Skip to main content

Module

Access control

Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.

After completing this module, you should be able to:

Identify the record types used to configure role-based access control.
Customize Access Roles based on dependent roles.
Identify the role of attachment categories.
Distinguish between attribute-based and role-based access control.
Identify the role of Access Control Policies and Access Control Policy Conditions in securing an application.
Identify the role of a client-based access Rule in securing an application.

Practice what you learned in the following Challenges:

Securing an application using attribute-based access control v8 Using RBAC to organize and manage access to case attachments v7

Available in the following mission:

Senior System Architect v7

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice