Article

Aug 13, 2019

Pega Platform™ supports two-factor authentication by sending a one-time password (OTP) to a user through email. The user must enter this one-time password in your Pega Platform application for verification. Two-factor authentication is supported for the following use cases: In custom authentication…

Article

Aug 12, 2019

Pega ® Platform provides encryption of sensitive data while the data is at rest. For more information, see Encryption in Pega Platform . This encryption can be performed using a platform cipher or by using a custom cipher that you define. To implement a custom cipher, you create the cipher class,…

Article

Aug 12, 2019

As an administrator, senior system architect, or lead system architect, your goal is to ensure the confidentiality, integrity, and availability of your application during development and before you move it to production. Unauthorized individuals should not have access to the application or the data…

Article

Aug 12, 2019

As a best practice, before moving your application from development to a production environment, configure these dynamic system settings to enable greater security in your application. The settings shown below with the prefix "prconfig" can also be set on a per-node basis in the prconfig.…

Article

Aug 12, 2019

Data encryption in Pega Platform™ gives sensitive data in your applications an additional layer of security while preserving critical Pega Platform functionality. Data encryption makes it easier to comply with privacy policies, regulatory requirements, and contractual obligations for handling…

Article

Aug 12, 2019

Authentication in Pega Platform™ ensures that only users and systems whose identity has been verified can access resources such as web pages, APIs, and data. Examples of authentication in Pega Platform include user logins, platform requests to external services, and external service requests to the…

Article

Aug 8, 2019

Application and data security are major concerns of information technology organizations today. Inadequate security can prevent your application from being deployed. Security failures in deployment can expose your organization to severe consequences, from loss of customers and of your organization’…

Article

Aug 7, 2019

In Pega Predictive Diagnostic Cloud™ (PDC) and Pega Autonomic Event Services™ (AES), if your application has specific known issues that are expected to be slower, bigger, or costlier than the key performance indicator (KPI) threshold value configured in Pega Platform™, you can discard unnecessary…

Article

Jul 8, 2019

When building a mobile application for iOS devices, you have to generate iOS provisioning files and upload them from the Channels and interfaces tab in Designer Studio. If you do not have a Macintosh computer running Mac OS X, you can create provisioning files on a Windows-based system by following…

Article

Jul 8, 2019

This article describes how to generate a password protected APNs certificate file with the .p12 extension used for push notifications. The generated .p12 APNs certificate file is later used in the Pega 7 Platform in the iOS certificate set to build your custom mobile app on the iOS platform. For…