What is Pega Sub Report in Report Definition?

 Pega Sub Report is a Report Definition feature that enables users to create a master report and derive achild orsub-report from the main report for additional granularity. The sub-report provides additional context and detail to the primary report, and helps identify and analyze data more efficiently by allowing users to drill down into the results.



Advertisement

What is Pega RBAC?

 Pega RBAC (Role-Based Access Control) is a security feature of Pega Platform that authorizes users to Pega application functions based on their assigned roles. It assigns permissions and access control to roles that are used to control user access. RBAC is based on the concept of a "role" as it applies to an individual's relationship to an application or system, and the access and privileges associated with it. RBAC provides administrators with the ability to quickly grant and revoke access and securely manage users throughout an organization.



Advertisement

What is Pega ABAC?

 Pega ABAC (Attribute Based Access Control) is a model used to control user access to information in an enterprise system. It uses attributes associated with the user, the resource, and the environment in order to determine which users should be authorized or denied access to a resource. Pega ABAC also makes use of policies and rules to determine the level of access a user should have.



What is Security in Pega?

Pega Security is the system of tools, policies, user roles, and processes used to define and protect the use and management of the Pega platform and its data. Pega Security is designed to detect, prevent, and respond to security threats, risks, and attacks to the Pega platform, data, and applications. It also helps to ensure the privacy, integrity, and availability of customer data.



Authentication in Pega Connect-REST?

Pega Connect-REST supports multiple authentication schemes, including OAuth2, basic authentication headers, and custom headers.

OAuth2 is recommended for authenticated applications.

Basic authentication can be used if user identities are required, but these types of applications are often vulnerable to attack and require additional security measures.

Custom headers can be used to provide session-based authentication, where the header is passed with each request and contains authentication information.

Custom headers require additional development effort, but can provide more control over authentication and greatly improve security.



What is Authentication Profile in Pega Connect-REST?

Authentication Profile in Pega Connect-REST allows for access to Secured REST services by specifying the credentials and security protocols. The profile is used to authenticate requests to external systems or access OAuth2 and OpenID Connect services for user-level authentication. Authentication Profile procedures can be configured to support Basic Authentication, OAuth2, and OpenID Connect protocols.


The authentication Profile in Pega Connect-REST is a set of configurations that defines the authentication mechanism and information used to authenticate an external system with the Connect-REST service. It includes a number of authentication details such as authentication type, trust store, user ID, password, OAuth configuration, and so on. An authentication profile also allows users to securely store and manage authentication tokens used in token-based authentication.

#security




Pega Clipboard tool

 Pega Clipboard tool
























Pega automatic draft off mode for processes in case types

 What is the Draft mode for processes in Pega?

Draft mode provides an option to test the case type before you advance with your application development, even if processes in your case life cycle contain configuration issues.
When you add a process to your case life cycle, by default the process is in draft mode.
When a process is in draft mode, you can check its run-time behavior by running the processor previewing it in a user portal, even if the process contains errors. However, to ensure that the process works correctly after you deploy your application in a production environment, you need to turn off draft mode before moving relevant rulesets to the production environment.

draft mode off pega