Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

Preparing for the implementation

Updated on April 16, 2021

To prepare the implementation environment and to create your application, complete the following preparation tasks:

Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide Pega Government Platform Implementation Guide

Creating the application

Run the New Application wizard to create your application.

  1. To create a new operator ID for running the New Application wizard, complete the following steps:
    1. Log in to Dev Studio by using the operator ID [email protected] and the password that you specified for that operator.
    2. Save a copy of the existing [email protected] operator and give it a name that identifies it as an Application Setup operator.
    3. Add the PegaGPCosmos:Administrators access group to the new operator record, and then click the radio button to the left of the access group to select it as the default access group.
    4. Save the new Application Setup operator.
  2. Log in as the Application Setup operator.
  3. In the header of Dev Studio, click the name of the application, and then click New Application.
  4. Follow the New Application wizard instructions until the Name your application page opens, and then follow the steps below.

    For more information about each step of the wizard, see Creating an application.

  5. On the Name your application page, enter the name of the application, and then click Advanced configuration.
  6. In the Organization settings section, enter the Organization name, Division name, and Unit name for this application.

    The New Application wizard creates the application class structure for you based on the organization settings that you enter. For more information, see Class layers and Class hierarchy and inheritance.

    If you have not already defined the organization entities (for example, if you have not already defined the division), type the name of the new entity in the appropriate field. The application saves the new values when you create the new application.

    Note: For the new application, the organization name cannot be PegaPS.
  7. Click Save.
  8. Click Create application.

    The Application Wizard creates the implementation application. The application includes one system administrator operator so that you can log into the application after you complete the wizard.

  9. To open the new application, click Go to app.
Result: The creates a set of access groups for the application. Copy the access roles from the existing access groups and add them to the corresponding implementation access groups. Create your own operators, and then apply the appropriate access groups.

Implementing the security model

Security planning involves defining authorization and authentication strategies for your application.

Optional: Defining the security model and organization structure

Define the authorization and authentication strategies for your application.

Authentication
Proves to the application that you are who you say you are.
Authorization
Determines the functions that you can perform in the application. This corresponds to an access group and role configuration.

Security planning involves defining authorization and authentication strategies for your application. It is a best practice to create new access groups and roles that are based on the default access groups and roles that come with the product.

Security planning also involves setting up the organization structure and operator attributes. The application provides security in the form of access settings and denial rules. Many integration rules also incorporate authentication.

For more information about the additional aspects of security, enroll in the Lead System Architect course on Pega Academy.

Authentication schemes

The Pega Platform offers the following authentication types:

PRBasic
Based on passwords in the Operator ID data instances and the login form. This is defined by the HTML @baseclass.Web-Login rule, which your application can override.
PRSecuredBasic
Similar to PRBasic, but passes credentials by using Secure Sockets Layer (SSL) with Basic HTTP authentication. The login form is defined by the HTML @baseclass.Web-Login-SecuredBasic rule, which your application can override.
PRCustom
Supports access to an external LDAP directory or a custom authentication scheme.
PRExtAssign
Supports external assignments (Directed Web Access).
J2EEContext
Specifies that the application server in which the Pega Platform is deployed uses JAAS to authenticate users.

Defining your authentication scheme

Your site can use a centralized, automated means of maintaining operator data instead of maintaining it manually in your application.

  1. Discuss the authentication schemes with your site's security and application server teams.
  2. Determine the appropriate authentication type.

    For more information on authentication scheme planning, see Authentication.

Defining your authorization scheme

Pega Government Platform comes with a predefined set of access groups, roles, and privileges. You can use the application roles as a starting point, but you should create your own application-specific access groups and roles to avoid any future problems when upgrading.

Other rule types such as sections, flow actions, and activities use roles and privileges to allow access to these rules at run time.

Defining your access groups

Define the access groups that you want to add to your application.

  1. Identify additional access groups that are needed for your application.
  2. Identify portals associated with these access groups.

    For more information, see Viewing access groups and operators.

Defining access roles and privileges

You can associate one or more roles with an access group. Roles are additive. The more roles that you add to an access group, the more authorization there is. Privileges can be associated with one or more roles.

  1. Determine which roles are needed for your application. You can use the Pega Government Platform roles as a starting point.
  2. Determine which privileges to associate with each role.
  3. Associate each role with an access group.

    For more configuration information, see Groups and roles.

Defining the organization structure

Use the organization structure for routing and reporting within the application. Typically, the application organization structure does not map operators exactly to the site's organization chart but instead, it maps the work that those operators do.

Tip: For design guidance, see Setting up your organization structure.
  1. In the header of Dev Studio, click ConfigureOrg & SecurityOrganizationOrganizational Chart.
  2. Review the existing structure.
  3. Determine the organization, division, and unit levels of the hierarchy.

