Developing custom claim providers to enable authorization in share point an...AntonioMaio2
Developing Custom Claim Providers to Enable Authorization in SharePoint - Antonio Maio.
With the release of SharePoint 2010, Microsoft introduced the concepts of Claims Based Authentication and Authorization. SharePoint 2013 went a step further making Claims Based Authentication the default method for authenticating users when they login. Claims, and identities in general, are playing a bigger role in the security capabilities of systems like SharePoint, enabling us to solve some new and exciting security challenges. Typically we authorize the content that users have access to using SharePoint permissions, however authentication scenarios can be extended in new and interesting ways by developing a custom component called a Custom Claim Provider. This session will introduce the concepts of Claims Based Authentication and Authorization in SharePoint and provide step by step instructions on how to develop and deploy Custom Claim Providers. The session will also walk through several examples of how custom Claim Providers can enhance SharePoint security and authorization.
Developing social solutions on Microsoft technologies (SP Social and Yammer)SPC Adriatics
Development of the enterprise social solutions, which merge social computing and well known enterprise csolutions is a fairly new development discipline, which gains ever more on importance and traction. It is empirically proven that the traditional data processing gets more efficient and productive with an enterprise social layer on top. Although we have large software companies leading the way with integrating social layers in their known solutions – e.g. Microsoft Dynamics CRM with Yammer – there is still a lot of need for integration of the enterprise social solutions with the different software applications in companies.
This development session will show how Microsoft’s enterprise social products (SharePoint 2013 and Yammer) – can be integrated with another solutions. It will show how to use these products as a common social layer across the software infrastructure in companies. Session will explore which development possibilities we have, which APIs can we use, how to implement the authentication. It will also show, how to bring such integrated enterprise social layer to the mobile devices.
Last but not least, it will show which of the both products can and should be used in which scenario, what are strengths of the both products, and where there can be feature overlapping.
Adis Jugo
Developing custom claim providers to enable authorization in share point an...AntonioMaio2
Developing Custom Claim Providers to Enable Authorization in SharePoint - Antonio Maio.
With the release of SharePoint 2010, Microsoft introduced the concepts of Claims Based Authentication and Authorization. SharePoint 2013 went a step further making Claims Based Authentication the default method for authenticating users when they login. Claims, and identities in general, are playing a bigger role in the security capabilities of systems like SharePoint, enabling us to solve some new and exciting security challenges. Typically we authorize the content that users have access to using SharePoint permissions, however authentication scenarios can be extended in new and interesting ways by developing a custom component called a Custom Claim Provider. This session will introduce the concepts of Claims Based Authentication and Authorization in SharePoint and provide step by step instructions on how to develop and deploy Custom Claim Providers. The session will also walk through several examples of how custom Claim Providers can enhance SharePoint security and authorization.
Developing social solutions on Microsoft technologies (SP Social and Yammer)SPC Adriatics
Development of the enterprise social solutions, which merge social computing and well known enterprise csolutions is a fairly new development discipline, which gains ever more on importance and traction. It is empirically proven that the traditional data processing gets more efficient and productive with an enterprise social layer on top. Although we have large software companies leading the way with integrating social layers in their known solutions – e.g. Microsoft Dynamics CRM with Yammer – there is still a lot of need for integration of the enterprise social solutions with the different software applications in companies.
This development session will show how Microsoft’s enterprise social products (SharePoint 2013 and Yammer) – can be integrated with another solutions. It will show how to use these products as a common social layer across the software infrastructure in companies. Session will explore which development possibilities we have, which APIs can we use, how to implement the authentication. It will also show, how to bring such integrated enterprise social layer to the mobile devices.
Last but not least, it will show which of the both products can and should be used in which scenario, what are strengths of the both products, and where there can be feature overlapping.
Adis Jugo
Ortocloud è arrivata seconda all'ICS del developer competition di IBM.
