Book Image

Democratizing RPA with Power Automate Desktop

By : Peter Krause
Book Image

Democratizing RPA with Power Automate Desktop

By: Peter Krause

Overview of this book

Whether you want to organize simple files or perform more complex consolidations between different Office programs and remote-control applications that don't allow outside access, Power Automate Desktop helps meet these challenges. This book shows you how to leverage this workflow automation platform by explaining the underlying RPA concepts in a step-by-step way. You’ll start with simple flows that can be easily recorded and further processed using the built-in recorder. Later, you’ll learn how to use the more advanced actions to automate folder and file management and enable Office programs to interact with each other. You’ll also get to grips with integrating desktop flows into other cloud environments and further enhance their value using AI. As you progress, you’ll understand how flows can run unattended and how they are managed in the Power Platform, as well as key concepts such as creating, modifying, debugging, and error-handling UI flows. Finally, the book will guide you to use Process Automation Designer (PAD) in conjunction with your frequently used desktop systems to automate routine tasks. By the end of this book, you’ll have become a Power Automate Desktop expert, automating both professional and personal tasks.
Table of Contents (15 chapters)

Using additional security features

In the security environment, we have two action groups in PAD dedicated to this issue. In the Cryptography group, actions are available that enable the encryption and decryption of text or files. A so-called symmetric encryption method based on the Advanced Encryption Standard (AES) algorithm is offered, which allows a maximum key length of 256 bits.

Another option in this action group is to create a hash value for a text or a file. This hash value can also be calculated based on a key that is provided. Hash values are typically used when a text or a file should be checked against changes.

These mechanisms can, of course, fulfill a basic need for security. However, care must also be taken to ensure that the key information is stored securely and is not accessible to everyone. One way to do this is to use the actions in the CyberArk action group. CyberArk is a provider of identity and access management security solutions. After service access...