Tools and knowledge to help you succeed.
Explore solutions, events, and customers
Register for our flagship virtual event
Discover program benefits and enablement resources
Extend Pega with components and apps
Manage your organization's relationship with Pega
Drive success with centralized content and resources
Find product guides and reference docs
Complete missions, earn badges, and stay current
Ask questions and help other Pega professionals
Design Pattern Library
Explore common implementation patterns
Pega Cosmos Design System
Browse library of UI/UX templates, patterns, and components
Log in or sign up to set up user profile.
Log in or sign up to set up personalized notifications.
Looking for instructor-led training?
1 h 10 minutos
Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
Configure the structure and refresh strategies for data pages to optimize the retrieving, refreshing, and persistence of data for case processing.
Configure data types based on external data models to simplify integration with external systems.
Pega Platform™ provides the Clipboard tool to display data in memory and enables you to review application data and check for correctness, helping you...
View the relationships between case types and data objects to gain insight into the data model for an application.
Add data records to your...
In some cases, a data reference is insufficient for your business need. Pega Platform™ provides data transforms to copy selected data from one source...
Learn how you can configure role-based access control by using the Access Manager. Access Manager secures your application and tightens the access...
This module provides an overview of application quality and application testing processes. It explains the significance of building test cases that...
Learn how to configure security policies to thwart attempts by malicious hackers to gain unauthorized access to Pega Platform™.
1 h 5 minutos
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.