Permette di vedere come è stato possibile sfruttare i servizi weather di Bluemix con le XPages e noSQL Database di Domino
Granite state #spug The #microsoftGraph and #SPFx on steroids with #AzureFunc...Vincent Biret
Slides supporting the session at the granite state user group meeting of January 2019. Talking as well about #Azure Active directory and lots of other things
Building Social Business Applications with OpenSocialClint Oram
Presentation delivered at E2Innovate conference on November 15, 2012 in Santa Clara, CA describing the OpenSocial standard for building collaborative, social context aware business applications.
IBM Connect 2014 - BPD406: Ignite your IBM SmartCloud for Social Business Int...IBM Connections Developers
BPD406 : Ignite your IBM SmartCloud for Social Business Integration
Paul Bastide, IBM
Customers ask for it; developers deliver it. It is the IBM SmartCloud for Social Business – IBM’s social features in the Cloud. This session teaches developers how to develop an integration from requesting a trial, to setting up the IBM Social Business Toolkit SDK, testing the integration, prototyping an integration, and building an integration which delivers value to the customer.
Sun, 26/Jan 04:15 PM – 05:15 PM
Microsoft Flow is a new service (currently in preview) that helps you to build connection between different services and apps. You can create several workflows using available templates in O365 to do specific tasks like sending e-mail notifications to an app or sending messages at specific schedules.
In this session you will get an overview of what Microsoft Flow can do for you and how to create your own custom workflows easily using easy to learn visual designer tools.
Nwtl2017 extending and customizing ibm connections cloudAndré Luís Cardoso
Extending and customizing ibm connections cloud. How to customize your connections on the smartcloud. How to get better visual for your connections. IBM
IBM Connections Cloud Application Development StrategyLuis Benitez
This session will help you get started building your social applications. IBM Connections Cloud S1 provides easy to access integrated email with IBM Verse, social business capabilities and third party applications. It also provides a solid foundation for social and mail application development through APIs. This session guides users through the application development process for IBM Connections Cloud, from a blank page to a functional application. Attend this session to learn how to use existing services in your own applications and how to deploy to IBM Bluemix. Bluemix developers who haven't used IBM Connections can use a new Bluemix service to get started using these services within minutes.
IIBA® Sydney Unlocking the Power of Low Code No Code: Why BAs Hold the KeyAustraliaChapterIIBA
Unlocking the Power of Low Code No Code: Why Business Analysts Hold the Key
Join us for an upcoming virtual event to explore how business analysts can drive low code no code adoption within their organisations. Taking place on Wednesday 29th March at 6pm - 7pm AEDT, this event is a must-attend for Australian businesses looking to simplify processes, reduce costs, and achieve more with less using low code and no code strategies.
According to Gartner, the low code development platform market is predicted to grow at a pace of 23% through 2026, reaching $23.3 billion in revenue. As digital transformation continues to accelerate and skilled developers remain in short supply, the adoption of low code and no code is set to soar in the coming years.
Hear from industry experts from Microsoft Power Platform and Increment as they discuss the latest trends in low code and no code adoption, the benefits of these platforms, and the pivotal role that business analysts play in driving their adoption. Discover how the Business Analyst is uniquely positioned to spearhead the success of low code no code by streamlining operations, automating processes, speeding up time to market, and improving ROI.
Empowering you - Power BI, Power Platform & AI BuilderRui Quintino
Slides for the "Microsoft Empowering You" webinar about Power BI, Power Apps, Power Automate & AI Builder by DevScope.
Explore how Power Platform & AI Builder can enrich your Power BI experience.
Watch the full session at https://youtu.be/IhwiESvFaxg
(English subtitles available)
BP 308 - The Journey to Becoming a Social Application DeveloperSerdar Basegmez
IBM Connect 2014 session, Serdar Basegmez and Graham Acres.
