Use Case Collection
You can use FLOWSTER Studio for a wide range of IT use cases in a variety of fields. These can occur in almost any company. With the FLOWSTER Use Case Collection, we would like to support you in identifying possible use cases in your own company that you may not have considered before. Our experience from numerous customer projects forms the basis of this collection. It is intended to serve you as a source of ideas and a decision-making aid.
If you would like to get to know something new or simply find a new source of inspiration, we have compiled use cases in various areas that can do just that: Inspire and make you want to discover.
The Use Case Collection contains examples of use cases in the following categories.
Create an Active Directory user, also as import of a list
Activates a selected Active Directory user in different systems
Changes an Active Directory user in different systems
Disables a selected Active Directory user in different systems
Deletes a selected Active Directory user in different system
Delete user time-controlled
Deletion of a registered Active Directory user with the current or an earlier date entered as the deletion date.
Create permission role
Creates a new user role in Active Directory
Delete permission role
Deletes an Active Directory permission role
Change user permission temporarily
Changes an Active Directory user permission for a permission period
Revoke temporary permissions time-controlled
Temporary permissions in Active Directory are granted or revoked by checking the current date at the permission period
Reset user password
Resets the Active Directory password of a user to a new password
Change user role
Changes an Active Directory user role and the associated groups
Synchronisation of different Active Directories
Synchronizes different directory services with Active Directory
All required accounts and accesses to folders and directories for new employees will be created automatically. Permissions on applications, services and drives are created.
All stored accounts and accesses to folders and directories of an employee will be automatically removed upon resignation. Permissions to applications, services and drives are revoked again.
Promotion or name change
When the employee situation changes, authorizations are automatically updated – e.g. in case of a change of department, promotion, marriage with a change of name or or even longer absences due to illness.
In the case of temporary changes for employees, access authorizations are adjusted automatically – for example, in the case of
temporary work in project or work groups, during parental leave or in the case of a substitute.
At any time, you keep an overview of the current status of the boarding process of an employee or an employee group. This allows you to check and understand the process quickly and provide information as needed.
Forgotten passwords cost time and productivity. On average, they reduce the working time of both an employee and the involved helpdesk two times a year. Via Self-Service passwords can be reset independently, directly and automatically in compliance, thus increasing the performance of employees, HR staff and administrators.
All tasks around the user administration
are executed automatically.
Create a new Microsoft 365 user
Delete an existing Microsoft 365 user
Enable a created Microsoft 365 user
Disable an activated Microsoft 365 user
Locking a created Microsoft 365 user
Unlocking a created Microsoft 365 user
Resetting the password of a Microsoft 365 user to a unique password
Permissions are automatically
assigned to and revoked from users.
Assign a permission to a user
Assign one or more permissions to a 365 user
Revoke a user permission
Revoke one or more permissions from a 365 user
Licenses and clients as well as the
assignment to users regulate the possible
use of applications. The necessary actions
are simple, automated and executed in a
Assign license to a client
Assign a license to a created Microsoft 365 client
Revoke license from a client
Revoke a license from a created Microsoft 365 client
Assign license to a user
Assign a license to a created Microsoft 365 user
Revoke license from a user
Revoke a license from a created Microsoft 365 user
E-mail and function mailboxes are
created automatically and users
and their deputies are assigned.
In addition, external tools for backup
and restore can be triggered automatically.
Set up mailbox
Set up a Microsoft 365 mailbox for a user
Set up function mailboxes
Set up one or more functional mailboxes in Microsoft 365 – for example, Analyze, Distribute, forward, archive, or delete messages.
