Securing IBM Business Process Manager and applications

Security of IBM® Business Process Manager and applications depends on securing the runtime environment and securing applications.

Securing the IBM Business Process Manager runtime environment involves enabling administrative security, enabling application security, creating profiles with security, and restricting access to critical functions to selected users.

Securing an application includes authenticating users, implementing access control for operations and resources, and providing data integrity and privacy.

IBM Business Process Manager security is based on the WebSphere® Application Server version 7.0 security.

For detailed information about security, see the WebSphere Application Server Network Deployment Information Center.

Security tasks can be broadly divided into those concerning the administration of security in the IBM Business Process Manager environment and those that are related to the applications running in IBM Business Process Manager. The security of the server environment is central to the security of applications, and therefore the two sides should not be thought of in isolation.

Securing the environment involves enabling administrative security, enabling application security, creating profiles with security, and restricting access to critical functions to selected users.

To secure an application, consider the following aspects:

The rest of this section describes the security considerations at various stages of operation of the IBM Business Process Manager environment.

IBM Business Process Manager security is built on WebSphere Application Server 7.0 security. Considerations that are specific to IBM Business Process Manager are listed.
The following list provides an overview of the tasks you perform when securing IBM Business Process Manager. For detailed instructions, refer to the related tasks.
  1. Consider security when you install IBM Business Process Manager.
    1. Secure your environment before installation.
    2. Prepare the operating system for installation of IBM Business Process Manager.
    3. Prepare your environment after installation.
  2. Ensure that security is turned on for your stand-alone or deployment environment installation.
    1. Ensure that Administrative security is turned on.
    2. Ensure that Application security is turned on.
    3. If required, turn on Java™ 2 security.
    4. Use the Security Configuration wizard in the administrative console to configure security options.
    5. Set up a secure authentication mechanism and user account repository.
    6. Assign user names and passwords to important business integration authentication aliases.
    7. Assign users to appropriate administrative security roles.
    8. Assign users and groups to appropriate internal groups (using the Process Admin Console) so that IBM Process Center, IBM Process Portal, and other tools can be accessed by those users and groups.
  3. Set up security for specific IBM Business Process Manager components. For example, use the Security Roles widget to set up role-based access control for timetables in the Business Calendars widget.
  4. Secure the applications that you deploy to your process server environment.
    1. Develop your applications in Integration Designer using all appropriate security features.
    2. Deploy your applications to your IBM Business Process Manager environment.
    3. Assign users or groups to appropriate security roles to control access to the newly deployed application.
  5. Maintain the security of your IBM Business Process Manager environment.