Mission
Security Design
3 Modules
5 Challenges
7 hrs
The Security Design mission is an advanced mission for Pega certified senior system architects (PCSSA) who are ready to take on the Pega certified lead system architect (PCLSA) role. This mission covers modules and topics that are required to design authentication services that verify the identity of operators, as well as effective authorization schemes that ensure users can access only the application features and data that they are authorized to access. This mission also discusses how to identify and address security vulnerabilities and how to design solutions that avoid common mistakes that can expose vulnerabilities in a system.
Available in the following mission:
Defining the authentication scheme
-
Module
Defining the authentication scheme
8 Topics
1 hr 15 mins
-
In most cases, you want to authenticate users when they log into an application to establish who they are, and that they are actually who they say...
Configurating SAML authentication
-
Challenge
Configurating SAML authentication
3 Tasks
1 hr 30 mins
-
Front Stage is considering using SSO with SAML to Authenticate Operators. There are many Identity Providers available in the marketplace, and some are...
Configuring OpenID Connect authentication
-
Challenge
Configuring OpenID Connect authentication
4 Tasks
45 mins
-
Front Stage is considering using OpenID Connect to Authenticate Operators.
Design and implement an OpenID Connect as a proof of concept.
Pega now...
Defining the authorization scheme
-
Module
Defining the authorization scheme
6 Topics
1 hr
-
In most cases, you want to restrict authenticated users from accessing every part of an application. You can implement authorization features that...
Defining the authorization scheme
-
Challenge
Defining the authorization scheme
9 Tasks
30 mins
-
Front Stage's organization wants to implement the following security requirements:
- Only sales executives and executive managers are allowed to see...
Mitigating security risks
-
Module
Mitigating security risks
6 Topics
1 hr 5 mins
-
Securing an application and ensuring that the correct security is set up is important. Correct security entails making sure that users are actually...
Identifying and mitigating security risks
-
Challenge
Identifying and mitigating security risks
2 Tasks
20 mins
-
Front Stage's Booking application is going live in the near future. Before promoting the application to production, a security review is required. Any...
Analyzing security event logs
-
Challenge
Analyzing security event logs
3 Tasks
20 mins
-
Front Stage is concerned whether someone’s user name and password may have been compromised, perhaps through a phishing attack. FSG has decided to...