In this blog article, we will learn about Workparty or case participants in Pega. Take any Pega case as an example. The case normally has a lifecycle with different stages, processes and steps. The case can progress through different statuses during its life cycle. During the case lifeccyle, there can be different participants to the […]
Core Concepts – Rule Availability in Pega
In this blog article, we will understand about the rule availability concept. Update: The concept of Rule availability remains the same across different Pega versions. The screenshots in this blog article were reused from Pega 7 version. Use this blog article to learn the concepts and you can try it out in the latest versions […]
Core Concepts – Circumstance in Pega
In this blog article, we will see some detailed explanation about rule circumstancing in Pega Update: The concept of Circumstancing remains the same across different Pega versions. The screenshots in this blog article were reused from Pega 7 version. Use this blog article to learn the concepts and you can try it out in the […]
Service Package – Usage and Configurations in Pega
In this blog article, we will talk about the importance of service package instance in Pega. If you take some Cloud providers or technologies, when they have some exposed APIs/services, they will also have some API management solutions. This API management can perform different roles in adding security layers, permission authorisation, whitelisting, request throttling, DDOS […]
Sending Outbound Emails from Pega
In this blog article, we will see how we can send an outbound email from a Pega application. We will start with understanding about how sending and receiving email works followed by a tutorial. First non-Pega things. Imagine you want to send out an outbound email from your Gmail account. We just login to gmail, […]
One-way SSL – Implementation in Pega
In this blog article, we will see how to implement one-way SSL and how Pega can make use of one-way to secure their web services using keystore instance. This is the continuation of my previous article on SSL basics. Assume there are 2 applications (Java application ABC and Pega application XYZ) Pega application is hosting […]
Single Sign On – Part 3 – Configure SP
This is the continuation of the previous blog article. In the last article, we saw how we can configure an IdP entity using OpenAM. For better understanding, please go through the below articles, before proceeding further. In this post we will see how we can configure a Service provider entity details in Pega authentication service […]
Configure Calendar instance in Pega
In this blog article, we will see how we can configure a calendar instance and use it in a pega application. Business Requirment: Say, ABC banking organization uses Pega CRM application to treat the customers. Based on the customer needs, banking employees (application users) start creating the appropriate case types. Case types may have different […]
Loggers and Log Categories in Pega
In this blog article, we will see how to add log levels for different loggers and also group the loggers into a log category for easy maintenance purposes. Let’s start with the logging framework. What is a logging framework? – Logging framework is a utility designed to standardize the process of logging in the application. […]
Compliance Score, Guardrail Warnings and Custom Warning
In this article, we will talk about the application quality metrics – Guardrail warnings and compliance score. We will also see how we can add/suppress guardrail warnings for different rule types. This tutorial is demonstrated using Pega 8.5.1 personal edition. Application Quality Think an insurance providing organization wanted to use Pega software to build a […]









