IBM BPM, V8.0.1, All platforms > Securing IBM BPM and applications > Configure administrative and application security

Configure application security

Applications deployed to your IBM BPM instance require security to be built into them which will later be applied at run time.

The applications that you host in your IBM BPM environment perform many business critical functions that require security. Some applications will access, transfer, or alter sensitive information (for example, payroll information or credit card details). Others will perform billing or inventory management. The security of these applications is vitally important.

Important: Application security is required by IBM BPM and must not be turned off in the administrative console.

Secure your applications by doing the following:


Procedure

  1. Ensure that administrative security is enabled.
  2. Ensure that application security is enabled.

    1. On the administrative console, expand Security and click Global security.

    2. Select Enable application security so that IBM BPM will require authentication from users who try to access a secured application.
  3. Develop your applications in Integration Designer using all appropriate security features.
  4. Deploy your applications to your IBM BPM environment, assigning users or groups to appropriate security roles.
  5. Maintain the security of your IBM BPM environment.

Configure administrative and application security


Related tasks:
Configure administrative and application security