Skip to main content

Search

Looking for instructor-led training?

Application security

  • Modul

    Application security

    7 Themen

    1 Std. 25 Min.

    Für alle Benutzer sichtbar
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

Attribute-based access control

  • Modul

    Attribute-based access control

    5 Themen

    1 Std. 5 Min.

    Für alle Benutzer sichtbar
  • Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.

Deployment Manager

  • Modul

    Deployment Manager

    4 Themen

    38 Min.

    Für alle Benutzer sichtbar
  • This module describes the components in Deployment Manager architecture. Define and identify the components of Deployment Manager and recognize all...

Organizing and managing access to case attachments

  • Modul

    Organizing and managing access to case attachments

    3 Themen

    25 Min.

    Für alle Benutzer sichtbar
  • Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...

Reviewing log files

  • Modul

    Reviewing log files

    6 Themen

    45 Min.

    Für alle Benutzer sichtbar
  • Pega Platform™ provides logs that record system events such as application errors and performance and security issues. Use log files to identify and...

Role-based access control

  • Modul

    Role-based access control

    5 Themen

    55 Min.

    Für alle Benutzer sichtbar
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

Configuring security policies

Organizing and managing access to case attachments

  • Challenge

    Organizing and managing access to case attachments

    4 Aufgaben

    30 Min.

    Für alle Benutzer sichtbar
  • Applicants for an open position at TGB must submit a resume as part of the application process. To ensure the security of resumes attached to a...

Reviewing log files

  • Challenge

    Reviewing log files

    3 Aufgaben

    15 Min.

    Für alle Benutzer sichtbar
  • During the employee evaluation process, employees undergo an evaluation period to regularly assess their performance as new hires. To check the status...

Securing an application using attribute-based access control

  • Challenge

    Securing an application using attribute-based access control

    4 Aufgaben

    30 Min.

    Für alle Benutzer sichtbar
  • Each candidate case includes a Taxpayer Identification Number (TIN) to identify the candidate. This information is considered sensitive personal...

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice