With Celonis Process Mining 4.7.2, we are focussing on improved stability and ease of migration to the EMS.

Please find the official release note presentation as well as the bug fixes attached. Additionally, this article features a technical overview of the newly introduced features below.




Release Notes


Bug fixes





Updating to Celonis Process Mining 4.7.2

Please be aware that before updating to Celonis Process Mining 4.7.2, it is required to install and run version 4.7.1. 

For detailed information and further required steps, please refer to the Celonis 4.7.2 - Update Guide 1.13. All updated guides can be found here.

Not adhering to these instructions can lead to loss of configuration! These steps are not necessary in case of a fresh installation. Only application updates are affected.




Changes & Improvements




Important Changes

1. Deprecation note: legacy audit logger

With Celonis Process Mining 4.7.2, we are deprecating the legacy audit logger configured in <installDir>/component_configurations/audit-logging.properties.

In case the audit logs are used in your installation, a migration of the audit logging configuration to the new audit-logging-advanced.properties file is required. 

For detailed information and further required steps, please refer to the Celonis 4.7.2 - Update Guide 1.13. Not following the instructions will lead to no audit logs being written. 

Activating the new advanced audit logger:

  1. Log onto the application server
  2. Stop the Celonis Process Mining application
  3. Navigate to <installDir>/component_configurations/
  4. Copy the audit-logging-advanced.properties.sample file and rename one of the files to audit-logging-advanced.properties. Make sure the file is treated as a .PROPERTIES file
  5. Open the properties file and activate the required properties by setting them to true
  6. Start the Celonis Process Mining application



2. Amazon Athena JDBC driver

With Celonis Process Mining 4.7.2, we no longer distribute the Amazon Athena JDBC driver (com.simba.athena.jdbc.Driver) with the application.

If you are currently using any Amazon Athena connection, please follow the instructions in the Update Guide 1.13 to deploy the Amazon Athena JDBC driver. This change is required to ensure full version compatibility. 

For detailed information and further required steps, please refer to the Celonis 4.7.2 - Update Guide 1.13. Not following this instruction will lead to all Amazon Athena connections failing.

Deploying your own Amazon Athena JDBC driver:

  1. Get the suitable JDBC driver from the vendor
  2. Log onto the application server
  3. Stop the Celonis Process Mining application
  4. Navigate to <installDir>/lib and paste the driver .jar file into the folder
  5. Start the Celonis Process Mining application



3. Time zone information in stdout and advanced audit logs

The log format of the stdout log files (located in <installDir/logs>) and the advanced audit logs was adapted from yyyy-MM-dd HH:mm:ss to yyyy-MM-dd'T'HH:mm:ss.SSSXXX, adding information about the application server time zone.





Switching analyses with selections

Since Celonis Process Mining 4.7.2, it is possible to browse and open another analysis from the current one.


Doing so, it is also possible to forward the current selections to the target analysis if they are connected to the same data model.

  1. Access the pop-up menu
  2. Select, whether the current selections should be carried to the target analysis 
  3. Browse through the analyses
  4. Select and go to analysis





Audit logging to database

With release 4.7.2, we support audit logging to external databases to enable advanced analysis of the logging events.

You can find the required new properties in the audit-logging-advanced.properties.sample file in <installDir>/component_configurations after the update. If you are already using the advanced audit logs, you can copy the new properties into the existing audit-logging-advanced.properties.sample file.

More information about the configuration of the advanced audit logs can be found in the Operation Guide.

Please find the following addition in the audit-logging-advanced.properties.sample file:

audit-logging-advanced.properties.sample
# Logging to the database is disabled by default
# To enable logging to the database, uncomment the next section, set audit_logging_advanced_config.database to true
# and configure a datasource
# audit_logging_advanced_config.database=true
# audit_logging_advanced_config.database.driverClassName=<driver>
# audit_logging_advanced_config.database.url=<url>
# audit_logging_advanced_config.database.username=<user>
# audit_logging_advanced_config.database.password=<password>




User and group report

The new user and group report enables our customers to effortlessly export a list of the current users, groups, and group memberships. Therefore, this functionality targets audits, system assessments, and migrations to the Celonis EMS!


To create the export in xlsx or csv format, simply navigate to:

  • <celonis_url>/api/user_group_roles_report/xlsx
  • <celonis_url>/api/user_group_roles_report/csv


Note: The user generating the export requires the following three roles (e.g., the initial sysadmin user): 

  • System Administrator
  • Global Content Administrator
  • User Administrator

Content of the user and group report:

  • All users (incl. user information such as ID, name, e-mail, roles)
  • Groups the users are a member of (incl. group information such as ID, name, roles)
  • Effective roles of the users (taking into consideration the roles directly assigned to the users and the ones assigned to the users via group memberships)

Note: Any user can appear multiple times in the report if they are part of multiple groups.


