Skip to main content


Access control

5 Topics

1 hr 5 mins

Visible to: All users
Intermediate Pega Platform 8.8 Security English
Verify the version tags to ensure you are consuming the intended content or, complete the latest version.

Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.

After completing this module, you should be able to:

Identify the record types used to configure role-based access control.
Customize access roles based on dependent roles.
Identify the role of attachment categories.
Distinguish between attribute-based and role-based access control.
Identify the role of access control policies and access control policy conditions in securing an application.
Identify the role of a client-based access rule in securing an application.

Practice what you learned in the following Challenges:

Securing an application using attribute-based access control v5 Using RBAC to organize and manage access to case attachments v4

Available in the following mission:

Senior System Architect v5

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice