Skip to main content
close Search

Search

Looking for instructor-led training?

Application security

  • Module

    Application security

    7 Topics

    1 hr 25 mins

    Visible to all users
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

Attribute-based access control

  • Module

    Attribute-based access control

    5 Topics

    1 hr 5 mins

    Visible to all users
  • Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.

Designing reports with multiple sources

  • Module

    Designing reports with multiple sources

    6 Topics

    1 hr 5 mins

    Visible to all users
  • Learn three techniques to create a report that references data from multiple classes: combining data in a report by creating subreports, configuring...

Gaining insight into business efficiency

Organizing and managing access to case attachments

  • Module

    Organizing and managing access to case attachments

    3 Topics

    25 mins

    Visible to all users
  • Cases may require that users upload documents required to process and resolve the case. To organize attachments, developers can create attachment...

Role-based access control

  • Module

    Role-based access control

    5 Topics

    55 mins

    Visible to all users
  • Learn how to authorize users to define roles and assign privileges to members of an access group.

Configuring security policies

Creating reports that combine data from multiple classes

  • Challenge

    Creating reports that combine data from multiple classes

    2 Tasks

    30 mins

    Visible to all users
  • The business partners in the Human Resources (HR) department request two reports.

    The first report must track the progress of candidate cases...

Organizing and managing access to case attachments

  • Challenge

    Organizing and managing access to case attachments

    4 Tasks

    30 mins

    Visible to all users
  • Applicants for an open position at TGB must submit a resume as part of the application process. To ensure the security of resumes attached to a...

Securing an application using attribute-based access control

  • Challenge

    Securing an application using attribute-based access control

    4 Tasks

    30 mins

    Visible to all users
  • Each candidate case includes a Taxpayer Identification Number (TIN) to identify the candidate. This information is considered sensitive personal...

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice