Skip to main content

Search

Looking for instructor-led training?

Daten im Arbeitsspeicher anzeigen

Anwendungsentwicklung

Anwendungsentwicklung verwalten

Managing application access

Application security

  • Modul

    Application security

    7 Themen

    1 Std. 25 Min.

    Für alle Benutzer sichtbar
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

Attribute-based access control

  • Modul

    Attribute-based access control

    5 Themen

    1 Std. 5 Min.

    Für alle Benutzer sichtbar
  • Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.

Benutzer zu einer Anwendung einladen

Circumstancing

  • Modul

    Circumstancing

    4 Themen

    55 Min.

    Für alle Benutzer sichtbar
  • Applications often need to customize behavior to match the needs of a specific situation or circumstance. For example, a call center may need to...

Circumstancing case processing

  • Modul

    Circumstancing case processing

    7 Themen

    1 Std.

    Für alle Benutzer sichtbar
  • Create variations of a rule that can be executed in specific circumstances, to better tailor application behavior to variations identified by the...

Configuring security policies

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice