Logo
  • Products
    • SecOps Studio
  • Solutions
    • Pega Stack Shifter
  • Services
    • Pega Enablement
    • Pega Modernization
  • About
  • Contact
  • Blog
Code Vault

Unauthenticated ruleset and customize login screen in Pega

December 7, 2024 Code Vault Curators

In this article, we will explore the purpose and implementation of an Unauthenticated Ruleset and provide a step-by-step tutorial on how to customize login screen in Pega application using Tranditional UI Design system.

Detailed video lecture link can be found at the bottom of this blog article!


Note: This tutorial is implemented using Pega 8.2. Please be aware that the corresponding HTML structure and code may vary in earlier or later versions of the platform.


In Pega, rules and data instances drive all business processing. But how does Pega decide which rules to run for a specific user?

The Business Scenario

Imagine an insurance organization, “AAA.” Two employees, Jon (Sales) and Arya (Customer Service), use Pega daily. When Jon logs in, he sees a Sales dashboard, while Arya sees a Service portal.

At the backend, Pega uses Rule Resolution based on the user’s profile to fetch the correct application rules. The logic follows this hierarchy:

Operator ID -> Access Group -> Application -> Ruleset Stack

Since Jon’s profile points to the Sales application, Pega resolves and renders Sales-specific rules. This works seamlessly because Jon is an authenticated user.


The Challenge: Handling Unauthenticated Sessions

How do you render a screen to a user before they are authenticated?

Enjoying this content?

Access the author’s full video courses here at MyKnowAcademy.

Explore Courses →
Author

The most common example is the Login Screen. Since the user hasn’t logged in yet, Pega doesn’t know their Operator ID or Access Group. These sessions are known as Unauthenticated or Guest user sessions.

When you hit a Pega URL, a new browser requestor session is launched.

You can inspect this configuration in the System Administration records:

Records -> SysAdmin -> Requestor Type -> Browser Requestor

Opening the prpc or pega Browser requestor type reveals that it references the PRPC:Unauthenticated access group. More about browser requestor types can be found in this blog article

This access group points to the PegaRULES application. This ensures that guest users are strictly restricted to core Pega rules and have no access to your private enterprise applications.

Customizing the Login Screen

The HTML rule Web-Login is responsible for rendering the login page. It resides in the Pega-EndUserUI ruleset.

To customize this screen, we face two major restrictions:

  1. Restriction 1: You cannot save the modified Web-Login rule into PegaRULES rulesets.
  2. Restriction 2: You cannot point the Unauthenticated access group to your enterprise application for security reasons (you don’t want guests accessing internal logic).

The Solution: Create a dedicated Unauthenticated Ruleset and add it specifically to the Unauthenticated access group.

Tutorial: Step-by-Step Customization

Prerequisite: Setting the System Name

In real-world enterprise projects, every environment manages its own unique system name. If you haven’t set one yet, follow these steps:

1. Create a System Name: Navigate to Records -> System -> System -> Create.

    2. Configure the System:

    • Environment Name: e.g., Dev, Test, or Production.
    • Production Level: 1 (Sandbox) to 5 (Production).
    • Lock Timeout: System-wide case locking duration.
    • Concurrent Sessions: Limit sessions per operator (-1 for unlimited).

    3. Update the Default System: Go to Dynamic System Settings (DSS) and search for prconfig/identification/SystemName/default.

    Change the value from pega to your new name (e.g., facebook).

    4. Restart the Server: For the changes to take effect, a restart is required. After restarting, verify the change under System -> General -> Systems, Nodes, Requestors.

    You can click and open the BROWSER requestor.

    What are the steps to customize the login screen?

    Step 1: Create a New Access Group

    Create an access group for your new system (e.g., facebook:Unauthenticated).

    Configure the access group as shown below.

    Step 2: Update Requestor Type

    Add this access group to your BROWSER requestor type for the new system.

    Step 3: Create the Unauthenticated Ruleset

    Create a new ruleset (e.g., facebookUnauthenticated).

    Step 4: Add to Production Rulesets

    In the Advanced tab of your unauthenticated access group, add this ruleset to the Production Rulesets list. (Ignore the warning regarding application association).

    Step 5: Customize the CSS

    The login screen’s look and feel is controlled by py-login-screen.css.

    Step 6: Update the Background

    “Save As” the py-login-screen.css file into your new unauthenticated ruleset. Update the background image path.

    Note: To use a custom image, save it as a Binary File in your unauthenticated ruleset under the webwb directory.

    The Result

    Launch your Pega URL again to see your customized homepage in action!

    You now have a secure way to manage rules for guest users. In future posts, we will explore more rules that can be placed in this unauthenticated ruleset to enhance the user’s pre-login experience..

    Detailed steps can be found in the YouTube video –

    • authentication
    Code Vault Curators

    A technical team dedicated to empowering the Pega ecosystem with in-depth knowledge, guided by Premkumar Ganesan's vision.

    Post navigation

    Previous
    Next

    Pega Courses

    Pega courses can be accessed at https://myknowacademy.com

    Search through the blog

    Tags

    activity authentication background-processing case-management data-model declarative-processing email-processing file-processing pega-core-concepts pega-integration process reporting security system-administration user-interface validation

    Categories

    • Career
    • Code Vault
    • Insight

    Recent posts

    • Different Applications in Pega: Components, Component Applications and Modules
    • Vibe Coding with Pega Blueprint: What You Must Know
    • Is AI Killing Pega Jobs? A Reality Check for 2026
    • Beyond the Hype: What Pega Blueprint Is (and What It Is NOT)
    • Sending Outbound Emails from Pega

    Related Articles

    Code Vault

    Requestor types in Pega

    December 11, 2024 Code Vault Curators

    In this blog article, we will see about different requestor types in Pega. This article is implemented using Pega Infinity ’24 version. First, let’s start with understanding the term – Requestor. What is a requestor? From the name, we can say that it can be any people or object which requests for a service. From […]

    Code Vault

    Configure LDAP Authentication Service in Pega

    December 10, 2024 Code Vault Curators

    In this blog article, we will see how we can authenticate the application user credentials against the attributes stored in the apache directory server. It is mandatory to visit my another blog article of LDAP set up before proceeding in this article. How to configure the LDAP authentication in Pega? Let’s start by choosing the […]

    Code Vault

    Configure LDAP services – Apache Directory

    December 10, 2024 Code Vault Curators

    In this blog article, we will see more in detail about directory services and LDAP protocols. We will also set up our own directory service. Let’s start with the directory. What is a directory? Directory is a collection or list of data and they saves the information and provides them when needed. Real time examples […]

    Code Vault

    Customizing Basic authentication in Pega

    December 10, 2024 Code Vault Curators

    In the last post, we saw how the default basic authentication works in Pega. In this post, we will see how we can customize and have our own basic authentication. This blog article is implemented using 8.2 version Now the first question is why do we need to customize the basic authentication? 1. When the […]

    About

    MyKnowTech was born with a mission to bridge the gap between technical expertise and business needs. We are a boutique firm specializing in Pega solutions, delivering them with a personal touch. At the heart of our philosophy is a commitment to putting clients first.

    Company
    • About
    • Leadership
    • Career
    • Contact
    Resources
    • Blog
    • Services
    • Solutions
    • Insights

    ©  MyKnowTech B.V. All Rights Reserved.

    • Sitemap
    • Terms & Conditions
    • Privacy Policy