Calculate Client Security Hash - Process Design Document
Calculate Client Security Hash - Process Design Document
This document describes the sequence of steps performed as part of the process, as well as
the conditions and requirements prior to its automation. This design document serves as a
base documentation for developers to collect the details required for robotic automation of
the same business process.
1.2 Objectives
The process has been selected for RPA as part of the larger project initiative conducted within
ACME Systems Inc., the Finance and Accounting department.
The objective of this process automation is linked to the project business case and is mainly
intended to:
AS IS process details
Process full name Calculate Client Security Hash
Function Security
Department Finance and Accounting
Process short description Generate the Security Hash for each Client based on their
(operation, activity, personal information.
outcome)
Role required for System 1 User
performing the process
Process schedule Daily
Open cBsha1.com
Log into ACME Access “Word website and enter
Select an activity Select Client details
START System 1 Web listing item” on the the correct formula,
type of W15 on the details page
application dashboard using client Id,
name and country
1.3 Access the Dashboard - the central location, where the user can pick a specific menu item.
1.4 Access the Work Items listing to view all the available tasks to be performed (Output data: Work Items).
1.5.A Open the Details page of the selected activity to retrieve the Client Details.
1.5.B Open the SHA1generator webpage of your choice, for example https://codebeautify.org/sha1-hash-
generator, and provide the following input: ClientID ClientCountry. Replace all the variableswith the
correspondingvalues. Use dashes between e ach item and the above.
1.5.C Retrievethe Client Security Hash value fromthe webpage.
1.5.D Go back to Work Item Details and open Update Work Item.
Possible
exception:
Log in to System 1. - Handl
Access to
Required input exception if
1.2 the
data: email and Incorrect
dashboard
password. email or
Password
Access the
Dashboard - the The
central location, display of
1.3 where the user can each item
pick a specific in the
menu item menu
Retrieve Client
Security Hash
1.5.C
from the
webpage
Continue with
1.6 the next WI5
Activity
Insert as many rows as requiredin the table, to capture all exceptionsin a comprehensivelist.
Step where
Exception
# exception is Parameters Action to be taken
name
encountered
If message for Send email to exceptions@acme-
Incorrect incorrect test.com
Step # 1.2 “Hello,
1 email or username or
The usernameor the email is incorrect.Please
password password exist check and restart
Thank you’’
No task of
2 type WI5 Step # 1.5 Stop process
exists
For any other unanticipated or unknown exceptions, the robot should send an email notification at
[email protected] with the original email and error message screenshot attached.
The errors identifiedin the automation process can be classified according to the table below.
Based on the above criteria, the table below should reflect all the identifiable errors in the process, and
map the expected action of the Robot in each case.
Insert as many rows as required in the table, to capture all the errors in a comprehensive list.
Business
Document Name
1.0 Process
Approved by: Surname
Owner
Dev/RPA
Document Name
1.0 Solution
Approved by: Surname
Architect
5.. Appendix
5.1 UiPath automated process details
Note: this step is to be filled in after automation process is complete
Use of Orchestrator:
Lessons Learned:
Any adjustments made to facilitate the automation process and any steps taken to shift from the
human way of working to the automatic one. Any activity performed to improve the As Is process and to
enable higher rates of automation of the process:
Reporting: The details and format of the logging mechanism available in the workflowhave to be
specified here, whether it is a local log report or the Orchestratorlog).
Workflow and scripts: A brief overview of each workflow and the sequence in which it is executed
should be provided here.