Authentication and authorization
Pega 8provides security capabilities that are both flexible and layered. The security model is based on user authentication for system access and on authorization for particular application elements once users are logged in.
Authorization features allow you to define access at different levels:
- Your ruleset and versions
- Classes (types of work)
- Certain individual rules, such as flows
Standard security rules provide access to rulesets, classes, and individual rules, many of which may suit your access requirements with little or no modification.
Previous topic Understanding security basics Next topic Security configuration components