IBM BPM, V8.0.1, All platforms > Securing IBM BPM and applications

Configure administrative and application security

The first step in securing your IBM BPM environment and your applications is to make sure that administrative security is enabled. In WebSphere Application Server version 7.0, administrative security is enabled by default. If you have disabled administrative security, use the following instructions to enable it again.

Important: Application security is required by IBM BPM and must not be turned off in the administrative console. Using the administrative console, you can enable administrative security, application security, and Java™ 2 security.


Procedure

  1. Open the administrative security page in the administrative console.

    Expand Security and click Global security.

  2. Confirm that Enable administrative security is selected. If not, select this option.
  3. Confirm that Enable application security is selected. If not, select this option.

  4. Optional: Enable Java 2 security, if required.

    Although Java 2 security is supported, it is disabled by default. Select Use Java 2 security to restrict application access to local resources to enforce Java 2 security permission checking.

    When you enable Java 2 security, an application that requires more Java 2 security permissions than are granted in the default policy might fail to run properly until the required permissions are granted in either the app.policy file or the was.policy file of the application. Access Control exceptions are generated by applications that do not have all the required permissions. For more information about Java 2 security, see the topic on Configuring Java 2 security policy files in the WebSphere Application Server Information Center. A related link is provided.

    Updates to the app.policy file apply only to the enterprise applications on the node to which the app.policy file belongs.

    1. Select Warn if applications are granted custom permissions. The filter.policy file contains a list of permissions that an application should not have according to the Java 2 Platform, Enterprise Edition 1.4 Specification.

      If an application is installed with a permission specified in this policy file and this option is enabled, a warning is issued. The default is enabled.

    2. Select Restrict access to resource authentication data. Enable this option if you need to restrict application access to sensitive Java Connector Architecture (JCA) mapping authentication data.

  5. If you made changes to the security settings, perform these additional steps.

    1. Click Apply.

    2. Click Save.

    3. If necessary, stop and restart the server.


What to do next

You must confirm that administrative security is enabled for each profile created.

Securing IBM BPM and applications


Related concepts:
Get started with security


Related tasks:
Configure application security


Related information:

Java 2 security
Configure Java 2 security policy files