Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

Security model

Updated on April 20, 2021

Pega Foundation for Financial Services

Define the authorization and authentication strategies for your application.

  • Authentication
    • Proves to the application that you are who you say you are.
  • Authorization
    • Determines the functions that you can perform in the application. This corresponds to an access group and role configuration.

Security planning involves defining authorization and authentication strategies for your application. It is a best practice to create new access groups and roles that are based on the default access groups and roles that come with the product.

Security planning also involves setting up the organization structure and operator attributes. The application provides security in the form of access settings and denial rules. Many integration rules also incorporate authentication. Authentication information is presented in Defining Your Authentication Scheme part of the document

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us