Example (including selected columns):

User IDUser NameSystem AdminUser AdminContent AdminGroup IDGroup NameG. System AdminG. User AdminG. Content AdminEf. System AdminEf. User AdminEf. Content Admin
1sysadmintruetruetrue




truetruetrue
2analystfalsefalsefalse12analyststruefalsefalsetruefalsetrue
2analystfalsefalsetrue14analysts_EMEAfalsefalsefalsetruefalsetrue




Permission report

In addition to the user report, a permission report can be generated. This report lists the content permissions (folder, analysis, data model) of every user and if access was granted on a user- or group level.


To create the export in xlsx or csv format, simply navigate to:

  • <celonis_url>/api/user_permissions_report/xlsx
  • <celonis_url>/api/user_permissions_report/csv


Note: The user generating the export requires the following three roles (e.g., the initial sysadmin user): 

  • System Administrator
  • Global Content Administrator
  • User Administrator

Content of the permission report:

  • All content objects (incl. object information such as ID, name, type)
  • All users permitted to the content objects (incl. user information such as ID, name, e-mail)
  • In case the access is granted on group level: ID and name of the group that provides the permission to the respective user
  • The effective permissions on the content (Administrate, Create Document, Edit Document, View Document, Create Data Model, Edit Data Model, Use Data Model)
  • Further information about the project the content object is located in (ID, name)
  • The effective roles of the respective user (taking into consideration the roles directly assigned to the user and the ones assigned to the user via group memberships)

Note: Any given content object will appear multiple times in the report if more than one user can access it.


Example (including selected columns):

Entry IDEntry NameEntry TypeUser IDUser NameGroup IDGroup NameCreateEdit ViewProject IDProject NameEf. Content Admin
22P2P AnalysisDocument2analyst12analyststruetruetrue1P2Pfalse
23P2P_EMEAFolder2analyst

falsefalsetrue1P2Pfalse
24P2P DMData Model4engineer

truetruetrue1P2Pfalse




Authorization report

Lastly, an authorization report can be generated. This report lists authorization objects that have a manual value mapping (authorization objects querying databases are not taken into consideration here)



To create the export in xlsx or csv format, simply navigate to:

  • <celonis_url>/api/user_authorizations_report/xlsx
  • <celonis_url>/api/user_authorizations_report/csv


Note: The user generating the export requires the following three roles (e.g., the initial sysadmin user): 

  • System Administrator
  • Global Content Administrator
  • User Administrator

Content of the authorization report:

  • All data models with authorization objects assigned to them (incl. information such as ID, name)
  • All users the objects are assigned to (incl. information such as ID, name, e-mail)
  • All authorization objects with manual value mapping (incl. information such as name, authorized table, authorized column, and authorized values)
  • The projects the respective data models are located in (incl. information such as ID, name)


Note: Any authorization object will appear multiple times in the report, if

  • it is assigned to more than one user or data model
  • multiple values are permitted to the user


Example (including selected columns):

Data Model IDData Model NameUser IDUsernameAuthorization NameTableColumnValueProject NameProject ID
24P2P DM2analystP2P_EMEAEKKOMANDTM11P2P
24P2P DM2analystP2P_EMEAEKKOMANDTM21P2P
25P2P DM4engineerP2P_EMEAEKKOMANDTM21P2P
26AP DM4engineerAP_APACEKKOMANDTM22AP




Improved transport creation

In the new version, you can now create transports more efficiently. We added the options to directly include:

  • all analyses from a selected folder
  • all analyses from a selected folder and all of its subfolders
  • all data models from a selected project
  • all analyses and data models from a selected project


In addition to that, you can select the new transport creation options directly when viewing a folder or project.





Bulk user deletion

Previously, it was cumbersome to delete large amounts of users from the front end. Therefore, we enabled bulk user deletions in the User Browser.


The end user is now able to:

  • Select all users
  • Select all users on the current page
  • Delete all selected users
  • Deselect all 

Note: It is impossible to delete the initial sysadmin user or the current user from this screen.





Other changes

"Include into axis range" for position lines in Scatter Plots

The checkbox to include position lines into the axis range was added to the Scatter Plot component.

When this option is active, the axis range will always be calculated to include the position line.



Chart color swatch

The color swatch of all chart components was optimized for colorblindness.


PreviousNew


Mouseovers for component titles

All components now display the full component title on mouseover. This change is most useful for components that tend to be smaller, such as Single KPI components.



Formatting for percentages in Pie Charts & Donut Chart components

In release 4.7.2, we added custom formatting for the "Show percentages" option of data series within Pie Charts & Donut Charts.



Input validation for Date Picker components

Date Picker components now validate the input date. Invalid input is highlighted in red.




Custom dimension for the Conformance Checker

Users can now provide a custom dimension in the Conformance Checker to measure the conformance of a column other than the default activity column.

This setting is accessible in the settings of the Conformance Checker or while "Mining the target process".

  • No labels