Updated

Content Type

Product

Capability

Industry

Article

May 27, 2020

Symptom Users working with Pega Web Mashup in the same session of Chrome with the secure cookie attribute SameSite=None or SameSite=Strict experience the Cross-Origin Read Blocking (CORB) error. The problem occurs in Pega 7.2 through Pega 8.4. Error Cross-Origin Read Blocking (CORB) blocked cross-…

Article

May 27, 2020

Security Pega Platform protects against a wide variety of security risks. Use the platform features related to authentication, authorization, and auditing to protect and monitor the use of your application. Pega Platform protects you against adverse security events, whether they be inadvertent or…

Article

May 27, 2020

Security Checklist To secure your application, complete the Security Checklist to: Follow best practices for securely deploying applications. Ensure the confidentiality, integrity, and availability of your application in production. Identify when each task should be performed: at or near the…

Article

May 27, 2020

Preparing your application for secure deployment Use the Application Security Checklist to prepare your application for deployment. By completing the tasks on this checklist, you can safeguard sensitive data and improve the security of your application. To mark a task on the security checklist as…

Article

May 27, 2020

Security Checklist items To assist you in tracking the completion of the tasks in the checklist, Pega Platform shows the overall completion on the Dev Studio Home page, and built-in ways to track the status of each task. Assign responsibility for administering security At the beginning of…

Article

May 27, 2020

Security guidelines for test environments As a best practice, configure the application server in your test environment to mirror a production environment configuration. Use the following guidelines to minimize security vulnerabilities that can happen on the server side in your application: Prevent…

Article

May 27, 2020

Adding the security checklist to an application created before 7.3.1 The security checklist is automatically added to applications starting in Pega Platform 7.3.1. You can manually add the security checklist to applications that were created in earlier versions. By completing the tasks on the…

Article

May 27, 2020

Authentication Authentication in Pega Platform ensures that only users and systems whose identity has been verified can access your applications. Authentication in Pega Platform includes user logins, platform requests to external services, and external service requests to the platform. You can also…

Article

May 27, 2020

Creating an authentication service To override or extend the default authentication process, create an authentication service. By creating an authentication service, you implement more specialized authentication requirements than the default, for example, to use preauthentication and…

Article

May 27, 2020

Authentication services To override or extend the default authentication process, create and configure an authentication service. You can configure your application to authenticate users by using single sign-on (SSO) and external identity providers. Create an authentication service to configure…