O'Reilly logo

Business Process Management Design Guide: Using IBM Business Process Manager by Dr. Ali Arsanjani, Nakul Bharade, Magnus Borgenstrand, Philipp Schume, J. Keith Wood, Vyacheslav Zheltonogov

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security architecture considerations
In this chapter, we describe security concerns for an organization that wants to use IBM Business Process Manager (IBM BPM). We talk about common security holes that often occur in this field, and describe techniques for rectifying these holes. We show preferred practices and common security hardening exercises that you can use to achieve a reasonably well-secured IBM BPM installation.
Many of the practices described in this chapter apply equally to generic Java Platform, Enterprise Edition (Java EE) applications ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required