Title: RPA Online Training | RPA Introduction | RPA Automation Explained
1- ROBOTIC PROCESS AUTOMATION
www.etrainingsindia.com
91 9010769088
contact_at_etrainingsindia.com
2- RPA Use Cases
- Calculators Initial practice- Calculate
Manually complex tasks- Invention of
calculators. But we are still feeding numbers in
calculator manually. This is now implemented by
bots - Data Entry Employee Job Data entry employees
repeatedly gets data from different sources and
aggregates them in an excel file. - Premium Provider Insurance Company To process
multiple invoices everyday. - Banking Sector To process different loan
application
3(No Transcript)
4(No Transcript)
5 Types Of Bots Front Office Robots An Attended
Bot executes its automation on the users local
work station and need a human to trigger or
schedule them. Back Office Robots An
Unattended Bot runs on a virtual machine and
executes automation that do not require user
interaction.
6(No Transcript)
7(No Transcript)
8- Assess
- This phase starts by investigating the process
that could be automated - We take decision on
- - Schedule
- - Degree of importance
- - Data type usage and the
department it is related to. - Assess phase ends with an assessment of report
that outlines the feasibility of the RPA project
more in detail. - Approve
- It starts with an approval of the process which
is to be automated. - It is followed by thorough investigation and
documentation of the process. - After documentation, we design future processes
as part of the solution. - This phase ends with Business case being resented
to the management team
9- Design
- Starts by looking at which software vendor best
fulfils the criteria outlined in the business
case. - During this phase we will design the robot with
exact process which is outlined - Robot will be programmed to scale the level of
automation. - This phase ends with testing the process.
- Implement
- Process we designed will be released into a
working environment, mimicking an user behavior. - When deployed , business side monitors the robot
and handles any exceptions. - If there are any changes in the process
- - Robots have to be
programmed again - - Business side does it
themselves.
10- How to handle exceptions encountered in RPA
- Exceptions arise when dealing with a software
program and should be handled properly. - If the exception left unhandled, it could
drastically impair RPA functionality. - The success of exception handling depends on how
well it is implemented during development. - It ensures that the problems are resolved, easily
identifiable and repairable by system admins. - Exception Types
- Business Exception
- System Exception
11- What are Business Exceptions
- These exceptions occur when established rules are
broken - Business exceptions are the implementation of
business rules that exist within a process to be
automated. - Example
- In making business payments online, if an
encountered value is above a threshold amount,
then it need an approval. - How to handle it?
- Process that encounter business exceptions are
rerouted for alternative processing. -
12- What are System Exceptions
- These exceptions occur in response to technical
situations like, - - Application not responding
- - Application crashes
- - UI changes, New
screens/changes within an application that were
not accounted during design and development
phase. - Example
- Any change in the UI of an application
- How to handle it?
- These exceptions can either be monitored or
handled by reprogramming the bots.
13(No Transcript)
14- Role Based Access Overview
- Role Based Access control (RBAC) is a method of
regulating access to computer or network
resources based on the roles of individual users
within an enterprise. - Role-based access involves a built-in privilege
system hat can be configured by the
administrator. - Users will have to login to interact with
automation and are restricted based on security
that is implemented in an organization. -
- Example
- A developer who develops the process can be
blocked from releasing the configured changes
into live environment until they are fully
approved by the administrator. - There is huge risk to business in accidentally
providing access to sensitive data to someone who
is not authorized to see it.
15 Credential Management Credential Manager
Credential manager is the digital locker, where
we can store login credentials Orchestrator
Credentials Credentials are stored in encrypted
format in server database. Orchestrator
Credential Integration with Third Party
Tools Orchestration credentials can be
integrated with third party tools like CyberArk.