IBM BPM, V8.0.1, All platforms > Securing IBM BPM and applications > Get started with security
Understanding elements of application security
Applications that run in IBM BPM are secured through a number of elements such as authentication, access control, data integrity, privacy, and identity propagation.
The following topics provide more information for application security in IBM BPM:
- Authentication of users
Clients must be authenticated by providing a user name and password from the user registry when administrative security is enabled. If a client tries to access a secured application without being authenticated, an exception is generated.- Access control
When authenticating a user for IBM BPM, it is important for security purposes that access to all operations is not automatically be granted to that user. Allowing some users to perform certain operations, while denying access to those same operations for other users, is termed access control.- Data integrity and privacy
The privacy and integrity of data when IBM BPM processes are invoked is critical to maintaining security.- Single sign on
When a single sign on is used, a client is asked to provide the user name and password information only once. The provided identity then propagates throughout the system.