Socratic Module
Application security
Pega Platform™ includes robust features to protect your application from unauthorized access by malicious hackers. In this module, you engage in a conversation about authentication, authorization, and Pega security policies, including the Security Checklist, operator records, Access Groups, and Access Roles.
As you complete each module in the System Architect Socratic mission, your feedback is greatly appreciated. All feedback is currently being triaged and considered for future development of the Socratic tool.
After completing this module, you should be able to:
- Identify the purpose and benefits of the Security Checklist.
- Describe the relationship between authentication and authorization in application security.
- Design Operator records for each of the application users.
- Use Access Groups to control Operator permissions in a Pega application.
- Incorporate the Role-based access control (RBAC) authorization model to prevent users from accessing restricted content.
Practice what you learned in the following Challenge:
Available in the following mission:
Log In to Launch Socrates
Through interactive engagement, Pega GenAI Socrates™ will be your personalized guide, offering thought-provoking conversation, questions, and multimedia resources to deepen your understanding. The module opens in a large window; closing it won't affect your progress.