You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Current »

One of our clients want s to implement a BPM solution, but he asked about the security mechanism that is used to protect the Joget workflow from web attacks and other securit risks such as:-

1. protected against cross-site scripting and session stealing attacks

2. support Digital Signature that is be provided by a trusted Root CA

3. disaster recovery availability.

but unfortunately i did not find any documentation that talks about how these security requirements (if any) are implemented in Joget workflow.

Any help will be highly appreciated.

Best Regards

  • No labels