
Search
Access control
-
Modul
Access control
5 Themen
1 Std. 5 Min.
-
Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
Activities
-
Modul
Activities
2 Themen
25 Min.
-
Learn how to configure activities when appropriate to automate system tasks in Pega Platform™ applications. Additionally, discover when to use an...
Activities and automations
-
Modul
Activities and automations
3 Themen
35 Min.
Pega Platform 8.8 -
Learn how to configure activities when appropriate to automate system tasks in Pega Platform™ applications. Discover when to use an automation...
Adding an external data source to a data type
-
Modul
Adding an external data source to a data type
2 Themen
30 Min.
-
Configure data types based on external data models to simplify integration with external systems.
App Factory advanced configurations
-
Modul
App Factory advanced configurations
1 Thema
12 Min.
-
Utilize the DevOps, reuse, automation, and collaboration capabilities to get the most out of App Factory.
App Factory application life cycle
-
Modul
App Factory application life cycle
3 Themen
37 Min.
Platform -
Learn about the repeatable application life cycle enabled by App Factory and how to extend and configure the life cycle based on the needs of your...
Application migration
-
Modul
Application migration
4 Themen
35 Min.
-
An application is typically packaged and exported to move it to another system. For example, you package and export an application to migrate among...
Application rulesets
-
Modul
Application rulesets
3 Themen
35 Min.
-
Learn how to configure an application ruleset to package for distribution and learn about the impact the configuration has during development and run...
Application versioning
-
Modul
Application versioning
1 Thema
15 Min.
-
Pega Platform™ provides the ability to preserve a version of an application. To avoid impacting existing functionality on a released application...
Attribute-based access control
-
Modul
Attribute-based access control
5 Themen
1 Std. 5 Min.
-
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.