
Search
Looking for instructor-led training?
-
Module
Application security
7 Topics
1 hr 25 mins
-
Learn how to authorize users to define roles and assign privileges to members of an access group.
-
Module
Attribute-based access control
8 Topics
1 hr 25 mins
-
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
-
Module
Configuring security policies
4 Topics
40 mins
-
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform, and how to configure security policies to...
-
Module
Inviting users to an application
3 Topics
20 mins
-
Add users to an application and assign users to roles based on how they interact with a case.
-
Module
Managing application access
3 Topics
30 mins
-
Learn how you can configure role-based access control by using the Access Manager.
-
Module
Organizing and managing access to case attachments
4 Topics
30 mins
-
Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...
-
Module
Reviewing log files
6 Topics
45 mins
-
Pega Platform™ provides logs that record system events such as application errors and performance and security issues. Use log files to identify and...
-
Module
Role-based access control
5 Topics
55 mins
-
Learn how to authorize users to define roles and assign privileges to members of an access group.
-
Module
Security Checklist awareness
1 Topic
20 mins
-
- What is the Security Checklist?
- How do I access the Security Checklist?
- How to use the Security Checklist?/What is the purpose?
- What happens if...
-
Module
Tracking and auditing changes to data
2 Topics
20 mins
-
Pega Platform™ automatically tracks actions performed, such as which operators worked on a case and when. You can enhance this capability by using...