Pages
(Move to ...)
Home
About us
Pega Interview QA
Meet the Author
Contact Us
▼
Showing posts with label
Security
.
Show all posts
Showing posts with label
Security
.
Show all posts
Home
» Posts filed under Security
What are Access Deny rules in Pega
›
Access Den y rules in P ega are security rules used to define user access restrictions to system data . These rules det...
Difference between WHEN rule and Access WHEN in Pega
›
When Rule is used to produce a conditional outcome or to decide when to run an activity or to make a decision . It ...
Pega Access of Role to Object
›
P ega Access is a powerful data security tool used in P ega Platform s to define access permissions for roles and objec...
What is Pega RBAC?
›
P ega RB AC ( Role - Based Access Control ) is a security feature of P ega Platform that author izes users to P ega appli...
What is Pega ABAC?
›
P ega AB AC ( Attribute Based Access Control ) is a model used to control user access to information in an enterprise s...
What is Security in Pega?
›
P ega Security is the system of tools , policies , user roles , and processes used to define and protect the use and man...
Authentication in Pega Connect-REST?
›
P ega Connect - R EST supports multiple authentication schemes , including O Auth 2 , basic authentication headers , and custom ...
1 comment:
›
Home
View web version