Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

ASUG - Workflow Approval: Anytime, Anywhere

528 views

Published on

ASUG Webinar Feb 10 2014

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

ASUG - Workflow Approval: Anytime, Anywhere

  1. 1. Introduction @grahamrobbo Photo by Martin Gillet © Yelcho Systems Consulting 2014. All rights reserved. / Page 2
  2. 2. Agenda Workflow Approval – what a mess! A different perspective Let’s see it in action How does it work? What about security? Questions © Yelcho Systems Consulting 2014. All rights reserved. / Page 3
  3. 3. Workflow Approval – what a mess! © Yelcho Systems Consulting 2014. All rights reserved. / Page 4
  4. 4. Out of the box © Yelcho Systems Consulting 2014. All rights reserved. / Page 5
  5. 5. SBWP See the objects being worked on See additional attachments or text © Yelcho Systems Consulting 2014. All rights reserved. / Page 6
  6. 6. Business Document © Yelcho Systems Consulting 2014. All rights reserved. / Page 7
  7. 7. Universal Worklist © Yelcho Systems Consulting 2014. All rights reserved. / Page 8
  8. 8. NW BPM Inbox © Yelcho Systems Consulting 2014. All rights reserved. / Page 9
  9. 9. Notification Email © Yelcho Systems Consulting 2014. All rights reserved. / Page 10
  10. 10. Fiori Wave 1 25 Apps 13 Workflow Apps © Yelcho Systems Consulting 2014. All rights reserved. / Page 11
  11. 11. 2-Cliks – A Different Perspective © Yelcho Systems Consulting 2014. All rights reserved. / Page 12
  12. 12. Overview F © Yelcho Systems Consulting 2014. All rights reserved. / Page 13
  13. 13. Let’s see it in action © Yelcho Systems Consulting 2014. All rights reserved. / Page 14
  14. 14. Any Email Client © Yelcho Systems Consulting 2014. All rights reserved. / Page 15
  15. 15. Any Mobile Client © Yelcho Systems Consulting 2014. All rights reserved. / Page 16
  16. 16. © Yelcho Systems Consulting 2014. All rights reserved. / Page 18
  17. 17. Security Uses same encrypted channel as SAP Support and Consulting – SAPRouter Dedicated “system” account RFC user © Yelcho Systems Consulting 2014. All rights reserved. / Page 19
  18. 18. Security Each work item & decision for each agent is assigned a unique key Inbound email processing checks   Key is valid  © Yelcho Systems Consulting 2014. All rights reserved. / Page 20 Receiver address is correct Sender address is correct
  19. 19. Security Special function group that contains proxy function modules for Workflow API’s Can replace any proxy function with your own for email customization and other enhancements such as…  Opt-in/out  Non-decision tasks  Extend beyond enterprise Support for Substitutes © Yelcho Systems Consulting 2014. All rights reserved. / Page 21
  20. 20. Role of Proxy Function Modules © Yelcho Systems Consulting 2014. All rights reserved. / Page 23
  21. 21. Role of Proxy Function Modules © Yelcho Systems Consulting 2014. All rights reserved. / Page 24
  22. 22. Error Handling/Reporting Application Status Email connectivity Work Item Status Work Item Logs Resend Work Items © Yelcho Systems Consulting 2014. All rights reserved. / Page 25
  23. 23. “To the cloud…” Rapid deployment Transaction based pricing No lock-in, no contracts, no minimums Less than 20c per workflow decision No additional infrastructure required Emails completely tailored for each organisation You can have total control of email contents No corporate data stored except key attributes © Yelcho Systems Consulting 2014. All rights reserved. / Page 26
  24. 24. More Information http://www.yelcho.com.au/2-cliks Send email to… info@2-cliks.com samples@2-cliks.com © Yelcho Systems Consulting 2014. All rights reserved. / Page 27
  25. 25. Thank you. Questions? © Yelcho Systems Consulting 2014. All rights reserved. / Page 28
  26. 26. Thank you @grahamrobbo © Yelcho Systems Consulting 2014. All rights reserved. / Page 29

×