Tools and knowledge to help you succeed.
Looking for instructor-led training?
1h 25 mins
Learn how to authorize users to define roles and assign privileges to members of an access group.
1h 5 mins
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
This module describes the components in Deployment Manager architecture. Define and identify the components of Deployment Manager and recognize all...
Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...
Pega Platform™ provides logs that record system events such as application errors and performance and security issues. Use log files to identify and...
GoGoRoad hat mit einer großen Anzahl an fehlgeschlagenen Anmeldeversuchen zu kämpfen. Das Management vermutet, dass es sich bei den Versuchen um...
The client company ABC Enterprises needs a Citrix Robotic solution that allows users to manage their legacy applications. Create a test solution to...
As a developer, you are tasked with creating a Citrix robotic solution for your company to allow users to manage a legacy application in a mixed mode...
Applicants for an open position at TGB must submit a resume as part of the application process. To ensure the security of resumes attached to a...
Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.