BAM securities requirements vary from one system to another. Nevertheless, the basic things remain the same. For a BAM application, you have to ensure your resources, such as Data Objects, reports, and the BAM web applications, are securely protected, so that only authenticated and authorized users can access the information. Apart from these, you also need to consider the security issues during the data transmission between clients and servers. Keeping these security requirements in mind, the following key BAM securities concepts will be covered in this chapter:
Authentication
Authorization
Secure Socket Layer (SSL)
In this chapter, we will first discuss the topics related to client authentication, such as how to manage users and groups, and how to configure external LDAP servers for BAM. Then, you will learn how to manage security policies and application roles to control access to BAM resources. Finally, you will learn how to enable SSL for BAM.