Schneider Electric's industrial software business and AVEVA have merged to create a new global leader in engineering and industrial software. For more details click here.
Wonderware Skelta BPM Process Designer
Overview > Wonderware Skelta Security

Wonderware Skelta BPM offers users comprehensive, in-depth and extendable, enterprise level security infrastructure for even itemized levels of participation throughout the product architecture. Wonderware Skelta BPM’s security infrastructure extends to components such as Process Designer, Work Item List, BAM, Reporting,Queues and Calendars.

Ensure adherence to corporate and legal security mandates for all applications deployed through Wonderware Skelta BPM with comprehensive User Rights management.

Security Setting



  • Well mapped, in-depth security cover allows addition of users / roles to security groups
  • User Rights management for workflow participants
  • Collaboration for sensitive tasks enabled through user-based access rights for workflow design functions.


  • Role based security groups and rights
  • Automatic extendable security for customized applications
  • Automatic extendable security for dynamically created lists



  • Use existing roles within Active Directory as well as SharePoint for defining user rights.
  • Role based security extends to Reporting and BAM for qualified views of alerts
space BAM security:
  • Limit viewing rights through Progress, Analysis and Execution views
  • Set up KPI’s and control views for KPI’s and other BAM settings like Overdue Analysis, Performance Analysis etc
Close Window
Security Setting