Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Requested Node

Current Status

Action

Taken By

New Status

Request

INITIATED

Fill out form, set URGENT to NO, click route

requester1

ENROUTE

ReviewCurrentConfiguration

ENROUTE

Click approve

DES1

ENROUTE

InitialApproval

ENROUTE

Click disapprove

FPG1

DISAPPROVED

AcknowledgeConfiguration

DISAPPROVED

Click acknowledge

requester1

DISAPPROVED

Procure Roles

After going through the easy and expedient process of requesting work groups, the Kuali Rice administrator has notified us that the following groups are available for use in our workflow:

Responsible Party

Work Group

Requester

Initiator.Role.RuleAttribute

Desktop Services

edu.ucdavis.iet.des.DevelopmentSupport

Firewall Policy Group

edu.ucdavis.iet.adda.FirewallPolicyGroup

Firewall Gatekeeper

edu.ucdavis.iet.dccs.FirewallSysAdmin

Super User Workgroup

edu.ucdavis.iet.adda.KualiRiceSysAdmin

Default Exception Workgroup

edu.ucdavis.iet.KualiRiceSysAdmin

Info

Notice that the Kuali Rice Administrator identified ucd.IET.AppDev.KualiRice.SysAdmin.Workgroup even though that group is not involved in our business process. We'll need to identify a Super User Workgroup and Default Exception Workgroup when we create Document Types. In production, these work groups could potentially be the process owners, or department system administrators, rather than IET system administrators.

Looking at our workflow diagram, we build a responsibility matrix documenting who should act on which node and what action we're requesting of them. We'll use this later when we build our set of rules.

Node

Responsible Party

Responsibility Condition(s)

Action Requested

Request

Initiator.Role.RuleAttribute (whoever creates the document)

none

SUBMIT

Review Current Configuration

ucd.IET.DES.DevelopmentSupport.WorkGroup

none

APPROVE

Initial Approval

ucd.IET.AppDev.FirewallPolicyGroup.Workgroup

non-urgent request

APPROVE

Initial Approval

ucd.IET.DCCS.FirewallSysAdmin.Workgroup

urgent request

APPROVE

Final Approval

ucd.IET.AppDev.FirewallPolicyGroup.Workgroup

non-urgent request

APPROVE

Final Approval

ucd.IET.DCCS.FirewallSysAdmin.Workgroup

urgent request

APPROVE

Acknowledge Configuration

Initiator.Role.RuleAttribute

none

ACKNOWLEDGE

Looking at our workflow diagram, we build a responsibility matrix documenting who should act on which node and what action we're requesting of them. We'll use this later when we build our set of rules.

Node

Responsible Party

Responsibility Condition(s)

Action Requested

Request

Initiator (whoever creates the document)

none

SUBMIT

Review Current Configuration

IET DES Development Support

anyone, any request

APPROVE

Initial Approval

IET PSL Firewall Policy Group

everyone, non-urgent request

APPROVE

Initial Approval

IET DCCS Firewall System Administrator

first one, urgent request

APPROVE

Final Approval

IET PSL Firewall Policy Group

everyone, non-urgent request

APPROVE

Final Approval

IET DCCS Firewall System Administrator

first one, urgent request

APPROVE

Acknowledge Configuration

Initiator

none

ACKNOWLEDGE

After going through the easy and expedient process of requesting work groups, the Kuali Rice administrator has notified us that the following roles are available for use in our workflow:

Responsible Party

Work Group

Requester

Initiator.Role.RuleAttribute

Desktop Services

edu.ucdavis.iet.des.DevelopmentSupport

Firewall Policy Group

edu.ucdavis.iet.adda.FirewallPolicyGroup

Firewall Gatekeeper

edu.ucdavis.iet.dccs.FirewallSysAdmin

Super User Workgroup

edu.ucdavis.iet.adda.KualiRiceSysAdmin

Default Exception Workgroup

edu.ucdavis.iet.KualiRiceSysAdmin

Info

Notice that the Kuali Rice Administrator identified edu.ucdavis.iet.KualiRiceSysAdmin even though that role is not involved in our business process. We'll need to identify a Super User Role and Default Exception Role when we create Document Types. In production, these work groups could potentially be the process owners, or department system administrators, rather than IET system administrators.

Create the Parent Document Type

...

Code Block
titleRequestFirewallChange.eDoc.ChildDocType.xml
<?xml version="1.0" encoding="UTF-8"?>
<data xmlns="ns:workflow" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="ns:workflow resource:WorkflowData">
<documentTypes xmlns="ns:workflow/DocumentType" xsi:schemaLocation="ns:workflow/DocumentType resource:DocumentType">
	<documentType>
		<name>RequestFirewallChange.eDoc.ChildDocType</name>
		<parent>RequestFirewallChange.eDoc.ParentDocType</parent>
		<description>Request Firewall Change eDocLite Child Document Type</description>
		<label>Request Firewall Change eDocLite Child Document Type</label>
		<postProcessorName>edu.iu.uis.eden.edl.EDocLitePostProcessor</postProcessorName>
		<superUserWorkgroupName>ucd.IET.AppDev.KualiRice.SysAdmin.Workgroup</superUserWorkgroupName>
		<defaultExceptionWorkgroupName>ucd.IET.AppDev.KualiRice.SysAdmin.Workgroup</defaultExceptionWorkgroupName>
		<docHandler>${workflow.url}/EDocLite</docHandler>
		<active>true</active>
		<routingVersion>2</routingVersion>
		<routePaths>
			<routePath>
          			<start name="Request" nextNode="ReviewCurrentConfiguration" />
		          	<requests name="ReviewCurrentConfiguration" nextNode="InitialApproval" />
				<requests name="InitialApproval" nextNode="FinalApproval" />
				<requests name="FinalApproval" nextNode="AcknowledgeConfiguration" />
				<requests name="AcknowledgeConfiguration" />
        	      </routePath>
		</routePaths>
	      <routeNodes>
			<start name="Request">
				<activationType>P</activationType>
			</start>
			<requests name="ReviewCurrentConfiguration">
				<activationType>P</activationType>
				<ruleTemplate>RequestFirewallChange.eDoc.ReviewCurrentConfiguration.RuleTemplate</ruleTemplate>
			</requests>
			<requests name="InitialApproval">

				<activationType>P</activationType>
				<ruleTemplate>RequestFirewallChange.eDoc.InitialApproval.RuleTemplate</ruleTemplate>
			</requests>
			<requests name="FinalApproval">
				<activationType>P</activationType>
				<ruleTemplate>RequestFirewallChange.eDoc.FinalApproval.RuleTemplate</ruleTemplate>
			</requests>		
			<requests name="AcknowledgeConfiguration">
				<activationType>S</activationType>
				<ruleTemplate>RequestFirewallChange.eDoc.AcknowledgeConfiguration.RuleTemplate</ruleTemplate>
				<mandatoryRoute>false</mandatoryRoute>
				<finalApproval>false</finalApproval>
			</requests>
		</routeNodes>
	</documentType>
</documentTypes>
</data>

...