Workflow Overview Introduction to Workflows
4.1 Introduction to Workflows
This section provides an overview to workflows, their uses, and the advantages they can provide for your business operation. It discusses the following topics: ■ Workflow Overview on page 4-1 ■ Workflow Steps on page 4-2 ■ Workflow Step Evaluation Process on page 4-5 ■ Workflow Participation on page 4-74.1.1 Workflow Overview
Workflows are used to specify how content is routed for review, approval, and release to the system. For example, using a workflow ensures that the appropriate people in the Legal Department, Human Resource Department, and in upper management review and approve new policies before being released on the organizations intranet. Or a workflow could be set up to obtain timely approval and sign-off on marketing campaigns that are produced in-house. Users receive e-mail notification when content in a workflow is ready for review. Designing an effective workflow is an iterative process. Workflows are planned, refined, and re-defined as the process is implemented. Good planning in the beginning 4-2 Application Administrators Guide for Content Server can eliminate many problems before the workflow is enabled. See Planning a Workflow on page 4-7 for details about the planning process.4.1.1.1 Types of Workflows
There are three types of workflows: ■ A criteria workflow is used for content that enters a workflow automatically based on metadata that matches predefined criteria. ■ A basic workflow defines the review process for specific content items, and must be initiated manually. ■ In addition to these two basic types, sub-workflows can be used. Sub-workflows do not have an initial contribution step, but are entered via a workflow jump. They are created in the same manner as criteria workflows. Sub-workflows are useful for splitting large, complex workflows into manageable pieces.4.1.1.2 Workflow Advantages and Disadvantages
Setting up workflows for your business processes can provide several advantages: ■ Workflows provide good reporting metrics; by using workflows, an audit trail can be created of who signed off on content at various points of the life cycle of the content. ■ Workflows help you get the right information to the relevant person, and the relevant information to the right person. ■ Designing a workflow forces you to examine and understand your business processes, helping you find areas that can be improved. The same elements that provide advantages can also be disadvantages: you will be forced to examine your business processes and map out how you want to use workflows. This can be a time-consuming process, but the end result is worth it.4.1.2 Workflow Steps
Parts
» Oracle Fusion Middleware Online Documentation Library
» About Native File Conversion Identifying MIME Types
» About Custom Fields Managing Content Fields
» Changing the Default Sort Order of the Opening Query
» About Managed Links Managing Linked Content with Link Manager
» Configuring Link Manager Managing Linked Content with Link Manager
» Managing Links Managing Linked Content with Link Manager
» Link Manager Database Tables
» Link Manager Filters Managing Linked Content with Link Manager
» Site Studio Integration Managing Linked Content with Link Manager
» Click Go located next to the Abort refresh activity option. The refresh activity
» About DCLs and Metadata Schemas
» About Content Profiles Using Profiles to Customize Content Screens
» Content Profile Rules Using Profiles to Customize Content Screens
» Click OK. Oracle Fusion Middleware Online Documentation Library
» Select the Is global rule with priority check box. You can optionally change the
» On the Conditions tab, click Add. Click OK. Click OK. Click OK. Click OK.
» Workflow Overview Introduction to Workflows
» Workflow Steps Introduction to Workflows
» Workflow Step Evaluation Process
» Pre-design Questions Planning a Workflow
» Designing a Workflow Modifying Workflows
» Criteria Workflow Process Creating a Criteria Workflow
» Basic Workflow Process Creating a Basic Workflow
» Idoc Script Functions and Variables
» About Jumps Customizing Workflows
» Jump Variables and Steps Setting Up Jumps
» Jump Examples Customizing Workflows
» Scenario 1: Criteria Workflow Workflow Scenarios
» Scenario 2: Tokens Scenario 3: Jump Based on Metadata Scenario 4: Time-Dependent Jump
» Acquiring a Digital Signature Setting Up Parallel Workflows
» Adding Ad Hoc Step Users Customizing Criteria Workflow Emails
» Paste the following code into the entry event of your workflow step. Note that
» Other Customizations Workflow Tips and Tricks
» Searching Within a Workflow Step Suppressing Workflow Notifications
» Workflow Item Stuck in EDIT or GENWWW Status
» Workflow Item Entered in Wrong Workflow
» About PDF Watermark How PDF Watermark Works
» Folders Overview Usage Scenarios
» Folders Structure Naming Folders Folders Component Security
» Folder Metadata Inheritance Trash Bin Metadata Propagation
» Folder Content Item Revisions
» Folder Archiving Folder Searching URL-Mapped Folders
» About WebDAV What is WebDAV?
» WebDAV Clients WebDAV Architecture
» Preventing Folder Static Inheritance for Specific Metadata Fields
» Optimizing System Performance Click OK.
» Virtual Folders Configuring WebDAV
» Other Issues Click OK twice to save the settings and close the Internet Options screen.
» Adding Custom Viewers and Renderers
» Content Tracker Summary About Content Tracker Components and Functions
» Content Tracker Reports Summary Data Recording Overview
» Data Reduction Overview Data Reporting Overview Content Tracker Terminology
» General Limitations General Considerations
» Data Collection and Processing
» Data Collection Operational Overview
» Data Reduction Operational Overview
» Data Output Operational Overview
» Tracking Limitations Operational Overview
» Data Reduction Features Data Tracking Functions
» Activity Snapshots Data Tracking Functions
» Service Calls Data Tracking Functions
» Web Beacon Objects Data Tracking Functions
» Click the Snapshot tab. Click OK. Open the Content Tracker Administration page: Click OK.
» Oracle and DB2 Case Sensitivity Access Control Lists and Content Tracker Reports Secure Mode
» Pre-Defined Reports Report Generation
» Custom Reports External Report Generator
» User AuthenticationAuthorization and Auditing Site Studio Web Site Activity Reporting
» Security Checks and Query Results
» Accessing Drill Down Reports Accessing Reports from the Information Page
» Creating Custom Report Queries
» Creating Secure Report Queries Using an External Report Generator
» About the Service Call Configuration File
» About the Content Tracker Logging Service
» Managing Service Call Information
» Configuration Variables Configuration and Customization
» Activity Metrics SQL Queries
» Web Server Filter Debugging Support Java Code Debugging Support DataBinder Dump Facility
» Search Rules About Content Categorizer
» XML Conversion About Content Categorizer
» Configuration Variable Setting Up Content Categorizer
» Understanding Search Rules Search Rules
» Pattern Matching Search Rules
» Abstract Search Rules Search Rules
» Categorization Engine Search Rule Filetype Search Rule
» Translation Transformation Using XSLT Stylesheets
» SearchML Transformation XSLT Transformation
» Flexiondoc Transformation XSLT Transformation
Show more