検索

Pregunta
· 2 hr atrás

"Invalid Action" Error When Accessing CSP

I’m facing an issue with a CSP-based web application.
The default.csp page loads correctly on both servers. However, when I try to open or submit the login.csp page on one server, it shows the error:

"INVALID ACTION"

The exact same codebase is deployed on another IRIS server, and it works there without any issues.

Summary of the issue:

  • default.csp → Loads successfully
  • login.csp → Fails with “INVALID ACTION” only on one server
  • No code changes between the two servers

Has anyone encountered this kind of scenario?
What configuration differences should I check between the two servers that might cause this behavior?

Comentarios (0)1
Inicie sesión o regístrese para continuar
Resumen
· 7 hr atrás

InterSystems 开发者社区中文版:每周摘要(2025年11月24日-30日)

十一月 24 - 30, 2025Week at a GlanceInterSystems Developer Community
Pregunta
· 8 hr atrás

Filename capture during BPL process

Need to capture filename during BPL process, then set it to MSH-6 in the HL7 message.

Please advice, if this can be done.

2 nuevos comentarios
Comentarios (2)3
Inicie sesión o regístrese para continuar
Pregunta
· 10 hr atrás

Filename read during HL7 message processing

I need to read first six characters from the filename we process in healthconnect, then need to insert these six characters in MSH-6 in the same HL7 message. (please note each file can have multiple HL7 messages with multiple MSH segments)

Is something can be done when first process the file, then insert first characters MSH-6?

Please advice if this is an easy fix.

3 nuevos comentarios
Comentarios (3)3
Inicie sesión o regístrese para continuar
Artículo
· 11 hr atrás Lectura de 28 min

Security in IRIS

Security is fundamental to enterprise application development. InterSystems IRIS provides a comprehensive security framework that protects data, controls access, and ensures compliance. This guide introduces essential security features for developers new to IRIS, covering authentication, authorization, encryption, and practical implementation strategies.

Comentarios (0)1
Inicie sesión o regístrese para continuar