• Share
  • ?
  • Profiles ▼
  • Communities ▼
  • Apps ▼

Blogs

  • My Blogs
  • Public Blogs
  • My Updates

  • Log in to participate

About this blog

We've moved - New entries here: https://www.ibm.com/developerworks/community/blogs/aimsupport/ - Technical support knowledge for IBM Business Process Management Products. Following the IBM Social Computing Guidelines - Steve Webb, Stacy Cannon
  • Facebook
  • Twitter
  • Google
  • LinkedIn
  • RSS

Links

  • Welcome & Product List
  • Disclaimer & Trademark
  • IBM Business Process Managemen...
  • IBM Adapters on Twitter
  • WebSphere on Facebook
  • WebSphere & CICS Support blog
  • IBM BPM Good Practices Communi...
  • IBM Technical Content Blog

Tags

Recent tweets

    with Tags: authentication Remove the tag from the selected filter tags - authentication X
    All posts
    • Sort by:
    • Date ▼
    • Title
    • Likes
    • Comments
    • Views

    Top 5 authentication security considerations for Business Process Management

    MartinKeen 1200007VU3 | | Visits (12615)

    Tweet
    My name is Martin Keen, and I wrote this blog post. Or did I? How do you know I'm Martin Keen? Does it matter which Martin Keen (the one who works for IBM, or the one who owns a shoe company)? That's where authentication comes in – the process of proving the identity of a user. Authentication is particularly important in IBM Business Process Manager because it determines who has access to your Business Process Manager applications. Using excerpts from J Keith Wood and Jens Engelke's new IBM Redbooks publication IBM Business Process Manager... [More]

    Tags:  authentication was bpm business-process-manager websphere-application-ser... security martin_keen
    • Show:
    • 10
    • 20
    • 30
    • Previous
    • Next
    1