Skip to main content

Module

Access control

6 Topics

1 hr 10 mins

Visible to: All users
Intermediate Pega Platform 8.7 Security English
Verify the version tags to ensure you are consuming the intended content or, complete the latest version.

Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.

After completing this module, you should be able to:

Identify the record types used to configure role-based access control
Customize access roles based on dependent roles
Identify the role of attachment categories
Distinguish between attribute-based and role-based access control
Identify the role of access control policies and access control policy conditions in securing an application
Identify the role of a client-based access rule in securing an application

Practice what you learned in the following Challenges:

Securing an application using role-based access control v4 Securing an application using attribute-based access control v4 Using RBAC to organize and manage access to case attachments v3

Available in the following mission:

Senior System Architect v4

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice