Looking for instructor-led training?
We're still migrating content to the new system.
Learn about the types of attacks that malicious hackers use to gain unauthorized access to Pega Platform, and how to configure security policies to...
Add users to an application and assign users to roles based on how they interact with a case.
Learn how you can configure role-based access control by using the Access Manager.
Pega Platform™ automatically tracks actions performed, such as which operators worked on a case and when. You can enhance this capability by using...
Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.