Logo
  • Products
    • SecOps Studio
  • Solutions
    • Pega Stack Shifter
  • Services
    • Pega Enablement
    • Pega Modernization
  • About
  • Contact
  • Blog

Blog

We simplify complex trends in the Pega ecosystem, delivering clear insights.
Our blogs keep you ahead - explore emerging tech and business solutions with us!

  • Home
  • Blog
  • Page 15
Code Vault

OAuth 2.0 – Part 3 – Pega as OAuth client – Authorization Code grant type

December 10, 2024 Code Vault Curators

This is the third blog article of the OAuth series. For a better understanding, I would suggest you to visit the previous blog articles on OAuth 2.0 in order – Part 1 & Part 2. https://myknowtech.com/tag/oauth In this blog article, we will see how Pega can act as OAuth client for authorization code grant type. […]

Code Vault

Access Group Usage and Configurations

December 10, 2024 Code Vault Curators

In the series of blog articles, we will explore difference authorization rules in Pega. This article was created using Pega ’24 version. We already talked about Operator record which can act as an basic authentication record. There are other rules in Pega which serves only on authorization side. First let’s clear the air on Authentication […]

Code Vault

Operator ID Usage and Configurations

December 10, 2024 Code Vault Curators

In this blog article, we will Understand about the Operator ID configurations in Pega and how to create one. This article was created using Pega ’24 version. Imagine social networking sites. They have a Sign Up link in their home page. You can sign up to create a new account. “What happens at the back end?“.  A […]

Code Vault

Enterprise Class Structure in Pega

December 10, 2024 Code Vault Curators

In this blog article, we will keep our focus to get clear understanding on the Enterprise class structure in Pega. This article was created using Pega ’24 version. When an Organization decides to use Pega solution to build their enterprise applications, One of the first questions is to get clear on the Enterprise architecture and […]

Code Vault

Situational Layer Cake and Framework Vs Implementation Application types

December 10, 2024 Code Vault Curators

In this blog article, we will see the basics about situational layer cake and different types of Pega applications – Framework Vs Implementation. Let’s start with Java application development. 1. Project creation – In Java programming, when we want to create a new application, we will start with creating a new Java project (The Java […]

Code Vault

Database Class Mapping Wizard

December 10, 2024 Code Vault Curators

In the previous article, we saw how to use data type to create a data layer and map it to the local database table. In this article, we will see how to make a connection to the external database table using the database class mapping wizard. This article was created using Pega ’24 version. Note: […]

Code Vault

Data type Understanding and Cascading control tutorial

December 10, 2024 Code Vault Curators

In this blog article – first, we will understand the data layers and then in detail about configuring a data type, followed by a short tutorial on Implementing Cascading control. This article was created using Pega ’24 version. In Pega database, we can have three types of instances in the two schemas – rules and […]

Code Vault

Server-side Validation Vs Client-side Validation in Pega

December 10, 2024 Code Vault Curators

In the last blog article, we talked a lot about different validation rules. In this blog article we will understand about the different types of validation that is generic across applications (even non-pega). This article was created using Pega ’24 version. There are two types of Validation Look carefully at the below picture, you will […]

Code Vault

Validation rules in Pega

December 10, 2024 Code Vault Curators

In this blog article, we will see about different types of validation rules available in Pega. Every application needs correct data to process any request. Validation rules play a critical role in ensuring the data quality of the application and can also partly play as a security guard. Imagine you are visiting an employment portal […]

Code Vault

Unauthenticated ruleset and customize login screen in Pega

December 7, 2024 Code Vault Curators

In this blog article, we will see in detail about the usage of an Unauthenticated ruleset and then a working tutorial about customizing the login screen. This tutorial is implemented using Pega 8.2 version. Please note the corresponding HTML code may vary in the previous pega versions. We know that in Pega, rules and data […]

Posts pagination

Previous 1 … 14 15 16 Next

Pega Courses

Pega courses can be accessed at https://myknowacademy.com

Search through the blog

Tags

activity authentication background-processing case-management data-model declarative-processing email-processing file-processing pega-core-concepts pega-integration process reporting security system-administration user-interface validation

Categories

  • Code Vault

Recent posts

  • Add a Pega Icon Font in Traditional UI
  • Pega using Azure Key Vault as External Secret Store
  • Service REST – Usage and Configurations in Pega
  • Queue processor – Usage and Configurations
  • Data Pages Usage & Configurations in Pega
About

MyKnowTech was born with a mission to bridge the gap between technical expertise and business needs. We are a boutique firm specializing in Pega solutions, delivering them with a personal touch. At the heart of our philosophy is a commitment to putting clients first.

Company
  • About
  • Leadership
  • Career
  • Contact
Resources
  • Blog
  • Services
  • Solutions
  • Insights

©  MyKnowTech B.V. All Rights Reserved.

  • Sitemap
  • Terms & Conditions
  • Privacy Policy