Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

Step 13: Defining the security model and organization structure

Updated on September 18, 2020

Security planning involves defining authorization and authentication strategies for your application.

  • Authentication

    Proves to the application that you are who you say you are.

  • Authorization

    Determines the functions that the application allows you to perform. This corresponds to access group and role configuration.

Security planning also involves setting up the organization structure and operator attributes.

The application provides a fine level of security in the form of access settings and denial rules. Many integration rules also incorporate authentication. For more information on the additional aspects of security, enroll in the Lead System Architect course on Pega Academy and cover the Security lessons corresponding to the following topics:

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us