Skip to main content

Module

Access control

5 Topics

1 hr 5 mins

Visible to: All users
Intermediate Pega Platform 8.8 Security Theme Cosmos English

Learn how to secure an application using role-based access control, attribute-based access control, and client-based access control.

After completing this module, you should be able to:

Identify the record types used to configure role-based access control.
Customize access roles based on dependent roles.
Identify the role of attachment categories.
Distinguish between attribute-based and role-based access control.
Identify the role of access control policies and access control policy conditions in securing an application.
Identify the role of a client-based access rule in securing an application.

Practice what you learned in the following Challenges:

Securing an application using attribute-based access control v5 Using RBAC to organize and manage access to case attachments v4

Available in the following mission:

Senior System Architect v5

We'd prefer it if you saw us at our best.

Pega Academy has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice