After you save an Access Group form, active requestor sessions on the current node that are associated with that access group are immediately updated. Requestors at other nodes in a cluster are updated when the next system pulse occurs on their node.
Using the optional security audit feature, your application can present in the History display which values were added, updated, or removed from the data object, for selected data classes.
Guest users—also known as unauthenticated requestors—typically have access to only the rules in the rulesets in the PRPC:Unauthenticated access group, as referenced in the Requestor type instance named pega.BROWSER.
If you update the pega.BROWSER requestor type to reference a different access group, or update the PRPC:Unauthenticated access group to make additional rulesets available to unauthenticated users, review the Authenticate? check box on the Security tab of each activity in the rulesets. Select this check box for only the activities that guests need to run.
The clipboard for a guest requestor does not include pages for the Operator ID, organization, division, or organization unit.
The default time-out period for an idle guest requestor is one minute.