
Search
Senior System Architect
-
Mission
Senior System Architect
3 Missions
11 Modules
11 Challenges
1 day 8 hrs 55 mins
-
The Senior System Architect mission continues the journey to increase your knowledge of application development on Pega Platform™. The modules in this...
Access control
-
Module
Access control
5 Topics
1 hr 5 mins
-
Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
Attribute-based access control
-
Module
Attribute-based access control
5 Topics
1 hr 5 mins
-
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
Circumstancing case processing
-
Module
Circumstancing case processing
7 Topics
1 hr
-
Create variations of a rule that can be executed in specific circumstances, to better tailor application behavior to variations identified by the...
Creating a Pega Platform application
-
Module
Creating a Pega Platform application
3 Topics
40 mins
-
Developing new applications from the ground up can be an overwhelming task for any organization and developer. Every application should adhere to an...
Debugging system performance
-
Module
Debugging system performance
3 Topics
1 hr
-
Diagnosing performance issues requires understanding the root cause of an issue. For example, a user might report that an application takes a minute...
Measuring system performance
-
Module
Measuring system performance
5 Topics
1 hr 25 mins
-
Pega Platform™ provides tools to evaluate application performance through performance statistics and events that help you distinguish between...
Organizing and managing access to case attachments
-
Module
Organizing and managing access to case attachments
3 Topics
25 mins
-
Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...
Reviewing log files
-
Module
Reviewing log files
3 Topics
30 mins
-
Pega Platform™ provides logs that record system events such as application errors and performance and security issues. Use log files to identify and...
Role-based access control
-
Module
Role-based access control
5 Topics
55 mins
-
Learn how to authorize users to define roles and assign privileges to members of an access group.