IBM RPA Control Center security aspects

IBM RPA Control Center is the control room for managing and auditing resources that are related to your solution environment. It centralizes all operation functions into a robust interface.

You perform the overall system administration in IBM RPA Control Center. You can schedule bots, set bots for manual launching, and orchestrate bots. Bots in IBM RPA Control Center are under embedded revision control.

IBM RPA Control Center enables the organization to visualize data of bots in operation in dashboards, maintain the organization's available computers and active users, among other advanced functions.

  • IBM RPA Control Center user authentication
    IBM RPA Control Center enforces OAuth 2 Bearer Token authentication method by default. During the on-premises offering installation, you can configure Single Sign-On (SSO) authentication.

  • IBM RPA Control Center data encryption
    The communication between IBM RPA Control Center and IBM RPA's API uses secure HTTPS over TLS 1.2 protocol. The communication between a user and IBM RPA Control Center uses the same protocol.

  • Data visualization in IBM RPA Control Center
    You can visualize data in IBM RPA Control Center in comprehensive logs or dashboards.

  • Multi-environment security
    IBM RPA Control Center environments are logically separated in the IBM Robotic Process Automation server. The data in those environments is independent of each other.

  • Role-based access
    Users of an IBM RPA Control Center environment can access environment resources based on their role.

  • IBM RPA Control Center user password security
    Users' passwords are encrypted with the Password-Based Key Derivation Function 2 (PBKDF2) to stretch the password key. This function creates a newly derived key based on the password, making password-cracking difficult.