View source | Discuss this page | Page history | Printable version   
Main Page
Upload file
What links here
Recent changes

PDF Books
Show collection (0 pages)
Collections help



In other words, there are two types of processes which can be monitored in this window:

In any case, only the users having a role which have access to a given process/processes will be able to monitor it/them in this window.

Besides and as already explained, "Security based on role" definition at process request level will allows to define the users which will be able to monitor a given background process in this window.

Retrieved from ""

This page has been accessed 629 times. This page was last modified on 1 February 2012, at 17:26. Content is available under Creative Commons Attribution-ShareAlike 2.5 Spain License.