The Tulip Player is an Electron-based application built by Tulip for operators to run Tulip apps. These apps are created on the "App Editor" Page.
Once installed on a device and configured by a user with "create" permissions for Stations, it can run the set of apps and versions that are determined by the "Shop Floor" Page.
The Tulip Player is meant for "production" use cases, in other words, for running the published versions of apps in order to store production data.
Here are the environments that can run the Tulip Player:
Operating System | Method | Requirements |
---|---|---|
Windows | Downloadable Application from Tulip Website | Windows 10, 64 bit processor, 4 GB RAM |
Windows | Chrome Browser | Windows 10, 64 bit processor, 4 GB RAM |
MacOS | Downloadable Application from Tulip Website | 64 bit processor, 4 GB RAM |
MacOS | Chrome Browser | 64 bit processor, 4 GB RAM |
iPadOS | Safari browser | Recommend testing for each class of device you intend to use. |
iOS | Safari browser | Recommend testing for each class of device you intend to use. |
Android | Downloadable Application from Google Play Store | Android OS 5.1 or later. Recommend testing for each class of device you intend to use. |
Thin Clients | Downloadable Application from Tulip Website | Recommend testing for each class of device you intend to use. |
It supports the following devices on Windows with no external configuration:
It supports the following devices on Android, macOS, iOS, iPadOS:
The Tulip Player can be opened via two methods:
This method does not require authentication. The Player is automatically authenticated when it is installed on the machine, and can be opened via a URL string through other programs on the machine that the user has the appropriate credentials to access.
There are two ways to initialize the Player via human input- either via the credentials of a Tulip user or via a single-use link that is provided by a Tulip user.
Tulip User Authentication
Operator Authentication
The Tulip Player collects data from applications that were originally created by Tulip users. App data is stored in the Tulip database when the app is "completed". An app is "completed" when a Trigger with the "Complete App" transition is executed.
Once data is stored from an application, it cannot be modified or deleted. The main components of the Tulip Player:
The Tulip Player Menu can be accessed by pressing the "Menu" button within any running Tulip app.
Here's how apps run in the Player can manipulate different Models in the Tulip system.
View
Edit
View
View
Edit
Create
Delete
Create
View
View
Step, Signature Step, Regular Step, Form Step
View
View
Create
View
View
Create
Edit/View/Delete
These are the details associated with each unique install of the Player.
Name | Description |
---|---|
Language | Choose the language for all the text in the Player Menu. Choices include English, German, Spanish, French, Italian and Japanese |
App Version | The installed version of the Tulip Player |
Device | The name of this install of Tulip Player when referenced within Tulip |
Serial Number | The unique identifier for this install of the Tulip Player |
Navigation Audio | A boolean value to turn default navigation sounds on or off. This setting will inherit the global setting, but can be overitten. |
Device Input Language | Choose whether barcode scanners should attempt to output in English or the keyboard's default language |
Clear All Data | When a user chooses this option, all configuration settings will be discarded and a Tulip user will need to reauthenticate the Player as if it had just been installed for the first time |
ID | Name |
---|---|
QA-T17 | User Management : 09 - Login to /player using new badge ID |
QA-T62 | Variable widget : 07 - Testing variables and compound variables in app |
QA-T98 | Record Placeholders : 04 - Load Table Records Trigger, and Table Record Widget |
QA-T99 | Record Placeholders : 05 - Create and Load Table Record Trigger |
QA-T100 | Record Placeholders : 06 - Table Data Tab |
QA-T108 | Signature Step : 03 - Signature form should allow any user to submit it when configured so |
QA-T109 | Signature Step : 04 - Signature form should allow only the current user to submit it when configured so |
QA-T110 | Signature Step : 05 - Signature forms should only be submittable a single time per process run |
QA-T112 | Signature Step : 07 - LDAP Signature Widgets should accept a correct username/password pair |
QA-T136 | Values are persisted |
QA-T148 | SQL Connectors : 02 - Add Function to SQL Connector |
