Pega supports the use of a centralized, automated means of maintaining operator data instead of maintaining it in the Product Designer for Financial Services application.
Use the Security model portion of the implementation planning workbook for the Pega application being implemented to record your decisions during this procedure.
- Discuss Authentication schemes with your site’s security and application server teams.
- Determine the appropriate authentication model for the organization by defining the access group, portal, and roles for each user type.
For more information on authentication scheme planning, see Authentication in Pega Platform. Configuring the authorization scheme in the application.
Product Designer for Financial Services includes the following pre-defined operators and access groups. You can log in to the application using one of these Operator IDs using the password that you specified when you enabled this operator; to enable Pega-provided operators, see Enabling operators
|Operator ID||Access Group||Role|
Use these access groups, roles, and privileges for your site needs to control access to the functionalities in the application implementation. To configure an authorization scheme in the application, do the following:
- Review the Product Designer for Financial Services access groups and roles:
- To view access groups: Click Dev Studio > Org & Security > Groups & Roles > Access Groups. The access groups use the preface PegaPDFS.
- To view roles: Click Dev Studio > Org & Security > Groups & Roles > Roles. The roles use the preface PegaPDFS.
- Define access groups for the application. The following access groups are
pre-defined in the application:
- Record the authentication scheme in the Security model worksheet in yourproject’s Implementation Planning Workbook
- Identify additional access groups needed for your application.
- Identify portals associated with these access groups.
- Define the access roles and privileges for the application.
Pega authentication schemes work by associating one or more roles to an access group. Roles are additive. The more roles that you add to an access group, the more authorization there is Privileges can be associated with one or more roles. The application comes with the following pre- defined roles:
For more information, see Access group and role configuration in the Pega 8.4 help.