Skip to main content

Misión

Security Design

Archived

3 Módulos

5 Retos

6 horas 58 minutos

Visible to: All users
Avanzado Pega Platform 8.5 Inglés

The Security Design mission is an advanced mission for senior system architects who are ready to take on the lead system architect (LSA) role. The mission covers modules and topics required to design authentication services that verify the identity of operators and effective authorization schemes that ensure users can access only the application features and data that they are authorized to access.  This mission also discusses how to identify and address security vulnerabilities and how to design solutions that avoid common mistakes that can expose vulnerabilities in the system.

Disponible en la siguiente misión:

Lead System Architect v2
Este contenido está archivado y ya no se actualiza. El progreso no está calculado. Las instancias de Pega Cloud están deshabilitadas y las insignias ya no se conceden. Haga clic aquí para continuar con su progreso en la última versión.

Defining the authentication scheme

  • Módulo

    Defining the authentication scheme

    Archived

    8 Temas

    1 h 15 minutos

  • In most cases, you want to authenticate users when logging into an application to establish who they are and that they are who they say they are. You...

Configurating SAML authentication

  • Reto

    Configurating SAML authentication

    3 Tareas

    1 h 30 minutos

  • Front Stage is considering using SSO with SAML to Authenticate Operators. There are many Identity Providers available in the marketplace, and some are...

Configuring OpenID Connect authentication

  • Reto

    Configuring OpenID Connect authentication

    Archived

    4 Tareas

    45 minutos

  • Front Stage is considering using OpenID Connect to authenticate Operators.

    Design and implement an OpenID Connect as a proof of concept.

    Pega now...

Defining the authorization scheme

  • Módulo

    Defining the authorization scheme

    Archived

    6 Temas

    1 h

  • In most cases, you want to restrict authenticated users from accessing every part of an application. You can implement authorization features that...

Defining the authorization scheme

  • Reto

    Defining the authorization scheme

    Archived

    9 Tareas

    30 minutos

  • Front Stage's organization wants to implement the following security requirements:

    • Only sales executives and executive managers are allowed to see...

Mitigating security risks

  • Módulo

    Mitigating security risks

    Archived

    6 Temas

    1 h 3 minutos

  • Securing an application and ensuring that the correct security is set up is important. Correct security entails making sure users are who they say...

Identifying and mitigating security risks

  • Reto

    Identifying and mitigating security risks

    Archived

    2 Tareas

    20 minutos

  • Front Stage's Booking application is going live in the near future. Before promoting the application to production, a security review is required. Any...

Analyzing security event logs

  • Reto

    Analyzing security event logs

    3 Tareas

    20 minutos

  • Front Stage is concerned whether someone’s user name and password may have been compromised, perhaps through a phishing attack. FSG has decided to...

mission badge: Security Design

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice