
Search
Looking for instructor-led training?
Access control
-
Modul
Access control
6 Themen
1 Std. 10 Min.
Pega Platform 8.7 -
Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
Application security
-
Modul
Application security
2 Themen
30 Min.
-
Learn how to configure security policies to thwart attempts by malicious hackers to gain unauthorized access to Pega Platform™.
Attribute-based access control
-
Modul
Attribute-based access control
5 Themen
1 Std. 5 Min.
-
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
Configuring security policies
-
Modul
Configuring security policies
4 Themen
45 Min.
-
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform™, and how to configure security policies to...
Inviting users to an application
-
Modul
Inviting users to an application
1 Thema
10 Min.
-
Add personas and channel interfaces to an application and assign users to personas based on how they interact with a case.
Managing application access
-
Modul
Managing application access
2 Themen
25 Min.
-
Learn how you can configure role-based access control by using the Access Manager. Access Manager secures your application and tightens the access...
Organizing and managing access to case attachments
-
Modul
Organizing and managing access to case attachments
3 Themen
25 Min.
-
Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...
Pega Platform patch releases
-
Modul
Pega Platform patch releases
3 Themen
40 Min.
Pega Platform -
Get familiar with the benefits and best practices of patch releases in Pega Platform™ to effectively adopt the patch release process and reduce hotfix...
Reviewing log files
-
Modul
Reviewing log files
6 Themen
45 Min.
-
Pega Platform™ provides logs that record system events such as application errors and performance and security issues. Use log files to identify and...
Role-based access control
-
Modul
Role-based access control
5 Themen
55 Min.
-
Learn how to authorize users to define roles and assign privileges to members of an access group.