Skip to main content


Defining the authorization scheme

Verify the version tags to ensure you are consuming the intended content or, complete the latest version.

In most cases, you want to restrict authenticated users from accessing every part of an application. You can implement authorization features that ensure users can access only the user interfaces and data that they are authorized to access. Pega Platform™ provides a complementary set of access control features called role-based access control, attribute-based access control, and client-based access control.

After completing this module, you should be able to:

Compare role and attribute-based access control.
Identify and configure roles and access groups for an application.
Determine the appropriate authorization model for a given use case.
Determine the rule security mode.

Available in the following mission:

Security Design v3

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice