
Search
Looking for instructor-led training?
Access control
-
Module
Access control
6 Rubriques
1h 10 mins
Pega Platform 8.7 -
Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
Activities
-
Module
Activities
2 Rubriques
25 mins
-
Learn how to configure activities when appropriate to automate system tasks in Pega Platform™ applications. Additionally, discover when to use an...
Application security
-
Module
Application security
7 Rubriques
1h 25 mins
-
Learn how to authorize users to define roles and assign privileges to members of an access group.
Attribute-based access control
-
Module
Attribute-based access control
5 Rubriques
1h 5 mins
-
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
Background processing
-
Module
Background processing
3 Rubriques
35 mins
-
Learn how the background processing capabilities in Pega Platform™ allow you to offload tasks to help improve throughput and efficiency. Learn how to...
Circumstancing case processing
-
Module
Circumstancing case processing
4 Rubriques
40 mins
-
Create variations of a rule that can be executed in specific circumstances, to better tailor application behavior to variations identified by the...
Organizing and managing access to case attachments
-
Module
Organizing and managing access to case attachments
3 Rubriques
25 mins
-
Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...
Promoting rule reuse with relevant records
-
Module
Promoting rule reuse with relevant records
1 Sujet
15 mins
-
Developers designate rules as relevant records to promote rule reuse by other developers. Leveraging relevant records helps developers build high...
Reviewing log files
-
Module
Reviewing log files
6 Rubriques
45 mins
-
Pega Platform™ provides logs that record system events such as application errors and performance and security issues. Use log files to identify and...
Role-based access control
-
Module
Role-based access control
5 Rubriques
55 mins
-
Learn how to authorize users to define roles and assign privileges to members of an access group.