Updated

Content Type

Product

Capability

Industry

Article

May 17, 2019

The prconfig.xml   file and Dynamic System Settings include parameters that control access to the Pega Platform™ database. As a best practice, use the Dynamic System Settings rather than editing the prconfig.xml file. Edit the prconfig.xml file to overwrite Dynamic System Settings that apply to a…

Article

May 15, 2019

Opportunity value helps account owners and underwriters to determine the best opportunities to pursue. Decision Strategy Manager (DSM) is required to calculate opportunity value in Pega Underwriting for Multinational Insurance. Before you begin your configuration, ensure that the…

Article

May 15, 2019

Opportunity value helps account owners and underwriters to determine the best opportunities to pursue. Decision Strategy Manager (DSM) is required to calculate opportunity value in Pega Underwriting for Commercial Insurance. Before you begin your configuration, ensure that the…

Article

May 15, 2019

The ACORD 125 Commercial Insurance Application form is an industry-standard form that is used by commercial insurers. Applicants for insurance can use this form to provide the information that is required to initiate a commercial package submission case in the Pega Underwriting for Commercial…

Article

May 15, 2019

Opportunities are submissions that account owners and underwriters are responsible for completing, but could be assigned to another individual or work queue for various reasons. Opportunity value helps account owners and underwriters determine the best opportunities to pursue. In Pega Underwriting…

Article

May 7, 2019

Pega Predictive Diagnostic Cloud™ (PDC) receives, analyzes, and stores data that is sent from Pega Platform™. The information is gathered from several data sources and received as summary statistics or individual data. The following topics contain information about the data collected by PDC:…

Article

May 3, 2019

You can use authorization, or access control, features in the Pega Platform™ to restrict user actions. You can use role-based access control or attribute-based access control to restrict the following types of user access and actions: Accessing portions of the user interface (harnesses, controls)…

Article

May 3, 2019

Data encryption in Pega Platform™ gives sensitive data in your applications an additional layer of security while preserving critical Pega Platform functionality. Data encryption makes it easier to comply with privacy policies, regulatory requirements, and contractual obligations for handling…

Article

May 3, 2019

Authentication in Pega Platform™ ensures that only users and systems whose identity has been verified can access resources such as web pages, APIs, and data. Sample use cases for authentication in Pega Platform include user logins, platform requests to external services, and external service…

Article

Apr 29, 2019

Summary When you execute a list view rule or summary view rule to produce a report, an “invalid column name” SQL error message appears. This message indicates that the problem is not a reporting issue, but arises from a class mapping misconfiguration. This article explains the reason for the error…