Skip to main content


Access control

6 Topics

1 hr 10 mins

Pega Platform 8.7
Visible to all users
Intermediate Pega Platform 8.7 Security English

Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.

After completing this module, you should be able to:

Identify the record types used to configure role-based access control
Customize access roles based on dependent roles
Identify the role of attachment categories
Distinguish between attribute-based and role-based access control
Identify the role of access control policies and access control policy conditions in securing an application
Identify the role of a client-based access rule in securing an application

Practice what you learned in the following Challenges:

Securing an application using role-based access control Securing an application using attribute-based access control Using RBAC to organize and manage access to case attachments

Available in the following mission:

Senior System Architect

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice