Socratic Module
Application security
Pega Platform™ includes robust features to protect your application from unauthorized access by malicious hackers. In this module, you engage in a conversation about authentication, authorization, and Pega security policies, including the Security Checklist, operator records, Access Groups, and Access Roles.
Estimated module duration: 1 hour
Engage at your own pace, with Socrates guiding your understanding of the material. For an optimal experience, complete the module in one session.
Using Socrates: |
|
Experienced learners: |
|
New learners: |
|
After completing this module, you should be able to:
- Identify the purpose and benefits of the Security Checklist.
- Describe the relationship between authentication and authorization in application security.
- Design Operator records for each of the application users.
- Use Access Groups to control Operator permissions in a Pega application.
- Incorporate the Role-based access control (RBAC) authorization model to prevent users from accessing restricted content.
Practice what you learned in the following Challenge:
Available in the following mission:
Log In to Launch Socrates
Through interactive engagement, Pega GenAI Socrates™ will be your personalized guide, offering thought-provoking conversation, questions, and multimedia resources to deepen your understanding. The module opens in a large window; closing it won't affect your progress.