IBM BPM, V8.0.1, All platforms > Securing IBM BPM and applications > Configure administrative and application security

Configure administrative security

During installation, all components default to the primary administrative credentials that you provide. These default values provide basic security, but to enhance the security of your installation, configure the various components of IBM BPM with appropriate security identities.

When you create an IBM BPM profile and keep Enable administrative security selected, you are prompted for a user name. This identity is used as a default for all underlying components. Configure these identities after you create profiles to further enhance your security

When you configure IBM BPM, you augment the default profile. Part of this profile augmentation process involves providing a user name and password at various portions of the response file. The user names and passwords that you provide must correspond to an identity in the user registry chosen for this profile. The user names and passwords you supply are required when you enable administrative security.

Several components of IBM BPM use authentication aliases. These aliases are used to authenticate the runtime component for access to databases and messaging engines. You can modify these aliases on the Business Integration Security page of the administrative console.

Several components of IBM BPM use authentication aliases. These aliases are used to authenticate the runtime component for access to databases and messaging engines. The profile augmentation process collects a valid user name and password used to create these aliases.

Configure administrative and application security