
Search
Looking for instructor-led training?
Access control
-
Module
Access control
6 Topics
1 hr 10 mins
Pega Platform 8.7 -
Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
Application security
-
Module
Application security
2 Topics
30 mins
-
Learn how to configure security policies to thwart attempts by malicious hackers to gain unauthorized access to Pega Platform™.
Attribute-based access control
-
Module
Attribute-based access control
5 Topics
1 hr 5 mins
-
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
Configuring security policies
-
Module
Configuring security policies
4 Topics
45 mins
-
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform™, and how to configure security policies to...
Inviting users to an application
-
Module
Inviting users to an application
1 Topic
10 mins
-
Add personas and channel interfaces to an application and assign users to personas based on how they interact with a case.
Managing application access
-
Module
Managing application access
2 Topics
25 mins
-
Learn how you can configure role-based access control by using the Access Manager. Access Manager secures your application and tightens the access...
Organizing and managing access to case attachments
-
Module
Organizing and managing access to case attachments
3 Topics
25 mins
-
Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...
Pega Platform patch releases
-
Module
Pega Platform patch releases
3 Topics
40 mins
Pega Platform -
Get familiar with the benefits and best practices of patch releases in Pega Platform™ to effectively adopt the patch release process and reduce hotfix...
Reviewing log files
-
Module
Reviewing log files
6 Topics
45 mins
-
Pega Platform™ provides logs that record system events such as application errors and performance and security issues. Use log files to identify and...
Role-based access control
-
Module
Role-based access control
5 Topics
55 mins
-
Learn how to authorize users to define roles and assign privileges to members of an access group.