Skip to main content

Search

Access control

  • Módulo

    Access control

    6 Temas

    1 h 10 minutos

    Visible to all users
  • Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.

Application security

Attribute-based access control

  • Módulo

    Attribute-based access control

    5 Temas

    1 h 5 minutos

    Visible to all users
  • Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.

Circumstancing

  • Módulo

    Circumstancing

    4 Temas

    55 minutos

    Pega Platform 8.2 Visible to all users
  • Applications often need to customize behavior to match the needs of a specific situation or circumstance. For example, a call center may need to...

Circumstancing case processing

Creating a Pega Platform application

Debugging and performance

  • Módulo

    Debugging and performance

    11 Temas

    3 horas

    Pega Platform 8.2 Visible to all users
  • Pega Platform™ provides tools to debug applications and evaluate application performance through performance statistics, events, and system logs...

Debugging system performance

Measuring system performance

Organizing and managing access to case attachments

  • Módulo

    Organizing and managing access to case attachments

    3 Temas

    25 minutos

    Visible to all users
  • Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice