Securing Bonita BPM - API

In the third installment of this video series, Fabio Lombardi demonstrates how to secure Bonita applications. As cyber attacks occur nearly everyday, we feel the need to preserve and  protect Bonitasoft customers. As we are OWASP compliant, we wish to provide complete security to all of our customers. But total security is difficult to attain, so we decide to let the customer choose the final stages of protection. This video series discusses each of these trade-offs to further your understanding of Bonitasoft security. Watch the video to see REST API authorization and activating dynamic checks.