Security is an integral consideration when you are planning
to install IBM® Business Process Manager,
when you are developing and deploying applications, and in the day-to-day
running of your server.
Security considerations
This section contains information that you need to know
when determining how security will be implemented in standalone and
network deployment environments in IBM Business Process Manager.
Default users and groups IBM Business Process Manager has
an internal security provider that includes several default users
and groups. For each default user account, default authentication
aliases are provided for external components to connect to the Process
Server.
Understanding elements of application security
Applications that run in IBM Business Process Manager are
secured through a number of elements such as authentication, access
control, data integrity, privacy, and identity propagation.
Considerations for securing adapters
An adapter is the mechanism used by an application to communicate
with an Enterprise Information System (EIS). The information exchanged
between an application and an EIS can be highly sensitive and therefore
important to ensure the security of this information transaction.
Creating end-to-end security
There are a number of potential end-to-end security scenarios,
each involving differing security steps. Several typical scenarios,
with the necessary security options, are presented in this topic.