Skip to main content

This content has been archived and is no longer being updated. Links may not function; however, this content may be relevant to outdated versions of the product.

Support Article

Prevent SystemArchitect make themselves a System Administrator



PRPC Administrators wish to know how to prevent PRPC developers with the default SystemArchitect access group from adding the administrator access group to their own Operator IDs.


This behavior is because the default access group "PRPC:SystemArchitects" includes the role "PegaRULES:SysArch4" which permits access to (among other things) instances of Data-Admin-Operator-ID.

To change this, a System Administrator should create Access Groups and Roles as needed to meet business security requirements.  More information regarding the Pega 7 Access Manager is available here:

Published January 31, 2016 - Updated October 8, 2020

Was this useful?

0% found this useful

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega Community has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice
Contact us