This topic applies only to the IBM Business Automation Workflow Advanced
configuration.

Security considerations for runtime installation and deployment

Before you install a snapshot or deploy a service module in the runtime environment, consider any security requirements or restrictions associated with the snapshot, the module, or the environment.
If you have enabled Administrative and Application security, consider the following points.
  • Only certain roles have the authority to install or deploy on the runtime server. Make sure that the user who is performing the installation or deployment operation is assigned to the appropriate administrative security role. See Restricting installation access to runtime servers.
  • An application developed in IBM® Integration Designer can have its own security constraints. In order to deploy a secured application, ensure that users and groups have been assigned to the roles that were defined when the application was constructed. See Deploying secure applications.