Defining your authentication scheme
Your site can use a centralized, automated means of maintaining operator data instead of maintaining it manually in the Pega Foundations.
- Discuss Authentication schemes with your site's security and application server teams.
- Determine the appropriate authentication type.
For more information on authentication scheme planning, see Authentication in the Pega Platform.
Pega Foundations comes with a predefined set of access groups, roles, and privileges. You can use the application roles as a starting point, but you should create your own application-specific access groups and roles to avoid any future problems when upgrading.
Other rule types such as sections, flow actions, and activities use roles and privileges to allow access to these rules at run time.
Previous topic Authentication schemes Next topic Defining access roles and privileges