Unlock

The Unlock action unlocks a locked computer using a botflow A file that stores the actions and variables designed to automate tasks.. The Nintex RPA Unlocker installs a DLL file that allows Nintex RPA to use the Unlock action to unlock the machine if it is locked (for example, if a user uses CTL+ALT+DEL to lock their PC for security reasons). There is both a 64-bit and 32-bit version of the Nintex RPA Unlocker installer (depending on the bit version of the PC).

Using the Unlock action, you can:

  • Periodically check a computer to ensure it is online.
  • Unlock a computer as a troubleshooting step.
  • Unlock a computer at a predetermined time.
  • Unlock an idle computer in preparation for running a botflow.
Note: 
  • The Unlock action can only unlock a locked computer, such as a computer that is set to automatically lock after a set period of inactivity. It cannot perform the initial log in to the computer.

  • The Unlocker installation installs DLL files that Nintex Bot uses to unlock the machine while it is on the locked screen (when someone locks the PC, but does not log out of the machine). Administrator permissions are required to install the Unlocker.

  • The Nintex Bot machine must remain logged into the machine and then lock the machine in order for the Unlock action to work. It must be logged in using the same username and password associated with the Unlock action being executed.

  • Nintex Bot must be set up to run as an administrator.

    1. Find the Foxtrot.exe file in the installation folder: C:\Program Files (x86)\Nintex\RPA\Foxtrot.exe

    2. Right-click on Foxtrot.exe and select Properties.

    3. Click the Compatibility tab.

    4. Select Run this program as an administrator.

    5. Click OK.

  • The Nintex Bot machine must have User Access Control (UAC) turned OFF.

    1. In the Type here to search text box on the Windows 10 task bar, type UAC and select Change User Account Control settings.​

    2. Select the Never notify me when setting and click OK.

  • When connecting to a machine through RDP, do not log out of the machine; instead, disconnect from it. Additionally, follow these steps for handling RDP: