No Code Flows Overview
EmpowerID's No Code Flows provides administrators with a framework to design, manage, and automate business process workflows without traditional coding. Built on a component-based architecture, No Code Flows offers predefined elements that connect stages of a business process, from data acquisition to approval mechanisms and task execution.
This article introduces the core components and execution flow of No Code Flows, providing the foundation needed to build automated workflows in your organization.
Core Components
No Code Flows consists of interconnected components that work together to automate business processes. Understanding these building blocks is essential for creating effective workflows.
Flow Events
Flow Events are triggers that initiate workflows. When an event occurs, it is added to the Flow Event Inbox, where it awaits processing by the system.
Common Flow Event examples:
- Person Leaver — Triggered when an employee or contractor leaves the organization. May initiate actions such as disabling accounts, removing group memberships, archiving emails, and revoking access to resources.
- Mailbox Discovered — Triggered when a new mailbox is detected. May initiate verification, distribution list additions, or security control setup.
- Account Takeover — Security-related trigger indicating potential unauthorized access. May initiate account suspension, security team notifications, or investigation procedures.
Figure 1: Flow Events page showing the Person Leaver event configuration
Flow Items
Flow Items are specific tasks or actions performed in response to Flow Events. Each Flow Item handles a particular aspect of the event response.
Flow Item parameters:
| Parameter | Purpose | Example |
|---|---|---|
| Item Type Action | Specifies the exact task to execute | "Bulk Remove Person Group Membership", "Person Disable" |
| Item Scope Type | Determines the range within which the action executes | "All Accounts for Person", "Remove All Non-RBAC Group Accounts" |
| Item Collection Query | SQL statement that retrieves resources related to the Flow Item | Query to retrieve all user accounts owned by a person |
Together, these parameters define what action to take, where to apply it, and which resources to affect. Multiple Flow Items can be combined within a Flow Definition to create complex automated workflows.
Flow Definitions
Flow Definitions are containers that hold one or more Flow Items. They serve as templates for business processes, defining how Flow Items are orchestrated in response to specific Flow Events.
For example, a "Person Leaver" Flow Definition might contain Flow Items for disabling accounts, removing group memberships, and archiving emails, executed in a specific sequence.
Figure 2: Flow Definition showing multiple Flow Items and their execution sequence
Flow Policies
Flow Policies connect Flow Events to Flow Definitions. They specify which Flow Definitions to trigger in response to particular events.
Organizations can create multiple Flow Policies for a single event to handle different scenarios. For example:
- An "internal employee departures" policy might disable access to internal systems
- An "external consultant departures" policy might revoke temporary access permissions
This flexibility allows organizations to adapt automated responses to specific circumstances and requirements.
Figure 3: Flow Policy linking a Flow Event to its corresponding Flow Definition
Flow Policies and Flow Definitions work together: Policies determine what should happen in response to an event, while Definitions specify how it should happen.
Business Requests
When an event triggers a Flow Definition, the system generates a Business Request. This represents a formal request to execute the actions defined in the Flow Definition.
Business Request Items
Business Request Items are the individual tasks generated from Flow Items within a Business Request. Each item holds data such as request details, assignee ID, and resource ID. Items are processed independently in the order defined by the Flow Definition. If an item depends on another item's completion, it waits until the dependency is satisfied.
Approval Flow Policies
Approval Flow Policies route Business Requests to appropriate approvers. For example, when a person changes locations, the request might route to their manager for approval before resources are allocated. Requests can also be configured to execute automatically without approval when appropriate.
Fulfillment Workflows
Fulfillment Workflows define the procedures followed when a Business Request Item is approved, auto-approved, or rejected. These workflows are triggered after the Approval Flow Policy completes. Based on the approval outcome, different workflow branches execute specific tasks such as updating systems of record, sending notifications, or performing post-decision activities.
Flow Execution Process
The following steps describe how No Code Flows execute from event trigger to completion:
- An event occurs (e.g., "Person Leaver")
- The event is added to the Event Inbox
- Applicable Flow Policies determine which Flow Definitions to run
- Flow Definitions are added to the Flow Inbox
- Each Flow Definition is processed and creates a Business Request
- The Business Request generates Business Request Items based on the Flow Items in the definition
- Business Request Items are sequenced according to the Flow Definition timing and dependencies
- Items requiring approval are routed to appropriate approvers
- Upon approval or auto-approval, items are sent to the Business Request Fulfillment engine for execution
Figure 4: Complete flow execution process from event trigger to fulfillment
Next Steps
Now that you understand No Code Flows components and execution, you can begin building automated workflows:
- Create Flow Definitions — Build templates for your business processes
- Create Flow Items — Define specific actions for your workflows
- Create Flow Policies — Connect events to automated responses