with Tags:
security
X

Just in time for the holidays - More good practices for IBM Business Process Manager!
Have you see the IBM Business Process Manager Good Practices community ? The Good Practices community is available as a vehicle for the IBM Business Process Manager development team, clients, business partners, and other IBMers to share their knowledge and help you use the IBM Business Process Manager products effectively. We've added more good practices for using IBM Business Process Manager (BPM), just in time for the holidays! Check out these great suggestions:... [More]
Tags:  troubleshoot resources security performance pattern xml business_process_manager business_process_manager_... custom javascript topology learn |
Top 5 authorization security considerations in Business Process Management
All users are not created equally. Authorization is the process of ensuring that a user (or other computer system) has permission to perform a given act. IBM Business Process Manager defines a very fine-grained authorization model. Getting this model right – ensuring that only the right people have access to certain resources – is key to securing your Business Process Management environment. Using excerpts from J Keith Wood and Jens Engelke's new IBM Redbooks publication IBM Business Process Manager Security: Concepts and Guidance , here's the... [More]
Tags:  management security martin_keen bpm authorization administration process business websphere |
Top 5 authentication security considerations for Business Process Management
My name is Martin Keen, and I wrote this blog post. Or did I? How do you know I'm Martin Keen? Does it matter which Martin Keen (the one who works for IBM, or the one who owns a shoe company)? That's where authentication comes in – the process of proving the identity of a user. Authentication is particularly important in IBM Business Process Manager because it determines who has access to your Business Process Manager applications. Using excerpts from J Keith Wood and Jens Engelke's new IBM Redbooks publication IBM Business Process Manager... [More]
Tags:  authentication was bpm business-process-manager websphere-application-ser... security martin_keen |
Propagating User Authentication information in HTTP bindings
Propagating User Authentication Information in HTTP Bindings In this post, I will explain how to propagate user authentication information when using HTTP bindings. Consider FooGateway mediation flow component (MFC) which is exported using HTTP bindings as shown in the Figure 1. Figure 1. FooGateway MFC with HTTP Bindings (export) Also note that operation1 of the FooInterface, which is implemented by FooGateway MFC, has security permission as shown in the Figure 2. Figure 2 Security Permission on operation1 The Security permission says... [More]
Tags:  security httpbindings |