Use the Ignore Businessobject command to bypass a required
signature. In this case, you are not approving or rejecting the signature
requirement. Instead, you are specifying that this required signature can be
ignored for this object.
In a policy definition, states are created to
serve the majority of business objects of a particular type. You might have
some business objects that do not need to adhere to all of the constraints of
the policy. For example, you might have a policy for developing software
programs. Under this policy, you could have objects that contain programs for
customer use and programs for internal use only. In the case of the internal
programs, you might not want to require all of the signatures for external
programs. Instead, you might be willing to ignore selected signatures.
The Ignore Businessobject command controls a single signature. An
object is promoted to the next state automatically when all requirements are
met if the state was defined with the Promote clause set to true. By ignoring a
single signature, it does not necessarily mean that the object will meet all of
the requirements for promotion to the next state. It only means that one of the
requirements for promotion was circumvented. Depending on the state definition,
another user or condition might be required to promote the business object.
For example, assume you have a simple inventory program to track one
group's supplies. The program is highly specialized for internal use and will
not be used outside the company. According to the policy governing the object,
the company president's signature is required before the program can enter the
Released state for business objects outside the company. Because no one wants
to bother the president for a signature for this program, you decide to bypass
the signature requirement with the following Ignore Businessobject command.
(The user must have privileges to do this.)
ignore businessobject "Software Program" "In-house Inventory" III
signature "Full Release"
comment "Signature is ignored since program is for internal use only"
|
In this example, the comment provides the reason for the bypass is
clearly defined so that users understand the reason for the initial bypass of
the signature.