Skip to main content

Módulo

Defining the authorization scheme

Este contenido está archivado y ya no se actualiza. El progreso no está calculado. Las instancias de Pega Cloud están deshabilitadas y las insignias ya no se conceden. Haga clic aquí para continuar con su progreso en la última versión.

In most cases, you want to restrict authenticated users from accessing every part of an application. You can implement authorization features that ensure users can access only the user interfaces and data that they are authorized to access. The Pega Platform provides a complementary set of access control features called Role-based access control and Attribute-based access control.

Another access control capability in Pega is Client-based access control (CBAC). This is more focused on tracking and processing requests to view, update or remove personal Customer data held across your Pega applications, such as that required by EU GDPR (and similar) regulations. In itself, it doesn’t influence the authorization considerations for lead system architects when designing a Pega application, and is not discussed further in this module.

Después de completar este módulo, podrá hacer lo siguiente:

Compare role and attribute based access control
Identify and configure roles and access groups for an application
Determine the appropriate authorization model for a given use case
Determine the rule security mode

Disponible en la siguiente misión:

Lead System Architect v1

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice