Skip to main content

Módulo

Defining the authentication scheme

Archived

8 Temas

1 h 15 minutos

Visible to: All users
Avanzado Pega Platform 8.5 Inglés
Este contenido está archivado y ya no se actualiza. El progreso no está calculado. Las instancias de Pega Cloud están deshabilitadas y las insignias ya no se conceden. Haga clic aquí para continuar con su progreso en la última versión.

In most cases, you want to authenticate users when logging into an application to establish who they are and that they are who they say they are. You can implement authentication features that ensure valid users can access the environments they are authorized to access. Pega Platform™ provides a complementary set of authentication services.

Después de completar este módulo, podrá hacer lo siguiente:

Compare the available authentication services
Determine the appropriate authentication service for a given use case
Design an authentication scheme

Disponible en la siguiente misión:

Security Design v1

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice