Table of Contents

Securing your application

Secure your application by setting up the organizational and user structures to precisely limit access to your application. You must configure groups and roles, and create operator IDs for each user who will be able to carry out tasks using your application, depending upon their access, group, and role.

Refer to the topic Security Checklist when deploying on Pega Cloud, which gives an overview of the different capabilities with which you set up user access and secure your application, including the following tasks:

    Suggest Edit
    Did you find this content helpful?

    Have a question? Get answers now.

    Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.