QA-T183 | Triggers - Print Using System Dialog Trigger |
QA-T208 | Analytics - Analytics Widget |
QA-T212 | Logs stored on system (Windows) |
QA-T219 | Load failed view- 'Retry' tests |
QA-T222 | Picking and authenticating server and factory instances |
QA-T223 | Developer tests - channel and server |
QA-T224 | Auth'd credentials - with and without proxy (Windows) |
QA-T225 | Onscreen Keyboard loads and resizes according to content on touch devices |
QA-T228 | Player settings persist across app restarts |
QA-T232 | Proxy Testing for Updater (Mac) |
QA-T240 | HTTP Connectors : 02 - Add several functions to HTTP Connector |
QA-T243 | Embedded Tables : 03 - Connect an embedded Tulip Table to a Table record |
QA-T267 | User Roles : 08 / Viewers should be unable to modify data in Tulip |
QA-T299 | Camera Tests |
QA-T332 | LDAP Tulip Managed : 02 - Users can log in via LDAP |
QA-T334 | Stations Page - Player Authorization |
QA-T335 | Stations Page - Station and Station Group Management |
QA-T336 | Stations Page - Station App Configuration |
QA-T337 | Stations Page - Live Preview and Player Control |
QA-T347 | Form Step - Running the Form Step |
QA-T349 | App Editor Misc - Player Menu |
QA-T350 | App Editor Misc - Comments |
QA-T372 | Single Install authentication on Windows Platform |
QA-T373 | Single Install login on Windows Platform |
QA-T375 | Single Install - Instance locking |
QA-T394 | Configuration and Apps : 06 - Test Snapshot Feature with regions |
QA-T421 | Automatic Updates - 24 Hour Deferral |
QA-T437 | Single Install - Instance locking timeout |
QA-T534 | Display Devices Page : 05 - Shareable Link |
QA-T558 | Single Install: Migration to operator auth from badge Id mode |
QA-T559 | Single Install: Migration to badge Id from operator auth mode |
QA-T651 | Signature Step : 07 / LDAP Signature Widgets should reject wrong/empty passwords |
QA-T655 | LDAP Tulip Managed : 02 / Operators can't log into Factory via LDAP |
QA-T666 | Logs stored on system (MAC) |
QA-T670 | Proxy Testing for Updater (Windows) |
QA-T671 | Auth'd credentials - with and without proxy (Mac) |
QA-T673 | Factory Logger |
QA-T675 | Configurable Storage path (Mac) |
QA-T729 | HTTP Connectors : 06 - HTTP Connector Functions perform the same with TLS on/off |
QA-T750 | Workspaces : 11 / - Failing to run an app from another workspace |
QA-T751 | Workspaces : 12 / - Workspace owner cannot access other workspaces |
QA-T809 | Mobile - Register Tulip Player on SAML enabled site |
QA-T837 | Display Devices Page : 06 - Shareable Link - One time use |
QA-T838 | Display Devices Page : 07 - Shareable Link - Reusable Links |
QA-T923 | Embedded Tables : 03 / Only matching record placeholders can be selected |
QA-T962 | Analytics - Analytics Widget (cloned) |
ID | Requirement |
---|---|
PLAT-8741 (462) | Ability to view and display the material history record for a specific batch/lot and material |
PLAT-8780 (105) | Support of Tulip operation on mobile devices |
PLAT-8792 (56) | Apps can be used without external keyboard and mouse. |
PLAT-8799 (75) | Ability to send notifications from any content screen. Ie. email, txt message, alarms. |
PLAT-8807 (32) | All Users have to be uniquely identified |
PLAT-8811 (255) | Ability to verify that equipment (room, suite, area, etc.) meets routine cleaning requirements and prevent process start if cleaning status requirement is not met prior to start of processing. |
PLAT-8874 (848) | The ability to discern invalid or altered records. Ability to annotate data is changed. For GMP or critical data changes annotation can be configured as required. |
PLAT-8883 (814) | Ability to view, display and and print accurate and complete records, including any attachments, electronic signatures and their associated audit trails. |
PLAT-8888 (811) | All records, electronic signatures, and audit trails must be protected to ensure they are readily retrievable throughout a pre-configured retention period. |
PLAT-8920 (802) | All records shall be Original; all originally recorded data shall be maintained. |
PLAT-8939 (35) | Automatic logout user from system after a configurable amount of inactivity time |
PLAT-8943 (807) | All records shall be Available and can be accessed for review, audit or inspection over the lifetime of the record (retention period). |
PLAT-8946 (806) | All records shall be Enduring, ie. store, managed and unalterable for the full retention period. |
PLAT-8984 (244) | Ability to view and print a version of App that define a specific Master Batch Record (MBR) or Master Device Record (MDR) |