Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

Implementing your authentication scheme

Updated on May 22, 2021
Centralize and automatically maintain operator data instead of maintaining it manually in your application.
  1. Discuss Authentication schemes with your site's security and application server teams.
  2. Determine the appropriate authentication type.

    For more information on authentication scheme planning, see Authentication in Pega Platform.

  • Previous topic Implementing the security model and organization structure
  • Next topic Implementing your authorization scheme

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us