Skip to main content


Defining the authentication scheme


1 Topic

10 mins

Visible to: All users
Advanced Pega Platform 8.3.1 English
This content is now archived and is no longer updated. Progress is not calculated. Pega Cloud instances are disabled, and badges are no longer awarded. Click here to continue your progress in the latest version.

In most cases, you want to authenticate users when logging into an application to establish who they are and that they are who they say they are. You can implement authentication features that ensure valid users can access the environments they are authorized to access. The Pega Platform provides a complementary set of authentication services.

After completing this module, you should be able to:

Compare the available authentication services
Determine the appropriate authentication service for a given use case
Design an authentication scheme

Available in the following mission:

Lead System Architect v1

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice