SlideShare a Scribd company logo
1 of 28
POP108 Workflow Approval Anywhere - Anytime

Graham Robinson
Yelcho Systems Consulting
Introduction

@grahamrobbo
Photo by Martin Gillet

© Yelcho Systems Consulting 2013. All rights reserved. / Page 2
Agenda
Workflow Approval – what a mess!
A different perspective
Let’s see it in action
How does it work?
What about security?
Questions

© Yelcho Systems Consulting 2013. All rights reserved. / Page 3
Workflow Approval – what a mess!

© Yelcho Systems Consulting 2013. All rights reserved. / Page 4
Out of the box

© Yelcho Systems Consulting 2013. All rights reserved. / Page 5
SBWP

See the
objects being
worked on

See additional
attachments
or text

© Yelcho Systems Consulting 2013. All rights reserved. / Page 6
Business Document

© Yelcho Systems Consulting 2013. All rights reserved. / Page 7
Universal Worklist

© Yelcho Systems Consulting 2013. All rights reserved. / Page 8
NW BPM Inbox

© Yelcho Systems Consulting 2013. All rights reserved. / Page 9
Notification Email

© Yelcho Systems Consulting 2013. All rights reserved. / Page 10
Fiori Wave 1
25 Apps
13 workflow Apps

© Yelcho Systems Consulting 2013. All rights reserved. / Page 11
2-Cliks – A Different Perspective

© Yelcho Systems Consulting 2013. All rights reserved. / Page 12
Overview

F
© Yelcho Systems Consulting 2013. All rights reserved. / Page 13
Let’s see it in action

© Yelcho Systems Consulting 2013. All rights reserved. / Page 14
Any Email Client

© Yelcho Systems Consulting 2013. All rights reserved. / Page 15
Any Mobile Client

© Yelcho Systems Consulting 2013. All rights reserved. / Page 16
© Yelcho Systems Consulting 2013. All rights reserved. / Page 18
© Yelcho Systems Consulting 2013. All rights reserved. / Page 19
Security
Uses same encrypted channel as SAP Support and
Consulting – SAPRouter

Dedicated “system” account RFC user

© Yelcho Systems Consulting 2013. All rights reserved. / Page 20
Security
Each work item & decision for each agent is
assigned a unique key

Inbound email processing checks



Receiver address is correct



Key is correct



© Yelcho Systems Consulting 2013. All rights reserved. / Page 21

Sender address is correct

Subject line contains action (optional)
Security
Special function group that contains proxy
function modules for Workflow API’s
Can replace any proxy function with your own
for email customization and other
enhancements such as…


Opt-in/out



Non-decision tasks



Extend beyond enterprise

Support for Substitutes

© Yelcho Systems Consulting 2013. All rights reserved. / Page 22
Role of Proxy Function Modules

© Yelcho Systems Consulting 2013. All rights reserved. / Page 24
Role of Proxy Function Modules

© Yelcho Systems Consulting 2013. All rights reserved. / Page 25
Role of Proxy Function Modules

© Yelcho Systems Consulting 2013. All rights reserved. / Page 26
Error Handling/Reporting
Application Status
Email connectivity
Work Item Status
Work Item Logs
Resend Work Items

© Yelcho Systems Consulting 2013. All rights reserved. / Page 27
“To the cloud…”
Rapid deployment
Transaction based pricing
No lock-in, no contracts, no minimums
Less than 20c per workflow decision
No additional infrastructure required
Emails completely tailored for each organisation

You can have total control of email contents
No corporate data stored except key attributes
© Yelcho Systems Consulting 2013. All rights reserved. / Page 28
More Information
http://www.yelcho.com.au/2-cliks

Send email to…
wflow.info@2-cliks.com

wflow.sample@2-cliks.com

© Yelcho Systems Consulting 2013. All rights reserved. / Page 29
Thank you. Questions?

© Yelcho Systems Consulting 2013. All rights reserved. / Page 30

More Related Content

Viewers also liked

Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009
Tiina Sarisalmi
 
Turkey School Presentation
Turkey School PresentationTurkey School Presentation
Turkey School Presentation
Tiina Sarisalmi
 
Orivesi - Down the Mainstreet
Orivesi - Down the MainstreetOrivesi - Down the Mainstreet
Orivesi - Down the Mainstreet
Tiina Sarisalmi
 
Askartelukerho kevät 2011
Askartelukerho kevät 2011Askartelukerho kevät 2011
Askartelukerho kevät 2011
Tiina Sarisalmi
 
The Boardwalk Difference v6.15
The Boardwalk Difference v6.15The Boardwalk Difference v6.15
The Boardwalk Difference v6.15
Scott Sadler
 
Verkostojen rooli koulujen kansainvälistämisessä
Verkostojen rooli koulujen kansainvälistämisessäVerkostojen rooli koulujen kansainvälistämisessä
Verkostojen rooli koulujen kansainvälistämisessä
Tiina Sarisalmi
 

Viewers also liked (20)

Rok 09
Rok 09Rok 09
Rok 09
 
Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009Everyday Life Questionnaire Results 2009
Everyday Life Questionnaire Results 2009
 
