<< Click to Display Table of Contents >> Security definition |
Besides the Identity Provider configuration described in Cloud portals first steps, you can enhance security through Bizagi features.
Work Portal authorization configuration
Bizagi lets you restrict access to different areas of your processes during execution to make sure that the correct people have the necessary privileges, and to prevent unauthorized actions.
Bizagi offers the Security module, which lets you define a schema of permissions on some of the elements including:
•How users are authenticated.
•Which options users can see or use (according to roles, positions, location, etc).
•Which processes and tasks are available for mobile devices.
For more information, refer to Work Portal Security.
Case Security
Bizagi lets you include additional security measures to manage sensitive information, to comply with your data confidentiality policies.
In scenarios in which special controls are required to limit data exposure for the different actors and roles using Bizagi Work Portal, you may indicate which users have permissions over specific business information (at the case level).
For more information, refer to Case Security.
Additional measurements
To review additional measurements regarding information access management, refer to Managing Access to Information.
Proceed with your environment's configuration by defining the time zone and integrating a mailbox to complete tasks via email.
Last Updated 7/19/2023 12:29:09 PM