Authorization scheme
Pega Foundation for Communications comes with a predefined set of access groups, roles, and privileges. You can use the application roles as a starting point, but you should create your own application-specific access groups and roles to avoid any future problems when upgrading.
Other rule types such as sections, flow actions, and activities use roles and privileges to allow access to these rules at run time.
Previous topic Implementing your authentication scheme Next topic Defining your access groups