<< Click to Display Table of Contents >> Security definition |
Overview
Apart from the identity provider configuration described in Cloud portals first steps, you can take additional security measure through features offered by Bizagi.
Work Portal authorization configuration
Bizagi lets you restrict access to different areas of your processes during execution to make sure that the correct people have the necessary privileges and to prevent unauthorized actions.
Bizagi offers the Security Module that lets you define a schema of permissions on some of the elements, which includes:
•How users are authenticated.
•What options each user can see or use (according to roles, positions, location, etc).
•Which processes and tasks are available for mobile device access.
For more information refer to Work Portal Security.
Case Security
Bizagi lets you include additional security measures to manage information that is a very sensitive, to comply with your data confidentiality policies.
In scenarios in which special controls are required to limit data exposure for the different actors and roles using Bizagi Work Portal, you may indicate which users have permissions over specific business information (at the case level).
For more information refer to Case Security.
Additional measurements
To review additional measurements regarding information access management, refer to Managing Access to Information.
Next steps
Proceed with your environment's configuration by defining the time zone and integrating a mailbox to complete tasks via email.