Article

May 17, 2019

The prconfig.xml   file and Dynamic System Settings include parameters that control access to the Pega Platform™ database. As a best practice, use the Dynamic System Settings rather than editing the prconfig.xml file. Edit the prconfig.xml file to overwrite Dynamic System Settings that apply to a…

Article

May 7, 2019

Pega Predictive Diagnostic Cloud™ (PDC) receives, analyzes, and stores data that is sent from Pega Platform™. The information is gathered from several data sources and received as summary statistics or individual data. The following topics contain information about the data collected by PDC:…

Article

May 3, 2019

You can use authorization, or access control, features in the Pega Platform™ to restrict user actions. You can use role-based access control or attribute-based access control to restrict the following types of user access and actions: Accessing portions of the user interface (harnesses, controls)…

Article

May 3, 2019

Data encryption in Pega Platform™ gives sensitive data in your applications an additional layer of security while preserving critical Pega Platform functionality. Data encryption makes it easier to comply with privacy policies, regulatory requirements, and contractual obligations for handling…

Article

May 3, 2019

Authentication in Pega Platform™ ensures that only users and systems whose identity has been verified can access resources such as web pages, APIs, and data. Sample use cases for authentication in Pega Platform include user logins, platform requests to external services, and external service…

Article

Apr 29, 2019

Summary When you execute a list view rule or summary view rule to produce a report, an “invalid column name” SQL error message appears. This message indicates that the problem is not a reporting issue, but arises from a class mapping misconfiguration. This article explains the reason for the error…

Article

Apr 29, 2019

As an administrator, senior system architect, or lead system architect, your goal is to ensure the confidentiality, integrity, and availability of your application during development and before you move it to production. Unauthorized individuals should not have access to the application or the data…

Article

Mar 29, 2019

Pega ® Platform provides encryption of sensitive data while the data is at rest. For more information, see Encryption in Pega Platform . This encryption can be performed using a platform cipher or by using a custom cipher that you define. To implement a custom cipher, you create the cipher class,…

Article

Mar 25, 2019

Go to the Pega Predictive Diagnostic Cloud™ product page on Community .

Article

Mar 22, 2019

Pega Platform™ supports two-factor authentication by sending a one-time password (OTP) to a user through email. The user must enter this one-time password in your Pega Platform application for verification. Two-factor authentication is supported for the following use cases: In custom authentication…