Tools and knowledge to help you succeed.
Looking for instructor-led training?
1 Std. 25 Min.
Learn how to authorize users to define roles and assign privileges to members of an access group.
1 Std. 5 Min.
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
Applications often need to customize behavior to match the needs of a specific situation or circumstance. For example, a call center may need to...
Create variations of a rule that can be executed in specific circumstances, to better tailor application behavior to variations identified by the...
Developing new applications from the ground up can be an overwhelming task for any organization and developer. Every application should adhere to an...
Pega Platform™ provides tools to debug applications and evaluate application performance through performance statistics, events, and system logs...
1 Std. 15 Min.
Diagnosing performance issues requires understanding the root cause of an issue. For example, a user might report that an application takes a minute...
Pega Platform™ provides tools to evaluate application performance through performance statistics and events. Performance statistics help you...
Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...
Developers designate rules as relevant records to promote rule reuse by other developers. Leveraging relevant records helps developers build high...
Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.