Encryption in Pega Platform
Data encryption in Pega ® Platform gives sensitive data in your applications an additional layer of security while preserving critical Pega Platform functionality. Data encryption makes it easier to comply with privacy policies, regulatory requirements, and contractual obligations for handling…
Security checklist for deploying applications
As an administrator, senior system architect, or lead system architect, your goal is to ensure the confidentiality, integrity, and availability of your application during development and before you move it to production. Unauthorized individuals should not have access to the application or the data…
Security settings in the prconfig.xml file
The prconfig.xml file and Dynamic System Settings include parameters that control access to the Pega Platform™ database. As a best practice, use the Dynamic System Settings rather than editing the prconfig.xml file. Edit the prconfig.xml file to overwrite Dynamic System Settings that apply to a…
Pega Platform
Developing custom modules for Android for Pega 7.1.9
This tutorial describes how Android developers can extend their applications by using custom modules, which are developed in Java and expose their functionality through the JavaScript API. Custom modules enable features and functions that are available to native Android applications in Pega…
Developing custom Pega Mobile Client modules for iOS in Pega 7.2.2
Pega Mobile Client consists of several modules that enable various device functionalities or allow your custom mobile app to communicate with the Pega ® Platform. This tutorial describes how iOS developers can extend the Pega Mobile Client by creating their own modules, which can be developed in…
Developing custom Pega Mobile Client modules for the iOS platform
This tutorial describes how you can extend your custom mobile apps by using custom Pega ® Mobile Client modules. You can develop custom modules in Objective-C or Swift and expose their functionality through the JavaScript API. They can enable features and functions that are available to native iOS…
Developing custom Pega Mobile Client modules for the Android platform
This tutorial describes how you can extend your custom mobile apps by using custom Pega ® Mobile Client modules. You develop custom modules in Java and expose their functionality through the JavaScript API. The modules enable features and functions that are available to native Android applications…
Pega Platform Pega Mobile Client Pega Platform 7.3.1
Configuring CSRF protection
Cross-Site Request Forgery (CSRF) is an attack that forces a user to execute unwanted actions on a web application in which the user is currently authenticated. CSRF specifically targets state-changing requests, not theft of data, because the attacker cannot see the response to the forged request.…
Pega Platform
Dynamic System Settings for application security
As a best practice, configure these Dynamic System Settings to enable greater security in your application before moving your application from development to a production environment. To obtain the values to include in the cross-site request forgery (CSRF) mitigation lists, enable CSRF mitigation,…
Configuring two-factor authentication with a one-time password
Pega ® Platform supports two-factor authentication by sending a one-time password (OTP) to a user through email. The user must enter this one-time password in your Pega Platform application for verification. Two-factor authentication is supported for the following use cases: In custom…