Logo
  • Products
    • SecOps Studio
  • Solutions
    • Pega Stack Shifter
  • Services
    • Pega Enablement
    • Pega Modernization
  • About
  • Contact
  • Blog

Code Vault

  • Home
  • Blog
  • Code Vault
  • Page 4
Code Vault

Report Definition – Understanding in Pega

December 10, 2024 Code Vault Curators

In this blog article, we will see in detail about report definition rule, how to create a new RD and its usage. Update: The concept of Report Definition rule remains the same across different Pega versions. Most of the screenshots in this blog article were reused from Pega 7 version and few were updated. Use […]

Code Vault

Report Scheduling in Pega

December 10, 2024 Code Vault Curators

In this blog article, we will see how to schedule and subscribe any reports from Pega. Business scenario: Say Amazon is using pega application for the sales department. The sales department has different line managers for different sales category. For example, Sales manager for electronics department, sales manager for household department etc. As a Sales […]

Code Vault

Single Sign on – Part 1 – Understanding

December 10, 2024 Code Vault Curators

In this blog article, we will see the basics about single sign-on (SSO) mechanism and the common configuration for single sign-on. Warning!! Only theory! What is single sign-on? It is an authentication process, where one set of login credential provides access to multiple applications. It helps in 2 ways a) You don’t need to have […]

Code Vault

Service Email Usage – Case Creation

December 10, 2024 Code Vault Curators

In the other articles, we saw, how to create a file listener, email account, service email using email wizard. The processing of all listeners in Pega is basic. The listener listens at a location for a message/file or email and invokes a service rule to process. Similarly, in email processing, the listener listens for an […]

Code Vault

Email Listener – Usage and Configurations in Pega

December 10, 2024 Code Vault Curators

This blog article will be the continuation of my previous article on email wizard. In this blog article, we will see in detail about all the configuration points in the email listener. What is email listener? The email listener monitors the email account on the configured folder and routes the email message to email service rule for […]

Code Vault

Integration Mapping – Parse Structured rule in Pega

December 10, 2024 Code Vault Curators

In this blog article, we will see more in detail about the parse structured rule and the four specific methods. This is the continuation of the previous blog article on Map structured rule. It is recommended to visit the Map structured article before proceeding here. What is Parse structured rule? Used to parse the structured data into […]

Code Vault

Integration Mapping – Map structured rule in Pega

December 10, 2024 Code Vault Curators

In this blog article, we will see more in detail about Map structured rule. Let me start with a scenario, Our Pega application needs to talk with another application. Talk refers to the transfer of data between systems. Data can be in any format.  Now, the external system sends us input data in a file […]

Code Vault

Service File Processing – tutorial

December 10, 2024 Code Vault Curators

This article is all about working out a tutorial on service file rules in Pega. It is a mandatory pre-requisite to go through my previous article on Service file configurations before continuing here. I have already explained the business requirements in my previous article. Business Requirement: External system sends us the input file with a […]

Code Vault

Single Sign On – Part 2 – Configure IdP

December 10, 2024 Code Vault Curators

Finally, its time to document my SSO implementation in Pega personal edition 8.2 using OpenAM. In this article, we will see about setting up the Identity provider using OpenAM. To know basics about the SAML, IDP, SP (theory 😉) visit my previous post! I am splitting this post into two main areas How to host […]

Code Vault

Two-way SSL – Implementation in Pega

December 10, 2024 Code Vault Curators

This is the final article of the SSL series. In this article, we will see how to implement two-way SSL and how Pega can make use of two-way to secure their web services using keystore and truststore instance. This is the continuation of my previous article on SSL basics. It is mandatory to go through […]

Posts pagination

Previous 1 … 3 4 5 … 15 Next

Pega Courses

Pega courses can be accessed at https://myknowacademy.com

Search through the blog

Tags

activity authentication background-processing case-management data-model declarative-processing email-processing file-processing pega-core-concepts pega-integration process reporting security system-administration user-interface validation

Categories

  • Code Vault

Recent posts

  • Service REST – Usage and Configurations in Pega
  • Queue processor – Usage and Configurations
  • Data Pages Usage & Configurations in Pega
  • Requestor types in Pega
  • Case Locking Mechanism in Pega
About

MyKnowTech was born with a mission to bridge the gap between technical expertise and business needs. We are a boutique firm specializing in Pega solutions, delivering them with a personal touch. At the heart of our philosophy is a commitment to putting clients first.

Company
  • About
  • Leadership
  • Career
  • Contact
Resources
  • Blog
  • Services
  • Solutions
  • Insights

©  MyKnowTech B.V. All Rights Reserved.

  • Sitemap
  • Terms & Conditions
  • Privacy Policy