Skip to main content
close Search

Search

Looking for instructor-led training?

Daten im Arbeitsspeicher anzeigen

Anwendungsentwicklung

Managing application development

Managing application access

Application security

  • Module

    Application security

    7 Topics

    1 hr 25 mins

    Visible to all users
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

Attribute-based access control

  • Module

    Attribute-based access control

    5 Topics

    1 hr 5 mins

    Visible to all users
  • Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.

Inviting users to an application

Circumstancing

  • Module

    Circumstancing

    4 Topics

    55 mins

    Visible to all users
  • Applications often need to customize behavior to match the needs of a specific situation or circumstance. For example, a call center may need to...

Circumstancing case processing

  • Module

    Circumstancing case processing

    7 Topics

    1 hr

    Visible to all users
  • Create variations of a rule that can be executed in specific circumstances, to better tailor application behavior to variations identified by the...

Configuring security policies

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice