Decode the URL-encoded parameters injected by the Process screen so the JSON tool can parse them properly

Issue No: IN-376
Created 5/22/2019 4:19:53 AM
Type Bug-QC
Priority Blocker
Status Closed
Resolution Fixed
Fixed Version 19.1
Description Process screen is modifying the original parameters that are being passed into the JSON executable tool. I think this is for security reasons. A workaround is to add an option for the tool to decode the URL-encoded parameters.   !pastedImage_d118957_0.png|height=603,width=1097!