IBM BPM, V8.0.1, All platforms > Installing, deploying, and undeploying applications in the runtime environment

Security considerations for runtime installation and deployment

Before install a snapshot or deploy a service module in the runtime environment, consider any security requirements or restrictions associated with the snapshot, the module, or the environment.

If you have enabled Administrative and Application security, consider the following points.

Installing, deploying, and undeploying applications in the runtime environment


Related information:
Install process applications
Restricting installation access to runtime servers
Deploying secure applications
Administrative security roles