Article

May 21, 2019

Inform Pega Predictive Diagnostic Cloud™ users about system health by requesting email digests and event notifications for specific mailboxes. You can choose a complete Improvement Plan, a summary of recent cases, a periodic digest with new cases, and notifications for specific events. You can…

Article

May 21, 2019

As a Pega Predictive Diagnostic Cloud™ (PDC) administrator, you can create, modify, and delete PDC operator records, and define operators' roles. Use the operator records to grant or deny access to PDC or to update login information for an operator. If you want to define operators'…

Article

May 21, 2019

The Improvement Plan landing page provides detailed information about issues that affect the performance of your monitored system. By looking at this information, you can identify areas that you need to work on to improve your system's performance. To access the page, on the navigation pane,…

Article

May 17, 2019

The prconfig.xml   file and Dynamic System Settings include parameters that control access to the Pega Platform™ database. As a best practice, use the Dynamic System Settings rather than editing the prconfig.xml file. Edit the prconfig.xml file to overwrite Dynamic System Settings that apply to a…

Article

May 7, 2019

Pega Predictive Diagnostic Cloud™ (PDC) receives, analyzes, and stores data that is sent from Pega Platform™. The information is gathered from several data sources and received as summary statistics or individual data. The following topics contain information about the data collected by PDC:…

Article

May 3, 2019

You can use authorization, or access control, features in the Pega Platform™ to restrict user actions. You can use role-based access control or attribute-based access control to restrict the following types of user access and actions: Accessing portions of the user interface (harnesses, controls)…

Article

May 3, 2019

Data encryption in Pega Platform™ gives sensitive data in your applications an additional layer of security while preserving critical Pega Platform functionality. Data encryption makes it easier to comply with privacy policies, regulatory requirements, and contractual obligations for handling…

Article

May 3, 2019

Authentication in Pega Platform™ ensures that only users and systems whose identity has been verified can access resources such as web pages, APIs, and data. Sample use cases for authentication in Pega Platform include user logins, platform requests to external services, and external service…

Article

Apr 29, 2019

Summary When you execute a list view rule or summary view rule to produce a report, an “invalid column name” SQL error message appears. This message indicates that the problem is not a reporting issue, but arises from a class mapping misconfiguration. This article explains the reason for the error…

Article

Apr 29, 2019

As an administrator, senior system architect, or lead system architect, your goal is to ensure the confidentiality, integrity, and availability of your application during development and before you move it to production. Unauthorized individuals should not have access to the application or the data…