Define the authorization and authentication strategies for your application.
- Proves to the application that you are who you say you are.
- Determines the functions that you can perform in the application. This corresponds to an access group and role configuration.
Security planning also involves setting up the organization structure and operator attributes. The application provides security in the form of access settings and denial rules. Many integration rules also incorporate authentication.
For more information about the additional aspects of security, enroll in the Lead System Architect course on Pega Academy and cover the Security lessons that correspond to the following topics: