Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Security considerations
This section contains information that you need to know when determining how security will be
implemented in standalone and network deployment environments in IBM Business Process Manager.
For more information about registries and repositories, see
Standalone
environment
Network deployment
environment
Security consideration
pic.dhe.ibm.com/infocenter/dmndhelp/v8r0m1/index.jsp?topic=%2Fcom.ibm.wbpm.main.doc%2Ftopics%2Fcbpm_ibpmarch.html
1/4
10/14/13
Process Admin
Console or at
server startup, the
users and groups
from the file registry
are synchronized to
the internal User
Registry.
The User and
Group management
in the Process
Admin Console
creates, modifies
and deletes users
and groups from
the internal User
Registry. It does
not manage the
users and groups
from the file
registry.
The users and
groups created in
the file registry can
be added as
members of the
groups in the
internal User
Registry. The
groups in the
internal User
Registry are not
visible to the
WebSphere
Application Server
administrative
console, business
process
component,
Business Space, or
business
calendars.
The users and
groups created in
the WebSphere
Application Server
administrative
console are stored
in the file registry.
The users in the
internal User
Registry are visible
to the WebSphere
Application Server
administrative
console "Manage
Users" but they
cannot be modified
or deleted from the
WebSphere
Application Server
administrative
pic.dhe.ibm.com/infocenter/dmndhelp/v8r0m1/index.jsp?topic=%2Fcom.ibm.wbpm.main.doc%2Ftopics%2Fcbpm_ibpmarch.html
2/4
10/14/13
administrative
console.
These users cannot
be added as
members to the
groups of the file
registry. The
groups in the
internal User
Registry are not
visible to the
WebSphere
Application Server
administrative
console.
Management of users and
groups for IBM Business
Process Manager
Standard
3/4
10/14/13
perform in your
external provider
does not require
additional work in
IBM BPM.
Parent topic: Getting started with security
Related concepts:
Getting started with security
pic.dhe.ibm.com/infocenter/dmndhelp/v8r0m1/index.jsp?topic=%2Fcom.ibm.wbpm.main.doc%2Ftopics%2Fcbpm_ibpmarch.html
4/4