Chapter 1. Why Business Process Manager security is important 13
In a Network Deployment, you can specify one, two, three, or four clusters. The choice of
topology will depend on a large number of factors. For more information about this topic, refer
to:
Business Process Manager V7.5 Production Topologies
, SG24-7976
IBM WebSphere Deployment and Advanced Configuration, IBM Press, ISBN 0131468626
Despite the fact that this is a large topic, we will still investigate some of the security holes we
see that are common to many installations, regardless of topologies, in Chapter 2,
“Installation” on page 21.
1.3 Encryption, SSL, and certificates
Encryption, https://, SSL, and digital certificates are so fundamental to the idea of security
that it ...