Skip to main content

Search

Looking for instructor-led training?

Application security

  • Module

    Application security

    7 Topics

    1 hr 25 mins

    Visible to all users
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

Attribute-based access control

  • Module

    Attribute-based access control

    5 Topics

    1 hr 5 mins

    Visible to all users
  • Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.

Organizing and managing access to case attachments

  • Module

    Organizing and managing access to case attachments

    3 Topics

    25 mins

    Visible to all users
  • Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...

Reviewing log files

  • Module

    Reviewing log files

    6 Topics

    45 mins

    Visible to all users
  • Pega Platform™ provides logs that record system events such as application errors and performance and security issues. Use log files to identify and...

Role-based access control

  • Module

    Role-based access control

    5 Topics

    55 mins

    Visible to all users
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

Securing data

  • Module

    Securing data

    7 Topics

    55 mins

    Visible to all users
  • Data is an important asset that must be protected from unauthorized access and use. Client-based access control manages how data is used to comply...

Configuring security policies

Organizing and managing access to case attachments

  • Challenge

    Organizing and managing access to case attachments

    4 Tasks

    30 mins

    Visible to all users
  • Applicants for an open position at TGB must submit a resume as part of the application process. To ensure the security of resumes attached to a...

Reviewing log files

  • Challenge

    Reviewing log files

    3 Tasks

    15 mins

    Visible to all users
  • During the employee evaluation process, employees undergo an evaluation period to regularly assess their performance as new hires. To check the status...

Securing an application using attribute-based access control

  • Challenge

    Securing an application using attribute-based access control

    4 Tasks

    30 mins

    Visible to all users
  • Each candidate case includes a Taxpayer Identification Number (TIN) to identify the candidate. This information is considered sensitive personal...

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice