Comprehensive Security

Overview > Wonderware Skelta Security

Wonderware Skelta BPM offers users comprehensive, in-depth and extendable, enterprise level security infrastructure for even itemized levels of participation throughout the product architecture. Wonderware Skelta BPM’s security infrastructure extends to components such as Process Designer, Work Item List, BAM, Reporting,Queues and Calendars.

Ensure adherence to corporate and legal security mandates for all applications deployed through Wonderware Skelta BPM with comprehensive User Rights management.

Security Setting
space

space Collaboration:

  • Well mapped, in-depth security cover allows addition of users / roles to security groups
  • User Rights management for workflow participants
  • Collaboration for sensitive tasks enabled through user-based access rights for workflow design functions.

space

Customization Customization:

  • Role based security groups and rights
  • Automatic extendable security for customized applications
  • Automatic extendable security for dynamically created lists
space

Extendable Extendable:

  • Use existing roles within Active Directory as well as SharePoint for defining user rights.
  • Role based security extends to Reporting and BAM for qualified views of alerts
space

BAM security BAM security:

  • Limit viewing rights through Progress, Analysis and Execution views
  • Set up KPI’s and control views for KPI’s and other BAM settings like Overdue Analysis, Performance Analysis etc
Close Window
Security Setting