
Search
Looking for instructor-led training?
Access control
-
Módulo
Access control
6 Temas
1 h 10 minutos
Pega Platform 8.7 -
Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
Activities
-
Módulo
Activities
2 Temas
25 minutos
-
Learn how to configure activities when appropriate to automate system tasks in Pega Platform™ applications. Additionally, discover when to use an...
Application security
-
Módulo
Application security
7 Temas
1 h 25 minutos
-
Learn how to authorize users to define roles and assign privileges to members of an access group.
Attribute-based access control
-
Módulo
Attribute-based access control
5 Temas
1 h 5 minutos
-
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
Background processing
-
Módulo
Background processing
3 Temas
35 minutos
-
Learn how the background processing capabilities in Pega Platform™ allow you to offload tasks to help improve throughput and efficiency. Learn how to...
Circumstancing case processing
-
Módulo
Circumstancing case processing
4 Temas
40 minutos
-
Create variations of a rule that can be executed in specific circumstances, to better tailor application behavior to variations identified by the...
Organizing and managing access to case attachments
-
Módulo
Organizing and managing access to case attachments
3 Temas
25 minutos
-
Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...
Promoting rule reuse with relevant records
-
Módulo
Promoting rule reuse with relevant records
1 Tema
15 minutos
-
Developers designate rules as relevant records to promote rule reuse by other developers. Leveraging relevant records helps developers build high...
Reviewing log files
-
Módulo
Reviewing log files
6 Temas
45 minutos
-
Pega Platform™ provides logs that record system events such as application errors and performance and security issues. Use log files to identify and...
Role-based access control
-
Módulo
Role-based access control
5 Temas
55 minutos
-
Learn how to authorize users to define roles and assign privileges to members of an access group.