Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

Defining your authentication scheme

Updated on April 23, 2021

Your site can use a centralized, automated means of maintaining operator data instead of maintaining it manually in the Pega Foundation for Healthcare.

Pega Foundation for Healthcare

  1. Discuss Authentication schemes with your site's security and application server teams.
  2. Determine the appropriate authentication type.

For more information on authentication scheme planning, see Authentication in the Pega Platform.

Pega Foundation for Healthcare comes with a predefined set of access groups, roles, and privileges. You can use the application roles as a starting point, but you should create your own application-specific access groups and roles to avoid any future problems when upgrading.

Other rule types such as sections, flow actions, and activities use roles and privileges to allow access to these rules at run time.

Note: To review the Pega Foundation for Healthcare access groups and roles, click Dev Studio > Org & Security > Groups & Roles > Access Groups or Dev Studio > Org & Security > Groups & Roles > Access Roles.

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us