Absract: You probably have heard about the Social Business Toolkit SDK but do you know what it is and what it's really about? Yes, it's XPages, it's JavaScript, and it's Java, and it works with Domino, Connections and SmartCloud, but what about the other apps that your users are asking for? What about Dropbox, Twitter and other platforms? This session will give developers a strong foundation to build on. You will learn the tools to use and invest in, the place to start and the roadblocks to avoid when building your skills. You will leave with practical examples and code samples to show you how easy it is to extend your apps and bring the power of Social Business to your organization.
Similar to IBM Connections How to use existing data to increase adoption success with IBM Connections (20)
We all know that "knowledge is power", but how realistic is aiming for transparency in our own IT environments? The interaction between clients, servers, applications and users is often difficult to analyze, much less quantify. Come join Daniel Reimann to take a look at the history of your infrastructure and prepare you for future projects such as consolidations or infrastructure additions (e.g. IBM Connections). We will show you how and why you should be looking at your infrastructure as a whole, rather than individual technology silos. Find out where the hidden challenges of your IBM Notes/Domino environment are, what impact they have on your network and how you can fix it! A bolt of lightning for your DeLore...erm...infrastructure!
Using XPages out of the box lets you build good looking and well performing applications. However, as XPage applications become bigger and more complex, performance can become an issue and, if it comes to scalability and speed optimization, there are a couple of things to take into consideration. Learn how to use partial refresh and partial execution mode and how to monitor its execution using a JSF LifeCycle monitor to avoid multiple re-calculation of controls. We will show tools that can allow you to profile your code, readily available from OpenNTF, along with a demonstration of how to use them to improve the speed of your code. Still writing SSJS and encounter a significant slow down when using Script Libraries? See, how you can improve the speed of your application using JAVA instead of JS, JSON and even @formulas.
Come to this session to get an update about everything related to OpenNTF, the open source community for IBM Collaboration Solutions.
See the contest winning XPages projects live and learn about the new open source projects for IBM Connections.
The session will also cover the IBM Social Business Toolkit SDK which allows XPages, Java and JavaScript developers to easily access IBM Connections and IBM SmartCloud for Social Business from custom applications. Attend this session to see demos of the latest functionality and new samples of the toolkit.
Vediamo quali sono i vantaggi di fare i backup con Tivoli Storage Manager for Domino (occupazione di spazio, statistiche, esempi di restore).
Prerequisiti, piattaforme supportate. Pianificazione ambiente in termini di spazio e di policy TSM.
Concetti di base di TSM (Policy domani e management class). Pianificazione dei backup per due scenari. Stima dello spazio occupato per entrambi gli scenari.
Esempio di installazione e schedulazione dei backup.
DAOS: come cambiano i backup, come si fanno i restore, come si impostano i tempi di retention. Restore di file del DAOS.
Un'immagine, si sa, vale più di mille parole, e a maggior ragione anche più di mille numeri: la rappresentazione visiva di una serie di cifre è la strada più rapida per identificare a colpo d'occhio le situazioni che necessitano di una più approfondita analisi di dettaglio.
Strumenti come Google Chart Tools rendono possibile l'integrazione di grafici funzionali e moderni nelle proprie applicazioni web, e quando queste ultime sono realizzate sfruttando le potenzialità di Domino e la flessibilità delle XPages si può davvero parlare di felice unione tra esperienza produttiva e dinamica per l'utente e sviluppo rapido per il programmatore.
In questa sessione analizzeremo insieme, con demo alla mano, diversi esempi pratici applicabili anche in contesto mobile, senza dimenticare l'importanza fondamentale di una selezione ragionata dei dati da elaborare.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
IBM Connections How to use existing data to increase adoption success with IBM Connections
1. How to use existing data to
increase adoption success with
IBM Connections
Andreas Ponte - Belsoft Collaboration AG
Henning Schmidt - hedersoft GmbH
2. • Andreas Ponte about.me
• ~20 years of experience in the IBM/IT world
• Worked for a Reinsurance company until 2007, amongst other things responsible
for the global communication infrastructure
• Joined Belsoft AG in 2007 with focus on consulting in the IBM Domino and mobile
