
Search
Looking for instructor-led training?
Access control
-
Module
Access control
6 Topics
1 hr 10 mins
Pega Platform 8.7 -
Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
Application security
-
Module
Application security
7 Topics
1 hr 25 mins
-
Learn how to authorize users to define roles and assign privileges to members of an access group.
Attribute-based access control
-
Module
Attribute-based access control
5 Topics
1 hr 5 mins
-
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
Organizing and managing access to case attachments
-
Module
Organizing and managing access to case attachments
3 Topics
25 mins
-
Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...
Reviewing log files
-
Module
Reviewing log files
6 Topics
45 mins
-
Pega Platform™ provides logs that record system events such as application errors and performance and security issues. Use log files to identify and...
Role-based access control
-
Module
Role-based access control
5 Topics
55 mins
-
Learn how to authorize users to define roles and assign privileges to members of an access group.
Configuring security policies
-
Challenge
Configuring security policies
2 Tasks
5 mins
-
GogoRoad is experiencing a large number of failed login attempts. Management suspects that the attempts are malicious attacks by an internet bot...
Reviewing log files
-
Challenge
Reviewing log files
3 Tasks
15 mins
-
During the employee evaluation process, employees undergo an evaluation period to regularly assess their performance as new hires. To check the status...
Securing an application using attribute-based access control
-
Challenge
Securing an application using attribute-based access control
4 Tasks
30 mins
-
Each candidate case includes a Taxpayer Identification Number (TIN) to identify the candidate. This information is considered sensitive personal...
Securing an application using role-based access control
-
Challenge
Securing an application using role-based access control
2 Tasks
20 mins
-
In the Employee Evaluation case, TGB provides an optional, case-wide action to update an employee’s goals. The Human Resources (HR) department...