Search
Keyed Data Pages
-
Module
Keyed Data Pages
1 Topic
15 mins
-
Learn how to source data with a keyed Data Page to optimize performance and minimize data store operations in Pega Platform™.
Managing application access
-
Module
Managing application access
2 Topics
25 mins
-
Learn how you can configure role-based access control by using the Persona access landing page and Access Manager. The Persona access landing page and...
Managing application access for Business Architects
-
Module
Managing application access for Business Architects
2 Topics
30 mins
-
User management is fundamental to the successful implementation of a Pega Platform™ application.
As a Pega Business Architect, in order to...
Managing data values for Business Architects
-
Module
Managing data values for Business Architects
5 Topics
1 hr 15 mins
-
As a Pega Business Architect, understanding Pega's features for managing data integrity and accuracy throughout the Case Life Cycle is essential for...
Preparing Customer Decision Hub for development
-
Module
Preparing Customer Decision Hub for development
3 Topics
40 mins
-
Discover how to complete the essential setup tasks of the Pega Customer Decision Hub™ application through an automated, end-to-end process by using...
Reviewing log files
-
Module
Reviewing log files
3 Topics
30 mins
-
Pega Platform™ provides logs that record system events such as application errors and performance and security issues. Use log files to identify and...
Saving data to a system of record
-
Module
Saving data to a system of record
2 Topics
30 mins
-
Promote Case processing efficiency and improve application flexibility by leveraging savable Data Pages and systems of records to store and update...
Securing and auditing data
-
Module
Securing and auditing data
2 Topics
30 mins
-
Pega Platform™ provides multiple ways to ensure the integrity of and ability to audit application data. Applications automatically track Actions...
Security Checklist awareness
-
Module
Security Checklist awareness
1 Topic
20 mins
Platform -
- What is the Security Checklist?
- How do I access the Security Checklist?
- How to use the Security Checklist?/What is the purpose?
- What happens if I...
Simulating an external data source
-
Module
Simulating an external data source
1 Topic
25 mins
-
During development, before database integrations are configured. You can simulate an external data source to test functionality when a data source is...