In this blog article, we will explore the new feature of Pega Infinity ’25 – Storing and sourcing the secrets through an External Secret Store instance. First of all, let’s understand the need or use case for the External Secret Store. Let’s revisit the OAuth Client Credentials flow. Say Pega as a client application needs … Continue reading Pega using Azure Key Vault as External Secret Store
In this blog article we are going to talk about Role based access configurations, specifically about the Access role and Access role to Object rule configurations. This article was created using Pega ’24 version. First let’s get some basics about Role based access. Take a simple example of Office building as you see in the … Continue reading Access Roles and ARO in Pega
Related Articles
SSL – Understanding and Terminologies
This blog article is the first of the SSL series. In this blog article, we will see more in detail about the basics of SSL and end by hosting the pega personal edition using https. Let’s get started. If we see from the networking angle, systems can communicate with each other through host name and … Continue reading SSL – Understanding and Terminologies
OAuth 2.0 – Part 2 – Pega as OAuth Client – Client Credentials Grant Type
This is the continuation of the previous blog article. In this article, we will see how Pega can act as an OAuth client using the Client credentials grant type. The article was created using earlier Pega 8 version! but the core concept remains the same! Use this blog article to learn the concepts and you … Continue reading OAuth 2.0 – Part 2 – Pega as OAuth Client – Client Credentials Grant Type
One-way SSL – Implementation in Pega
In this blog article, we will see how to implement one-way SSL and how Pega can make use of one-way to secure their web services using keystore instance. This is the continuation of my previous article on SSL basics. Assume there are 2 applications (Java application ABC and Pega application XYZ) Pega application is hosting … Continue reading One-way SSL – Implementation in Pega



