Article
Jan 29, 2019

Data encryption in Pega ® Platform gives sensitive data in your applications an additional layer of security while preserving critical Pega Platform functionality. Data encryption makes it easier to comply with privacy policies, regulatory requirements, and contractual obligations for handling…

Article
Dec 4, 2018

As an administrator, senior system architect, or lead system architect, your goal is to ensure the confidentiality, integrity, and availability of your application during development and before you move it to production. Unauthorized individuals should not have access to the application or the data…

Article
Oct 31, 2018

The prconfig.xml   file and Dynamic System Settings include parameters that control access to the Pega Platform™ database. As a best practice, use the Dynamic System Settings rather than editing the prconfig.xml file. Edit the prconfig.xml file to overwrite Dynamic System Settings that apply to a…

Article
Oct 19, 2018

This tutorial describes how Android developers can extend their applications by using custom modules, which are developed in Java and expose their functionality through the JavaScript API. Custom modules enable features and functions that are available to native Android applications in Pega…

Article
Oct 19, 2018

Pega Mobile Client consists of several modules that enable various device functionalities or allow your custom mobile app to communicate with the Pega ® Platform. This tutorial describes how iOS developers can extend the Pega Mobile Client by creating their own modules, which can be developed in…

Article
Oct 18, 2018

This tutorial describes how you can extend your custom mobile apps by using custom Pega ® Mobile Client modules. You can develop custom modules in Objective-C or Swift and expose their functionality through the JavaScript API. They can enable features and functions that are available to native iOS…

Article
Oct 18, 2018

This tutorial describes how you can extend your custom mobile apps by using custom Pega ® Mobile Client modules. You develop custom modules in Java and expose their functionality through the JavaScript API. The modules enable features and functions that are available to native Android applications…

Article
Oct 17, 2018

Cross-Site Request Forgery (CSRF) is an attack that forces a user to execute unwanted actions on a web application in which the user is currently authenticated. CSRF specifically targets state-changing requests, not theft of data, because the attacker cannot see the response to the forged request.…

Article
Oct 17, 2018

As a best practice, configure these Dynamic System Settings to enable greater security in your application before moving your application from development to a production environment. To obtain the values to include in the cross-site request forgery (CSRF) mitigation lists, enable CSRF mitigation,…

Article
Oct 11, 2018

Pega ® Platform supports two-factor authentication by sending a one-time password (OTP) to a user through email. The user must enter this one-time password in your Pega Platform application for verification. Two-factor authentication is supported for the following use cases: In custom…