Security of the working environment
Pega Smart Investigate for Payments
Implementation Guide
Your application is preconfigured with usable security models that you can further customize to support your organization. The following sections describe some of the mechanisms through which your application and the underlying Pega 8 architecture provide a secure working environment.
Previous topic Operators, access groups, and access roles Next topic Security components