    "bindCredentials": "Passw0rd!",
}

Brute Force Protection

Q: Does UiPath Process Mining provide a brute force protection?

A: Yes, UiPath Process Mining limits the number of login attempts.

End-user Access

Q: How do I make the UiPath Process Mining platform available to users?

A: Making the platform available to the users over the internet is done by making the site in IIS available. Consult your IT department for assistance with this. The following steps need to be performed:

  1. Create a (sub)domain name for the site.
  2. Obtain an SSL certificate for that domain name and install it on the UiPath Process Mining server. (Refer to the documentation of the supplier of your SSL certificate for information on how to request and install an SSL certificate for your specific IIS version.)

    Note: The IT department may already have wildcard SSL certificates for your company domain name.
  3. Create an HTTPS binding for the site in IIS. For a detailed description on how to create an SSL binding, visit the official Microsoft documentation.
  4. Make sure your network is configured properly:

    • the domain name points to the UiPath Process Mining server;
    • HTTPS traffic to and from the UiPath Process Mining server is allowed.

Database Connections

Database Connection

Q: How can the database connection be set up?

A: The UiPath Process Mining platform supports database access by ODBC. ODBC is the standardized way of accessing databases on Windows and it consists of two parts:

  1. a suitable driver for the database needs to be installed. The UiPath Process Mining platform is only available in 64-bit and requires a 64-bit ODBC driver.
  2. a DSN (Data Source Name) needs to be setup that contains the information about how to access the database and provides a name the application can use to access the database. The DSN needs to be either a system DSN or created for the user that is used to run the platform.

    Note: JDBC and ODBC are different standards. Most databases have both JDBC and ODBC drives, but the UiPath Process Mining platform only supports ODBC.

ODBC DSN

Q: The ODBC DSN cannot be used from the platform. What should I do?

A Make sure you use a 64-bit ODBC driver and that the DSN is a system DSN or set up for the correct user.

Supported Databases

Q: Which databases are supported?

A: All databases that can be accessed via a 64-bit ODBC driver can be used.

Connector

Recurring Loop

Q: After building my connector the process only has activities that loop with themselves. What does this mean?

A: If this is an unexpected result, you must check the Case ID’s in your input files. It is possible that the Case ID’s are not unique. In this case it is not possible to detect which is the correct Case ID and all activities with non-unique Case ID’s will occur multiple times.

Was this page helpful?

Get The Help You Need
Learning RPA - Automation Courses
UiPath Community Forum
Uipath Logo White
Trust and Security
© 2005-2024 UiPath. All rights reserved.