
Search
Access control
-
Module
Access control
5 Topics
1 hr 5 mins
-
Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
Adding an external data source to a data type
-
Module
Adding an external data source to a data type
2 Topics
30 mins
-
Configure data types based on external data models to simplify integration with external systems.
Application security
-
Module
Application security
7 Topics
1 hr 25 mins
-
Learn how to authorize users to define roles and assign privileges to members of an access group.
Attribute-based access control
-
Module
Attribute-based access control
5 Topics
1 hr 5 mins
-
Configure attribute-based access control to enforce security requirements for a specific case or data instance, based on case or session data.
Auto-balancing in Pega Robot Manager
-
Module
Auto-balancing in Pega Robot Manager
5 Topics
30 mins
Pega Robot Manager 8.5.2 -
Pega Robot Manager uses Auto-balancing to monitor and move robots between work groups dynamically. Automatic workload balancing reduces the number of...
Building the customer analytical data model
-
Module
Building the customer analytical data model
9 Topics
1 hr 55 mins
-
Data lies at the heart of one-to-one customer engagement. Utilize industry-specific data models for customer-centric decisioning, based on best...
Citrix robotic project design
-
Module
Citrix robotic project design
1 Topic
25 mins
Pega Robotic Automation 19.1 -
Developers must determine how an implemented Citrix environment configuration can impact a robotic solution's development by recognizing design...
Creating and setting application variables
-
Module
Creating and setting application variables
1 Topic
20 mins
-
Pega Platform™ provides a unified, consistent framework for allowing developers to expose certain application settings for customization. You can...
Integration errors
-
Module
Integration errors
3 Topics
30 mins
-
Connectors are used to integrate with external systems. Errors related to application infrastructure or configuration may occur when a connector...
Exchanging data with other applications
-
Module
Exchanging data with other applications
2 Topics
30 mins
-
Most businesses have applications that handle a wide variety of business needs. Many of these applications need to exchange data with each other as...