Security architecture considerations
In this chapter, we describe security concerns for an organization that wants to use IBM Business Process Manager (IBM BPM). We talk about common security holes that often occur in this field, and describe techniques for rectifying these holes. We show preferred practices and common security hardening exercises that you can use to achieve a reasonably well-secured IBM BPM installation.
Many of the practices described in this chapter apply equally to generic Java Platform, Enterprise Edition (Java EE) applications ...

Get Business Process Management Design Guide: Using IBM Business Process Manager now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.