Search
The first method is searching for a topic in the table of contents by following down the tree while expanding the subsections, properties, links, and so on. Let us take a look at the first line of our handler (listing 5.19). Listing 5.19. MaterialsQuantityOnChange procedure ...
Using data types for manipulating database objects
... value only stores the internal identifier (the same that is stored in the Ref field of a catalog table). This value is stored in the fields of other database tables, it is selected in the input box and specified in the query parameters when data is searched via reference, and so on. It is important that a value of the type CatalogRef can always be compared with other values of the type CatalogRef and the values are always equal if these are the references to the same database object (regardless ...
Publishing 1C configuration via HTTPS protocol in IIS
... folder and then execute the letsencrypt.exe file on behalf of the local administrator. The application runs in the console window. In the console window, type your email address and press ENTER. Type "Y" and then press ENTER. The application searches for DNS records in your IIS server and displays found records. Type the number that corresponds to the domain you are configuring ("cfg.cf") and then press ENTER. Wait for the confirmation that the TLS certificate is ready and installed ...
Getting the PayPal payment list through REST API
... First of all, the two fields are important here: Client ID and Secret . Using the values of these fields, we can connect from the program on the 1C platform using REST API and get the necessary data. On the same page below, select the Transaction Search option. This option allows our program on the 1C platform to receive a list of operations. After that, click Save : We can also log into our PayPal test accounts as in a regular account, see the balance, make a transfer of money from one test ...
Kerberos authentification setup example for the Linux version of 1С:Enterprise server
... distribution package that you use, in this example you have to edit the /etc/resolv.conf file manually by adding the IP address of the domain controller, so that the file includes the following lines: srv1c:~# cat /etc/resolv.conf nameserver 192.168.29.150 search krb.local srv1c:~# Then check the work of the DNS. Run the ping command: srv1c:~# ping main -c 1 PING main.krb.local (192.168.29.150) 56(84) bytes of data. 64 bytes from 192.168.29.150: icmp_seq=1 ttl=128 time=0.177 ms ---main.krb.local ping ...
... opening and closing 1C:Enterprise script clauses (including brackets): Procedure ... EndProcedure , If ... EndIf , and so on Selecting identifiers is disabled by default. To use this feature, enable it in Designer options dialog box. Selecting the search expression is available in Designer, thick client, and thin client. This features were not provided. The 1C:Enterprise script editor is improved. External data sources. External data sources support all features of the MySQL query language. In ...
What Can You Build with the 1C:Enterprise Platform?
... registers, the accounting engine, the chart of characteristics, the chart of accounts, business processes, and others. Technology components include web and HTTP services, data access, support for background processes and tasks, data history, full-text search, and others. Catalogs, documents, and reports are good examples to describe the role of platform objects. Catalogs are lists that contain products, customers, currencies, and similar. Documents log all the events that occur as a company runs ...
Using script tools for working with applied objects
... references, selections, objects to be changed, record sets, and so on (see section "Object interconnection" later in this article). An object of this type provides access to an applied object as a set of items. Methods of this object can be used to search for data, obtain selections, create new records, or call forms and templates of the applied object. Typical properties (for catalogs and charts): <name of a predefined item> Typical methods: Select() FindByCode() FindByAttribute() EmptyRef() ...
Setting Access Rights in 1C:Enterprise (Data Separation Feature)
... currentUser . Company ; If Not currentCompany . IsEmpty () Then SessionParameters . CompanyValue = currentCompany ; SessionParameters . CompanyUse = True; EndIf; EndIf; EndProcedure The code is very simple and means that when the system starts, a user is searched for in the "Users" catalog, at that user's name must match the name used for the authorization. If a user is found and has "Company" specified, the session parameters "CompanyValue" and "CompanyUse" are ...
... to make it easier to repeat this verification later. Let it be Mobile . Select the following checkboxes: Verifying configuration integrity and consistency ; Find unresolved references ; Mobile application - client ; Mobile application - server ; Search for unsupported functionality . Click OK . Figure 12-3. The Configuration check window The configuration will be verified for compatibility with the mobile platform. The result of this verification will be 11 errors. Figure 12-4. The result of ...
First | Prev. | 44 45 46 47 48 | Next | Last