Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering jBPM 5

You're reading from   Mastering jBPM 5 Design, build, and deploy business process-centric applications using the cutting-edge jBPM technology stack

Arrow left icon
Product type Paperback
Published in Jun 2015
Publisher
ISBN-13 9781783289578
Length 326 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (2):
Arrow left icon
Simone Fiorini Simone Fiorini
Author Profile Icon Simone Fiorini
Simone Fiorini
Arun V Gopalakrishnan Arun V Gopalakrishnan
Author Profile Icon Arun V Gopalakrishnan
Arun V Gopalakrishnan
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Business Process Modeling – Bridging Business and Technology FREE CHAPTER 2. Building Your First BPM Application 3. Working with the Process Designer 4. Operation Management 5. BPMN Constructs 6. Core Architecture 7. Customizing and Extending jBPM 8. Integrating jBPM with Enterprise Architecture 9. jBPM in Production A. The Future B. jBPM BPMN Constructs Reference Index

Security


Security or application security in this context refers to protecting the services and data provided by jBPM from unauthorized access (authentication) and at the same time ensuring that the users can access the set of services and data authorized for them (authorization).

Another important perspective that we have to consider in a BPM system is providing non-repudiation for all the user interactions. jBPM supports this by providing an audit logging facility for all runtime data changes.

Note

Non-repudiation assures that a user cannot deny performing an action or operation in the system.

Securing the access of application assets

jBPM, usually deployed in an application server, uses a JEE-compatible standard, that is, Java Authentication and Authorization Service (JAAS), for providing application security. The application server provides this service and a mechanism to register the users.

The default asset repository used to keep the application assets is the Git repository. Further, a...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image