Defining the operator attributes

An operator's access group affects what the operator can do in the application. In addition to the access group, the following fields in the operator record influence how the application handles assignment of work to the user.

Tip: In many implementations, it is more efficient for the application to set values in the operator record during the authentication process than it is to have an administrator manually maintain these records. These rules must be configured as part of the authentication mechanism for your site. For more information, see Authentication services.

For more information, see Operators.

Defining the operator work group

The work group setting in the operator record affects how your application delivers work to the operator. Review the Operator record and determine the rules for assigning a work group to an operator or the role that multiple operators hold.

  1. In the header of Dev Studio, click ConfigureOrg & SecurityOrganizationOperators.
  2. Select an operator ID.
  3. On the Work tab, review the work group information for the operator record.
  4. Determine your policy for assigning a work group to an operator or the role that multiple operators hold.

Defining the operator skills

Skill settings in the operator record affect how the application routes work to the operator. Skill settings also affect how the application gets the most appropriate work when using the Get Next Work feature. You must determine the skills that are appropriate for your application and operators.

  1. Define the skills that are needed for the application.
  2. Determine which operator records or roles should be associated with those skills.

Defining the operator calendar

The application calendar affects date calculations within the application, such as the date between business days calculation, and the SLA goal and deadline date calculation. The calendar on the operator record is relevant only if you have users who are not working in the same time zone as the rest of the organization. Otherwise, the application uses the calendar on the organization record and you can skip this step.

Operator calendars will have an impact on chat availability. If a chat request comes in after or before the business hours defined in the specified calendar, then the requestor receives "Off-hours behavior" message.
  1. Determine the calendar instances that are needed for your application.
  2. Determine which operator roles need a distinct calendar.
  3. Determine the operator location.
    For more information, see Specifying calendar navigation options.

Defining the work groups

A work group determines which work queues you can access.

  1. In the header of Dev Studio, click ConfigureOrg & SecurityToolsWork Groups.
  2. Review and modify the list if necessary.

    For more information, see Teams.

Defining the workbaskets

A work queue is a queue of open assignments in the application.

  1. In the header of Dev Studio, click ConfigureOrg & SecurityToolsWork Queues to display a list of work queues.
  2. Pega Government Platform provides a set of default work queues. Implementation teams must create their own work queues with their respective organization structure. References to the work queues must also be updated accordingly in the implementation layer.

Defining work parties

A work party represents a person, business, or organization that is involved in a case. It receives correspondence, such as email, and can be an active or passive participant based on its role. Pega Government Platform comes with default work parties, but you might need to configure them for site-specific requirements.

  1. In the Case types explorer, click the name of the case of which you want to modify the work parties.
  2. Click the Settings tab and select Parties.
  3. Click the work party name to open the settings for the work party.
  4. Make your modifications and click OK.
What to do next:

For more information, see Defining case participants.

Implementing the security model and organization structure

After you review the existing groups and roles to determine additional groups and roles that you need, create them in Dev Studio when logged in as an administrator.

  • For Access groups, click ConfigureApplicationStructureAccess Groups and Users.
  • For Access roles, click ConfigureOrg & SecurityToolsSecurityRole Names.
For more information, see Learning about access groups and related topics.

Extending an application built on Pega Government Platform

This section describes the high-level steps for creating an implementation layer on top of an application (such as Investigative Case Management) that is built on Pega Government Platform, then modifying or creating the required rules and structures to support that layer.

After the implementation layer has been created, perform the configurations that are described in the following steps. Ensure that you are logged in as a developer.

  1. Log in to Pega Government Platform as an administrator.
  2. In the header of your workspace, click the Switch Studio menu, and then click App Studio.
  3. In the navigation pane of App Studio, click PGPApplication setup.
  4. Click Setup application, and then click Done.

Setting up the application

When Application setup is run, it automatically runs the implementation layer steps that are required for the apps that are built on Pega Government Platform, and it performs the following actions.

  • Overrides the lookup data pages in base applications work classes to implementation layer specific work classes and updates the source of lookup to the implementation work class.
  • Overrides all node level data pages which are in the pattern inheritance of PegaPS-Data-Context class to the implementation layer and sets the access group to the implementation layer Admin Access Group. For example, if built-on is PegaGP, PegaPS-Data-Context-Application is the class. If built-on is ICM then it also considers PegaPS-Data-Context-ICM as well as per pattern inheritance.
  • Updates the operators of base application with implementation specific access group and sets it to default.
  • Updates the implementation Application Data class direct inheritance with the data class of the base application.

Alternatively, teams can perform the steps above manually, if only a subset of the steps is required.

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us