To experience the full functionality of this website, cookies are needed. Please activate cookies and refresh your browser. After the refresh, a cookie management dialogue will be shown.

This website uses cookies for reasons of functionality, comfort, and statistics. You can change this setting at any time by clicking on “change settings”. If you consent to this use of cookies, please click “Yes, I agree”. Our privacy policy


Business Process Management with inubit BPM - Design and Architecture

Business Process Management with inubit BPM
Technology Newsletter registration

Design and Architecture: platform-independent and open


The perfect partner for your system environment: inubit BPM is platform-independent, has an open architecture entirely based on Java/J2EE, and uses XML as its main data format. In addition, it has a command-line interface (CLI) and fully supports SNMP and 64-bit computing.


inubit BPM Architecture

inubit BPM Architecture

Permission management for every requirement

The multi-level, fine-grained permission management ensures secure data storage and user management. You can choose to administer your user management using either LDAP or the Identity Management (IM) of the Bosch IoT Suite. All administrative actions performed by the user can be traced via the Audit Log. System security is ensured by means of electronic signature support, SSL, S/MIME, client-server authentication, a security token service, centralized key management, and password security.


Active/active cluster for high availability and failure safety

Active/active cluster for high availability and failure safety

An active/active cluster means that you can run the software on a network of several computers (aka “cluster network”). The two main advantages of this are failure safety and scalability: if a node fails, the other nodes take over its processes and the system can continue uninterrupted.

  • Flexible instance management via the cluster manager
  • Failure-safe processes by means of state-of-the-art caching
  • Runtime data either in RDBMS or in file system – the choice is yours
  • Monitoring across nodes