Security architecture considerations
In this chapter, we describe security concerns for an organization that wants to use IBM Business Process Manager (IBM BPM). We talk about common security holes that often occur in this field, and describe techniques for rectifying these holes. We show preferred practices and common security hardening exercises that you can use to achieve a reasonably well-secured IBM BPM installation.
Many of the practices described in this chapter apply equally to generic Java Platform, Enterprise Edition (Java EE) applications ...

Get Business Process Management Design Guide: Using IBM Business Process Manager now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.