Skip to main content
close Search

Search

Looking for instructor-led training?

Configuring security policies

Configuring application rulesets

  • Challenge

    Configuring application rulesets

    1 Task

    20 mins

    Visible to all users
  • The Human Resources (HR) department requests the ability to update rules that describe department and company policies in the HRApps application. Add...

Creating a new application ruleset

  • Challenge

    Creating a new application ruleset

    3 Tasks

    10 mins

    Visible to all users
  • Your manager wants to preserve the initial starting version of the HRApps application before developers begin configuring application functionality...

Creating a robotic test solution for Citrix

  • Challenge

    Creating a robotic test solution for Citrix

    6 Tasks

    30 mins

    Visible to all users
  • The client company ABC Enterprises needs a Citrix Robotic solution that allows users to manage their legacy applications. Create a test solution to...

Dismissing a Citrix logon window

  • Challenge

    Dismissing a Citrix logon window

    4 Tasks

    20 mins

    Visible to all users
  • As a developer, you are tasked with creating a Citrix robotic solution for your company to allow users to manage a legacy application in a mixed mode...

Merging a development branch

  • Challenge

    Merging a development branch

    4 Tasks

    30 mins

    Visible to all users
  • The Payroll Setup case type provides automatic tax withholdings calculated based on the selected filing status. The current version of the case type...

Migrating an application

  • Challenge

    Migrating an application

    2 Tasks

    30 mins

    Visible to all users
  • Development of the HRApps application is complete. You are asked to migrate the application to a testing system. Quality assurance (QA testers)...

Organizing and managing access to case attachments

  • Challenge

    Organizing and managing access to case attachments

    4 Tasks

    30 mins

    Visible to all users
  • Applicants for an open position at TGB must submit a resume as part of the application process. To ensure the security of resumes attached to a...

Securing an application using attribute-based access control

  • Challenge

    Securing an application using attribute-based access control

    4 Tasks

    30 mins

    Visible to all users
  • Each candidate case includes a Taxpayer Identification Number (TIN) to identify the candidate. This information is considered sensitive personal...

Securing an application using role-based access control

  • Challenge

    Securing an application using role-based access control

    2 Tasks

    20 mins

    Visible to all users
  • In the Employee Evaluation case, TGB provides an optional, case-wide action to update an employee’s goals. The Human Resources (HR) department...

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice