IBM BPM, V8.0.1, All platforms > Installing, deploying, and undeploying applications in the runtime environment
Security considerations for runtime installation and deployment
Before install a snapshot or deploy a service module in the runtime environment, consider any security requirements or restrictions associated with the snapshot, the module, or the environment.
If you have enabled Administrative and Application security, consider the following points.
- Only certain roles have the authority to install or deploy on the runtime server. Verify that the user who is performing the installation or deployment operation is assigned to the appropriate administrative security role. See "Restricting installation access to runtime servers."
- An application developed in IBM Integration Designer can have its own security constraints. In order to deploy a secured application, ensure that users and groups have been assigned to the roles that were defined when the application was constructed. See "Deploying secure applications."
Installing, deploying, and undeploying applications in the runtime environment
Related information:
Install process applications
Restricting installation access to runtime servers
Deploying secure applications
Administrative security roles