Skip to main content

Socratic Module

Application security

1 hr

Pega Platform '24.1
Visible to: All users

Pega Platform™ includes robust features to protect your application from unauthorized access by malicious hackers. In this module, you engage in a conversation about authentication, authorization, and Pega security policies, including the Security Checklist, operator records, Access Groups, and Access Roles.

After completing this module, you should be able to:

  • Identify the purpose and benefits of the Security Checklist.
  • Describe the relationship between authentication and authorization in application security.
  • Design Operator records for each of the application users.
  • Use Access Groups to control Operator permissions in a Pega application.
  • Incorporate the Role-based access control (RBAC) authorization model to prevent users from accessing restricted content.

Practice what you learned in the following Challenge:

Using Role-based Access Control v1
Log In to Launch Socrates
Through interactive engagement, Pega GenAI Socrates™ will be your personalized guide, offering thought-provoking conversation, questions, and multimedia resources to deepen your understanding. The module opens in a large window; closing it won't affect your progress.

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice