Close popover

Table of Contents

Configuring login and disablement policies

Version:

You can make user authentication more secure by defining policies for password requirements, multifactor authentication, lockout policies, and other similar restrictions.

  • Managing security policies

    Enable security policies for user authentication and session management to improve application security. You can control the strength of user IDs and passwords, manage session time-outs and the disabling of operator IDs, control the auditing of login events, and implement CAPTCHA and multifactor authentication.

  • Understanding Requestor Type data instances

    Users and external systems connect to Pega Platform using one of four requestor types. Requestor type data instances define the types of requestors that can access your system, such as a browser session, an external application, or an internal background process.

  • Application ID data instances

    Pega Platform supports single sign-on. A person or external system that is authenticated by an external application can be authenticated without providing a second user ID and password. The single sign-on feature is implemented through a security token, which is referenced by an application ID data instance.

Suggest Edit

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.