IBM Business Process Manager security
This chapter provides information about security of an organization’s business process management (BPM) program, common security holes that often occur in this field, and techniques for rectifying these holes. It describes preferred practices and common security hardening exercises that you can use to achieve a reasonably well-secured BPM installation.
Many of the practices that are described apply equally to generic Java Platform and Java Platform, Enterprise Edition applications, and to BPM. However, it focuses ...

Get IBM Business Process Manager Version 8.0 Production Topologies now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.