Skip to main content

Search

Looking for instructor-led training?

Einblicke in die Unternehmenseffizienz gewinnen

Application security

  • Module

    Application security

    7 Rubriques

    1h 25 mins

    Visible to all users
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

Attribute-based access control

  • Module

    Attribute-based access control

    5 Rubriques

    1h 5 mins

    Visible to all users
  • Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.

Designing reports with multiple sources

  • Module

    Designing reports with multiple sources

    6 Rubriques

    1h 5 mins

    Visible to all users
  • Learn three techniques to create a report that references data from multiple classes: combining data in a report by creating subreports, configuring...

Organizing and managing access to case attachments

  • Module

    Organizing and managing access to case attachments

    3 Rubriques

    25 mins

    Visible to all users
  • Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...

Role-based access control

  • Module

    Role-based access control

    5 Rubriques

    55 mins

    Visible to all users
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

Configuring security policies

Creating reports that combine data from multiple classes

  • Défi

    Creating reports that combine data from multiple classes

    2 Tâches

    30 mins

    Visible to all users
  • The business partners in the Human Resources (HR) department request two reports.

    The first report must track the progress of candidate cases...

Organizing and managing access to case attachments

  • Défi

    Organizing and managing access to case attachments

    4 Tâches

    30 mins

    Visible to all users
  • Applicants for an open position at TGB must submit a resume as part of the application process. To ensure the security of resumes attached to a...

Securing an application using attribute-based access control

  • Défi

    Securing an application using attribute-based access control

    4 Tâches

    30 mins

    Visible to all users
  • Each candidate case includes a Taxpayer Identification Number (TIN) to identify the candidate. This information is considered sensitive personal...

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice