Skip to main content

Customizing Security Requirements in Pega Applications

This course is for anyone who wants to customize security requirements in Pega Applications

In this course, you use Pega Platform capabilities to satisfy common security requirements in your applications and deploy guardrail-compliant applications. The Pega Platform model-driven architecture allows you to secure applications by configuring built-in features that include user and system authentication, access control, and data encryption. Delivered on v7.3, exercises in this course are designed to enable users on v7.3 and v7.4. You may notice slight navigation changes between versions.


  • None

What you'll learn

By the end of this course, you will be able to successfully:

  • Understand common security requirements in your applications
  • Deploy guardrail-compliant applications

Course Outline

  1. Course Overview

    • Before you begin
  2. User Authentication

    • Authenticating users
    • Customizing user authentication
  3. Access Control

    • Authorizing users based on external information
  4. Securing Pega Applications and Data

    • Concealing passwords and sensitive data
  5. Security Auditing

    • Auditing changes to field values
  6. Course Summary

    • Course Summary

Choose Your Format

Need help choosing the best format? Learn More.

  • Skill Level


  • Duration

    4 hours

  • Platform Version

    7.3, 7.4

View our Certification FAQ and Policies