Logo
  • Products
    • SecOps Studio
  • Solutions
    • Pega Stack Shifter
  • Services
    • Pega Enablement
    • Pega Modernization
  • About
  • Contact
  • Blog

security

  • Home
  • Blog
  • security
Code Vault

SSL – Understanding and Terminologies

December 10, 2024 Code Vault Curators

This blog article is the first of the SSL series. In this blog article, we will see more in detail about the basics of SSL and end by hosting the pega personal edition using https. Let’s get started. If we see from the networking angle, systems can communicate with each other through host name and […]

Code Vault

OAuth 2.0 – Part 2 – Pega as OAuth Client – Client Credentials Grant Type

December 10, 2024 Code Vault Curators

This is the continuation of the previous blog article. In this article, we will see how Pega can act as an OAuth client using the Client credentials grant type. The article was created using earlier Pega 8 version! but the core concept remains the same! Use this blog article to learn the concepts and you […]

Code Vault

One-way SSL – Implementation in Pega

December 10, 2024 Code Vault Curators

In this blog article, we will see how to implement one-way SSL and how Pega can make use of one-way to secure their web services using keystore instance. This is the continuation of my previous article on SSL basics.  Assume there are 2 applications (Java application ABC and Pega application XYZ) Pega application is hosting […]

Code Vault

Access Deny, Access When and Privilege in Pega

December 10, 2024 Code Vault Curators

This is the continuation of my another blog article on Authorization topic. I recommend you to visit from blog article on Access roles and ARO concepts. In this article we will talk about Access Deny, Privilege and Access when rules. This article was created using Pega ’24 version. First let’s start with Access Deny rules. […]

Code Vault

Access Roles and ARO in Pega

December 10, 2024 Code Vault Curators

In this blog article we are going to talk about Role based access configurations, specifically about the Access role and Access role to Object rule configurations. This article was created using Pega ’24 version. First let’s get some basics about Role based access. Take a simple example of Office building as you see in the […]

Code Vault

Access Group Usage and Configurations

December 10, 2024 Code Vault Curators

In the series of blog articles, we will explore difference authorization rules in Pega. This article was created using Pega ’24 version. We already talked about Operator record which can act as an basic authentication record. There are other rules in Pega which serves only on authorization side. First let’s clear the air on Authentication […]

Pega Courses

Pega courses can be accessed at https://myknowacademy.com

Search through the blog

Tags

activity authentication background-processing case-management data-model declarative-processing email-processing file-processing pega-core-concepts pega-integration process reporting security system-administration user-interface validation

Categories

  • Code Vault

Recent posts

  • Service REST – Usage and Configurations in Pega
  • Queue processor – Usage and Configurations
  • Data Pages Usage & Configurations in Pega
  • Requestor types in Pega
  • Case Locking Mechanism in Pega
About

MyKnowTech was born with a mission to bridge the gap between technical expertise and business needs. We are a boutique firm specializing in Pega solutions, delivering them with a personal touch. At the heart of our philosophy is a commitment to putting clients first.

Company
  • About
  • Leadership
  • Career
  • Contact
Resources
  • Blog
  • Services
  • Solutions
  • Insights

©  MyKnowTech B.V. All Rights Reserved.

  • Sitemap
  • Terms & Conditions
  • Privacy Policy