Skip to main content
Verify the version tags to ensure you are consuming the intended content or, complete the latest version.

Authentication design considerations

Authentication design considerations

Authentication is proving to the application you are who you say you are. Each organization has policies on how users are authenticated into the application. Most organizations use some form of single sign on. If the organization is running an enterprise tier deployment, it may be using container-based authentication or JAAS or JEE security. If so, this affects how you design your authentication scheme and your application.

In short, the Pega application implements to the organization's authentication policy. For more information on authentication protocols supported by Pega, see the Pega Community article: Authentication in the Pega Platform and the Pega Help Topic: Authentication services .

Authentication Services

Pega 8 has replaced PRBasic with Basic credentials and also added support for Anonymous, Oauth2, OIDC (Open ID Connect), and Kerberos.

Pega can be the Identity Provider (IdP) or the IdP can be external. An example of an external Identity Provider is Microsoft’s Active Directory Federated Service (ADFS), which is used on-premise as well as within Microsoft’s Azure cloud offering.

Pega is the IdP when the AuthenticationType used to access Pega is Basic credentials. Someone accessing Pega this way would not have “Use external authentication” checked within the Security tab on their Operator record.


If you are having problems with your training, please review the Pega Academy Support FAQs.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice