
Search
Looking for instructor-led training?
Access control
-
Module
Access control
6 Rubriques
1h 10 mins
Pega Platform 8.7 -
Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
Application security
-
Module
Application security
7 Rubriques
1h 25 mins
-
Learn how to authorize users to define roles and assign privileges to members of an access group.
Attribute-based access control
-
Module
Attribute-based access control
5 Rubriques
1h 5 mins
-
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
Designing reports with multiple sources
-
Module
Designing reports with multiple sources
4 Rubriques
55 mins
-
Learn three techniques to create a report that references data from multiple classes: combining data in a report by creating subreports, configuring...
Gaining insight into business efficiency
-
Module
Gaining insight into business efficiency
2 Rubriques
30 mins
-
Design reports to analyze case data and provide insight into processes and workflows.
Organizing and managing access to case attachments
-
Module
Organizing and managing access to case attachments
3 Rubriques
25 mins
-
Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...
Role-based access control
-
Module
Role-based access control
5 Rubriques
55 mins
-
Learn how to authorize users to define roles and assign privileges to members of an access group.
Configuring security policies
-
Défi
Configuring security policies
2 Tâches
5 mins
-
GogoRoad is experiencing a large number of failed login attempts. Management suspects that the attempts are malicious attacks by an internet bot...
Creating reports that combine data from multiple classes
-
Défi
Creating reports that combine data from multiple classes
2 Tâches
30 mins
-
The business partners in the Human Resources (HR) department request two reports.
The first report must track the progress of candidate cases...
Securing an application using attribute-based access control
-
Défi
Securing an application using attribute-based access control
4 Tâches
30 mins
-
Each candidate case includes a Taxpayer Identification Number (TIN) to identify the candidate. This information is considered sensitive personal...