Módulo
Defining the authentication scheme
Archived
8 Temas
1 h 15 minutos
In most cases, you want to authenticate users when logging into an application to establish who they are and that they are who they say they are. You can implement authentication features that ensure valid users can access the environments they are authorized to access. Pega Platform™ provides a complementary set of authentication services.
Después de completar este módulo, podrá hacer lo siguiente:
Disponible en la siguiente misión:
Topics
Understanding security basics
10 minutos
Authentication
15 minutos
Authentication design considerations
10 minutos
Session management
10 minutos
Security auditing
5 minutos
Security checklist review
5 minutos
Security alert monitoring
5 minutos
Security for Reactive-UI applications
10 minutos
Cuestionario del módulo
5 minutos