KMUTNB - Internet Programming 5/7
KMUTNB - Internet Programming 5/7KMUTNB - Internet Programming 5/7
KMUTNB - Internet Programming 5/7
 
Unleash the 95%
Unleash the 95%Unleash the 95%
Unleash the 95%
 
Turkey School Presentation
Turkey School PresentationTurkey School Presentation
Turkey School Presentation
 
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsThe Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure Laws
 
Orivesi - Down the Mainstreet
Orivesi - Down the MainstreetOrivesi - Down the Mainstreet
Orivesi - Down the Mainstreet
 
NCrafts.IO 2015 - Future of User eXperiences
NCrafts.IO 2015 - Future of User eXperiencesNCrafts.IO 2015 - Future of User eXperiences
NCrafts.IO 2015 - Future of User eXperiences
 
Exercici11.3
Exercici11.3Exercici11.3
Exercici11.3
 
Welcome to Dywity
Welcome to DywityWelcome to Dywity
Welcome to Dywity
 
Case Note Record
Case Note RecordCase Note Record
Case Note Record
 
Askartelukerho kevät 2011
Askartelukerho kevät 2011Askartelukerho kevät 2011
Askartelukerho kevät 2011
 
Voimaa verkostoitumalla
Voimaa verkostoitumallaVoimaa verkostoitumalla
Voimaa verkostoitumalla
 
The Boardwalk Difference v6.15
The Boardwalk Difference v6.15The Boardwalk Difference v6.15
The Boardwalk Difference v6.15
 
From student to professional – my experiences - 2010
From student to professional – my experiences - 2010From student to professional – my experiences - 2010
From student to professional – my experiences - 2010
 
Verkostojen rooli koulujen kansainvälistämisessä
Verkostojen rooli koulujen kansainvälistämisessäVerkostojen rooli koulujen kansainvälistämisessä
Verkostojen rooli koulujen kansainvälistämisessä
 
Idea
IdeaIdea
Idea
 
Twelve Gods of Olympus
Twelve Gods of OlympusTwelve Gods of Olympus
Twelve Gods of Olympus
 
Ibiza Charter Boat: Sunseeker Predator 68 | THE DOER IBIZA. Bookings: + 34 63...
Ibiza Charter Boat: Sunseeker Predator 68 | THE DOER IBIZA. Bookings: + 34 63...Ibiza Charter Boat: Sunseeker Predator 68 | THE DOER IBIZA. Bookings: + 34 63...
Ibiza Charter Boat: Sunseeker Predator 68 | THE DOER IBIZA. Bookings: + 34 63...
 
East Side Rising
East Side RisingEast Side Rising
East Side Rising
 

Similar to Workflow Approval Anywhere, Anytime

So we've done APM. Now what?
 So we've done APM. Now what? So we've done APM. Now what?
So we've done APM. Now what?
SL Corporation
 

Similar to Workflow Approval Anywhere, Anytime (20)

Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
 
System Center 2012 R2 - Enterprise Automation
System Center 2012 R2 - Enterprise AutomationSystem Center 2012 R2 - Enterprise Automation
System Center 2012 R2 - Enterprise Automation
 
System Center 2012 Orchestrator R2 - Enterprise IT Automation
System Center 2012 Orchestrator R2 - Enterprise IT AutomationSystem Center 2012 Orchestrator R2 - Enterprise IT Automation
System Center 2012 Orchestrator R2 - Enterprise IT Automation
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps Era
 
ARAS - change management
ARAS - change managementARAS - change management
ARAS - change management
 
2011 05-11 IIBA Vendor Webinar- Business Process Modeling
2011 05-11 IIBA Vendor Webinar- Business Process Modeling2011 05-11 IIBA Vendor Webinar- Business Process Modeling
2011 05-11 IIBA Vendor Webinar- Business Process Modeling
 
Stay Two Steps Ahead of Your Auditor
 Stay Two Steps Ahead of Your Auditor Stay Two Steps Ahead of Your Auditor
Stay Two Steps Ahead of Your Auditor
 
Using Change Management in Primavera Contract Management
Using Change Management in Primavera Contract ManagementUsing Change Management in Primavera Contract Management
Using Change Management in Primavera Contract Management
 
Mobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to AutomateMobile Testing: What—and What Not—to Automate
Mobile Testing: What—and What Not—to Automate
 
Micro Front Ends for Micro Services using Oracle JET
Micro Front Ends for Micro Services using Oracle JETMicro Front Ends for Micro Services using Oracle JET
Micro Front Ends for Micro Services using Oracle JET
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!
 
20101007 how smart use cases drive web development
20101007   how smart use cases drive web development20101007   how smart use cases drive web development
20101007 how smart use cases drive web development
 
SharePoint Site Redesign : Information Architecture and User-centered Design ...
SharePoint Site Redesign : Information Architecture and User-centered Design ...SharePoint Site Redesign : Information Architecture and User-centered Design ...
SharePoint Site Redesign : Information Architecture and User-centered Design ...
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
 
So we've done APM. Now what?
 So we've done APM. Now what? So we've done APM. Now what?
So we've done APM. Now what?
 
