Article

May 17, 2019

The prconfig.xml   file and Dynamic System Settings include parameters that control access to the Pega Platform™ database. As a best practice, use the Dynamic System Settings rather than editing the prconfig.xml file. Edit the prconfig.xml file to overwrite Dynamic System Settings that apply to a…

Article

May 16, 2019

Pega Cloud provides industry-leading infrastructure, enterprise-grade services, and operational excellence for the Pega 7 Platform and strategic applications in the cloud. Pega Cloud provides Pega 7 Platform environments that are provisioned, monitored, and maintained for individual customers. In…

Article

May 16, 2019

The Pega Marketing application includes operators and access groups that you use to review the application's capabilities, copy into your application, or extend to meet your business needs. Name Role Default access group Portal MarketingAdministrator Systems administrator operator…

Article

May 3, 2019

You can use authorization, or access control, features in the Pega Platform™ to restrict user actions. You can use role-based access control or attribute-based access control to restrict the following types of user access and actions: Accessing portions of the user interface (harnesses, controls)…

Article

May 3, 2019

Data encryption in Pega Platform™ gives sensitive data in your applications an additional layer of security while preserving critical Pega Platform functionality. Data encryption makes it easier to comply with privacy policies, regulatory requirements, and contractual obligations for handling…

Article

May 3, 2019

Authentication in Pega Platform™ ensures that only users and systems whose identity has been verified can access resources such as web pages, APIs, and data. Sample use cases for authentication in Pega Platform include user logins, platform requests to external services, and external service…

Article

Apr 29, 2019

As an administrator, senior system architect, or lead system architect, your goal is to ensure the confidentiality, integrity, and availability of your application during development and before you move it to production. Unauthorized individuals should not have access to the application or the data…

Article

Apr 24, 2019

The security SECU0017 alert is generated when a request is sent to a Pega application and the browser fingerprint is either missing or does not match the expected value. The causes of this alert can include, for example, an attempted cross-site request forgery attack or a session hijacking attack.…

Article

Mar 29, 2019

Pega ® Platform provides encryption of sensitive data while the data is at rest. For more information, see Encryption in Pega Platform . This encryption can be performed using a platform cipher or by using a custom cipher that you define. To implement a custom cipher, you create the cipher class,…

Capability

Mar 29, 2019

Find resources a Pega user may need to manage case management within the Pega Platform including case design, "design-by-doing" features, and case manager portal.