Looking for information about ProntoForms features and functionality? Visit our Product Documentation Portal.
App‑to‑App communication is a way to exchange data between apps on a device, even if the device is offline. This topic lists the prerequisites for using App‑to‑App communication between the ProntoForms app and the ServiceMax Go app.
Supported on all tiers:
Note: Inbound requests are supported on all tiers. Callbacks are supported only on the Advanced and Enterprise tiers.
You must have an active ServiceMax Core subscription.
You must install and sign in to the ServiceMax Go app on your Android, iOS, or Windows device.
You must dispatch a work order that is linked to an active wizard.
The User-defined Custom Actions setup requires Unique Identifiers for questions in ProntoForms. Decide which ProntoForms answers you want to prepopulate and keep the associated Unique Identifiers ready for use.
Info:The topic Overview: Unique IDs describes how to find the Unique Identifiers in ProntoForms.
ProntoForms prerequisites for inbound requests
App‑to‑App communication requires that users install and sign in to the ProntoForms mobile app.
Note:App‑to‑App requests sent to logged-out users fail without triggering an x‑error callback.
To use the
searchaction, the mobile device user must belong to a ProntoForms team that has Search enabled.
ProntoForms prerequisites for callbacks
- Your ProntoForms Team must be on the Advanced or Enterprise tier.
You must be an Admin user or a User with Can Create FormSpace permissions.Tip:If you’re not an Admin user, you should have the following permissions so that you can thoroughly test your forms:
- Can Test
- Can View
- Can Submit
Configure a custom App‑to‑App allow list to include https://go.servicemax.io/
The default allow list settings depend on when your team was created:
For teams created before February 23, 2021, the allow list defaults to all callbacks allowed.
For teams created after February 23, 2021, the allow list defaults to no callbacks allowed.
Note:In both cases, we recommend that you configure a custom App‑to‑App allow list.