Tools and knowledge to help you succeed.
Looking for instructor-led training?
Learn how you can configure role-based access control by using the Access Manager.
1 hr 25 mins
Learn how to authorize users to define roles and assign privileges to members of an access group.
1 hr 5 mins
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
Add users to an application and assign users to roles based on how they interact with a case.
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform™, and how to configure security policies to...
Pega Platform™ automatically tracks actions performed, such as which operators worked on a case and when. You can enhance this capability by using...
Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...
Learn about low-code development and review how Pega Low-Code App Factory aids in effectively scaling low-code in an enterprise.
Data is an important asset that must be protected from unauthorized access and use. Client-based access control manages how data is used to comply...
Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.