Email and Surface Automation
We need to discuss email automation plus surface automation matters with this chapter.
Prior to performing email automation, we have to give permission to our own Gmail account we are usually currently using.
Stick to the below steps to offer the permission to typically the Gmail account:
Head to My Account page → Click on Sign-in as well as Security → Scroll to be able to ending of the webpage and select less Protected software option → Permit it.
Step 1: We need to configure the e-mail settings in action.
Step 2: Generate two data items regarding username, password, from e-mail and e-mail address.
Step 3: Give the POP3 and SMTP storage space details.
Step 4: Give the POP3 and SMTP port Details.
Step 5: Give the true for POP3 UseSSL and SMTP UseSSL. Typically the screenshot given below clarifies all of the above steps clearly.
Step 6: Allow us to name it as "Send mail".
Step 7: Next step is to link the process.
Glowing blue Prism provides Surface Software techniques that may be used as a substitute when technology connectors are certainly not available. Some of these types of Surface Automation techniques are usually briefly described in: Areas, Character Matching, Global Ticks, and Keys sections.
The actual below steps to operate surface automation in your own device. Screenshots are incorporated after each step of the process for easy understanding:
Step 1: Produce the business object plus configure the Application modeller with Surface Automation.
Step 2: Within the next step, we need in order to define a brand new application design name as given beneath:
Step 3: Based on the application type in use, select one as demonstrated below:
Step 4: Show the kind of application being utilized.
Step 5: Within this step, enter the way the location where the. exe file is usually saved or browse generally the location using Surf key as displayed under:
Step 6: Enter the Element details and launch the application.
Step 7: We are able to launch the application making use of the launch button in the bottom as given below.
Step 8: Sign in into the application making use of the credentials.
Step 9: Identify the spy components as demonstrated below:
Step 10: With this step, we need in order to identify the username plus password.
Step 11: Recognize the User Name.
Step 12: Recognize the password.
Step 13: Recognize the login button.
Step 14: Produce the two data products: username and password.
Step 15: Start the application using typically the navigation stage.
Step 16: Change the username using typically the navigation stage.
Step 17: Set up the password using the particular navigation stage.
Step 18: Now, run the process.