Looking for instructor-led training?
Learn how you can configure role-based access control by using the Access Manager.
1h 25 mins
Learn how to authorize users to define roles and assign privileges to members of an access group.
1h 5 mins
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
Fügen Sie Benutzer zu einer Anwendung hinzu und weisen Sie ihnen Rollen passend zu ihrer Interaktion in einem Case zu.
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform™, and how to configure security policies to...
Create scenario tests to perform testing based on real-world use cases. Scenario tests incorporate multiple rules, testing how these rules work...
Pega Platform™ automatically tracks actions performed, such as which operators worked on a case and when. You can enhance this capability by using...
1h 15 mins
Diagnosing performance issues requires understanding the root cause of an issue. For example, a user might report that an application takes a minute...
This module describes the components in Deployment Manager architecture. Define and identify the components of Deployment Manager and recognize all...
This module outlines the concepts, importance, and the implementation of DevOps practices.
Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.