
Search
24.1 Release notes
-
Module
24.1 Release notes
2 Topics
25 mins
Pega Platform '24.1 -
This module provides an overview of the significant changes and improvements in the Pega Infinity™ '24.1 release. Learn about the Pega GenAI™ features...
Access control
-
Module
Access control
5 Topics
1 hr 5 mins
-
Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.
Application security
-
Module
Application security
2 Topics
30 mins
-
Learn how to configure security policies to thwart attempts by malicious hackers to gain unauthorized access to Pega Platform™.
Managing application access
-
Module
Managing application access
2 Topics
25 mins
-
Learn how you can configure role-based access control by using the Persona access landing page and Access Manager. The Persona access landing page and...
Inviting users to an application
-
Module
Inviting users to an application
1 Topic
10 mins
-
Add Personas and Channel interfaces to an application and assign users to Personas based on how they interact with a Case.
Managing application access for Business Architects
-
Module
Managing application access for Business Architects
2 Topics
30 mins
-
User management is fundamental to the successful implementation of a Pega Platform™ application.
As a Pega Business Architect, in order to...
Datenänderungen nachverfolgen und prüfen
-
Module
Datenänderungen nachverfolgen und prüfen
2 Topics
20 mins
-
Die Pega-Plattform verfolgt durchgeführte Aktionen automatisch nach, z. B. welche Mitarbeiter wann an einem Case gearbeitet haben. Sie können diese...
Securing and auditing data
-
Module
Securing and auditing data
2 Topics
30 mins
-
Pega Platform™ provides multiple ways to ensure the integrity of and ability to audit application data. Applications automatically track Actions...
Security Checklist awareness
-
Module
Security Checklist awareness
1 Topic
20 mins
Platform -
- What is the Security Checklist?
- How do I access the Security Checklist?
- How to use the Security Checklist?/What is the purpose?
- What happens if I...