Task Mining Desktop Application
System requirements
Operating system:
Windows 10 (from version 2.2) or Windows 10 release 1903 or higher (version 2.0).
Windows 11 (beta).
Important
Support for Windows 11 is currently in beta. Get in touch if you have any feedback.
.NET Framework 4.8 (or higher).
Firewall: Outgoing connections from the Task Mining client to your Celonis Platform team via HTTPS.
Note
If your machine is running on up-to-date Windows 10, this .NET Framework should already be installed. If it is not installed, you will see a pop-up window when you first start Task Mining; this includes a link to the .NET Framework download page. You should download the correct version from there; you will need admin rights to do so.
Installing the Desktop Application software
Download "CelonisTaskMining.Installer-2.x.x.msi".
Run the installer package and follow the instructions of the installation wizard.
Updating an existing installation
Note
This is for both desktop applications, the Task Mining client and the Configuration Editor.
If the currently-installed version is 1.x.x:
The old version is restricted to per machine context (admin):
Newer version installed per user (not admin); this replaces the 1.x.x version.
Newer version installed per user (not admin); this replaces the 1.x.x version.
Note
For both of these scenarios, admin rights are required and you will be prompted to enter your credentials.
If the currently-installed version is 2.x.x:
old version per machine and new version per machine; prompts for admin rights and replaces the older version.
old version per user and new version per machine; prompts for admin rights and keeps the older version. This means there will be two different installation folders and two Start menu entries for .
old version per machine and new version per user; prompts for admin rights and replaces the older version.
old version per user and new version per user; replaces the older version without prompting for admin rights.
Tip
You can also (optionally) install browser extensions for Chrome and Edge. For further information, see Task Mining Desktop Application browser extensions (optional).
Configuration Editor (optional)
Note
This is only required if you want to create or change the Task Mining XML configuration file.
Download "CelonisTaskMining.Configuration.Installer-2.x.x.msi".
Run the installer package and follow the instructions of the installation wizard.
Installation without admin rights
On default Windows setups, the installer provides an option to install only for the current user; admin rights are not required.
Configure Task Mining (deprecated)
Notice
This section only applies to version 2.0 and prior. From version 2.2, the configuration is centrally-managed in the Celonis Platform and automatically downloaded by clients.
The Task Mining desktop application requires a configuration file (with file name extension .recconf) in XML format. This configuration file can be created with the Task Mining Configuration Editor.
The Celonis Task Mining desktop application tries to automatically retrieve a configuration file and searches in the following order:
Recently-used configuration file: the desktop application stores this and will re-use it if possible.
List of paths: the desktop application searches for a configuration file in a pre-defined list of paths (subfolders are not searched) in the following order:
The current directory (installation directory of the desktop application).
The home directory of the user.
The user's
My Documents
directory.Celonis Task Mining subdirectory in the Windows application data folder.
Manually-selected configuration file: the user is prompted to select a configuration file.
Warning
Based on the order given, the desktop application will always use the first configuration file that can be loaded successfully. If you have multiple files stored in different folders, the configuration file that is actually loaded may not be as expected.
Password input
If the field type is known and the type is a password field, the text input will not be captured. This means the content of password fields is ignored if they are extracted via the Chrome extension or the SAP integration; the fields 'EnteredText', 'ClipboardContent', 'TargetElementValue' and 'ElementTextSAP' respectively will be set to Null. For other applications, custom rules can be used to either generally hash the fields 'EnteredText' and 'ClipboardContent' or hash them for specific login screens. These can be identified, for example, using the fields 'URL' or 'ActiveWindow'.
Persisted directories and registry keys
Note
The Task Mining Desktop Application needs access to some directories and registry keys to work as expected.
Persisted directories
Directory | Access type | Description |
---|---|---|
|
| Installation directory when installed per machine context. |
|
| Installation directory when installed per user context. |
| Read/write access during runtime. | Contains cached parquet and image files. Can be configured in the project configuration. |
| Read/write access during runtime. | Contains cached configuration, application settings and logs. |
| Read/write access during runtime. | Contains required application settings. We recommend making the entire |
For further information, see Environment.SpecialFolder Enum. ImportantAny references to third-party products or services do not constitute Celonis Product Documentation nor do they create any contractual obligations. This material is for informational purposes only and is subject to change without notice. Celonis does not warrant the availability, accuracy, reliability, completeness, or usefulness of any information regarding the subject of third-party services or systems. | Write access during runtime. | Contains crash report files. |
For further information, see Environment.SpecialFolder Enum. ImportantAny references to third-party products or services do not constitute Celonis Product Documentation nor do they create any contractual obligations. This material is for informational purposes only and is subject to change without notice. Celonis does not warrant the availability, accuracy, reliability, completeness, or usefulness of any information regarding the subject of third-party services or systems. | Write access during runtime. | Contains error log files if configuration could not be loaded. |
Persisted registry keys
Note
For:
KMU
, when the client is installed per machine context (admin), the key will be underHKLM
. When installed per user context, the key will be underHKCU
.<SOFTWARE>
: On 32-bit Windows systems, replace withSoftware
. On 64-bit Windows systems, replace withSoftware\Wow6432Node
.
If the registry key for autostart is not writable, the application will not autostart at system start.
Registry key | Access type | Description |
---|---|---|
| Write access during installation. | Registers installation of the application. |
|
| Activation link to automatically activate the client on the first start. |
|
| Client certificate subject used for secure gateway authentication. |
|
| Working directory of the Task Mining client. |
|
| Custom connection timeout. |
|
| Custom browser extension IDs for self-hosted rollouts. |
|
| Host URLs of the secure gateway server. |
|
| Service principle names used for the on-premise Task Mining gateway. |
|
| Custom port for the Chrome Extension. |
| Write access during installation. | Update URL of the Chrome Extension. |
| Write access during installation. | Update URL of the Edge Extension. |
| Write access during installation. | Autostart entry for the Task Mining client. |
| Write access during installation. | Registers the Task Mining-specific URL. |
| Write access during installation. | Registers the shell command to open the client from URL. |
| Write access during installation. | Enables browsers to open the Task Mining client from URL. |
API endpoints
The Task Mining client must have access to these API endpoints.