SSE SE Practices Introduction
SSE SE Practices IntroductionSSE SE Practices Introduction
SSE SE Practices Introduction
 
Puvvati_Resume
Puvvati_ResumePuvvati_Resume
Puvvati_Resume
 
WebSphere Portlet Factory: Davalen’s Practical Advice from the Field
WebSphere Portlet Factory: Davalen’s Practical Advice from the Field WebSphere Portlet Factory: Davalen’s Practical Advice from the Field
WebSphere Portlet Factory: Davalen’s Practical Advice from the Field
 
SystemQuest Ltd - Simple Maintenance Systems
SystemQuest Ltd - Simple Maintenance SystemsSystemQuest Ltd - Simple Maintenance Systems
SystemQuest Ltd - Simple Maintenance Systems
 
Automate Yourself Out of a Job: Safely Delegate the Management of your Azure...
Automate Yourself Out of a Job:  Safely Delegate the Management of your Azure...Automate Yourself Out of a Job:  Safely Delegate the Management of your Azure...
Automate Yourself Out of a Job: Safely Delegate the Management of your Azure...
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 

Workflow Approval Anywhere, Anytime

  • 1. POP108 Workflow Approval Anywhere - Anytime Graham Robinson Yelcho Systems Consulting
  • 2. Introduction @grahamrobbo Photo by Martin Gillet © Yelcho Systems Consulting 2013. All rights reserved. / Page 2
  • 3. Agenda Workflow Approval – what a mess! A different perspective Let’s see it in action How does it work? What about security? Questions © Yelcho Systems Consulting 2013. All rights reserved. / Page 3
  • 4. Workflow Approval – what a mess! © Yelcho Systems Consulting 2013. All rights reserved. / Page 4
  • 5. Out of the box © Yelcho Systems Consulting 2013. All rights reserved. / Page 5
  • 6. SBWP See the objects being worked on See additional attachments or text © Yelcho Systems Consulting 2013. All rights reserved. / Page 6
  • 7. Business Document © Yelcho Systems Consulting 2013. All rights reserved. / Page 7
  • 8. Universal Worklist © Yelcho Systems Consulting 2013. All rights reserved. / Page 8
  • 9. NW BPM Inbox © Yelcho Systems Consulting 2013. All rights reserved. / Page 9
  • 10. Notification Email © Yelcho Systems Consulting 2013. All rights reserved. / Page 10
  • 11. Fiori Wave 1 25 Apps 13 workflow Apps © Yelcho Systems Consulting 2013. All rights reserved. / Page 11
  • 12. 2-Cliks – A Different Perspective © Yelcho Systems Consulting 2013. All rights reserved. / Page 12
  • 13. Overview F © Yelcho Systems Consulting 2013. All rights reserved. / Page 13
  • 14. Let’s see it in action © Yelcho Systems Consulting 2013. All rights reserved. / Page 14
  • 15. Any Email Client © Yelcho Systems Consulting 2013. All rights reserved. / Page 15
  • 16. Any Mobile Client © Yelcho Systems Consulting 2013. All rights reserved. / Page 16
  • 17. © Yelcho Systems Consulting 2013. All rights reserved. / Page 18
  • 18. © Yelcho Systems Consulting 2013. All rights reserved. / Page 19
  • 19. Security Uses same encrypted channel as SAP Support and Consulting – SAPRouter Dedicated “system” account RFC user © Yelcho Systems Consulting 2013. All rights reserved. / Page 20
  • 20. Security Each work item & decision for each agent is assigned a unique key Inbound email processing checks   Receiver address is correct  Key is correct  © Yelcho Systems Consulting 2013. All rights reserved. / Page 21 Sender address is correct Subject line contains action (optional)
  • 21. Security Special function group that contains proxy function modules for Workflow API’s Can replace any proxy function with your own for email customization and other enhancements such as…  Opt-in/out  Non-decision tasks  Extend beyond enterprise Support for Substitutes © Yelcho Systems Consulting 2013. All rights reserved. / Page 22
  • 22. Role of Proxy Function Modules © Yelcho Systems Consulting 2013. All rights reserved. / Page 24
  • 23. Role of Proxy Function Modules © Yelcho Systems Consulting 2013. All rights reserved. / Page 25
  • 24. Role of Proxy Function Modules © Yelcho Systems Consulting 2013. All rights reserved. / Page 26
  • 25. Error Handling/Reporting Application Status Email connectivity Work Item Status Work Item Logs Resend Work Items © Yelcho Systems Consulting 2013. All rights reserved. / Page 27
  • 26. “To the cloud…” Rapid deployment Transaction based pricing No lock-in, no contracts, no minimums Less than 20c per workflow decision No additional infrastructure required Emails completely tailored for each organisation You can have total control of email contents No corporate data stored except key attributes © Yelcho Systems Consulting 2013. All rights reserved. / Page 28
  • 27. More Information http://www.yelcho.com.au/2-cliks Send email to… wflow.info@2-cliks.com wflow.sample@2-cliks.com © Yelcho Systems Consulting 2013. All rights reserved. / Page 29
  • 28. Thank you. Questions? © Yelcho Systems Consulting 2013. All rights reserved. / Page 30