Security definition

<< Click to Display Table of Contents >>

Navigation:  Low-code Process Automation > Automation - Test and Production environments > Getting started with Bizagi Automation > Cloud portals first steps > Configuring your Test and Production environments for the first time >

Security definition

Overview

Besides the Identity Provider configuration described in Cloud portals first steps, you can enhance security through Bizagi features.

 

Work Portal authorization configuration

Bizagi lets you restrict access to different areas of your processes during execution to make sure that the correct people have the necessary privileges, and to prevent unauthorized actions.

 

Bizagi offers the Security module, which lets you define a schema of permissions on some of the elements including:

How users are authenticated.

Which options users can see or use (according to roles, positions, location, etc).

Which processes and tasks are available for mobile devices.

 

For more information, refer to Work Portal Security.

 

Case Security

Bizagi lets you include additional security measures to manage sensitive information, to comply with your data confidentiality policies.

In scenarios in which special controls are required to limit data exposure for the different actors and roles using Bizagi Work Portal, you may indicate which users have permissions over specific business information (at the case level).

 

For more information, refer to Case Security.

 

Additional measurements

To review additional measurements regarding information access management, refer to Managing Access to Information.

 

Next steps

Proceed with your environment's configuration by defining the time zone and integrating a mailbox to complete tasks via email.


Last Updated 7/19/2023 12:29:09 PM