
Search
Looking for instructor-led training?
Access control
-
Module
Access control
6 Rubriques
1h 10 mins
Pega Platform 8.7 -
Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
Application security
-
Module
Application security
7 Rubriques
1h 25 mins
-
Learn how to authorize users to define roles and assign privileges to members of an access group.
Attribute-based access control
-
Module
Attribute-based access control
5 Rubriques
1h 5 mins
-
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
Organizing and managing access to case attachments
-
Module
Organizing and managing access to case attachments
3 Rubriques
25 mins
-
Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...
Reviewing log files
-
Module
Reviewing log files
6 Rubriques
45 mins
-
Pega Platform™ provides logs that record system events such as application errors and performance and security issues. Use log files to identify and...
Role-based access control
-
Module
Role-based access control
5 Rubriques
55 mins
-
Learn how to authorize users to define roles and assign privileges to members of an access group.
Securing and auditing data
-
Module
Securing and auditing data
1 Sujet
15 mins
-
Data is an important asset that must be protected from unauthorized access and use. Client-based access control manages how data is used to comply...
Configuring security policies
-
Défi
Configuring security policies
2 Tâches
5 mins
-
GogoRoad is experiencing a large number of failed login attempts. Management suspects that the attempts are malicious attacks by an internet bot...
Reviewing log files
-
Défi
Reviewing log files
3 Tâches
15 mins
-
During the employee evaluation process, employees undergo an evaluation period to regularly assess their performance as new hires. To check the status...
Securing an application using attribute-based access control
-
Défi
Securing an application using attribute-based access control
4 Tâches
30 mins
-
Each candidate case includes a Taxpayer Identification Number (TIN) to identify the candidate. This information is considered sensitive personal...