Looking for instructor-led training?
Learn how you can configure role-based access control by using the Access Manager.
Add users to an application and assign users to roles based on how they interact with a case.
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform™, and how to configure security policies to...
Pega Platform™ automatically tracks actions performed, such as which operators worked on a case and when. You can enhance this capability by using...
Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.