Solved

Routing to Multiple approvers after last approver, send to one Reviewer

Posted on 2006-06-22
4
320 Views
Last Modified: 2013-12-18
I have to create a Access Request Database.  When user wants access to certain programs in the manufactuirng system they have to raise this forms.  This form will be routed from requestor, dept head, program owner, reviewer, processor then back to requestor once completed.
Menu will have a list of programs with individual owners.  When user clicks on a Button, dialog box prompt to User selects the "menu" followed by "program" (can choose multiple "program" under the same "menu").  Then route it to the individual "owners" of the "program" for approval.
Once the last person approves.  Route it to the "Dept Head"...
0
Comment
Question by:yukanthin
4 Comments
 
LVL 63

Accepted Solution

by:
SysExpert earned 500 total points
ID: 16968207
This is workflow approval.

Depending on how tight security needs to be and whether the route is static or dynamic, it can be quite complicated.

1) First build your routes by defining a doc that contains the program name and the people who need to approve it.
2) Use views to pull up the program list, and then to pull out the list of people who need to approve.

You also need to decide if you want parallel or serial routing and other things.

I bought an engine that did most of the work for me.

see wfs.com

I hope this helps !
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

IBM Notes offer Encryption feature using which the user can secure its NSF emails or entire database easily. In this section we will discuss about the process to Encrypt Incoming and Outgoing Mails in depth.
This article covers general Notes 8.5 troubleshooting information including recreating the Notes\Data folder.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question