This blog article is the first of the SSL series. In this blog article, we will see more in detail about the basics of SSL and end by hosting the pega personal edition using https. Let’s get started. If we see from the networking angle, systems can communicate with each other through host name and […]
OAuth 2.0 – Part 2 – Pega as OAuth Client – Client Credentials Grant Type
This is the continuation of the previous blog article. In this article, we will see how Pega can act as an OAuth client using the Client credentials grant type. The article was created using earlier Pega 8 version! but the core concept remains the same! Use this blog article to learn the concepts and you […]
One-way SSL – Implementation in Pega
In this blog article, we will see how to implement one-way SSL and how Pega can make use of one-way to secure their web services using keystore instance. This is the continuation of my previous article on SSL basics. Assume there are 2 applications (Java application ABC and Pega application XYZ) Pega application is hosting […]
Access Deny, Access When and Privilege in Pega
This is the continuation of my another blog article on Authorization topic. I recommend you to visit from blog article on Access roles and ARO concepts. In this article we will talk about Access Deny, Privilege and Access when rules. This article was created using Pega ’24 version. First let’s start with Access Deny rules. […]
Access Roles and ARO in Pega
In this blog article we are going to talk about Role based access configurations, specifically about the Access role and Access role to Object rule configurations. This article was created using Pega ’24 version. First let’s get some basics about Role based access. Take a simple example of Office building as you see in the […]
Access Group Usage and Configurations
In the series of blog articles, we will explore difference authorization rules in Pega. This article was created using Pega ’24 version. We already talked about Operator record which can act as an basic authentication record. There are other rules in Pega which serves only on authorization side. First let’s clear the air on Authentication […]