Module
Defining the authorization scheme
5 Topics
2 hrs 30 mins
In most cases, you want to restrict authenticated users from accessing every part of an application. You can implement authorization features that help ensure users can access only the user interfaces and data that they are authorized to access. Pega Platform™ provides a complementary set of access control features called role-based access control, attribute-based access control, and client-based access control.