Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

Authentication and authorization

Updated on March 4, 2022

Pega 8provides security capabilities that are both flexible and layered. The security model is based on user authentication for system access and on authorization for particular application elements once users are logged in.

Authorization features allow you to define access at different levels:

  • Your ruleset and versions
  • Classes (types of work)
  • Certain individual rules, such as flows

Standard security rules provide access to rulesets, classes, and individual rules, many of which may suit your access requirements with little or no modification.

Pega Smart Investigate for Payments Implementation Guide

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us