Explain Service REST integration in Pega

 REST integration in Pega is a process that allows two different systems to exchange data with each other via a standardized protocol such as REST (Representational State Transfer). This is done by creating an API that the two systems can use to communicate with each other. The API acts as a bridge between the two systems and can move data from one to the other and vice versa. The API is usually accompanied by a couple of web services that need to be invoked in order to complete the integration. These web services may include authentication, authorization, data transfer and other services needed to complete the integration. By leveraging the power of REST, Pega can provide integration to various systems and services, giving users greater flexibility and control over their data.



Advertisement

What is Pega Sub Report in Report Definition?

 Pega Sub Report is a Report Definition feature that enables users to create a master report and derive achild orsub-report from the main report for additional granularity. The sub-report provides additional context and detail to the primary report, and helps identify and analyze data more efficiently by allowing users to drill down into the results.



Advertisement

What is Pega RBAC?

 Pega RBAC (Role-Based Access Control) is a security feature of Pega Platform that authorizes users to Pega application functions based on their assigned roles. It assigns permissions and access control to roles that are used to control user access. RBAC is based on the concept of a "role" as it applies to an individual's relationship to an application or system, and the access and privileges associated with it. RBAC provides administrators with the ability to quickly grant and revoke access and securely manage users throughout an organization.



What is Pega ABAC?

 Pega ABAC (Attribute Based Access Control) is a model used to control user access to information in an enterprise system. It uses attributes associated with the user, the resource, and the environment in order to determine which users should be authorized or denied access to a resource. Pega ABAC also makes use of policies and rules to determine the level of access a user should have.



What is Security in Pega?

Pega Security is the system of tools, policies, user roles, and processes used to define and protect the use and management of the Pega platform and its data. Pega Security is designed to detect, prevent, and respond to security threats, risks, and attacks to the Pega platform, data, and applications. It also helps to ensure the privacy, integrity, and availability of customer data.



Authentication in Pega Connect-REST?

Pega Connect-REST supports multiple authentication schemes, including OAuth2, basic authentication headers, and custom headers.

OAuth2 is recommended for authenticated applications.

Basic authentication can be used if user identities are required, but these types of applications are often vulnerable to attack and require additional security measures.

Custom headers can be used to provide session-based authentication, where the header is passed with each request and contains authentication information.

Custom headers require additional development effort, but can provide more control over authentication and greatly improve security.



What is Authentication Profile in Pega Connect-REST?

Authentication Profile in Pega Connect-REST allows for access to Secured REST services by specifying the credentials and security protocols. The profile is used to authenticate requests to external systems or access OAuth2 and OpenID Connect services for user-level authentication. Authentication Profile procedures can be configured to support Basic Authentication, OAuth2, and OpenID Connect protocols.


The authentication Profile in Pega Connect-REST is a set of configurations that defines the authentication mechanism and information used to authenticate an external system with the Connect-REST service. It includes a number of authentication details such as authentication type, trust store, user ID, password, OAuth configuration, and so on. An authentication profile also allows users to securely store and manage authentication tokens used in token-based authentication.

#security