Skip to main content


Defining the authentication scheme

In most cases, you want to authenticate users when they log into an application to establish who they are and that they are actually who they say they are. You can implement authentication features that help to ensure that valid users can access the environments they are authorized to access. Pega Platform™ provides a complementary set of authentication services.

After completing this module, you should be able to:

Compare the available authentication services.
Determine the appropriate authentication service for a given use case.
Design an authentication scheme.

Available in the following mission:

Security Design v4

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice