Security definition

<< Click to Display Table of Contents >>

Navigation:  Bizagi Studio >

Security definition


Bizagi can be integrated with a variety of systems that are intended for different purposes. Usually, when a system is integrated with another, an authentication procedure must be executed first, to make sure that the integration occurs only between trusted systems. Due to the variety of systems, and their inherent technologies, access to these systems demand to handle a set of different authentication protocols, for each feature in Bizagi that can be integrated with other systems. For example, when you want to integrate an ECM like SharePoint.


The following picture shows an example where you can have multiple integrations throughout different features available in Bizagi:




Each feature can use a different authentication protocol. Therefore it is important to understand the protocols available for each feature. The following table sums the different integration types, their available authentication protocols. Here you can find also some of the Identity Providers (IdP) supported. An identity provider is a third-party application that handles the authentication of users.


Click on each item to see the authentication protocols.

Additional to authentication protocols set for integrations and features, there are other aspects of security that you can configure. You may define the following security aspects in a project:


Work Portal Security

Bizagi allows you to restrict access to different areas of your processes during execution to make sure that the correct people have the necessary privileges and prevent unauthorized actions.

Bizagi offers the Security Module that allows you to define a schema of permissions on some of the elements, which includes:

How are users authenticated.

What options can each user see or use (according to roles, positions, location, etc).

Which processes and tasks are available for mobile device access.

For more information refer to Work Portal Security.


Case security

Bizagi allows you to include additional security measures for the management of information that is a very sensitive, in order to comply with your data confidentiality policies.

In scenarios in which special controls are required to limit the data exposure for the different actors and roles using Bizagi Work Portal, you may indicate which users have permissions over specific business information (at cases level).

For more information refer to Case security.


Database Encryption

Bizagi allows you to include additional security measures to protect sensitive information, at the database's columns level (in addition to encryption at file level such as SQL Server's TDE).

Bizagi Encryption of information at the database is carried out by Bizagi by using a key you define and safe keep separately.

For more information refer to Database encryption.