Authorize user to a function mailbox
Entitles a Microsoft 365 user to a functional mailbox
Set up mailbox deputy
Create a deputy for a Microsoft 365 user
Back up mailbox (control from external tools)
Backing up a user’s Microsoft 365 mailbox by controlling of external tools
Playback mailbox (control of external tools)
Playback a user’s Microsoft 365 mailbox by control of external tools
Create a new Microsoft 365 client
Delete an existing Microsoft 365 client
Manage licenses and usable products
Manage external tool list
Migrate databases between clouds
Migrate databases servers from one cloud to another
Migrate Kubernetes between clouds
Migrate Kubernetes services from one cloud to another
Migrate virtual servers between clouds
Migrate virtual servers from one cloud to another
Manage accounts in cloud environments
Benutzerkonten verschiedener Cloud-Anbieter verwalten
Manage resources across many clouds
Manage services such as VPCs or machines in over 100 clouds – for example, create, start, stop, or delete
Monitor compliance rules when creating resources in clouds
Create cloud cost reporting
Read and analyze cost statements from different clouds
Authorize users on applications
Adds an Active Directory user to a CITRIX Active Directory Application Group
Authorize users on desktop / VDI
Adds a user or group to a CITRIX Desktop Group
Revoking the permission to published application
Revoking the rights of a Citrix Application Group in Active Directory
Revoking the authorization to a delivery group
Removing a Citrix Delivery Group in Active Directory
Create Citrix Delivery Group
Creating an Active Directory Citrix Delivery Group
Create Citrix application group
Creating an Active Directory Cirtix Application Group
Identify desktop group
Reading out a Citrix Desktop Group
Switch on virtual machine
Powering up a CITRIX virtual machine
Turn off virtual machine
Shutting down a CITRIX virtual machine
Restart virtual machine
Restarting a CITRIX virtual machine
Create a snapshot of a virtual machine
Creating a snapshot of a running CITRIX virtual machine
Add machine to a machine catalog
Adds a CITRIX machine to an existing machine catalog
Add server to an application silo
Adds a CITRIX server to an existing application silo
Test XenApp login automatically
Automatic test of Citrix XenApp login every xx minutes
Test XenDesktop login automatically
Automatic test of Citrix XenDesktop login every xx minutes
Migrate local database to AWS
Migrate local database to Azure
Migrate local Kubernetes
Migrate local virtual servers to AWS
Migrate local virtual servers to Azure
Checking fill levels
Query fill levels ad-hoc – for example, after being notified by an alarm.
Query temperatures or pressures ad-hoc – for example, after being notified by an alarm.
Checking vibration values
Vibration values recorded by sensors can be condensed into patterns and divided into categories. These can provide information about faults that have occurred or the state of preservation.
Master Data Collector
Time-controlled readout of sensor values to a central database. This reduces the energy consumption of the sensors through ad-hoc queries.
By collecting and analyzing monitoring information, the probability and timing of a failure can be predicted. This increases availability and reduces costs incurred by unexpected failure.
Reacting to exceeding or falling below threshold values
Comparison of the read sensor values with predefined threshold values. If the values exceed or fall below these thresholds, a notification can be sent or an automated check can be initiated.
Create service request
Generate service request in full
Execute service request
Accept service request and implement content-related
Edit service request
Service Request mit Informationen augmentieren
Create change request
Create change request in full
Execute change request
Accept change request and implement content-related
Edit change request
Augment change request with information
Create incident in full
Take over Incident and implement content-related
Augment incident with information
Create virtual BSD machine
Creating a virtual machine from a BSD image in VMware
Create virtual CentOS machine
Creating a virtual machine from a CentOS image in VMware
Create virtual RedHat machine
Creating a virtual machine from an RHEL image in VMware
Virtuelle SuSe-Maschine erstellen
Creating a virtual machine from a SuSe image in VMware
Create virtual Ubuntu machine
Creating a virtual machine from an Ubuntu image in VMware
Create virtual Windows machine
Creating a virtual machine from a Windows image in VMware
Switch on virtual machine
Starting a virtual machine in VMware
Switch off virtual machine
Switching off a virtual machine in VMware
Export virtual machine
Exporting a virtual machine in VMware
Clone virtual machine
Cloning a virtual machine in VMware
Restart virtual machine
Switching a virtual machine off and on again in VMware
Move virtual machine
Moving virtual machines from one host to another in VMware
Create a snapshot of a virtual machine
Creating a new snapshot for a running virtual machine in VMware
Reset virtual machine to snapshot
Resetting a virtual machine to a previous snapshot in VMware/p>
Mark virtual machine for scheduled removal
Creating a new virtual machine from a template and setting an expiry date in VMware
Remove virtual machine time-controlled
Monitor the expiry date and delete a virtual machine in VMware via workflow
Update Linux systems
Installing Linux updates in VMware
Update Windows systems
Installing Windows updates in VMware
Restart ESX hosts
Restarting one or more VMware ESX hosts
Extending resources for a virtual machine
Modify resources of a virtual machine in VMware
Move server to another network segment
Move a list of servers from one VLAN to another VLAN. Firewall rules, IP addresses and monitoring are automatically moved as well.
Query storage capacity
Verify the existing and unused capacity of a datastore in VMware.
Do you still have questions?
Would you like to advance your IT automation? Make an appointment and we will answer the following questions, among others:
- What are the options?
- Which solution suits you?
- What is the cost structure?