IBM BPM, V8.0.1, All platforms >

Securing IBM BPM and applications

Security of IBM BPM and applications depends on securing the runtime environment and securing applications.

Securing the IBM BPM runtime environment involves enabling administrative security, enabling application security, creating profiles with security, and restricting access to critical functions to selected users.

Securing an application includes authenticating users, implementing access control for operations and resources, and providing data integrity and privacy.

IBM BPM security is based on the WebSphere Application Server version 8.0 security.

For detailed information about security, see the WebSphere Application Server ND Information Center.

Security tasks can be broadly divided into those concerning the administration of security in the IBM BPM environment and those that are related to the applications running in IBM BPM. The security of the server environment is central to the security of applications, and therefore the two sides should not be thought of in isolation.

Securing the environment involves enabling administrative security, enabling application security, creating profiles with security, and restricting access to critical functions to selected users.

To secure an application, consider the following aspects:

The rest of this section describes the security considerations at various stages of operation of the IBM BPM environment.

IBM BPM security is built on WebSphere Application Server 8.0 security. Considerations that are specific to IBM BPM are listed.

The following list provides an overview of the tasks you perform when securing IBM BPM. For detailed instructions, refer to the related tasks.

  1. Consider security when you install IBM BPM.
    1. Secure your environment before installation.
    2. Prepare the operating system for installation of IBM BPM.
    3. Prepare the environment after installation.
  2. Ensure that security is turned on for your stand-alone or deployment environment installation.
    1. Ensure that Administrative security is turned on.
    2. Ensure that Application security is turned on.

    3. If required, turn on Java™ 2 security.

    4. Use the Security Configuration wizard in the administrative console to configure security options.
    5. Set up a secure authentication mechanism and user account repository.

    6. Assign user names and passwords to important business integration authentication aliases.

    7. Assign users to appropriate administrative security roles.

    8. Assign users and groups to appropriate internal groups (using the Process Admin Console) so that IBM Process Center, IBM Process Portal, and other tools can be accessed by those users and groups.
  3. Set up security for specific IBM BPM components.

    For example, use the Security Roles widget to set up role-based access control for timetables in the Business Calendars widget.

  4. Secure the applications that you deploy to your process server environment.
    1. Develop your applications in Integration Designer using all appropriate security features.
    2. Deploy your applications to your IBM BPM environment.

    3. Assign users or groups to appropriate security roles to control access to the newly deployed application.
  5. Maintain the security of your IBM BPM environment.


Related tasks:
Importing process applications and toolkits from the Process Center repository


Related reference:
Security considerations specific to IBM BPM