Calculate Client Security Hash - Process Design Document PDF
Calculate Client Security Hash - Process Design Document PDF
This document describes the sequence of steps performed as part of the process, as well as
the conditions and requirements prior to its automation. This design document serves as a
base documentation for developers to collect the details required for robotic automation of
the same business process.
1.2 Objectives
The process has been selected for RPA as part of the larger project initiative conducted within
ACME Systems Inc., the Finance and Accounting department.
The objective of this process automation is linked to the project business case and is mainly
intended to:
AS IS process details
Process full name Calculate Client Security Hash
Function Security
Department Finance and Accounting
Process short description Generate the Security Hash for each Client based on their
(operation, activity, personal information.
outcome)
Role required for System 1 User
performing the process
Process schedule Daily
Open sha1.com
Log into ACME Access “Word website and enter
Select an activity Select Client details
START System 1 Web listing item” on the the correct formula,
type of W15 on the details page
application dashboard using client Id,
name and country
1.3 Access the Dashboard - the central location, where the user can pick a specific menu item.
1.4 Access the Work Items listing to view all the available tasks to be performed (Output data: Work Items).
1.5.A Open the Details page of the selected activity to retrieve the Client Details.
1.5.B Open the SHA1 Online webpage - http://www.sha1-online.com, and provide the following
i-nput:ClientID ClientCountry. Replace all the variables with the correspondingvalues. Use dashes
between each item and the above.
1.5.C Retrievethe Client Security Hash value from the webpage.
1.5.D Go back to Work Item Details and open Update Work Item.
Possible
exception:
Log in to System 1. - Handl
Access to
Required input exception if
1.2 the
data: email and Incorrect
dashboard
password. email or
Password
Access the
Dashboard - the The
central location, display of
1.3 where the user can each item
pick a specific in the
menu item menu
Retrieve Client
Security Hash
1.5.C
from the
webpage
Continue with
1.6 the next WI5
Activity
Step where
Exception
# exception is Parameters Action to be taken
name
encountered
If message for Send emailto exceptions@acme-
Incorrect incorrect test.com
Step # 1.2 “Hello,
1 email or username or
The usernameor the email is incorrect.Please
password password exist check and restart
Thank you’’
No task of
2 type WI5 Step # 1.5 Stop process
exists
For any other unanticipated or unknown exceptions, the robot should send an email notification at
exceptions@acme-test.com with the original email and error message screenshot attached.
The errors identifiedin the automation process can be classified according to the tablebelow.
Based on the above criteria, the table below should reflect all the identifiable errors in the process, and
map the expected action of the Robot in each case.
Insert as many rows as required in the table, to capture all the errors in a comprehensive list.
Business
Document Name
1.0 Process
Approved by: Surname
Owner
Dev/RPA
Document Name
1.0 Solution
Approved by: Surname
Architect
5.. Appendix
5.1 UiPath automated process details
Note: this step is to be filled in after automation process is complete
Use of Orchestrator:
Lessons Learned:
Any adjustments made to facilitate the automation process and any steps taken to shift from the
human way of working to the automatic one. Any activity performed to improve the As Is process and to
enable higher rates of automation of the process:
Reporting: The details and format of the logging mechanism available inthe workflowhave to be
specified here, whether it is a local log report or the Orchestratorlog).
Workflow and scripts: A brief overview of each workflow and the sequence in which it is executed
should be provided here.