UiPath - Advanced - PDD - Calculate Client Security Hash
UiPath - Advanced - PDD - Calculate Client Security Hash
The Process Design Document describes the business processes chosen for automation using the
UiPath Robotic Process Automation (RPA) technology.
This document describes the sequence of steps performed as part of the process, as well as the
conditions and requirements prior to its automation. This design document serves as a base
documentation for developers to collect the details required for robotic automation of the same
business process.
The process has been selected for RPA as part of the larger project initiative conducted within
ACME Systems Inc., the Finance and Accounting department.
The objective of this process automation is linked to the project business case and is mainly
intended to:
The Design Document includes a brief, but comprehensive set of requirements for the process. Its
structure is based on the input provided by the Subject Matter Expert (SME) in the process.
General information about the process selected for RPA implementation, prior to its automation:
AS IS process details
Function Security
Department Finance and Accounting
Process short description Generate the Security Hash for each Client based on their
(operation, activity, outcome) personal information.
1.3 Access the Dashboard - the central location, where the user can pick a specific menu item.
1.4 Access the Work Items listing to view all the available tasks to be performed (Output data: Work Items).
1.5 For each activity of the WI5 type, perform the following steps:
1.5.B Open the SHA1 Online webpage - http://www.sha1-online.com/, and provide the following input: [ClientID]-
[ClientName]-[ClientCountry]. Replace all the variables with the corresponding values. Use dashes between items,
as shown above.
1.5.C Retrieve the Client Security Hash value from the webpage.
1.5.D Go back to Work Item Details and open Update Work Item.
1.5.E Set the status to “Completed”. Add a comment with the obtained [SecurityHash].
Possible
exception:
Log in to System
- Handle
1. Required input Access to the
1.2 exception if
data: email and dashboard
Incorrect email
password.
or Password
Access the
Dashboard - the
The display
central location,
1.3 of each item
where the user
in the menu
can pick a specific
menu item
Possible
exception:
For each activity Handle
of the type WI5 exception if no
1.5
perform the task of type
following steps: 'Calculate
Client Security
Hash’ exist
Open the Details
page of the
selected activity
1.5.A to retrieve the
Client Details
(Output data:
Client Details)
Open the SHA1
Online Webpage -
http://www.sha1-
online.com/ and
provide the
following input:
[ClientID]-
[ClientName]-
1.5.B
[ClientCountry]
Replace all the
variables with the
corresponding
values. Use
dashes between
items, as shown
above.
Go back to the
Work Item Details
1.5.D
and select Update
Work Item
Based on the above criteria, the table below should reflect all the known exceptions identified
throughout the process and map the expected action the robot needs to take in each case.
Insert as many rows as required in the table, to capture all exceptions in a comprehensive list.
Step where
Exception
# exception is Parameters Action to be taken
name
encountered
If message for Send email to exceptions@acme-
incorrect test.com
Incorrect email “Hello,
1 Step # 1.2 username or
or password The username or the email is incorrect. Please
password
check and restart
exist Thank you’’
No task of type
2 Step # 1.5 Stop process
WI5 exists
For any other unanticipated or unknown exceptions, the robot should send an email notification
at exceptions@acme-test.com with the original email and error message screenshot attached.
The errors identified in the automation process can be classified according to the table below.
Based on the above criteria, the table below should reflect all the identifiable errors in the process,
and map the expected action of the Robot in each case.
Insert as many rows as required in the table, to capture all the errors in a comprehensive list.
Step where
# Error Name error is Parameters Action to be taken
encountered
Application
Retry 2 times.
unresponsive No response /
1 Any step Close application and run the sequence
/ page not blank page
again
loading
*Feel free to insert an additional error mapping table for more complete explanation.
The table below lists all the applications that are used as part of the automated process.
Application
Syst. Login Environment/
# name & Interface Comments
Lang. module Access method
Version
1 ACME System 1 EN Web Web Web Browser
Users manage their own passwords. There are no special policies in place.
Login details (user IDs and passwords) should be stored under Windows Credential Manager or
UiPath Orchestrator Assets.
Document Business
1.0 Name Surname
prepared by Analyst
Business
Document
1.0 Process Name Surname
Approved by:
Owner
Dev/RPA
Document
1.0 Solution Name Surname
Approved by:
Architect
Use of Orchestrator:
Lessons Learned:
Any adjustments made to facilitate the automation process and any steps taken to shift from the
human way of working to the automatic one. Any activity performed to improve the As Is process
and to enable higher rates of automation of the process:
➢ Process Assumption
➢ Input data assumption
➢ Number or types of input to be received
➢ Skipping the login interface and collecting backend details
➢ Extracting backend data without opening the file
➢ Data conversion / formatting
Reporting: The details and format of the logging mechanism available in the workflow have to be
specified here, whether it is a local log report or the Orchestrator log).
Workflow and scripts: A brief overview of each workflow and the sequence in which it is executed
should be provided here.