Default language.

How to use workflow to modify requests


The following figure presents a sample scenario that demonstrates how to use workflow to modify requests.

Using workflow to modify requests
Administering-218.gif

  1. The  administrator at XYZ has enabled the  to modify entries in the . He has associated the incoming and outgoing mailboxes, enabled the incoming mailbox to accept modify instructions, and created and sent security keys to trusted users of . For more information, see Allowing-and-securing-modify-actions-through-incoming-emails.

    The incoming and outgoing mailboxes in the  can be one physical mailbox, performing both the incoming and outgoing functions.

  2.  receives a submit request. A filter uses email to send a notification that a request has been received. This email is formatted by using a modify template.
  3. The user receives the message in her email client and then replies to it. She modifies the request by entering the following information:
    • Login and password
    • Security key
    • Modifications to values of fields
       She clicks the Send button to reply back to the .
  4. The  verifies the security key, the user's email address, and the request ID. These security mechanisms make sure that only the entry sent for modification is being modified and that it is being modified by the user who the original email was sent to.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*