solutions area
• Since 2014 CEO of Belsoft Collaboration AG
• IBM Champion for 2015 and 2016
6. Integration! Why?
• Organization
• From enterprise to small companies
• Communities
• Customers or members, Prospects, Employees, Channel partners, Suppliers,
Volunteers, Product partners and consultants, Analysts, Donors, Conference
attendees, User groups, Chapters, Grassroots supporters
7. Integration! Why?
• Performance
• Improving brand perception
• Finding new customers
• Closing more sales faster
• Improving customer satisfaction while reducing
support costs
• Increasing customer retention and repeat business
• Increasing revenue and profit
8. Integration! Why?
• This implies
• #NewWayToWork / Work 4.0
• Many organizational changes
• Many cultural changes
• Heavy shift in people’s mindset
• BUT
• Only 10-15% are thoroughly loyal to employer (Gallup)
• People rather keep than share
• 90-9-1
11. Integration! Why?
• Social = People
• Don’t push, generate acceptance
• People need ability to change (Enablement)
• Involve / inform employees
• Qualify employees
• People need willingness to change (Decision)
• Create and share Social Business Framework
• Active motivation to participate
12. Integration! Why?
• Information
• Onboarding Package
• Communication Strategy and Concept (Events, Campaign, Roadshow)
• Ongoing Communication Management
• Orientation Guide for Leaders
• Reasoning Map
• à Transparency
18. Connections REST-API
• Read and write Connections data
• ActivityStream utilizes OpenSocial (Google) Standard
• Data payloads in JSON format
• Other APIs non-standardized
• Data payloads in XML format
• There are APIs for all applications
• Profiles, Wikis, Blogs, ActivityStreams, Activities, Communities, Bookmarks,
Files, Forums, Ideation Blogs, Search
20. Connections REST-API
• Example: ActivityStreams
• https://<host>/connections/opensocial/<auth>/rest/activitystreams/<user
ID>/<group ID>/<application ID>/<activity ID>
Component Meaning
<auth> (optional) If using form based authentication leave this component out. Otherwise
options are anonymos, basic, oauth.
<user ID> The user whose stream you’re addressing – use @me for current users stream, @public
for public stream or a community ID for the stream in a community.
<group ID> The group of entries you’re addressing – use @all for all posts or options for special
meaning such as @saved, @actions, @mentions. Refer for InfoCenter and resources
slide for more.
<application ID> When retrieving entries this refers to the application (or ”generator”) that created the
entry. All the IBM Connections app names can be used (profiles, blogs, wikis etc.) plus
custom ones (e.g. ontimegc). @all used for all applications.
<activity ID> Used to reference a specific event e.g. for updating saved status.
21. Connections REST-API
1. /activitystreams/@me/@all
List my (current users) entries
2. /activitystreams/@public/@all
List public stream entries
3. /activitystreams/@me/@actions
List my actionable events
4. /activitystreams/@me/@saved/blogs
List my saved events from blogs
5. /@me/@all/@all/urn:lsid:lconn.ibm.com:activitystreams.story:bdb562f…
Work with entry from my stream based on ID
* All URLs above start with
https://<host>/connections/opensocial/<auth>/rest
25. Connections REST-API
• Goal: ADOPTION!
• Good approach: Connect to and integrate 3rd party systems by
utilizing the APIs
• Better approach: Use automation!
• Option 1: Data migration
• Option 2: Scan data sources for updates and post
• Use Embedded Experience
28. Connections REST-API
• SAP Integration
• Detect new requests in SAP
• Create new entry in approver‘s Activity Stream
• Utilize Embedded Experience to make a decision
• Send data back to SAP
30. Connections REST-API
• Organization Handbook
• Process Handbook entries in external system
• Option: Utilize Embedded Experience during workflow
• Detect approved changes
• Create new or update Wiki entries with approved Handbook data
• Upload attachments either as Wiki
attachment or as community file