Security Considerations for BAM Interceptors

The following topics describe how to configure the security roles for the BAM interceptors.

In This Section

See Also

How to Determine and Set Event Writer Roles for Activities